Hay
Date
July 11, 2025, 10:11 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   64.908454] ==================================================================
[   64.915486] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   64.922862] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   64.930153] 
[   64.931636] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   64.931690] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.931707] Hardware name: WinLink E850-96 board (DT)
[   64.931728] Call trace:
[   64.931741]  show_stack+0x20/0x38 (C)
[   64.931776]  dump_stack_lvl+0x8c/0xd0
[   64.931809]  print_report+0x118/0x5d0
[   64.931839]  kasan_report+0xdc/0x128
[   64.931866]  __asan_report_load4_noabort+0x20/0x30
[   64.931900]  kasan_atomics_helper+0x40fc/0x4858
[   64.931935]  kasan_atomics+0x198/0x2e0
[   64.931967]  kunit_try_run_case+0x170/0x3f0
[   64.932006]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.932039]  kthread+0x328/0x630
[   64.932068]  ret_from_fork+0x10/0x20
[   64.932102] 
[   64.999770] Allocated by task 349:
[   65.003158]  kasan_save_stack+0x3c/0x68
[   65.006975]  kasan_save_track+0x20/0x40
[   65.010795]  kasan_save_alloc_info+0x40/0x58
[   65.015048]  __kasan_kmalloc+0xd4/0xd8
[   65.018781]  __kmalloc_cache_noprof+0x16c/0x3c0
[   65.023294]  kasan_atomics+0xb8/0x2e0
[   65.026940]  kunit_try_run_case+0x170/0x3f0
[   65.031107]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.036575]  kthread+0x328/0x630
[   65.039787]  ret_from_fork+0x10/0x20
[   65.043346] 
[   65.044822] The buggy address belongs to the object at ffff000807848f80
[   65.044822]  which belongs to the cache kmalloc-64 of size 64
[   65.057148] The buggy address is located 0 bytes to the right of
[   65.057148]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   65.069995] 
[   65.071473] The buggy address belongs to the physical page:
[   65.077030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   65.085015] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   65.091524] page_type: f5(slab)
[   65.094657] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   65.102380] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.110099] page dumped because: kasan: bad access detected
[   65.115654] 
[   65.117130] Memory state around the buggy address:
[   65.121909]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.129112]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.136319] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.143518]                                      ^
[   65.148296]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.155501]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.162702] ==================================================================
[   68.081146] ==================================================================
[   68.088180] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   68.095471] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   68.102849] 
[   68.104330] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   68.104381] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.104398] Hardware name: WinLink E850-96 board (DT)
[   68.104416] Call trace:
[   68.104429]  show_stack+0x20/0x38 (C)
[   68.104461]  dump_stack_lvl+0x8c/0xd0
[   68.104491]  print_report+0x118/0x5d0
[   68.104519]  kasan_report+0xdc/0x128
[   68.104547]  kasan_check_range+0x100/0x1a8
[   68.104578]  __kasan_check_write+0x20/0x30
[   68.104609]  kasan_atomics_helper+0x760/0x4858
[   68.104645]  kasan_atomics+0x198/0x2e0
[   68.104677]  kunit_try_run_case+0x170/0x3f0
[   68.104711]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.104745]  kthread+0x328/0x630
[   68.104771]  ret_from_fork+0x10/0x20
[   68.104802] 
[   68.175764] Allocated by task 349:
[   68.179150]  kasan_save_stack+0x3c/0x68
[   68.182969]  kasan_save_track+0x20/0x40
[   68.186789]  kasan_save_alloc_info+0x40/0x58
[   68.191042]  __kasan_kmalloc+0xd4/0xd8
[   68.194775]  __kmalloc_cache_noprof+0x16c/0x3c0
[   68.199289]  kasan_atomics+0xb8/0x2e0
[   68.202934]  kunit_try_run_case+0x170/0x3f0
[   68.207101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.212570]  kthread+0x328/0x630
[   68.215781]  ret_from_fork+0x10/0x20
[   68.219340] 
[   68.220816] The buggy address belongs to the object at ffff000807848f80
[   68.220816]  which belongs to the cache kmalloc-64 of size 64
[   68.233143] The buggy address is located 0 bytes to the right of
[   68.233143]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   68.245989] 
[   68.247465] The buggy address belongs to the physical page:
[   68.253021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   68.261006] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   68.267517] page_type: f5(slab)
[   68.270649] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   68.278374] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.286093] page dumped because: kasan: bad access detected
[   68.291648] 
[   68.293124] Memory state around the buggy address:
[   68.297902]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.305107]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.312311] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.319512]                                      ^
[   68.324291]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   68.331495]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   68.338696] ==================================================================
[   70.988733] ==================================================================
[   70.995776] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   71.003153] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   71.010444] 
[   71.011924] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   71.011972] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.011990] Hardware name: WinLink E850-96 board (DT)
[   71.012007] Call trace:
[   71.012019]  show_stack+0x20/0x38 (C)
[   71.012051]  dump_stack_lvl+0x8c/0xd0
[   71.012082]  print_report+0x118/0x5d0
[   71.012111]  kasan_report+0xdc/0x128
[   71.012139]  __asan_report_load4_noabort+0x20/0x30
[   71.012172]  kasan_atomics_helper+0x3dbc/0x4858
[   71.012208]  kasan_atomics+0x198/0x2e0
[   71.012239]  kunit_try_run_case+0x170/0x3f0
[   71.012278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.012311]  kthread+0x328/0x630
[   71.012338]  ret_from_fork+0x10/0x20
[   71.012370] 
[   71.080061] Allocated by task 349:
[   71.083447]  kasan_save_stack+0x3c/0x68
[   71.087266]  kasan_save_track+0x20/0x40
[   71.091086]  kasan_save_alloc_info+0x40/0x58
[   71.095339]  __kasan_kmalloc+0xd4/0xd8
[   71.099071]  __kmalloc_cache_noprof+0x16c/0x3c0
[   71.103585]  kasan_atomics+0xb8/0x2e0
[   71.107231]  kunit_try_run_case+0x170/0x3f0
[   71.111398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.116866]  kthread+0x328/0x630
[   71.120078]  ret_from_fork+0x10/0x20
[   71.123637] 
[   71.125113] The buggy address belongs to the object at ffff000807848f80
[   71.125113]  which belongs to the cache kmalloc-64 of size 64
[   71.137439] The buggy address is located 0 bytes to the right of
[   71.137439]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   71.150286] 
[   71.151762] The buggy address belongs to the physical page:
[   71.157318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   71.165305] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   71.171813] page_type: f5(slab)
[   71.174946] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   71.182671] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   71.190390] page dumped because: kasan: bad access detected
[   71.195945] 
[   71.197420] Memory state around the buggy address:
[   71.202198]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.209403]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.216608] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   71.223809]                                      ^
[   71.228587]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   71.235792]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   71.242993] ==================================================================
[   64.114026] ==================================================================
[   64.121055] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   64.128345] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   64.135634] 
[   64.137120] CPU: 7 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   64.137181] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.137196] Hardware name: WinLink E850-96 board (DT)
[   64.137219] Call trace:
[   64.137235]  show_stack+0x20/0x38 (C)
[   64.137270]  dump_stack_lvl+0x8c/0xd0
[   64.137304]  print_report+0x118/0x5d0
[   64.137334]  kasan_report+0xdc/0x128
[   64.137361]  kasan_check_range+0x100/0x1a8
[   64.137393]  __kasan_check_read+0x20/0x30
[   64.137426]  kasan_atomics_helper+0x1ec/0x4858
[   64.137461]  kasan_atomics+0x198/0x2e0
[   64.137493]  kunit_try_run_case+0x170/0x3f0
[   64.137532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.137565]  kthread+0x328/0x630
[   64.137593]  ret_from_fork+0x10/0x20
[   64.137628] 
[   64.208463] Allocated by task 349:
[   64.211851]  kasan_save_stack+0x3c/0x68
[   64.215668]  kasan_save_track+0x20/0x40
[   64.219487]  kasan_save_alloc_info+0x40/0x58
[   64.223741]  __kasan_kmalloc+0xd4/0xd8
[   64.227473]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.231987]  kasan_atomics+0xb8/0x2e0
[   64.235633]  kunit_try_run_case+0x170/0x3f0
[   64.239799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.245268]  kthread+0x328/0x630
[   64.248480]  ret_from_fork+0x10/0x20
[   64.252039] 
[   64.253516] The buggy address belongs to the object at ffff000807848f80
[   64.253516]  which belongs to the cache kmalloc-64 of size 64
[   64.265841] The buggy address is located 0 bytes to the right of
[   64.265841]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   64.278689] 
[   64.280165] The buggy address belongs to the physical page:
[   64.285722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   64.293707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   64.300216] page_type: f5(slab)
[   64.303350] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   64.311072] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.318791] page dumped because: kasan: bad access detected
[   64.324347] 
[   64.325822] Memory state around the buggy address:
[   64.330603]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.337805]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.345010] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.352211]                                      ^
[   64.356990]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.364193]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.371394] ==================================================================
[   65.961763] ==================================================================
[   65.968771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   65.976058] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   65.983436] 
[   65.984920] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   65.984973] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.984989] Hardware name: WinLink E850-96 board (DT)
[   65.985008] Call trace:
[   65.985025]  show_stack+0x20/0x38 (C)
[   65.985057]  dump_stack_lvl+0x8c/0xd0
[   65.985090]  print_report+0x118/0x5d0
[   65.985118]  kasan_report+0xdc/0x128
[   65.985146]  kasan_check_range+0x100/0x1a8
[   65.985177]  __kasan_check_write+0x20/0x30
[   65.985208]  kasan_atomics_helper+0x414/0x4858
[   65.985245]  kasan_atomics+0x198/0x2e0
[   65.985279]  kunit_try_run_case+0x170/0x3f0
[   65.985315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.985348]  kthread+0x328/0x630
[   65.985378]  ret_from_fork+0x10/0x20
[   65.985413] 
[   66.056352] Allocated by task 349:
[   66.059737]  kasan_save_stack+0x3c/0x68
[   66.063557]  kasan_save_track+0x20/0x40
[   66.067376]  kasan_save_alloc_info+0x40/0x58
[   66.071630]  __kasan_kmalloc+0xd4/0xd8
[   66.075362]  __kmalloc_cache_noprof+0x16c/0x3c0
[   66.079876]  kasan_atomics+0xb8/0x2e0
[   66.083522]  kunit_try_run_case+0x170/0x3f0
[   66.087688]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.093157]  kthread+0x328/0x630
[   66.096368]  ret_from_fork+0x10/0x20
[   66.099928] 
[   66.101403] The buggy address belongs to the object at ffff000807848f80
[   66.101403]  which belongs to the cache kmalloc-64 of size 64
[   66.113730] The buggy address is located 0 bytes to the right of
[   66.113730]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   66.126576] 
[   66.128054] The buggy address belongs to the physical page:
[   66.133610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   66.141597] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   66.148104] page_type: f5(slab)
[   66.151238] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   66.158961] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.166680] page dumped because: kasan: bad access detected
[   66.172235] 
[   66.173711] Memory state around the buggy address:
[   66.178490]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.185694]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.192901] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.200100]                                      ^
[   66.204877]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   66.212083]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   66.219283] ==================================================================
[   75.207929] ==================================================================
[   75.214986] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   75.222360] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   75.229738] 
[   75.231219] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   75.231268] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.231285] Hardware name: WinLink E850-96 board (DT)
[   75.231304] Call trace:
[   75.231317]  show_stack+0x20/0x38 (C)
[   75.231348]  dump_stack_lvl+0x8c/0xd0
[   75.231377]  print_report+0x118/0x5d0
[   75.231407]  kasan_report+0xdc/0x128
[   75.231435]  kasan_check_range+0x100/0x1a8
[   75.231464]  __kasan_check_write+0x20/0x30
[   75.231496]  kasan_atomics_helper+0x10c0/0x4858
[   75.231531]  kasan_atomics+0x198/0x2e0
[   75.231565]  kunit_try_run_case+0x170/0x3f0
[   75.231603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.231635]  kthread+0x328/0x630
[   75.231662]  ret_from_fork+0x10/0x20
[   75.231693] 
[   75.302741] Allocated by task 349:
[   75.306126]  kasan_save_stack+0x3c/0x68
[   75.309946]  kasan_save_track+0x20/0x40
[   75.313765]  kasan_save_alloc_info+0x40/0x58
[   75.318018]  __kasan_kmalloc+0xd4/0xd8
[   75.321751]  __kmalloc_cache_noprof+0x16c/0x3c0
[   75.326265]  kasan_atomics+0xb8/0x2e0
[   75.329911]  kunit_try_run_case+0x170/0x3f0
[   75.334077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.339546]  kthread+0x328/0x630
[   75.342758]  ret_from_fork+0x10/0x20
[   75.346317] 
[   75.347792] The buggy address belongs to the object at ffff000807848f80
[   75.347792]  which belongs to the cache kmalloc-64 of size 64
[   75.360119] The buggy address is located 0 bytes to the right of
[   75.360119]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   75.372965] 
[   75.374441] The buggy address belongs to the physical page:
[   75.379998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   75.387983] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   75.394493] page_type: f5(slab)
[   75.397627] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   75.405350] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.413069] page dumped because: kasan: bad access detected
[   75.418624] 
[   75.420100] Memory state around the buggy address:
[   75.424878]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.432083]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.439288] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.446489]                                      ^
[   75.451266]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   75.458471]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   75.465672] ==================================================================
[   76.798493] ==================================================================
[   76.805585] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   76.812962] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   76.820340] 
[   76.821819] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   76.821868] Tainted: [B]=BAD_PAGE, [N]=TEST
[   76.821885] Hardware name: WinLink E850-96 board (DT)
[   76.821902] Call trace:
[   76.821915]  show_stack+0x20/0x38 (C)
[   76.821948]  dump_stack_lvl+0x8c/0xd0
[   76.821979]  print_report+0x118/0x5d0
[   76.822006]  kasan_report+0xdc/0x128
[   76.822035]  kasan_check_range+0x100/0x1a8
[   76.822063]  __kasan_check_write+0x20/0x30
[   76.822095]  kasan_atomics_helper+0x1384/0x4858
[   76.822129]  kasan_atomics+0x198/0x2e0
[   76.822163]  kunit_try_run_case+0x170/0x3f0
[   76.822198]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.822232]  kthread+0x328/0x630
[   76.822259]  ret_from_fork+0x10/0x20
[   76.822292] 
[   76.893342] Allocated by task 349:
[   76.896727]  kasan_save_stack+0x3c/0x68
[   76.900547]  kasan_save_track+0x20/0x40
[   76.904366]  kasan_save_alloc_info+0x40/0x58
[   76.908619]  __kasan_kmalloc+0xd4/0xd8
[   76.912352]  __kmalloc_cache_noprof+0x16c/0x3c0
[   76.916866]  kasan_atomics+0xb8/0x2e0
[   76.920512]  kunit_try_run_case+0x170/0x3f0
[   76.924678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.930147]  kthread+0x328/0x630
[   76.933359]  ret_from_fork+0x10/0x20
[   76.936918] 
[   76.938393] The buggy address belongs to the object at ffff000807848f80
[   76.938393]  which belongs to the cache kmalloc-64 of size 64
[   76.950720] The buggy address is located 0 bytes to the right of
[   76.950720]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   76.963567] 
[   76.965042] The buggy address belongs to the physical page:
[   76.970598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   76.978584] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   76.985094] page_type: f5(slab)
[   76.988227] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   76.995951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   77.003670] page dumped because: kasan: bad access detected
[   77.009225] 
[   77.010701] Memory state around the buggy address:
[   77.015479]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.022684]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.029889] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.037090]                                      ^
[   77.041868]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   77.049073]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   77.056274] ==================================================================
[   69.932304] ==================================================================
[   69.939368] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   69.946659] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   69.954037] 
[   69.955516] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   69.955567] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.955582] Hardware name: WinLink E850-96 board (DT)
[   69.955599] Call trace:
[   69.955611]  show_stack+0x20/0x38 (C)
[   69.955641]  dump_stack_lvl+0x8c/0xd0
[   69.955673]  print_report+0x118/0x5d0
[   69.955699]  kasan_report+0xdc/0x128
[   69.955724]  kasan_check_range+0x100/0x1a8
[   69.955756]  __kasan_check_write+0x20/0x30
[   69.955787]  kasan_atomics_helper+0xa6c/0x4858
[   69.955823]  kasan_atomics+0x198/0x2e0
[   69.955857]  kunit_try_run_case+0x170/0x3f0
[   69.955890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.955923]  kthread+0x328/0x630
[   69.955949]  ret_from_fork+0x10/0x20
[   69.955982] 
[   70.026952] Allocated by task 349:
[   70.030337]  kasan_save_stack+0x3c/0x68
[   70.034157]  kasan_save_track+0x20/0x40
[   70.037976]  kasan_save_alloc_info+0x40/0x58
[   70.042230]  __kasan_kmalloc+0xd4/0xd8
[   70.045962]  __kmalloc_cache_noprof+0x16c/0x3c0
[   70.050476]  kasan_atomics+0xb8/0x2e0
[   70.054122]  kunit_try_run_case+0x170/0x3f0
[   70.058289]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.063757]  kthread+0x328/0x630
[   70.066968]  ret_from_fork+0x10/0x20
[   70.070528] 
[   70.072004] The buggy address belongs to the object at ffff000807848f80
[   70.072004]  which belongs to the cache kmalloc-64 of size 64
[   70.084330] The buggy address is located 0 bytes to the right of
[   70.084330]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   70.097177] 
[   70.098653] The buggy address belongs to the physical page:
[   70.104208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   70.112194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   70.118704] page_type: f5(slab)
[   70.121837] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   70.129561] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.137280] page dumped because: kasan: bad access detected
[   70.142836] 
[   70.144311] Memory state around the buggy address:
[   70.149089]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.156294]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.163499] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.170700]                                      ^
[   70.175478]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   70.182682]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   70.189884] ==================================================================
[   77.855473] ==================================================================
[   77.862513] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   77.869890] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   77.877268] 
[   77.878750] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   77.878800] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.878815] Hardware name: WinLink E850-96 board (DT)
[   77.878835] Call trace:
[   77.878848]  show_stack+0x20/0x38 (C)
[   77.878882]  dump_stack_lvl+0x8c/0xd0
[   77.878911]  print_report+0x118/0x5d0
[   77.878941]  kasan_report+0xdc/0x128
[   77.878969]  kasan_check_range+0x100/0x1a8
[   77.879001]  __kasan_check_write+0x20/0x30
[   77.879029]  kasan_atomics_helper+0x14e4/0x4858
[   77.879064]  kasan_atomics+0x198/0x2e0
[   77.879097]  kunit_try_run_case+0x170/0x3f0
[   77.879131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.879165]  kthread+0x328/0x630
[   77.879191]  ret_from_fork+0x10/0x20
[   77.879222] 
[   77.950270] Allocated by task 349:
[   77.953656]  kasan_save_stack+0x3c/0x68
[   77.957475]  kasan_save_track+0x20/0x40
[   77.961295]  kasan_save_alloc_info+0x40/0x58
[   77.965548]  __kasan_kmalloc+0xd4/0xd8
[   77.969281]  __kmalloc_cache_noprof+0x16c/0x3c0
[   77.973795]  kasan_atomics+0xb8/0x2e0
[   77.977440]  kunit_try_run_case+0x170/0x3f0
[   77.981607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.987076]  kthread+0x328/0x630
[   77.990287]  ret_from_fork+0x10/0x20
[   77.993846] 
[   77.995322] The buggy address belongs to the object at ffff000807848f80
[   77.995322]  which belongs to the cache kmalloc-64 of size 64
[   78.007649] The buggy address is located 0 bytes to the right of
[   78.007649]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   78.020495] 
[   78.021973] The buggy address belongs to the physical page:
[   78.027527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   78.035513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   78.042023] page_type: f5(slab)
[   78.045157] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   78.052879] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   78.060598] page dumped because: kasan: bad access detected
[   78.066154] 
[   78.067630] Memory state around the buggy address:
[   78.072408]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.079613]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.086818] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   78.094018]                                      ^
[   78.098796]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   78.106001]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   78.113202] ==================================================================
[   63.583501] ==================================================================
[   63.597628] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   63.605004] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   63.612293] 
[   63.613777] CPU: 5 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   63.613840] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.613856] Hardware name: WinLink E850-96 board (DT)
[   63.613879] Call trace:
[   63.613894]  show_stack+0x20/0x38 (C)
[   63.613930]  dump_stack_lvl+0x8c/0xd0
[   63.613964]  print_report+0x118/0x5d0
[   63.613995]  kasan_report+0xdc/0x128
[   63.614022]  __asan_report_load4_noabort+0x20/0x30
[   63.614059]  kasan_atomics_helper+0x40a8/0x4858
[   63.614095]  kasan_atomics+0x198/0x2e0
[   63.614127]  kunit_try_run_case+0x170/0x3f0
[   63.614168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.614203]  kthread+0x328/0x630
[   63.614233]  ret_from_fork+0x10/0x20
[   63.614270] 
[   63.681910] Allocated by task 349:
[   63.685295]  kasan_save_stack+0x3c/0x68
[   63.689113]  kasan_save_track+0x20/0x40
[   63.692932]  kasan_save_alloc_info+0x40/0x58
[   63.697186]  __kasan_kmalloc+0xd4/0xd8
[   63.700920]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.705432]  kasan_atomics+0xb8/0x2e0
[   63.709078]  kunit_try_run_case+0x170/0x3f0
[   63.713244]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.718713]  kthread+0x328/0x630
[   63.721925]  ret_from_fork+0x10/0x20
[   63.725484] 
[   63.726961] The buggy address belongs to the object at ffff000807848f80
[   63.726961]  which belongs to the cache kmalloc-64 of size 64
[   63.739288] The buggy address is located 0 bytes to the right of
[   63.739288]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   63.752133] 
[   63.753612] The buggy address belongs to the physical page:
[   63.759168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   63.767153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.773663] page_type: f5(slab)
[   63.776798] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.784517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.792238] page dumped because: kasan: bad access detected
[   63.797792] 
[   63.799267] Memory state around the buggy address:
[   63.804049]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.811251]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.818457] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.825656]                                      ^
[   63.830435]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   63.837639]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   63.844843] ==================================================================
[   79.439102] ==================================================================
[   79.446170] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   79.453547] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   79.460925] 
[   79.462406] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   79.462457] Tainted: [B]=BAD_PAGE, [N]=TEST
[   79.462474] Hardware name: WinLink E850-96 board (DT)
[   79.462494] Call trace:
[   79.462505]  show_stack+0x20/0x38 (C)
[   79.462539]  dump_stack_lvl+0x8c/0xd0
[   79.462570]  print_report+0x118/0x5d0
[   79.462597]  kasan_report+0xdc/0x128
[   79.462625]  kasan_check_range+0x100/0x1a8
[   79.462655]  __kasan_check_write+0x20/0x30
[   79.462686]  kasan_atomics_helper+0x16d0/0x4858
[   79.462722]  kasan_atomics+0x198/0x2e0
[   79.462753]  kunit_try_run_case+0x170/0x3f0
[   79.462789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.462821]  kthread+0x328/0x630
[   79.462849]  ret_from_fork+0x10/0x20
[   79.462880] 
[   79.533927] Allocated by task 349:
[   79.537313]  kasan_save_stack+0x3c/0x68
[   79.541132]  kasan_save_track+0x20/0x40
[   79.544952]  kasan_save_alloc_info+0x40/0x58
[   79.549205]  __kasan_kmalloc+0xd4/0xd8
[   79.552937]  __kmalloc_cache_noprof+0x16c/0x3c0
[   79.557451]  kasan_atomics+0xb8/0x2e0
[   79.561097]  kunit_try_run_case+0x170/0x3f0
[   79.565264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.570732]  kthread+0x328/0x630
[   79.573944]  ret_from_fork+0x10/0x20
[   79.577503] 
[   79.578979] The buggy address belongs to the object at ffff000807848f80
[   79.578979]  which belongs to the cache kmalloc-64 of size 64
[   79.591306] The buggy address is located 0 bytes to the right of
[   79.591306]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   79.604152] 
[   79.605630] The buggy address belongs to the physical page:
[   79.611184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   79.619170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   79.625680] page_type: f5(slab)
[   79.628814] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   79.636537] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   79.644256] page dumped because: kasan: bad access detected
[   79.649811] 
[   79.651287] Memory state around the buggy address:
[   79.656064]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   79.663269]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   79.670474] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   79.677675]                                      ^
[   79.682453]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   79.689658]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   79.696859] ==================================================================
[   69.137553] ==================================================================
[   69.144588] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   69.151879] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   69.159257] 
[   69.160738] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   69.160785] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.160801] Hardware name: WinLink E850-96 board (DT)
[   69.160816] Call trace:
[   69.160830]  show_stack+0x20/0x38 (C)
[   69.160863]  dump_stack_lvl+0x8c/0xd0
[   69.160893]  print_report+0x118/0x5d0
[   69.160920]  kasan_report+0xdc/0x128
[   69.160947]  kasan_check_range+0x100/0x1a8
[   69.160977]  __kasan_check_write+0x20/0x30
[   69.161008]  kasan_atomics_helper+0x934/0x4858
[   69.161043]  kasan_atomics+0x198/0x2e0
[   69.161076]  kunit_try_run_case+0x170/0x3f0
[   69.161113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.161145]  kthread+0x328/0x630
[   69.161172]  ret_from_fork+0x10/0x20
[   69.161203] 
[   69.232172] Allocated by task 349:
[   69.235558]  kasan_save_stack+0x3c/0x68
[   69.239377]  kasan_save_track+0x20/0x40
[   69.243197]  kasan_save_alloc_info+0x40/0x58
[   69.247450]  __kasan_kmalloc+0xd4/0xd8
[   69.251183]  __kmalloc_cache_noprof+0x16c/0x3c0
[   69.255696]  kasan_atomics+0xb8/0x2e0
[   69.259342]  kunit_try_run_case+0x170/0x3f0
[   69.263508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.268977]  kthread+0x328/0x630
[   69.272189]  ret_from_fork+0x10/0x20
[   69.275748] 
[   69.277224] The buggy address belongs to the object at ffff000807848f80
[   69.277224]  which belongs to the cache kmalloc-64 of size 64
[   69.289550] The buggy address is located 0 bytes to the right of
[   69.289550]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   69.302397] 
[   69.303873] The buggy address belongs to the physical page:
[   69.309429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   69.317416] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   69.323924] page_type: f5(slab)
[   69.327059] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   69.334781] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.342501] page dumped because: kasan: bad access detected
[   69.348056] 
[   69.349531] Memory state around the buggy address:
[   69.354310]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.361515]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.368719] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.375920]                                      ^
[   69.380698]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   69.387902]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   69.395104] ==================================================================
[   68.346048] ==================================================================
[   68.353107] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   68.360397] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   68.367776] 
[   68.369255] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   68.369302] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.369318] Hardware name: WinLink E850-96 board (DT)
[   68.369336] Call trace:
[   68.369349]  show_stack+0x20/0x38 (C)
[   68.369380]  dump_stack_lvl+0x8c/0xd0
[   68.369411]  print_report+0x118/0x5d0
[   68.369437]  kasan_report+0xdc/0x128
[   68.369466]  kasan_check_range+0x100/0x1a8
[   68.369494]  __kasan_check_write+0x20/0x30
[   68.369524]  kasan_atomics_helper+0x7cc/0x4858
[   68.369559]  kasan_atomics+0x198/0x2e0
[   68.369592]  kunit_try_run_case+0x170/0x3f0
[   68.369627]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.369659]  kthread+0x328/0x630
[   68.369686]  ret_from_fork+0x10/0x20
[   68.369716] 
[   68.440691] Allocated by task 349:
[   68.444077]  kasan_save_stack+0x3c/0x68
[   68.447896]  kasan_save_track+0x20/0x40
[   68.451715]  kasan_save_alloc_info+0x40/0x58
[   68.455969]  __kasan_kmalloc+0xd4/0xd8
[   68.459701]  __kmalloc_cache_noprof+0x16c/0x3c0
[   68.464215]  kasan_atomics+0xb8/0x2e0
[   68.467861]  kunit_try_run_case+0x170/0x3f0
[   68.472027]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.477496]  kthread+0x328/0x630
[   68.480708]  ret_from_fork+0x10/0x20
[   68.484267] 
[   68.485742] The buggy address belongs to the object at ffff000807848f80
[   68.485742]  which belongs to the cache kmalloc-64 of size 64
[   68.498069] The buggy address is located 0 bytes to the right of
[   68.498069]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   68.510916] 
[   68.512391] The buggy address belongs to the physical page:
[   68.517947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   68.525933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   68.532443] page_type: f5(slab)
[   68.535578] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   68.543300] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.551020] page dumped because: kasan: bad access detected
[   68.556575] 
[   68.558050] Memory state around the buggy address:
[   68.562828]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.570033]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.577238] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.584439]                                      ^
[   68.589217]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   68.596421]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   68.603623] ==================================================================
[   71.250340] ==================================================================
[   71.257404] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   71.264694] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   71.272072] 
[   71.273551] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   71.273601] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.273619] Hardware name: WinLink E850-96 board (DT)
[   71.273638] Call trace:
[   71.273653]  show_stack+0x20/0x38 (C)
[   71.273686]  dump_stack_lvl+0x8c/0xd0
[   71.273716]  print_report+0x118/0x5d0
[   71.273746]  kasan_report+0xdc/0x128
[   71.273772]  kasan_check_range+0x100/0x1a8
[   71.273803]  __kasan_check_write+0x20/0x30
[   71.273835]  kasan_atomics_helper+0xc08/0x4858
[   71.273870]  kasan_atomics+0x198/0x2e0
[   71.273903]  kunit_try_run_case+0x170/0x3f0
[   71.273937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.273971]  kthread+0x328/0x630
[   71.273998]  ret_from_fork+0x10/0x20
[   71.274029] 
[   71.344988] Allocated by task 349:
[   71.348373]  kasan_save_stack+0x3c/0x68
[   71.352192]  kasan_save_track+0x20/0x40
[   71.356012]  kasan_save_alloc_info+0x40/0x58
[   71.360266]  __kasan_kmalloc+0xd4/0xd8
[   71.363998]  __kmalloc_cache_noprof+0x16c/0x3c0
[   71.368512]  kasan_atomics+0xb8/0x2e0
[   71.372157]  kunit_try_run_case+0x170/0x3f0
[   71.376324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.381793]  kthread+0x328/0x630
[   71.385005]  ret_from_fork+0x10/0x20
[   71.388564] 
[   71.390039] The buggy address belongs to the object at ffff000807848f80
[   71.390039]  which belongs to the cache kmalloc-64 of size 64
[   71.402366] The buggy address is located 0 bytes to the right of
[   71.402366]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   71.415212] 
[   71.416688] The buggy address belongs to the physical page:
[   71.422244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   71.430230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   71.436740] page_type: f5(slab)
[   71.439873] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   71.447597] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   71.455316] page dumped because: kasan: bad access detected
[   71.460871] 
[   71.462347] Memory state around the buggy address:
[   71.467125]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.474330]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.481534] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   71.488735]                                      ^
[   71.493513]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   71.500718]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   71.507920] ==================================================================
[   78.650751] ==================================================================
[   78.657813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   78.665191] Read of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   78.672482] 
[   78.673962] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   78.674008] Tainted: [B]=BAD_PAGE, [N]=TEST
[   78.674026] Hardware name: WinLink E850-96 board (DT)
[   78.674046] Call trace:
[   78.674056]  show_stack+0x20/0x38 (C)
[   78.674091]  dump_stack_lvl+0x8c/0xd0
[   78.674119]  print_report+0x118/0x5d0
[   78.674147]  kasan_report+0xdc/0x128
[   78.674176]  __asan_report_load8_noabort+0x20/0x30
[   78.674208]  kasan_atomics_helper+0x3db0/0x4858
[   78.674243]  kasan_atomics+0x198/0x2e0
[   78.674277]  kunit_try_run_case+0x170/0x3f0
[   78.674312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.674345]  kthread+0x328/0x630
[   78.674372]  ret_from_fork+0x10/0x20
[   78.674404] 
[   78.742099] Allocated by task 349:
[   78.745484]  kasan_save_stack+0x3c/0x68
[   78.749304]  kasan_save_track+0x20/0x40
[   78.753123]  kasan_save_alloc_info+0x40/0x58
[   78.757377]  __kasan_kmalloc+0xd4/0xd8
[   78.761109]  __kmalloc_cache_noprof+0x16c/0x3c0
[   78.765623]  kasan_atomics+0xb8/0x2e0
[   78.769269]  kunit_try_run_case+0x170/0x3f0
[   78.773435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.778904]  kthread+0x328/0x630
[   78.782116]  ret_from_fork+0x10/0x20
[   78.785675] 
[   78.787150] The buggy address belongs to the object at ffff000807848f80
[   78.787150]  which belongs to the cache kmalloc-64 of size 64
[   78.799477] The buggy address is located 0 bytes to the right of
[   78.799477]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   78.812324] 
[   78.813799] The buggy address belongs to the physical page:
[   78.819355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   78.827341] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   78.833851] page_type: f5(slab)
[   78.836984] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   78.844708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   78.852427] page dumped because: kasan: bad access detected
[   78.857983] 
[   78.859458] Memory state around the buggy address:
[   78.864236]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.871441]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.878646] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   78.885847]                                      ^
[   78.890625]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   78.897829]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   78.905031] ==================================================================
[   73.621310] ==================================================================
[   73.628376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   73.635752] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   73.643130] 
[   73.644611] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   73.644660] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.644677] Hardware name: WinLink E850-96 board (DT)
[   73.644695] Call trace:
[   73.644709]  show_stack+0x20/0x38 (C)
[   73.644743]  dump_stack_lvl+0x8c/0xd0
[   73.644775]  print_report+0x118/0x5d0
[   73.644803]  kasan_report+0xdc/0x128
[   73.644830]  __asan_report_store8_noabort+0x20/0x30
[   73.644862]  kasan_atomics_helper+0x3e5c/0x4858
[   73.644897]  kasan_atomics+0x198/0x2e0
[   73.644931]  kunit_try_run_case+0x170/0x3f0
[   73.644966]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.645000]  kthread+0x328/0x630
[   73.645028]  ret_from_fork+0x10/0x20
[   73.645059] 
[   73.712834] Allocated by task 349:
[   73.716219]  kasan_save_stack+0x3c/0x68
[   73.720039]  kasan_save_track+0x20/0x40
[   73.723858]  kasan_save_alloc_info+0x40/0x58
[   73.728112]  __kasan_kmalloc+0xd4/0xd8
[   73.731844]  __kmalloc_cache_noprof+0x16c/0x3c0
[   73.736358]  kasan_atomics+0xb8/0x2e0
[   73.740004]  kunit_try_run_case+0x170/0x3f0
[   73.744171]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.749639]  kthread+0x328/0x630
[   73.752851]  ret_from_fork+0x10/0x20
[   73.756410] 
[   73.757886] The buggy address belongs to the object at ffff000807848f80
[   73.757886]  which belongs to the cache kmalloc-64 of size 64
[   73.770212] The buggy address is located 0 bytes to the right of
[   73.770212]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   73.783059] 
[   73.784535] The buggy address belongs to the physical page:
[   73.790090] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   73.798076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   73.804586] page_type: f5(slab)
[   73.807723] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   73.815443] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.823163] page dumped because: kasan: bad access detected
[   73.828718] 
[   73.830194] Memory state around the buggy address:
[   73.834971]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.842176]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.849381] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.856582]                                      ^
[   73.861360]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.868565]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.875766] ==================================================================
[   78.120523] ==================================================================
[   78.127614] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   78.134991] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   78.142369] 
[   78.143848] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   78.143895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   78.143912] Hardware name: WinLink E850-96 board (DT)
[   78.143930] Call trace:
[   78.143944]  show_stack+0x20/0x38 (C)
[   78.143979]  dump_stack_lvl+0x8c/0xd0
[   78.144007]  print_report+0x118/0x5d0
[   78.144038]  kasan_report+0xdc/0x128
[   78.144067]  kasan_check_range+0x100/0x1a8
[   78.144098]  __kasan_check_write+0x20/0x30
[   78.144129]  kasan_atomics_helper+0x154c/0x4858
[   78.144165]  kasan_atomics+0x198/0x2e0
[   78.144198]  kunit_try_run_case+0x170/0x3f0
[   78.144235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.144267]  kthread+0x328/0x630
[   78.144293]  ret_from_fork+0x10/0x20
[   78.144326] 
[   78.215371] Allocated by task 349:
[   78.218757]  kasan_save_stack+0x3c/0x68
[   78.222575]  kasan_save_track+0x20/0x40
[   78.226395]  kasan_save_alloc_info+0x40/0x58
[   78.230648]  __kasan_kmalloc+0xd4/0xd8
[   78.234381]  __kmalloc_cache_noprof+0x16c/0x3c0
[   78.238895]  kasan_atomics+0xb8/0x2e0
[   78.242540]  kunit_try_run_case+0x170/0x3f0
[   78.246707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.252176]  kthread+0x328/0x630
[   78.255387]  ret_from_fork+0x10/0x20
[   78.258946] 
[   78.260422] The buggy address belongs to the object at ffff000807848f80
[   78.260422]  which belongs to the cache kmalloc-64 of size 64
[   78.272749] The buggy address is located 0 bytes to the right of
[   78.272749]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   78.285595] 
[   78.287071] The buggy address belongs to the physical page:
[   78.292627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   78.300613] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   78.307123] page_type: f5(slab)
[   78.310256] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   78.317980] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   78.325699] page dumped because: kasan: bad access detected
[   78.331254] 
[   78.332730] Memory state around the buggy address:
[   78.337508]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.344713]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.351917] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   78.359119]                                      ^
[   78.363897]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   78.371101]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   78.378302] ==================================================================
[   78.912400] ==================================================================
[   78.919442] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   78.926819] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   78.934197] 
[   78.935676] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   78.935725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   78.935741] Hardware name: WinLink E850-96 board (DT)
[   78.935758] Call trace:
[   78.935772]  show_stack+0x20/0x38 (C)
[   78.935804]  dump_stack_lvl+0x8c/0xd0
[   78.935834]  print_report+0x118/0x5d0
[   78.935864]  kasan_report+0xdc/0x128
[   78.935891]  kasan_check_range+0x100/0x1a8
[   78.935922]  __kasan_check_write+0x20/0x30
[   78.935955]  kasan_atomics_helper+0x1644/0x4858
[   78.935989]  kasan_atomics+0x198/0x2e0
[   78.936021]  kunit_try_run_case+0x170/0x3f0
[   78.936056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.936088]  kthread+0x328/0x630
[   78.936116]  ret_from_fork+0x10/0x20
[   78.936149] 
[   79.007199] Allocated by task 349:
[   79.010585]  kasan_save_stack+0x3c/0x68
[   79.014404]  kasan_save_track+0x20/0x40
[   79.018223]  kasan_save_alloc_info+0x40/0x58
[   79.022477]  __kasan_kmalloc+0xd4/0xd8
[   79.026209]  __kmalloc_cache_noprof+0x16c/0x3c0
[   79.030723]  kasan_atomics+0xb8/0x2e0
[   79.034369]  kunit_try_run_case+0x170/0x3f0
[   79.038535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.044004]  kthread+0x328/0x630
[   79.047216]  ret_from_fork+0x10/0x20
[   79.050775] 
[   79.052251] The buggy address belongs to the object at ffff000807848f80
[   79.052251]  which belongs to the cache kmalloc-64 of size 64
[   79.064577] The buggy address is located 0 bytes to the right of
[   79.064577]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   79.077424] 
[   79.078900] The buggy address belongs to the physical page:
[   79.084455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   79.092441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   79.098951] page_type: f5(slab)
[   79.102087] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   79.109808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   79.117527] page dumped because: kasan: bad access detected
[   79.123082] 
[   79.124558] Memory state around the buggy address:
[   79.129336]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   79.136541]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   79.143746] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   79.150947]                                      ^
[   79.155725]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   79.162930]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   79.170131] ==================================================================
[   65.696840] ==================================================================
[   65.703844] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   65.711132] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   65.718510] 
[   65.719993] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   65.720046] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.720061] Hardware name: WinLink E850-96 board (DT)
[   65.720082] Call trace:
[   65.720096]  show_stack+0x20/0x38 (C)
[   65.720132]  dump_stack_lvl+0x8c/0xd0
[   65.720164]  print_report+0x118/0x5d0
[   65.720193]  kasan_report+0xdc/0x128
[   65.720221]  kasan_check_range+0x100/0x1a8
[   65.720251]  __kasan_check_write+0x20/0x30
[   65.720283]  kasan_atomics_helper+0x3ac/0x4858
[   65.720320]  kasan_atomics+0x198/0x2e0
[   65.720352]  kunit_try_run_case+0x170/0x3f0
[   65.720388]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.720420]  kthread+0x328/0x630
[   65.720450]  ret_from_fork+0x10/0x20
[   65.720485] 
[   65.791425] Allocated by task 349:
[   65.794811]  kasan_save_stack+0x3c/0x68
[   65.798630]  kasan_save_track+0x20/0x40
[   65.802449]  kasan_save_alloc_info+0x40/0x58
[   65.806703]  __kasan_kmalloc+0xd4/0xd8
[   65.810435]  __kmalloc_cache_noprof+0x16c/0x3c0
[   65.814949]  kasan_atomics+0xb8/0x2e0
[   65.818595]  kunit_try_run_case+0x170/0x3f0
[   65.822762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.828230]  kthread+0x328/0x630
[   65.831442]  ret_from_fork+0x10/0x20
[   65.835001] 
[   65.836477] The buggy address belongs to the object at ffff000807848f80
[   65.836477]  which belongs to the cache kmalloc-64 of size 64
[   65.848803] The buggy address is located 0 bytes to the right of
[   65.848803]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   65.861650] 
[   65.863127] The buggy address belongs to the physical page:
[   65.868683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   65.876671] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   65.883178] page_type: f5(slab)
[   65.886313] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   65.894035] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.901754] page dumped because: kasan: bad access detected
[   65.907309] 
[   65.908784] Memory state around the buggy address:
[   65.913563]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.920767]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.927974] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.935173]                                      ^
[   65.939951]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.947156]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.954357] ==================================================================
[   68.611000] ==================================================================
[   68.618034] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   68.625324] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   68.632702] 
[   68.634183] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   68.634232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.634247] Hardware name: WinLink E850-96 board (DT)
[   68.634268] Call trace:
[   68.634280]  show_stack+0x20/0x38 (C)
[   68.634311]  dump_stack_lvl+0x8c/0xd0
[   68.634343]  print_report+0x118/0x5d0
[   68.634371]  kasan_report+0xdc/0x128
[   68.634399]  kasan_check_range+0x100/0x1a8
[   68.634430]  __kasan_check_write+0x20/0x30
[   68.634461]  kasan_atomics_helper+0x894/0x4858
[   68.634496]  kasan_atomics+0x198/0x2e0
[   68.634529]  kunit_try_run_case+0x170/0x3f0
[   68.634562]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.634594]  kthread+0x328/0x630
[   68.634624]  ret_from_fork+0x10/0x20
[   68.634656] 
[   68.705617] Allocated by task 349:
[   68.709003]  kasan_save_stack+0x3c/0x68
[   68.712822]  kasan_save_track+0x20/0x40
[   68.716642]  kasan_save_alloc_info+0x40/0x58
[   68.720895]  __kasan_kmalloc+0xd4/0xd8
[   68.724628]  __kmalloc_cache_noprof+0x16c/0x3c0
[   68.729142]  kasan_atomics+0xb8/0x2e0
[   68.732787]  kunit_try_run_case+0x170/0x3f0
[   68.736954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.742423]  kthread+0x328/0x630
[   68.745634]  ret_from_fork+0x10/0x20
[   68.749193] 
[   68.750669] The buggy address belongs to the object at ffff000807848f80
[   68.750669]  which belongs to the cache kmalloc-64 of size 64
[   68.762996] The buggy address is located 0 bytes to the right of
[   68.762996]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   68.775842] 
[   68.777318] The buggy address belongs to the physical page:
[   68.782874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   68.790861] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   68.797370] page_type: f5(slab)
[   68.800503] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   68.808227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.815946] page dumped because: kasan: bad access detected
[   68.821501] 
[   68.822977] Memory state around the buggy address:
[   68.827755]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.834960]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.842165] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.849366]                                      ^
[   68.854143]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   68.861348]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   68.868549] ==================================================================
[   72.568401] ==================================================================
[   72.575440] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   72.582817] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   72.590108] 
[   72.591587] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   72.591639] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.591657] Hardware name: WinLink E850-96 board (DT)
[   72.591676] Call trace:
[   72.591689]  show_stack+0x20/0x38 (C)
[   72.591721]  dump_stack_lvl+0x8c/0xd0
[   72.591753]  print_report+0x118/0x5d0
[   72.591782]  kasan_report+0xdc/0x128
[   72.591810]  __asan_report_load4_noabort+0x20/0x30
[   72.591842]  kasan_atomics_helper+0x3e04/0x4858
[   72.591877]  kasan_atomics+0x198/0x2e0
[   72.591911]  kunit_try_run_case+0x170/0x3f0
[   72.591946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.591981]  kthread+0x328/0x630
[   72.592008]  ret_from_fork+0x10/0x20
[   72.592040] 
[   72.659725] Allocated by task 349:
[   72.663110]  kasan_save_stack+0x3c/0x68
[   72.666930]  kasan_save_track+0x20/0x40
[   72.670749]  kasan_save_alloc_info+0x40/0x58
[   72.675003]  __kasan_kmalloc+0xd4/0xd8
[   72.678735]  __kmalloc_cache_noprof+0x16c/0x3c0
[   72.683249]  kasan_atomics+0xb8/0x2e0
[   72.686895]  kunit_try_run_case+0x170/0x3f0
[   72.691061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.696530]  kthread+0x328/0x630
[   72.699742]  ret_from_fork+0x10/0x20
[   72.703301] 
[   72.704776] The buggy address belongs to the object at ffff000807848f80
[   72.704776]  which belongs to the cache kmalloc-64 of size 64
[   72.717103] The buggy address is located 0 bytes to the right of
[   72.717103]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   72.729950] 
[   72.731426] The buggy address belongs to the physical page:
[   72.736982] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   72.744967] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   72.751477] page_type: f5(slab)
[   72.754610] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   72.762334] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.770053] page dumped because: kasan: bad access detected
[   72.775609] 
[   72.777084] Memory state around the buggy address:
[   72.781862]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.789067]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.796272] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.803473]                                      ^
[   72.808251]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   72.815455]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   72.822657] ==================================================================
[   67.286368] ==================================================================
[   67.293401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   67.300691] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   67.308071] 
[   67.309553] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   67.309605] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.309622] Hardware name: WinLink E850-96 board (DT)
[   67.309642] Call trace:
[   67.309652]  show_stack+0x20/0x38 (C)
[   67.309684]  dump_stack_lvl+0x8c/0xd0
[   67.309716]  print_report+0x118/0x5d0
[   67.309745]  kasan_report+0xdc/0x128
[   67.309773]  kasan_check_range+0x100/0x1a8
[   67.309802]  __kasan_check_write+0x20/0x30
[   67.309833]  kasan_atomics_helper+0x61c/0x4858
[   67.309869]  kasan_atomics+0x198/0x2e0
[   67.309900]  kunit_try_run_case+0x170/0x3f0
[   67.309936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.309969]  kthread+0x328/0x630
[   67.309996]  ret_from_fork+0x10/0x20
[   67.310029] 
[   67.380985] Allocated by task 349:
[   67.384370]  kasan_save_stack+0x3c/0x68
[   67.388190]  kasan_save_track+0x20/0x40
[   67.392009]  kasan_save_alloc_info+0x40/0x58
[   67.396262]  __kasan_kmalloc+0xd4/0xd8
[   67.399995]  __kmalloc_cache_noprof+0x16c/0x3c0
[   67.404509]  kasan_atomics+0xb8/0x2e0
[   67.408155]  kunit_try_run_case+0x170/0x3f0
[   67.412321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.417790]  kthread+0x328/0x630
[   67.421002]  ret_from_fork+0x10/0x20
[   67.424561] 
[   67.426036] The buggy address belongs to the object at ffff000807848f80
[   67.426036]  which belongs to the cache kmalloc-64 of size 64
[   67.438363] The buggy address is located 0 bytes to the right of
[   67.438363]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   67.451209] 
[   67.452686] The buggy address belongs to the physical page:
[   67.458241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   67.466228] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   67.472737] page_type: f5(slab)
[   67.475871] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   67.483594] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.491313] page dumped because: kasan: bad access detected
[   67.496869] 
[   67.498344] Memory state around the buggy address:
[   67.503122]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.510327]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.517532] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.524732]                                      ^
[   67.529511]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   67.536715]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   67.543916] ==================================================================
[   70.197231] ==================================================================
[   70.204294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   70.211585] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   70.218963] 
[   70.220445] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   70.220494] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.220511] Hardware name: WinLink E850-96 board (DT)
[   70.220529] Call trace:
[   70.220540]  show_stack+0x20/0x38 (C)
[   70.220572]  dump_stack_lvl+0x8c/0xd0
[   70.220602]  print_report+0x118/0x5d0
[   70.220630]  kasan_report+0xdc/0x128
[   70.220659]  kasan_check_range+0x100/0x1a8
[   70.220688]  __kasan_check_write+0x20/0x30
[   70.220720]  kasan_atomics_helper+0xad4/0x4858
[   70.220756]  kasan_atomics+0x198/0x2e0
[   70.220791]  kunit_try_run_case+0x170/0x3f0
[   70.220826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.220858]  kthread+0x328/0x630
[   70.220884]  ret_from_fork+0x10/0x20
[   70.220914] 
[   70.291878] Allocated by task 349:
[   70.295264]  kasan_save_stack+0x3c/0x68
[   70.299084]  kasan_save_track+0x20/0x40
[   70.302903]  kasan_save_alloc_info+0x40/0x58
[   70.307156]  __kasan_kmalloc+0xd4/0xd8
[   70.310889]  __kmalloc_cache_noprof+0x16c/0x3c0
[   70.315403]  kasan_atomics+0xb8/0x2e0
[   70.319049]  kunit_try_run_case+0x170/0x3f0
[   70.323215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.328684]  kthread+0x328/0x630
[   70.331895]  ret_from_fork+0x10/0x20
[   70.335454] 
[   70.336930] The buggy address belongs to the object at ffff000807848f80
[   70.336930]  which belongs to the cache kmalloc-64 of size 64
[   70.349257] The buggy address is located 0 bytes to the right of
[   70.349257]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   70.362103] 
[   70.363579] The buggy address belongs to the physical page:
[   70.369135] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   70.377122] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   70.383631] page_type: f5(slab)
[   70.386765] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   70.394488] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.402207] page dumped because: kasan: bad access detected
[   70.407762] 
[   70.409238] Memory state around the buggy address:
[   70.414016]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.421221]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.428425] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.435626]                                      ^
[   70.440405]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   70.447609]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   70.454810] ==================================================================
[   72.829982] ==================================================================
[   72.837067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   72.844358] Read of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   72.851649] 
[   72.853129] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   72.853179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.853196] Hardware name: WinLink E850-96 board (DT)
[   72.853215] Call trace:
[   72.853227]  show_stack+0x20/0x38 (C)
[   72.853260]  dump_stack_lvl+0x8c/0xd0
[   72.853293]  print_report+0x118/0x5d0
[   72.853322]  kasan_report+0xdc/0x128
[   72.853351]  kasan_check_range+0x100/0x1a8
[   72.853383]  __kasan_check_read+0x20/0x30
[   72.853413]  kasan_atomics_helper+0xdd4/0x4858
[   72.853448]  kasan_atomics+0x198/0x2e0
[   72.853479]  kunit_try_run_case+0x170/0x3f0
[   72.853515]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.853549]  kthread+0x328/0x630
[   72.853577]  ret_from_fork+0x10/0x20
[   72.853610] 
[   72.924478] Allocated by task 349:
[   72.927863]  kasan_save_stack+0x3c/0x68
[   72.931683]  kasan_save_track+0x20/0x40
[   72.935502]  kasan_save_alloc_info+0x40/0x58
[   72.939756]  __kasan_kmalloc+0xd4/0xd8
[   72.943488]  __kmalloc_cache_noprof+0x16c/0x3c0
[   72.948002]  kasan_atomics+0xb8/0x2e0
[   72.951648]  kunit_try_run_case+0x170/0x3f0
[   72.955814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.961283]  kthread+0x328/0x630
[   72.964495]  ret_from_fork+0x10/0x20
[   72.968054] 
[   72.969529] The buggy address belongs to the object at ffff000807848f80
[   72.969529]  which belongs to the cache kmalloc-64 of size 64
[   72.981856] The buggy address is located 0 bytes to the right of
[   72.981856]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   72.994703] 
[   72.996178] The buggy address belongs to the physical page:
[   73.001734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   73.009720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   73.016230] page_type: f5(slab)
[   73.019363] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   73.027087] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.034806] page dumped because: kasan: bad access detected
[   73.040362] 
[   73.041837] Memory state around the buggy address:
[   73.046615]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.053820]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.061025] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.068226]                                      ^
[   73.073004]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.080208]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.087409] ==================================================================
[   75.473032] ==================================================================
[   75.480085] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   75.487460] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   75.494839] 
[   75.496319] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   75.496370] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.496384] Hardware name: WinLink E850-96 board (DT)
[   75.496405] Call trace:
[   75.496418]  show_stack+0x20/0x38 (C)
[   75.496449]  dump_stack_lvl+0x8c/0xd0
[   75.496481]  print_report+0x118/0x5d0
[   75.496510]  kasan_report+0xdc/0x128
[   75.496537]  kasan_check_range+0x100/0x1a8
[   75.496569]  __kasan_check_write+0x20/0x30
[   75.496600]  kasan_atomics_helper+0x1128/0x4858
[   75.496636]  kasan_atomics+0x198/0x2e0
[   75.496668]  kunit_try_run_case+0x170/0x3f0
[   75.496702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.496736]  kthread+0x328/0x630
[   75.496763]  ret_from_fork+0x10/0x20
[   75.496794] 
[   75.567841] Allocated by task 349:
[   75.571226]  kasan_save_stack+0x3c/0x68
[   75.575046]  kasan_save_track+0x20/0x40
[   75.578865]  kasan_save_alloc_info+0x40/0x58
[   75.583119]  __kasan_kmalloc+0xd4/0xd8
[   75.586851]  __kmalloc_cache_noprof+0x16c/0x3c0
[   75.591365]  kasan_atomics+0xb8/0x2e0
[   75.595011]  kunit_try_run_case+0x170/0x3f0
[   75.599177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.604646]  kthread+0x328/0x630
[   75.607857]  ret_from_fork+0x10/0x20
[   75.611417] 
[   75.612892] The buggy address belongs to the object at ffff000807848f80
[   75.612892]  which belongs to the cache kmalloc-64 of size 64
[   75.625219] The buggy address is located 0 bytes to the right of
[   75.625219]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   75.638065] 
[   75.639541] The buggy address belongs to the physical page:
[   75.645098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   75.653084] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   75.659593] page_type: f5(slab)
[   75.662728] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   75.670450] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.678169] page dumped because: kasan: bad access detected
[   75.683725] 
[   75.685200] Memory state around the buggy address:
[   75.689978]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.697183]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.704388] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.711589]                                      ^
[   75.716367]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   75.723572]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   75.730773] ==================================================================
[   67.816194] ==================================================================
[   67.823254] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   67.830544] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   67.837922] 
[   67.839402] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   67.839450] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.839466] Hardware name: WinLink E850-96 board (DT)
[   67.839485] Call trace:
[   67.839497]  show_stack+0x20/0x38 (C)
[   67.839529]  dump_stack_lvl+0x8c/0xd0
[   67.839557]  print_report+0x118/0x5d0
[   67.839584]  kasan_report+0xdc/0x128
[   67.839612]  kasan_check_range+0x100/0x1a8
[   67.839641]  __kasan_check_write+0x20/0x30
[   67.839671]  kasan_atomics_helper+0x6ec/0x4858
[   67.839706]  kasan_atomics+0x198/0x2e0
[   67.839738]  kunit_try_run_case+0x170/0x3f0
[   67.839772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.839807]  kthread+0x328/0x630
[   67.839836]  ret_from_fork+0x10/0x20
[   67.839866] 
[   67.910838] Allocated by task 349:
[   67.914223]  kasan_save_stack+0x3c/0x68
[   67.918043]  kasan_save_track+0x20/0x40
[   67.921862]  kasan_save_alloc_info+0x40/0x58
[   67.926116]  __kasan_kmalloc+0xd4/0xd8
[   67.929848]  __kmalloc_cache_noprof+0x16c/0x3c0
[   67.934362]  kasan_atomics+0xb8/0x2e0
[   67.938008]  kunit_try_run_case+0x170/0x3f0
[   67.942175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.947643]  kthread+0x328/0x630
[   67.950855]  ret_from_fork+0x10/0x20
[   67.954413] 
[   67.955889] The buggy address belongs to the object at ffff000807848f80
[   67.955889]  which belongs to the cache kmalloc-64 of size 64
[   67.968216] The buggy address is located 0 bytes to the right of
[   67.968216]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   67.981063] 
[   67.982538] The buggy address belongs to the physical page:
[   67.988094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   67.996080] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   68.002590] page_type: f5(slab)
[   68.005724] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   68.013447] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.021166] page dumped because: kasan: bad access detected
[   68.026722] 
[   68.028197] Memory state around the buggy address:
[   68.032975]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.040180]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.047385] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.054586]                                      ^
[   68.059364]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   68.066568]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   68.073770] ==================================================================
[   64.378838] ==================================================================
[   64.385808] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   64.393097] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   64.400474] 
[   64.401958] CPU: 7 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   64.402013] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.402031] Hardware name: WinLink E850-96 board (DT)
[   64.402050] Call trace:
[   64.402066]  show_stack+0x20/0x38 (C)
[   64.402102]  dump_stack_lvl+0x8c/0xd0
[   64.402135]  print_report+0x118/0x5d0
[   64.402168]  kasan_report+0xdc/0x128
[   64.402196]  kasan_check_range+0x100/0x1a8
[   64.402228]  __kasan_check_write+0x20/0x30
[   64.402260]  kasan_atomics_helper+0x24c/0x4858
[   64.402295]  kasan_atomics+0x198/0x2e0
[   64.402328]  kunit_try_run_case+0x170/0x3f0
[   64.402365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.402399]  kthread+0x328/0x630
[   64.402429]  ret_from_fork+0x10/0x20
[   64.402464] 
[   64.473389] Allocated by task 349:
[   64.476776]  kasan_save_stack+0x3c/0x68
[   64.480594]  kasan_save_track+0x20/0x40
[   64.484414]  kasan_save_alloc_info+0x40/0x58
[   64.488667]  __kasan_kmalloc+0xd4/0xd8
[   64.492400]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.496913]  kasan_atomics+0xb8/0x2e0
[   64.500559]  kunit_try_run_case+0x170/0x3f0
[   64.504726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.510194]  kthread+0x328/0x630
[   64.513406]  ret_from_fork+0x10/0x20
[   64.516965] 
[   64.518442] The buggy address belongs to the object at ffff000807848f80
[   64.518442]  which belongs to the cache kmalloc-64 of size 64
[   64.530767] The buggy address is located 0 bytes to the right of
[   64.530767]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   64.543614] 
[   64.545092] The buggy address belongs to the physical page:
[   64.550648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   64.558634] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   64.565143] page_type: f5(slab)
[   64.568278] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   64.575999] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.583718] page dumped because: kasan: bad access detected
[   64.589274] 
[   64.590749] Memory state around the buggy address:
[   64.595530]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.602732]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.609938] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.617137]                                      ^
[   64.621917]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.629120]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.636323] ==================================================================
[   73.094757] ==================================================================
[   73.101820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   73.109198] Read of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   73.116489] 
[   73.117969] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   73.118016] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.118033] Hardware name: WinLink E850-96 board (DT)
[   73.118052] Call trace:
[   73.118065]  show_stack+0x20/0x38 (C)
[   73.118097]  dump_stack_lvl+0x8c/0xd0
[   73.118131]  print_report+0x118/0x5d0
[   73.118158]  kasan_report+0xdc/0x128
[   73.118186]  __asan_report_load8_noabort+0x20/0x30
[   73.118219]  kasan_atomics_helper+0x3f58/0x4858
[   73.118254]  kasan_atomics+0x198/0x2e0
[   73.118286]  kunit_try_run_case+0x170/0x3f0
[   73.118322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.118355]  kthread+0x328/0x630
[   73.118384]  ret_from_fork+0x10/0x20
[   73.118414] 
[   73.186106] Allocated by task 349:
[   73.189491]  kasan_save_stack+0x3c/0x68
[   73.193311]  kasan_save_track+0x20/0x40
[   73.197130]  kasan_save_alloc_info+0x40/0x58
[   73.201384]  __kasan_kmalloc+0xd4/0xd8
[   73.205116]  __kmalloc_cache_noprof+0x16c/0x3c0
[   73.209630]  kasan_atomics+0xb8/0x2e0
[   73.213276]  kunit_try_run_case+0x170/0x3f0
[   73.217442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.222911]  kthread+0x328/0x630
[   73.226123]  ret_from_fork+0x10/0x20
[   73.229682] 
[   73.231157] The buggy address belongs to the object at ffff000807848f80
[   73.231157]  which belongs to the cache kmalloc-64 of size 64
[   73.243484] The buggy address is located 0 bytes to the right of
[   73.243484]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   73.256331] 
[   73.257806] The buggy address belongs to the physical page:
[   73.263362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   73.271348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   73.277858] page_type: f5(slab)
[   73.280991] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   73.288715] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.296434] page dumped because: kasan: bad access detected
[   73.301989] 
[   73.303465] Memory state around the buggy address:
[   73.308243]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.315448]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.322653] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.329854]                                      ^
[   73.334632]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.341837]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.349038] ==================================================================
[   66.756510] ==================================================================
[   66.763548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   66.770838] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   66.778216] 
[   66.779699] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   66.779750] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.779766] Hardware name: WinLink E850-96 board (DT)
[   66.779786] Call trace:
[   66.779798]  show_stack+0x20/0x38 (C)
[   66.779832]  dump_stack_lvl+0x8c/0xd0
[   66.779864]  print_report+0x118/0x5d0
[   66.779890]  kasan_report+0xdc/0x128
[   66.779918]  kasan_check_range+0x100/0x1a8
[   66.779950]  __kasan_check_write+0x20/0x30
[   66.779980]  kasan_atomics_helper+0x54c/0x4858
[   66.780014]  kasan_atomics+0x198/0x2e0
[   66.780046]  kunit_try_run_case+0x170/0x3f0
[   66.780082]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.780115]  kthread+0x328/0x630
[   66.780145]  ret_from_fork+0x10/0x20
[   66.780179] 
[   66.851132] Allocated by task 349:
[   66.854517]  kasan_save_stack+0x3c/0x68
[   66.858337]  kasan_save_track+0x20/0x40
[   66.862156]  kasan_save_alloc_info+0x40/0x58
[   66.866409]  __kasan_kmalloc+0xd4/0xd8
[   66.870142]  __kmalloc_cache_noprof+0x16c/0x3c0
[   66.874655]  kasan_atomics+0xb8/0x2e0
[   66.878301]  kunit_try_run_case+0x170/0x3f0
[   66.882468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.887936]  kthread+0x328/0x630
[   66.891148]  ret_from_fork+0x10/0x20
[   66.894708] 
[   66.896183] The buggy address belongs to the object at ffff000807848f80
[   66.896183]  which belongs to the cache kmalloc-64 of size 64
[   66.908510] The buggy address is located 0 bytes to the right of
[   66.908510]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   66.921356] 
[   66.922832] The buggy address belongs to the physical page:
[   66.928388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   66.936375] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   66.942884] page_type: f5(slab)
[   66.946018] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   66.953741] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.961460] page dumped because: kasan: bad access detected
[   66.967015] 
[   66.968491] Memory state around the buggy address:
[   66.973270]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.980473]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.987679] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.994879]                                      ^
[   66.999658]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   67.006862]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   67.014063] ==================================================================
[   79.177475] ==================================================================
[   79.184541] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   79.191919] Read of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   79.199210] 
[   79.200691] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   79.200739] Tainted: [B]=BAD_PAGE, [N]=TEST
[   79.200755] Hardware name: WinLink E850-96 board (DT)
[   79.200773] Call trace:
[   79.200787]  show_stack+0x20/0x38 (C)
[   79.200820]  dump_stack_lvl+0x8c/0xd0
[   79.200852]  print_report+0x118/0x5d0
[   79.200882]  kasan_report+0xdc/0x128
[   79.200911]  __asan_report_load8_noabort+0x20/0x30
[   79.200944]  kasan_atomics_helper+0x3df4/0x4858
[   79.200980]  kasan_atomics+0x198/0x2e0
[   79.201012]  kunit_try_run_case+0x170/0x3f0
[   79.201047]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.201081]  kthread+0x328/0x630
[   79.201108]  ret_from_fork+0x10/0x20
[   79.201139] 
[   79.268827] Allocated by task 349:
[   79.272212]  kasan_save_stack+0x3c/0x68
[   79.276032]  kasan_save_track+0x20/0x40
[   79.279852]  kasan_save_alloc_info+0x40/0x58
[   79.284105]  __kasan_kmalloc+0xd4/0xd8
[   79.287837]  __kmalloc_cache_noprof+0x16c/0x3c0
[   79.292351]  kasan_atomics+0xb8/0x2e0
[   79.295997]  kunit_try_run_case+0x170/0x3f0
[   79.300163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.305632]  kthread+0x328/0x630
[   79.308844]  ret_from_fork+0x10/0x20
[   79.312403] 
[   79.313879] The buggy address belongs to the object at ffff000807848f80
[   79.313879]  which belongs to the cache kmalloc-64 of size 64
[   79.326205] The buggy address is located 0 bytes to the right of
[   79.326205]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   79.339052] 
[   79.340527] The buggy address belongs to the physical page:
[   79.346083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   79.354069] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   79.360579] page_type: f5(slab)
[   79.363714] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   79.371436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   79.379155] page dumped because: kasan: bad access detected
[   79.384711] 
[   79.386186] Memory state around the buggy address:
[   79.390964]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   79.398169]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   79.405374] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   79.412575]                                      ^
[   79.417353]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   79.424557]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   79.431759] ==================================================================
[   79.965857] ==================================================================
[   79.972898] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   79.980275] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   79.987653] 
[   79.989134] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   79.989186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   79.989201] Hardware name: WinLink E850-96 board (DT)
[   79.989221] Call trace:
[   79.989234]  show_stack+0x20/0x38 (C)
[   79.989266]  dump_stack_lvl+0x8c/0xd0
[   79.989296]  print_report+0x118/0x5d0
[   79.989326]  kasan_report+0xdc/0x128
[   79.989353]  kasan_check_range+0x100/0x1a8
[   79.989383]  __kasan_check_write+0x20/0x30
[   79.989414]  kasan_atomics_helper+0x175c/0x4858
[   79.989451]  kasan_atomics+0x198/0x2e0
[   79.989485]  kunit_try_run_case+0x170/0x3f0
[   79.989520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.989552]  kthread+0x328/0x630
[   79.989579]  ret_from_fork+0x10/0x20
[   79.989610] 
[   80.060655] Allocated by task 349:
[   80.064041]  kasan_save_stack+0x3c/0x68
[   80.067860]  kasan_save_track+0x20/0x40
[   80.071680]  kasan_save_alloc_info+0x40/0x58
[   80.075933]  __kasan_kmalloc+0xd4/0xd8
[   80.079665]  __kmalloc_cache_noprof+0x16c/0x3c0
[   80.084180]  kasan_atomics+0xb8/0x2e0
[   80.087825]  kunit_try_run_case+0x170/0x3f0
[   80.091992]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.097461]  kthread+0x328/0x630
[   80.100673]  ret_from_fork+0x10/0x20
[   80.104231] 
[   80.105707] The buggy address belongs to the object at ffff000807848f80
[   80.105707]  which belongs to the cache kmalloc-64 of size 64
[   80.118034] The buggy address is located 0 bytes to the right of
[   80.118034]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   80.130880] 
[   80.132356] The buggy address belongs to the physical page:
[   80.137912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   80.145897] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   80.152408] page_type: f5(slab)
[   80.155542] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   80.163265] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   80.170984] page dumped because: kasan: bad access detected
[   80.176539] 
[   80.178015] Memory state around the buggy address:
[   80.182794]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   80.189998]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   80.197203] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   80.204403]                                      ^
[   80.209181]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   80.216386]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   80.223587] ==================================================================
[   71.515260] ==================================================================
[   71.522331] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   71.529707] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   71.536999] 
[   71.538481] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   71.538529] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.538544] Hardware name: WinLink E850-96 board (DT)
[   71.538566] Call trace:
[   71.538579]  show_stack+0x20/0x38 (C)
[   71.538609]  dump_stack_lvl+0x8c/0xd0
[   71.538643]  print_report+0x118/0x5d0
[   71.538671]  kasan_report+0xdc/0x128
[   71.538700]  __asan_report_load4_noabort+0x20/0x30
[   71.538733]  kasan_atomics_helper+0x3de4/0x4858
[   71.538770]  kasan_atomics+0x198/0x2e0
[   71.538805]  kunit_try_run_case+0x170/0x3f0
[   71.538838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.538870]  kthread+0x328/0x630
[   71.538898]  ret_from_fork+0x10/0x20
[   71.538928] 
[   71.606615] Allocated by task 349:
[   71.610001]  kasan_save_stack+0x3c/0x68
[   71.613820]  kasan_save_track+0x20/0x40
[   71.617640]  kasan_save_alloc_info+0x40/0x58
[   71.621893]  __kasan_kmalloc+0xd4/0xd8
[   71.625626]  __kmalloc_cache_noprof+0x16c/0x3c0
[   71.630140]  kasan_atomics+0xb8/0x2e0
[   71.633786]  kunit_try_run_case+0x170/0x3f0
[   71.637952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.643421]  kthread+0x328/0x630
[   71.646633]  ret_from_fork+0x10/0x20
[   71.650191] 
[   71.651667] The buggy address belongs to the object at ffff000807848f80
[   71.651667]  which belongs to the cache kmalloc-64 of size 64
[   71.663994] The buggy address is located 0 bytes to the right of
[   71.663994]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   71.676840] 
[   71.678316] The buggy address belongs to the physical page:
[   71.683874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   71.691858] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   71.698368] page_type: f5(slab)
[   71.701502] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   71.709225] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   71.716944] page dumped because: kasan: bad access detected
[   71.722499] 
[   71.723975] Memory state around the buggy address:
[   71.728753]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.735958]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.743163] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   71.750364]                                      ^
[   71.755142]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   71.762346]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   71.769547] ==================================================================
[   77.590346] ==================================================================
[   77.597413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   77.604790] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   77.612168] 
[   77.613650] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   77.613698] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.613715] Hardware name: WinLink E850-96 board (DT)
[   77.613734] Call trace:
[   77.613749]  show_stack+0x20/0x38 (C)
[   77.613779]  dump_stack_lvl+0x8c/0xd0
[   77.613808]  print_report+0x118/0x5d0
[   77.613837]  kasan_report+0xdc/0x128
[   77.613865]  kasan_check_range+0x100/0x1a8
[   77.613894]  __kasan_check_write+0x20/0x30
[   77.613925]  kasan_atomics_helper+0x147c/0x4858
[   77.613960]  kasan_atomics+0x198/0x2e0
[   77.613993]  kunit_try_run_case+0x170/0x3f0
[   77.614027]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.614059]  kthread+0x328/0x630
[   77.614084]  ret_from_fork+0x10/0x20
[   77.614119] 
[   77.685170] Allocated by task 349:
[   77.688556]  kasan_save_stack+0x3c/0x68
[   77.692375]  kasan_save_track+0x20/0x40
[   77.696194]  kasan_save_alloc_info+0x40/0x58
[   77.700448]  __kasan_kmalloc+0xd4/0xd8
[   77.704180]  __kmalloc_cache_noprof+0x16c/0x3c0
[   77.708694]  kasan_atomics+0xb8/0x2e0
[   77.712340]  kunit_try_run_case+0x170/0x3f0
[   77.716507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.721975]  kthread+0x328/0x630
[   77.725187]  ret_from_fork+0x10/0x20
[   77.728746] 
[   77.730222] The buggy address belongs to the object at ffff000807848f80
[   77.730222]  which belongs to the cache kmalloc-64 of size 64
[   77.742548] The buggy address is located 0 bytes to the right of
[   77.742548]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   77.755395] 
[   77.756871] The buggy address belongs to the physical page:
[   77.762427] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   77.770412] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   77.776923] page_type: f5(slab)
[   77.780055] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   77.787780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   77.795498] page dumped because: kasan: bad access detected
[   77.801054] 
[   77.802529] Memory state around the buggy address:
[   77.807308]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.814513]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.821717] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.828918]                                      ^
[   77.833696]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   77.840901]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   77.848102] ==================================================================
[   68.875868] ==================================================================
[   68.882960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   68.890337] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   68.897629] 
[   68.899108] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   68.899153] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.899170] Hardware name: WinLink E850-96 board (DT)
[   68.899189] Call trace:
[   68.899201]  show_stack+0x20/0x38 (C)
[   68.899234]  dump_stack_lvl+0x8c/0xd0
[   68.899265]  print_report+0x118/0x5d0
[   68.899293]  kasan_report+0xdc/0x128
[   68.899322]  __asan_report_load4_noabort+0x20/0x30
[   68.899354]  kasan_atomics_helper+0x42d8/0x4858
[   68.899389]  kasan_atomics+0x198/0x2e0
[   68.899423]  kunit_try_run_case+0x170/0x3f0
[   68.899457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.899491]  kthread+0x328/0x630
[   68.899519]  ret_from_fork+0x10/0x20
[   68.899550] 
[   68.967246] Allocated by task 349:
[   68.970631]  kasan_save_stack+0x3c/0x68
[   68.974451]  kasan_save_track+0x20/0x40
[   68.978270]  kasan_save_alloc_info+0x40/0x58
[   68.982523]  __kasan_kmalloc+0xd4/0xd8
[   68.986256]  __kmalloc_cache_noprof+0x16c/0x3c0
[   68.990770]  kasan_atomics+0xb8/0x2e0
[   68.994415]  kunit_try_run_case+0x170/0x3f0
[   68.998582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.004050]  kthread+0x328/0x630
[   69.007262]  ret_from_fork+0x10/0x20
[   69.010821] 
[   69.012297] The buggy address belongs to the object at ffff000807848f80
[   69.012297]  which belongs to the cache kmalloc-64 of size 64
[   69.024624] The buggy address is located 0 bytes to the right of
[   69.024624]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   69.037471] 
[   69.038946] The buggy address belongs to the physical page:
[   69.044502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   69.052488] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   69.058998] page_type: f5(slab)
[   69.062132] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   69.069855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.077574] page dumped because: kasan: bad access detected
[   69.083129] 
[   69.084605] Memory state around the buggy address:
[   69.089383]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.096588]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.103793] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.110994]                                      ^
[   69.115771]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   69.122976]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   69.130177] ==================================================================
[   77.063623] ==================================================================
[   77.070685] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   77.078062] Read of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   77.085353] 
[   77.086832] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   77.086881] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.086897] Hardware name: WinLink E850-96 board (DT)
[   77.086916] Call trace:
[   77.086929]  show_stack+0x20/0x38 (C)
[   77.086961]  dump_stack_lvl+0x8c/0xd0
[   77.086991]  print_report+0x118/0x5d0
[   77.087019]  kasan_report+0xdc/0x128
[   77.087047]  __asan_report_load8_noabort+0x20/0x30
[   77.087079]  kasan_atomics_helper+0x3f04/0x4858
[   77.087115]  kasan_atomics+0x198/0x2e0
[   77.087149]  kunit_try_run_case+0x170/0x3f0
[   77.087187]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.087219]  kthread+0x328/0x630
[   77.087245]  ret_from_fork+0x10/0x20
[   77.087279] 
[   77.154970] Allocated by task 349:
[   77.158355]  kasan_save_stack+0x3c/0x68
[   77.162175]  kasan_save_track+0x20/0x40
[   77.165994]  kasan_save_alloc_info+0x40/0x58
[   77.170247]  __kasan_kmalloc+0xd4/0xd8
[   77.173980]  __kmalloc_cache_noprof+0x16c/0x3c0
[   77.178494]  kasan_atomics+0xb8/0x2e0
[   77.182140]  kunit_try_run_case+0x170/0x3f0
[   77.186306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.191775]  kthread+0x328/0x630
[   77.194987]  ret_from_fork+0x10/0x20
[   77.198546] 
[   77.200021] The buggy address belongs to the object at ffff000807848f80
[   77.200021]  which belongs to the cache kmalloc-64 of size 64
[   77.212348] The buggy address is located 0 bytes to the right of
[   77.212348]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   77.225195] 
[   77.226670] The buggy address belongs to the physical page:
[   77.232229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   77.240212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   77.246722] page_type: f5(slab)
[   77.249855] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   77.257579] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   77.265298] page dumped because: kasan: bad access detected
[   77.270854] 
[   77.272329] Memory state around the buggy address:
[   77.277107]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.284312]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.291517] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.298718]                                      ^
[   77.303496]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   77.310700]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   77.317902] ==================================================================
[   65.170085] ==================================================================
[   65.177113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   65.184405] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   65.191781] 
[   65.193265] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   65.193316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.193333] Hardware name: WinLink E850-96 board (DT)
[   65.193354] Call trace:
[   65.193368]  show_stack+0x20/0x38 (C)
[   65.193404]  dump_stack_lvl+0x8c/0xd0
[   65.193438]  print_report+0x118/0x5d0
[   65.193466]  kasan_report+0xdc/0x128
[   65.193492]  kasan_check_range+0x100/0x1a8
[   65.193524]  __kasan_check_write+0x20/0x30
[   65.193554]  kasan_atomics_helper+0x32c/0x4858
[   65.193587]  kasan_atomics+0x198/0x2e0
[   65.193623]  kunit_try_run_case+0x170/0x3f0
[   65.193659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.193691]  kthread+0x328/0x630
[   65.193721]  ret_from_fork+0x10/0x20
[   65.193756] 
[   65.264697] Allocated by task 349:
[   65.268083]  kasan_save_stack+0x3c/0x68
[   65.271902]  kasan_save_track+0x20/0x40
[   65.275721]  kasan_save_alloc_info+0x40/0x58
[   65.279975]  __kasan_kmalloc+0xd4/0xd8
[   65.283707]  __kmalloc_cache_noprof+0x16c/0x3c0
[   65.288221]  kasan_atomics+0xb8/0x2e0
[   65.291867]  kunit_try_run_case+0x170/0x3f0
[   65.296033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.301502]  kthread+0x328/0x630
[   65.304714]  ret_from_fork+0x10/0x20
[   65.308273] 
[   65.309749] The buggy address belongs to the object at ffff000807848f80
[   65.309749]  which belongs to the cache kmalloc-64 of size 64
[   65.322075] The buggy address is located 0 bytes to the right of
[   65.322075]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   65.334922] 
[   65.336399] The buggy address belongs to the physical page:
[   65.341955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   65.349941] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   65.356449] page_type: f5(slab)
[   65.359585] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   65.367306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.375025] page dumped because: kasan: bad access detected
[   65.380581] 
[   65.382056] Memory state around the buggy address:
[   65.386835]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.394039]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.401244] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.408445]                                      ^
[   65.413223]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.420427]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.427629] ==================================================================
[   67.021420] ==================================================================
[   67.028474] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   67.035765] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   67.043143] 
[   67.044624] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   67.044674] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.044690] Hardware name: WinLink E850-96 board (DT)
[   67.044710] Call trace:
[   67.044722]  show_stack+0x20/0x38 (C)
[   67.044753]  dump_stack_lvl+0x8c/0xd0
[   67.044786]  print_report+0x118/0x5d0
[   67.044814]  kasan_report+0xdc/0x128
[   67.044842]  kasan_check_range+0x100/0x1a8
[   67.044872]  __kasan_check_write+0x20/0x30
[   67.044905]  kasan_atomics_helper+0x5b4/0x4858
[   67.044940]  kasan_atomics+0x198/0x2e0
[   67.044973]  kunit_try_run_case+0x170/0x3f0
[   67.045008]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.045040]  kthread+0x328/0x630
[   67.045068]  ret_from_fork+0x10/0x20
[   67.045099] 
[   67.116058] Allocated by task 349:
[   67.119444]  kasan_save_stack+0x3c/0x68
[   67.123263]  kasan_save_track+0x20/0x40
[   67.127082]  kasan_save_alloc_info+0x40/0x58
[   67.131336]  __kasan_kmalloc+0xd4/0xd8
[   67.135068]  __kmalloc_cache_noprof+0x16c/0x3c0
[   67.139583]  kasan_atomics+0xb8/0x2e0
[   67.143228]  kunit_try_run_case+0x170/0x3f0
[   67.147394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.152863]  kthread+0x328/0x630
[   67.156075]  ret_from_fork+0x10/0x20
[   67.159634] 
[   67.161110] The buggy address belongs to the object at ffff000807848f80
[   67.161110]  which belongs to the cache kmalloc-64 of size 64
[   67.173436] The buggy address is located 0 bytes to the right of
[   67.173436]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   67.186283] 
[   67.187759] The buggy address belongs to the physical page:
[   67.193315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   67.201300] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   67.207810] page_type: f5(slab)
[   67.210945] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   67.218667] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.226386] page dumped because: kasan: bad access detected
[   67.231942] 
[   67.233417] Memory state around the buggy address:
[   67.238195]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.245400]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.252605] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.259806]                                      ^
[   67.264584]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   67.271789]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   67.278990] ==================================================================
[   70.723788] ==================================================================
[   70.730850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   70.738139] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   70.745518] 
[   70.746997] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   70.747046] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.747063] Hardware name: WinLink E850-96 board (DT)
[   70.747081] Call trace:
[   70.747094]  show_stack+0x20/0x38 (C)
[   70.747124]  dump_stack_lvl+0x8c/0xd0
[   70.747155]  print_report+0x118/0x5d0
[   70.747181]  kasan_report+0xdc/0x128
[   70.747210]  kasan_check_range+0x100/0x1a8
[   70.747241]  __kasan_check_write+0x20/0x30
[   70.747270]  kasan_atomics_helper+0xb70/0x4858
[   70.747305]  kasan_atomics+0x198/0x2e0
[   70.747337]  kunit_try_run_case+0x170/0x3f0
[   70.747374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.747407]  kthread+0x328/0x630
[   70.747433]  ret_from_fork+0x10/0x20
[   70.747464] 
[   70.818433] Allocated by task 349:
[   70.821819]  kasan_save_stack+0x3c/0x68
[   70.825638]  kasan_save_track+0x20/0x40
[   70.829457]  kasan_save_alloc_info+0x40/0x58
[   70.833711]  __kasan_kmalloc+0xd4/0xd8
[   70.837443]  __kmalloc_cache_noprof+0x16c/0x3c0
[   70.841957]  kasan_atomics+0xb8/0x2e0
[   70.845603]  kunit_try_run_case+0x170/0x3f0
[   70.849770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.855238]  kthread+0x328/0x630
[   70.858450]  ret_from_fork+0x10/0x20
[   70.862008] 
[   70.863484] The buggy address belongs to the object at ffff000807848f80
[   70.863484]  which belongs to the cache kmalloc-64 of size 64
[   70.875811] The buggy address is located 0 bytes to the right of
[   70.875811]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   70.888658] 
[   70.890134] The buggy address belongs to the physical page:
[   70.895691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   70.903675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   70.910185] page_type: f5(slab)
[   70.913318] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   70.921042] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.928762] page dumped because: kasan: bad access detected
[   70.934317] 
[   70.935792] Memory state around the buggy address:
[   70.940570]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.947775]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.954980] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.962181]                                      ^
[   70.966959]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   70.974164]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   70.981365] ==================================================================
[   77.325273] ==================================================================
[   77.332313] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   77.339690] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   77.347068] 
[   77.348547] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   77.348599] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.348614] Hardware name: WinLink E850-96 board (DT)
[   77.348633] Call trace:
[   77.348647]  show_stack+0x20/0x38 (C)
[   77.348677]  dump_stack_lvl+0x8c/0xd0
[   77.348707]  print_report+0x118/0x5d0
[   77.348735]  kasan_report+0xdc/0x128
[   77.348764]  kasan_check_range+0x100/0x1a8
[   77.348797]  __kasan_check_write+0x20/0x30
[   77.348826]  kasan_atomics_helper+0x1414/0x4858
[   77.348861]  kasan_atomics+0x198/0x2e0
[   77.348894]  kunit_try_run_case+0x170/0x3f0
[   77.348931]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.348965]  kthread+0x328/0x630
[   77.348991]  ret_from_fork+0x10/0x20
[   77.349025] 
[   77.420070] Allocated by task 349:
[   77.423456]  kasan_save_stack+0x3c/0x68
[   77.427275]  kasan_save_track+0x20/0x40
[   77.431094]  kasan_save_alloc_info+0x40/0x58
[   77.435348]  __kasan_kmalloc+0xd4/0xd8
[   77.439080]  __kmalloc_cache_noprof+0x16c/0x3c0
[   77.443594]  kasan_atomics+0xb8/0x2e0
[   77.447240]  kunit_try_run_case+0x170/0x3f0
[   77.451407]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.456875]  kthread+0x328/0x630
[   77.460087]  ret_from_fork+0x10/0x20
[   77.463646] 
[   77.465122] The buggy address belongs to the object at ffff000807848f80
[   77.465122]  which belongs to the cache kmalloc-64 of size 64
[   77.477448] The buggy address is located 0 bytes to the right of
[   77.477448]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   77.490295] 
[   77.491771] The buggy address belongs to the physical page:
[   77.497328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   77.505314] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   77.511823] page_type: f5(slab)
[   77.514957] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   77.522680] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   77.530398] page dumped because: kasan: bad access detected
[   77.535954] 
[   77.537429] Memory state around the buggy address:
[   77.542207]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.549412]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.556617] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.563818]                                      ^
[   77.568596]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   77.575801]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   77.583002] ==================================================================
[   71.776921] ==================================================================
[   71.783960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   71.791249] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   71.798627] 
[   71.800107] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   71.800155] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.800171] Hardware name: WinLink E850-96 board (DT)
[   71.800189] Call trace:
[   71.800202]  show_stack+0x20/0x38 (C)
[   71.800234]  dump_stack_lvl+0x8c/0xd0
[   71.800266]  print_report+0x118/0x5d0
[   71.800295]  kasan_report+0xdc/0x128
[   71.800324]  kasan_check_range+0x100/0x1a8
[   71.800354]  __kasan_check_write+0x20/0x30
[   71.800385]  kasan_atomics_helper+0xca0/0x4858
[   71.800418]  kasan_atomics+0x198/0x2e0
[   71.800451]  kunit_try_run_case+0x170/0x3f0
[   71.800487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.800520]  kthread+0x328/0x630
[   71.800547]  ret_from_fork+0x10/0x20
[   71.800579] 
[   71.871542] Allocated by task 349:
[   71.874928]  kasan_save_stack+0x3c/0x68
[   71.878748]  kasan_save_track+0x20/0x40
[   71.882566]  kasan_save_alloc_info+0x40/0x58
[   71.886820]  __kasan_kmalloc+0xd4/0xd8
[   71.890552]  __kmalloc_cache_noprof+0x16c/0x3c0
[   71.895066]  kasan_atomics+0xb8/0x2e0
[   71.898712]  kunit_try_run_case+0x170/0x3f0
[   71.902879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.908348]  kthread+0x328/0x630
[   71.911559]  ret_from_fork+0x10/0x20
[   71.915118] 
[   71.916594] The buggy address belongs to the object at ffff000807848f80
[   71.916594]  which belongs to the cache kmalloc-64 of size 64
[   71.928920] The buggy address is located 0 bytes to the right of
[   71.928920]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   71.941767] 
[   71.943243] The buggy address belongs to the physical page:
[   71.948799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   71.956786] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   71.963295] page_type: f5(slab)
[   71.966428] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   71.974152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   71.981871] page dumped because: kasan: bad access detected
[   71.987426] 
[   71.988901] Memory state around the buggy address:
[   71.993679]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.000884]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.008089] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.015290]                                      ^
[   72.020068]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   72.027273]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   72.034474] ==================================================================
[   74.413031] ==================================================================
[   74.420030] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   74.427320] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   74.434698] 
[   74.436180] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   74.436230] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.436244] Hardware name: WinLink E850-96 board (DT)
[   74.436262] Call trace:
[   74.436276]  show_stack+0x20/0x38 (C)
[   74.436308]  dump_stack_lvl+0x8c/0xd0
[   74.436339]  print_report+0x118/0x5d0
[   74.436369]  kasan_report+0xdc/0x128
[   74.436397]  kasan_check_range+0x100/0x1a8
[   74.436428]  __kasan_check_write+0x20/0x30
[   74.436458]  kasan_atomics_helper+0xf88/0x4858
[   74.436493]  kasan_atomics+0x198/0x2e0
[   74.436528]  kunit_try_run_case+0x170/0x3f0
[   74.436566]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.436597]  kthread+0x328/0x630
[   74.436625]  ret_from_fork+0x10/0x20
[   74.436657] 
[   74.507614] Allocated by task 349:
[   74.510999]  kasan_save_stack+0x3c/0x68
[   74.514819]  kasan_save_track+0x20/0x40
[   74.518638]  kasan_save_alloc_info+0x40/0x58
[   74.522891]  __kasan_kmalloc+0xd4/0xd8
[   74.526624]  __kmalloc_cache_noprof+0x16c/0x3c0
[   74.531138]  kasan_atomics+0xb8/0x2e0
[   74.534784]  kunit_try_run_case+0x170/0x3f0
[   74.538950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.544419]  kthread+0x328/0x630
[   74.547631]  ret_from_fork+0x10/0x20
[   74.551190] 
[   74.552665] The buggy address belongs to the object at ffff000807848f80
[   74.552665]  which belongs to the cache kmalloc-64 of size 64
[   74.564992] The buggy address is located 0 bytes to the right of
[   74.564992]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   74.577839] 
[   74.579316] The buggy address belongs to the physical page:
[   74.584870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   74.592857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   74.599366] page_type: f5(slab)
[   74.602501] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   74.610223] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.617942] page dumped because: kasan: bad access detected
[   74.623497] 
[   74.624973] Memory state around the buggy address:
[   74.629751]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.636956]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.644161] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.651362]                                      ^
[   74.656141]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.663344]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.670546] ==================================================================
[   76.268317] ==================================================================
[   76.275384] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   76.282761] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   76.290139] 
[   76.291619] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   76.291666] Tainted: [B]=BAD_PAGE, [N]=TEST
[   76.291681] Hardware name: WinLink E850-96 board (DT)
[   76.291699] Call trace:
[   76.291712]  show_stack+0x20/0x38 (C)
[   76.291745]  dump_stack_lvl+0x8c/0xd0
[   76.291775]  print_report+0x118/0x5d0
[   76.291803]  kasan_report+0xdc/0x128
[   76.291831]  kasan_check_range+0x100/0x1a8
[   76.291860]  __kasan_check_write+0x20/0x30
[   76.291893]  kasan_atomics_helper+0x126c/0x4858
[   76.291928]  kasan_atomics+0x198/0x2e0
[   76.291961]  kunit_try_run_case+0x170/0x3f0
[   76.291995]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.292029]  kthread+0x328/0x630
[   76.292056]  ret_from_fork+0x10/0x20
[   76.292087] 
[   76.363141] Allocated by task 349:
[   76.366527]  kasan_save_stack+0x3c/0x68
[   76.370346]  kasan_save_track+0x20/0x40
[   76.374166]  kasan_save_alloc_info+0x40/0x58
[   76.378419]  __kasan_kmalloc+0xd4/0xd8
[   76.382152]  __kmalloc_cache_noprof+0x16c/0x3c0
[   76.386666]  kasan_atomics+0xb8/0x2e0
[   76.390311]  kunit_try_run_case+0x170/0x3f0
[   76.394478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.399947]  kthread+0x328/0x630
[   76.403159]  ret_from_fork+0x10/0x20
[   76.406717] 
[   76.408193] The buggy address belongs to the object at ffff000807848f80
[   76.408193]  which belongs to the cache kmalloc-64 of size 64
[   76.420520] The buggy address is located 0 bytes to the right of
[   76.420520]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   76.433366] 
[   76.434842] The buggy address belongs to the physical page:
[   76.440398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   76.448383] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   76.454894] page_type: f5(slab)
[   76.458026] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   76.465751] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   76.473470] page dumped because: kasan: bad access detected
[   76.479025] 
[   76.480501] Memory state around the buggy address:
[   76.485279]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   76.492484]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   76.499688] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   76.506889]                                      ^
[   76.511667]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   76.518872]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   76.526073] ==================================================================
[   76.003242] ==================================================================
[   76.010284] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   76.017661] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   76.025039] 
[   76.026521] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   76.026573] Tainted: [B]=BAD_PAGE, [N]=TEST
[   76.026590] Hardware name: WinLink E850-96 board (DT)
[   76.026608] Call trace:
[   76.026621]  show_stack+0x20/0x38 (C)
[   76.026653]  dump_stack_lvl+0x8c/0xd0
[   76.026684]  print_report+0x118/0x5d0
[   76.026713]  kasan_report+0xdc/0x128
[   76.026740]  kasan_check_range+0x100/0x1a8
[   76.026772]  __kasan_check_write+0x20/0x30
[   76.026804]  kasan_atomics_helper+0x11f8/0x4858
[   76.026839]  kasan_atomics+0x198/0x2e0
[   76.026872]  kunit_try_run_case+0x170/0x3f0
[   76.026909]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.026941]  kthread+0x328/0x630
[   76.026970]  ret_from_fork+0x10/0x20
[   76.027002] 
[   76.098041] Allocated by task 349:
[   76.101426]  kasan_save_stack+0x3c/0x68
[   76.105246]  kasan_save_track+0x20/0x40
[   76.109066]  kasan_save_alloc_info+0x40/0x58
[   76.113319]  __kasan_kmalloc+0xd4/0xd8
[   76.117051]  __kmalloc_cache_noprof+0x16c/0x3c0
[   76.121565]  kasan_atomics+0xb8/0x2e0
[   76.125211]  kunit_try_run_case+0x170/0x3f0
[   76.129378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.134847]  kthread+0x328/0x630
[   76.138058]  ret_from_fork+0x10/0x20
[   76.141617] 
[   76.143093] The buggy address belongs to the object at ffff000807848f80
[   76.143093]  which belongs to the cache kmalloc-64 of size 64
[   76.155420] The buggy address is located 0 bytes to the right of
[   76.155420]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   76.168266] 
[   76.169742] The buggy address belongs to the physical page:
[   76.175298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   76.183285] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   76.189793] page_type: f5(slab)
[   76.192926] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   76.200651] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   76.208370] page dumped because: kasan: bad access detected
[   76.213925] 
[   76.215401] Memory state around the buggy address:
[   76.220179]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   76.227384]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   76.234588] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   76.241789]                                      ^
[   76.246567]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   76.253772]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   76.260973] ==================================================================
[   72.303453] ==================================================================
[   72.310513] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   72.317803] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   72.325181] 
[   72.326661] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   72.326712] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.326727] Hardware name: WinLink E850-96 board (DT)
[   72.326746] Call trace:
[   72.326758]  show_stack+0x20/0x38 (C)
[   72.326790]  dump_stack_lvl+0x8c/0xd0
[   72.326824]  print_report+0x118/0x5d0
[   72.326852]  kasan_report+0xdc/0x128
[   72.326880]  kasan_check_range+0x100/0x1a8
[   72.326913]  __kasan_check_write+0x20/0x30
[   72.326943]  kasan_atomics_helper+0xd3c/0x4858
[   72.326977]  kasan_atomics+0x198/0x2e0
[   72.327010]  kunit_try_run_case+0x170/0x3f0
[   72.327046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.327080]  kthread+0x328/0x630
[   72.327106]  ret_from_fork+0x10/0x20
[   72.327138] 
[   72.398097] Allocated by task 349:
[   72.401482]  kasan_save_stack+0x3c/0x68
[   72.405302]  kasan_save_track+0x20/0x40
[   72.409121]  kasan_save_alloc_info+0x40/0x58
[   72.413374]  __kasan_kmalloc+0xd4/0xd8
[   72.417107]  __kmalloc_cache_noprof+0x16c/0x3c0
[   72.421621]  kasan_atomics+0xb8/0x2e0
[   72.425267]  kunit_try_run_case+0x170/0x3f0
[   72.429433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.434902]  kthread+0x328/0x630
[   72.438113]  ret_from_fork+0x10/0x20
[   72.441673] 
[   72.443148] The buggy address belongs to the object at ffff000807848f80
[   72.443148]  which belongs to the cache kmalloc-64 of size 64
[   72.455475] The buggy address is located 0 bytes to the right of
[   72.455475]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   72.468322] 
[   72.469798] The buggy address belongs to the physical page:
[   72.475353] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   72.483339] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   72.489849] page_type: f5(slab)
[   72.492982] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   72.500706] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.508425] page dumped because: kasan: bad access detected
[   72.513980] 
[   72.515456] Memory state around the buggy address:
[   72.520234]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.527439]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.534644] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.541845]                                      ^
[   72.546623]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   72.553827]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   72.561029] ==================================================================
[   63.852187] ==================================================================
[   63.859254] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   63.866628] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   63.874007] 
[   63.875492] CPU: 5 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   63.875554] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.875569] Hardware name: WinLink E850-96 board (DT)
[   63.875591] Call trace:
[   63.875606]  show_stack+0x20/0x38 (C)
[   63.875643]  dump_stack_lvl+0x8c/0xd0
[   63.875677]  print_report+0x118/0x5d0
[   63.875706]  kasan_report+0xdc/0x128
[   63.875732]  __asan_report_store4_noabort+0x20/0x30
[   63.875768]  kasan_atomics_helper+0x3f7c/0x4858
[   63.875806]  kasan_atomics+0x198/0x2e0
[   63.875839]  kunit_try_run_case+0x170/0x3f0
[   63.875877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.875910]  kthread+0x328/0x630
[   63.875943]  ret_from_fork+0x10/0x20
[   63.875978] 
[   63.943710] Allocated by task 349:
[   63.947099]  kasan_save_stack+0x3c/0x68
[   63.950915]  kasan_save_track+0x20/0x40
[   63.954734]  kasan_save_alloc_info+0x40/0x58
[   63.958987]  __kasan_kmalloc+0xd4/0xd8
[   63.962720]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.967234]  kasan_atomics+0xb8/0x2e0
[   63.970880]  kunit_try_run_case+0x170/0x3f0
[   63.975046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.980515]  kthread+0x328/0x630
[   63.983727]  ret_from_fork+0x10/0x20
[   63.987286] 
[   63.988763] The buggy address belongs to the object at ffff000807848f80
[   63.988763]  which belongs to the cache kmalloc-64 of size 64
[   64.001088] The buggy address is located 0 bytes to the right of
[   64.001088]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   64.013935] 
[   64.015412] The buggy address belongs to the physical page:
[   64.020969] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   64.028956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   64.035462] page_type: f5(slab)
[   64.038597] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   64.046319] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.054040] page dumped because: kasan: bad access detected
[   64.059594] 
[   64.061069] Memory state around the buggy address:
[   64.065849]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.073052]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.080260] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.087458]                                      ^
[   64.092237]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.099441]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.106642] ==================================================================
[   78.385676] ==================================================================
[   78.392714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   78.400090] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   78.407469] 
[   78.408950] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   78.409000] Tainted: [B]=BAD_PAGE, [N]=TEST
[   78.409016] Hardware name: WinLink E850-96 board (DT)
[   78.409035] Call trace:
[   78.409048]  show_stack+0x20/0x38 (C)
[   78.409078]  dump_stack_lvl+0x8c/0xd0
[   78.409108]  print_report+0x118/0x5d0
[   78.409136]  kasan_report+0xdc/0x128
[   78.409167]  kasan_check_range+0x100/0x1a8
[   78.409197]  __kasan_check_write+0x20/0x30
[   78.409228]  kasan_atomics_helper+0x15b4/0x4858
[   78.409264]  kasan_atomics+0x198/0x2e0
[   78.409297]  kunit_try_run_case+0x170/0x3f0
[   78.409331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.409365]  kthread+0x328/0x630
[   78.409391]  ret_from_fork+0x10/0x20
[   78.409424] 
[   78.480471] Allocated by task 349:
[   78.483857]  kasan_save_stack+0x3c/0x68
[   78.487676]  kasan_save_track+0x20/0x40
[   78.491495]  kasan_save_alloc_info+0x40/0x58
[   78.495748]  __kasan_kmalloc+0xd4/0xd8
[   78.499481]  __kmalloc_cache_noprof+0x16c/0x3c0
[   78.503995]  kasan_atomics+0xb8/0x2e0
[   78.507641]  kunit_try_run_case+0x170/0x3f0
[   78.511807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.517276]  kthread+0x328/0x630
[   78.520488]  ret_from_fork+0x10/0x20
[   78.524047] 
[   78.525522] The buggy address belongs to the object at ffff000807848f80
[   78.525522]  which belongs to the cache kmalloc-64 of size 64
[   78.537849] The buggy address is located 0 bytes to the right of
[   78.537849]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   78.550696] 
[   78.552173] The buggy address belongs to the physical page:
[   78.557727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   78.565715] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   78.572223] page_type: f5(slab)
[   78.575358] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   78.583080] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   78.590799] page dumped because: kasan: bad access detected
[   78.596354] 
[   78.597830] Memory state around the buggy address:
[   78.602608]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.609813]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.617018] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   78.624219]                                      ^
[   78.628997]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   78.636201]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   78.643402] ==================================================================
[   73.356409] ==================================================================
[   73.363449] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   73.370739] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   73.378117] 
[   73.379597] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   73.379646] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.379662] Hardware name: WinLink E850-96 board (DT)
[   73.379680] Call trace:
[   73.379692]  show_stack+0x20/0x38 (C)
[   73.379725]  dump_stack_lvl+0x8c/0xd0
[   73.379757]  print_report+0x118/0x5d0
[   73.379786]  kasan_report+0xdc/0x128
[   73.379815]  kasan_check_range+0x100/0x1a8
[   73.379846]  __kasan_check_write+0x20/0x30
[   73.379877]  kasan_atomics_helper+0xe44/0x4858
[   73.379915]  kasan_atomics+0x198/0x2e0
[   73.379946]  kunit_try_run_case+0x170/0x3f0
[   73.379982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.380016]  kthread+0x328/0x630
[   73.380042]  ret_from_fork+0x10/0x20
[   73.380075] 
[   73.451032] Allocated by task 349:
[   73.454418]  kasan_save_stack+0x3c/0x68
[   73.458238]  kasan_save_track+0x20/0x40
[   73.462057]  kasan_save_alloc_info+0x40/0x58
[   73.466310]  __kasan_kmalloc+0xd4/0xd8
[   73.470042]  __kmalloc_cache_noprof+0x16c/0x3c0
[   73.474556]  kasan_atomics+0xb8/0x2e0
[   73.478202]  kunit_try_run_case+0x170/0x3f0
[   73.482369]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.487838]  kthread+0x328/0x630
[   73.491049]  ret_from_fork+0x10/0x20
[   73.494608] 
[   73.496084] The buggy address belongs to the object at ffff000807848f80
[   73.496084]  which belongs to the cache kmalloc-64 of size 64
[   73.508411] The buggy address is located 0 bytes to the right of
[   73.508411]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   73.521257] 
[   73.522734] The buggy address belongs to the physical page:
[   73.528290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   73.536276] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   73.542785] page_type: f5(slab)
[   73.545920] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   73.553642] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.561361] page dumped because: kasan: bad access detected
[   73.566916] 
[   73.568392] Memory state around the buggy address:
[   73.573170]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.580375]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.587579] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.594781]                                      ^
[   73.599558]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.606763]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.613964] ==================================================================
[   66.491564] ==================================================================
[   66.498621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   66.505911] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   66.513290] 
[   66.514774] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   66.514824] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.514840] Hardware name: WinLink E850-96 board (DT)
[   66.514858] Call trace:
[   66.514870]  show_stack+0x20/0x38 (C)
[   66.514900]  dump_stack_lvl+0x8c/0xd0
[   66.514934]  print_report+0x118/0x5d0
[   66.514961]  kasan_report+0xdc/0x128
[   66.514988]  kasan_check_range+0x100/0x1a8
[   66.515018]  __kasan_check_write+0x20/0x30
[   66.515050]  kasan_atomics_helper+0x4e4/0x4858
[   66.515087]  kasan_atomics+0x198/0x2e0
[   66.515121]  kunit_try_run_case+0x170/0x3f0
[   66.515156]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.515189]  kthread+0x328/0x630
[   66.515215]  ret_from_fork+0x10/0x20
[   66.515248] 
[   66.586205] Allocated by task 349:
[   66.589591]  kasan_save_stack+0x3c/0x68
[   66.593410]  kasan_save_track+0x20/0x40
[   66.597229]  kasan_save_alloc_info+0x40/0x58
[   66.601483]  __kasan_kmalloc+0xd4/0xd8
[   66.605215]  __kmalloc_cache_noprof+0x16c/0x3c0
[   66.609729]  kasan_atomics+0xb8/0x2e0
[   66.613375]  kunit_try_run_case+0x170/0x3f0
[   66.617541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.623010]  kthread+0x328/0x630
[   66.626222]  ret_from_fork+0x10/0x20
[   66.629781] 
[   66.631256] The buggy address belongs to the object at ffff000807848f80
[   66.631256]  which belongs to the cache kmalloc-64 of size 64
[   66.643583] The buggy address is located 0 bytes to the right of
[   66.643583]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   66.656430] 
[   66.657907] The buggy address belongs to the physical page:
[   66.663462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   66.671449] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   66.677957] page_type: f5(slab)
[   66.681091] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   66.688814] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.696533] page dumped because: kasan: bad access detected
[   66.702089] 
[   66.703564] Memory state around the buggy address:
[   66.708343]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.715547]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.722752] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.729953]                                      ^
[   66.734730]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   66.741935]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   66.749137] ==================================================================
[   70.462153] ==================================================================
[   70.469221] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   70.476598] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   70.483890] 
[   70.485370] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   70.485419] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.485435] Hardware name: WinLink E850-96 board (DT)
[   70.485453] Call trace:
[   70.485467]  show_stack+0x20/0x38 (C)
[   70.485498]  dump_stack_lvl+0x8c/0xd0
[   70.485531]  print_report+0x118/0x5d0
[   70.485560]  kasan_report+0xdc/0x128
[   70.485589]  __asan_report_load4_noabort+0x20/0x30
[   70.485621]  kasan_atomics_helper+0x3dcc/0x4858
[   70.485656]  kasan_atomics+0x198/0x2e0
[   70.485688]  kunit_try_run_case+0x170/0x3f0
[   70.485724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.485755]  kthread+0x328/0x630
[   70.485782]  ret_from_fork+0x10/0x20
[   70.485812] 
[   70.553506] Allocated by task 349:
[   70.556892]  kasan_save_stack+0x3c/0x68
[   70.560711]  kasan_save_track+0x20/0x40
[   70.564531]  kasan_save_alloc_info+0x40/0x58
[   70.568784]  __kasan_kmalloc+0xd4/0xd8
[   70.572517]  __kmalloc_cache_noprof+0x16c/0x3c0
[   70.577030]  kasan_atomics+0xb8/0x2e0
[   70.580676]  kunit_try_run_case+0x170/0x3f0
[   70.584843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.590312]  kthread+0x328/0x630
[   70.593523]  ret_from_fork+0x10/0x20
[   70.597082] 
[   70.598558] The buggy address belongs to the object at ffff000807848f80
[   70.598558]  which belongs to the cache kmalloc-64 of size 64
[   70.610884] The buggy address is located 0 bytes to the right of
[   70.610884]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   70.623731] 
[   70.625207] The buggy address belongs to the physical page:
[   70.630763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   70.638748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   70.645259] page_type: f5(slab)
[   70.648393] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   70.656116] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.663835] page dumped because: kasan: bad access detected
[   70.669390] 
[   70.670866] Memory state around the buggy address:
[   70.675644]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.682849]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.690053] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.697254]                                      ^
[   70.702032]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   70.709237]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   70.716438] ==================================================================
[   74.677932] ==================================================================
[   74.684957] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   74.692247] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   74.699625] 
[   74.701104] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   74.701152] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.701170] Hardware name: WinLink E850-96 board (DT)
[   74.701187] Call trace:
[   74.701201]  show_stack+0x20/0x38 (C)
[   74.701237]  dump_stack_lvl+0x8c/0xd0
[   74.701265]  print_report+0x118/0x5d0
[   74.701291]  kasan_report+0xdc/0x128
[   74.701319]  kasan_check_range+0x100/0x1a8
[   74.701349]  __kasan_check_write+0x20/0x30
[   74.701379]  kasan_atomics_helper+0xff0/0x4858
[   74.701414]  kasan_atomics+0x198/0x2e0
[   74.701447]  kunit_try_run_case+0x170/0x3f0
[   74.701482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.701514]  kthread+0x328/0x630
[   74.701542]  ret_from_fork+0x10/0x20
[   74.701573] 
[   74.772540] Allocated by task 349:
[   74.775926]  kasan_save_stack+0x3c/0x68
[   74.779745]  kasan_save_track+0x20/0x40
[   74.783564]  kasan_save_alloc_info+0x40/0x58
[   74.787818]  __kasan_kmalloc+0xd4/0xd8
[   74.791551]  __kmalloc_cache_noprof+0x16c/0x3c0
[   74.796064]  kasan_atomics+0xb8/0x2e0
[   74.799710]  kunit_try_run_case+0x170/0x3f0
[   74.803877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.809346]  kthread+0x328/0x630
[   74.812557]  ret_from_fork+0x10/0x20
[   74.816116] 
[   74.817592] The buggy address belongs to the object at ffff000807848f80
[   74.817592]  which belongs to the cache kmalloc-64 of size 64
[   74.829919] The buggy address is located 0 bytes to the right of
[   74.829919]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   74.842765] 
[   74.844241] The buggy address belongs to the physical page:
[   74.849797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   74.857784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   74.864293] page_type: f5(slab)
[   74.867426] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   74.875150] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.882869] page dumped because: kasan: bad access detected
[   74.888424] 
[   74.889900] Memory state around the buggy address:
[   74.894678]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.901883]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.909088] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.916288]                                      ^
[   74.921068]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.928271]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.935472] ==================================================================
[   79.704212] ==================================================================
[   79.711270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   79.718647] Read of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   79.725938] 
[   79.727419] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   79.727467] Tainted: [B]=BAD_PAGE, [N]=TEST
[   79.727485] Hardware name: WinLink E850-96 board (DT)
[   79.727502] Call trace:
[   79.727515]  show_stack+0x20/0x38 (C)
[   79.727546]  dump_stack_lvl+0x8c/0xd0
[   79.727580]  print_report+0x118/0x5d0
[   79.727609]  kasan_report+0xdc/0x128
[   79.727635]  __asan_report_load8_noabort+0x20/0x30
[   79.727669]  kasan_atomics_helper+0x3e10/0x4858
[   79.727704]  kasan_atomics+0x198/0x2e0
[   79.727737]  kunit_try_run_case+0x170/0x3f0
[   79.727772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.727805]  kthread+0x328/0x630
[   79.727833]  ret_from_fork+0x10/0x20
[   79.727864] 
[   79.795555] Allocated by task 349:
[   79.798941]  kasan_save_stack+0x3c/0x68
[   79.802760]  kasan_save_track+0x20/0x40
[   79.806580]  kasan_save_alloc_info+0x40/0x58
[   79.810833]  __kasan_kmalloc+0xd4/0xd8
[   79.814566]  __kmalloc_cache_noprof+0x16c/0x3c0
[   79.819079]  kasan_atomics+0xb8/0x2e0
[   79.822725]  kunit_try_run_case+0x170/0x3f0
[   79.826892]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.832360]  kthread+0x328/0x630
[   79.835572]  ret_from_fork+0x10/0x20
[   79.839131] 
[   79.840607] The buggy address belongs to the object at ffff000807848f80
[   79.840607]  which belongs to the cache kmalloc-64 of size 64
[   79.852934] The buggy address is located 0 bytes to the right of
[   79.852934]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   79.865780] 
[   79.867256] The buggy address belongs to the physical page:
[   79.872812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   79.880797] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   79.887308] page_type: f5(slab)
[   79.890442] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   79.898165] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   79.905884] page dumped because: kasan: bad access detected
[   79.911439] 
[   79.912915] Memory state around the buggy address:
[   79.917693]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   79.924897]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   79.932102] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   79.939303]                                      ^
[   79.944081]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   79.951286]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   79.958487] ==================================================================
[   80.492588] ==================================================================
[   80.499626] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   80.507003] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   80.514381] 
[   80.515862] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   80.515915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   80.515932] Hardware name: WinLink E850-96 board (DT)
[   80.515952] Call trace:
[   80.515966]  show_stack+0x20/0x38 (C)
[   80.515997]  dump_stack_lvl+0x8c/0xd0
[   80.516027]  print_report+0x118/0x5d0
[   80.516057]  kasan_report+0xdc/0x128
[   80.516085]  kasan_check_range+0x100/0x1a8
[   80.516116]  __kasan_check_write+0x20/0x30
[   80.516147]  kasan_atomics_helper+0x17ec/0x4858
[   80.516183]  kasan_atomics+0x198/0x2e0
[   80.516216]  kunit_try_run_case+0x170/0x3f0
[   80.516252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.516284]  kthread+0x328/0x630
[   80.516312]  ret_from_fork+0x10/0x20
[   80.516344] 
[   80.587384] Allocated by task 349:
[   80.590769]  kasan_save_stack+0x3c/0x68
[   80.594589]  kasan_save_track+0x20/0x40
[   80.598408]  kasan_save_alloc_info+0x40/0x58
[   80.602661]  __kasan_kmalloc+0xd4/0xd8
[   80.606394]  __kmalloc_cache_noprof+0x16c/0x3c0
[   80.610908]  kasan_atomics+0xb8/0x2e0
[   80.614553]  kunit_try_run_case+0x170/0x3f0
[   80.618720]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.624189]  kthread+0x328/0x630
[   80.627401]  ret_from_fork+0x10/0x20
[   80.630960] 
[   80.632435] The buggy address belongs to the object at ffff000807848f80
[   80.632435]  which belongs to the cache kmalloc-64 of size 64
[   80.644762] The buggy address is located 0 bytes to the right of
[   80.644762]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   80.657608] 
[   80.659086] The buggy address belongs to the physical page:
[   80.664640] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   80.672627] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   80.679136] page_type: f5(slab)
[   80.682269] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   80.689993] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   80.697712] page dumped because: kasan: bad access detected
[   80.703267] 
[   80.704743] Memory state around the buggy address:
[   80.709521]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   80.716726]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   80.723930] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   80.731132]                                      ^
[   80.735909]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   80.743114]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   80.750315] ==================================================================
[   75.738121] ==================================================================
[   75.745183] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   75.752560] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   75.759939] 
[   75.761419] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   75.761465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.761483] Hardware name: WinLink E850-96 board (DT)
[   75.761502] Call trace:
[   75.761514]  show_stack+0x20/0x38 (C)
[   75.761546]  dump_stack_lvl+0x8c/0xd0
[   75.761577]  print_report+0x118/0x5d0
[   75.761605]  kasan_report+0xdc/0x128
[   75.761633]  kasan_check_range+0x100/0x1a8
[   75.761663]  __kasan_check_write+0x20/0x30
[   75.761695]  kasan_atomics_helper+0x1190/0x4858
[   75.761733]  kasan_atomics+0x198/0x2e0
[   75.761765]  kunit_try_run_case+0x170/0x3f0
[   75.761799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.761831]  kthread+0x328/0x630
[   75.761860]  ret_from_fork+0x10/0x20
[   75.761892] 
[   75.832941] Allocated by task 349:
[   75.836326]  kasan_save_stack+0x3c/0x68
[   75.840146]  kasan_save_track+0x20/0x40
[   75.843966]  kasan_save_alloc_info+0x40/0x58
[   75.848219]  __kasan_kmalloc+0xd4/0xd8
[   75.851951]  __kmalloc_cache_noprof+0x16c/0x3c0
[   75.856465]  kasan_atomics+0xb8/0x2e0
[   75.860111]  kunit_try_run_case+0x170/0x3f0
[   75.864278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.869746]  kthread+0x328/0x630
[   75.872958]  ret_from_fork+0x10/0x20
[   75.876517] 
[   75.877992] The buggy address belongs to the object at ffff000807848f80
[   75.877992]  which belongs to the cache kmalloc-64 of size 64
[   75.890319] The buggy address is located 0 bytes to the right of
[   75.890319]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   75.903166] 
[   75.904642] The buggy address belongs to the physical page:
[   75.910198] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   75.918183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   75.924694] page_type: f5(slab)
[   75.927826] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   75.935550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.943269] page dumped because: kasan: bad access detected
[   75.948825] 
[   75.950300] Memory state around the buggy address:
[   75.955079]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.962284]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.969488] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.976689]                                      ^
[   75.981467]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   75.988672]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   75.995873] ==================================================================
[   76.533445] ==================================================================
[   76.540484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   76.547861] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   76.555239] 
[   76.556720] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   76.556770] Tainted: [B]=BAD_PAGE, [N]=TEST
[   76.556786] Hardware name: WinLink E850-96 board (DT)
[   76.556805] Call trace:
[   76.556820]  show_stack+0x20/0x38 (C)
[   76.556852]  dump_stack_lvl+0x8c/0xd0
[   76.556882]  print_report+0x118/0x5d0
[   76.556911]  kasan_report+0xdc/0x128
[   76.556938]  kasan_check_range+0x100/0x1a8
[   76.556969]  __kasan_check_write+0x20/0x30
[   76.557001]  kasan_atomics_helper+0x12d8/0x4858
[   76.557037]  kasan_atomics+0x198/0x2e0
[   76.557069]  kunit_try_run_case+0x170/0x3f0
[   76.557103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.557135]  kthread+0x328/0x630
[   76.557164]  ret_from_fork+0x10/0x20
[   76.557194] 
[   76.628242] Allocated by task 349:
[   76.631628]  kasan_save_stack+0x3c/0x68
[   76.635447]  kasan_save_track+0x20/0x40
[   76.639266]  kasan_save_alloc_info+0x40/0x58
[   76.643519]  __kasan_kmalloc+0xd4/0xd8
[   76.647252]  __kmalloc_cache_noprof+0x16c/0x3c0
[   76.651766]  kasan_atomics+0xb8/0x2e0
[   76.655412]  kunit_try_run_case+0x170/0x3f0
[   76.659578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.665047]  kthread+0x328/0x630
[   76.668259]  ret_from_fork+0x10/0x20
[   76.671818] 
[   76.673293] The buggy address belongs to the object at ffff000807848f80
[   76.673293]  which belongs to the cache kmalloc-64 of size 64
[   76.685620] The buggy address is located 0 bytes to the right of
[   76.685620]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   76.698467] 
[   76.699943] The buggy address belongs to the physical page:
[   76.705498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   76.713485] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   76.719994] page_type: f5(slab)
[   76.723127] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   76.730851] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   76.738570] page dumped because: kasan: bad access detected
[   76.744125] 
[   76.745601] Memory state around the buggy address:
[   76.750379]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   76.757584]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   76.764789] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   76.771990]                                      ^
[   76.776768]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   76.783972]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   76.791173] ==================================================================
[   64.643706] ==================================================================
[   64.650736] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   64.658024] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   64.665314] 
[   64.666799] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   64.666856] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.666872] Hardware name: WinLink E850-96 board (DT)
[   64.666893] Call trace:
[   64.666907]  show_stack+0x20/0x38 (C)
[   64.666945]  dump_stack_lvl+0x8c/0xd0
[   64.666977]  print_report+0x118/0x5d0
[   64.667009]  kasan_report+0xdc/0x128
[   64.667038]  kasan_check_range+0x100/0x1a8
[   64.667071]  __kasan_check_read+0x20/0x30
[   64.667106]  kasan_atomics_helper+0x2b0/0x4858
[   64.667140]  kasan_atomics+0x198/0x2e0
[   64.667174]  kunit_try_run_case+0x170/0x3f0
[   64.667215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.667249]  kthread+0x328/0x630
[   64.667278]  ret_from_fork+0x10/0x20
[   64.667316] 
[   64.738142] Allocated by task 349:
[   64.741531]  kasan_save_stack+0x3c/0x68
[   64.745347]  kasan_save_track+0x20/0x40
[   64.749167]  kasan_save_alloc_info+0x40/0x58
[   64.753420]  __kasan_kmalloc+0xd4/0xd8
[   64.757152]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.761667]  kasan_atomics+0xb8/0x2e0
[   64.765312]  kunit_try_run_case+0x170/0x3f0
[   64.769479]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.774948]  kthread+0x328/0x630
[   64.778159]  ret_from_fork+0x10/0x20
[   64.781718] 
[   64.783196] The buggy address belongs to the object at ffff000807848f80
[   64.783196]  which belongs to the cache kmalloc-64 of size 64
[   64.795521] The buggy address is located 0 bytes to the right of
[   64.795521]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   64.808367] 
[   64.809845] The buggy address belongs to the physical page:
[   64.815402] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   64.823387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   64.829896] page_type: f5(slab)
[   64.833030] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   64.840752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.848471] page dumped because: kasan: bad access detected
[   64.854026] 
[   64.855502] Memory state around the buggy address:
[   64.860281]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.867485]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.874691] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.881890]                                      ^
[   64.886670]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.893873]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.901074] ==================================================================
[   74.148017] ==================================================================
[   74.155104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   74.162394] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   74.169772] 
[   74.171253] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   74.171305] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.171321] Hardware name: WinLink E850-96 board (DT)
[   74.171341] Call trace:
[   74.171353]  show_stack+0x20/0x38 (C)
[   74.171385]  dump_stack_lvl+0x8c/0xd0
[   74.171416]  print_report+0x118/0x5d0
[   74.171446]  kasan_report+0xdc/0x128
[   74.171473]  kasan_check_range+0x100/0x1a8
[   74.171503]  __kasan_check_write+0x20/0x30
[   74.171535]  kasan_atomics_helper+0xf20/0x4858
[   74.171568]  kasan_atomics+0x198/0x2e0
[   74.171604]  kunit_try_run_case+0x170/0x3f0
[   74.171639]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.171673]  kthread+0x328/0x630
[   74.171700]  ret_from_fork+0x10/0x20
[   74.171734] 
[   74.242687] Allocated by task 349:
[   74.246073]  kasan_save_stack+0x3c/0x68
[   74.249892]  kasan_save_track+0x20/0x40
[   74.253712]  kasan_save_alloc_info+0x40/0x58
[   74.257965]  __kasan_kmalloc+0xd4/0xd8
[   74.261697]  __kmalloc_cache_noprof+0x16c/0x3c0
[   74.266211]  kasan_atomics+0xb8/0x2e0
[   74.269857]  kunit_try_run_case+0x170/0x3f0
[   74.274023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.279492]  kthread+0x328/0x630
[   74.282704]  ret_from_fork+0x10/0x20
[   74.286263] 
[   74.287739] The buggy address belongs to the object at ffff000807848f80
[   74.287739]  which belongs to the cache kmalloc-64 of size 64
[   74.300065] The buggy address is located 0 bytes to the right of
[   74.300065]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   74.312912] 
[   74.314387] The buggy address belongs to the physical page:
[   74.319944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   74.327929] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   74.334440] page_type: f5(slab)
[   74.337573] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   74.345297] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.353016] page dumped because: kasan: bad access detected
[   74.358571] 
[   74.360046] Memory state around the buggy address:
[   74.364825]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.372029]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.379234] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.386435]                                      ^
[   74.391213]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.398418]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.405619] ==================================================================
[   80.230938] ==================================================================
[   80.237998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   80.245375] Read of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   80.252667] 
[   80.254146] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   80.254194] Tainted: [B]=BAD_PAGE, [N]=TEST
[   80.254211] Hardware name: WinLink E850-96 board (DT)
[   80.254229] Call trace:
[   80.254241]  show_stack+0x20/0x38 (C)
[   80.254275]  dump_stack_lvl+0x8c/0xd0
[   80.254305]  print_report+0x118/0x5d0
[   80.254334]  kasan_report+0xdc/0x128
[   80.254362]  __asan_report_load8_noabort+0x20/0x30
[   80.254394]  kasan_atomics_helper+0x3e20/0x4858
[   80.254429]  kasan_atomics+0x198/0x2e0
[   80.254462]  kunit_try_run_case+0x170/0x3f0
[   80.254496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.254531]  kthread+0x328/0x630
[   80.254558]  ret_from_fork+0x10/0x20
[   80.254590] 
[   80.322283] Allocated by task 349:
[   80.325669]  kasan_save_stack+0x3c/0x68
[   80.329488]  kasan_save_track+0x20/0x40
[   80.333308]  kasan_save_alloc_info+0x40/0x58
[   80.337561]  __kasan_kmalloc+0xd4/0xd8
[   80.341294]  __kmalloc_cache_noprof+0x16c/0x3c0
[   80.345808]  kasan_atomics+0xb8/0x2e0
[   80.349453]  kunit_try_run_case+0x170/0x3f0
[   80.353620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.359089]  kthread+0x328/0x630
[   80.362300]  ret_from_fork+0x10/0x20
[   80.365860] 
[   80.367335] The buggy address belongs to the object at ffff000807848f80
[   80.367335]  which belongs to the cache kmalloc-64 of size 64
[   80.379662] The buggy address is located 0 bytes to the right of
[   80.379662]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   80.392508] 
[   80.393984] The buggy address belongs to the physical page:
[   80.399540] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   80.407526] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   80.414036] page_type: f5(slab)
[   80.417171] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   80.424893] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   80.432612] page dumped because: kasan: bad access detected
[   80.438167] 
[   80.439643] Memory state around the buggy address:
[   80.444421]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   80.451625]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   80.458830] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   80.466032]                                      ^
[   80.470809]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   80.478014]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   80.485215] ==================================================================
[   69.667398] ==================================================================
[   69.674442] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   69.681732] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   69.689110] 
[   69.690589] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   69.690639] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.690656] Hardware name: WinLink E850-96 board (DT)
[   69.690674] Call trace:
[   69.690687]  show_stack+0x20/0x38 (C)
[   69.690722]  dump_stack_lvl+0x8c/0xd0
[   69.690752]  print_report+0x118/0x5d0
[   69.690779]  kasan_report+0xdc/0x128
[   69.690806]  kasan_check_range+0x100/0x1a8
[   69.690835]  __kasan_check_write+0x20/0x30
[   69.690867]  kasan_atomics_helper+0xa04/0x4858
[   69.690901]  kasan_atomics+0x198/0x2e0
[   69.690935]  kunit_try_run_case+0x170/0x3f0
[   69.690971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.691002]  kthread+0x328/0x630
[   69.691030]  ret_from_fork+0x10/0x20
[   69.691063] 
[   69.762025] Allocated by task 349:
[   69.765411]  kasan_save_stack+0x3c/0x68
[   69.769230]  kasan_save_track+0x20/0x40
[   69.773049]  kasan_save_alloc_info+0x40/0x58
[   69.777303]  __kasan_kmalloc+0xd4/0xd8
[   69.781035]  __kmalloc_cache_noprof+0x16c/0x3c0
[   69.785549]  kasan_atomics+0xb8/0x2e0
[   69.789195]  kunit_try_run_case+0x170/0x3f0
[   69.793362]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.798831]  kthread+0x328/0x630
[   69.802042]  ret_from_fork+0x10/0x20
[   69.805602] 
[   69.807077] The buggy address belongs to the object at ffff000807848f80
[   69.807077]  which belongs to the cache kmalloc-64 of size 64
[   69.819403] The buggy address is located 0 bytes to the right of
[   69.819403]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   69.832250] 
[   69.833726] The buggy address belongs to the physical page:
[   69.839285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   69.847269] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   69.853778] page_type: f5(slab)
[   69.856912] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   69.864635] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.872354] page dumped because: kasan: bad access detected
[   69.877909] 
[   69.879385] Memory state around the buggy address:
[   69.884163]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.891368]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.898572] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.905773]                                      ^
[   69.910551]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   69.917756]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   69.924957] ==================================================================
[   73.883134] ==================================================================
[   73.890178] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   73.897467] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   73.904845] 
[   73.906325] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   73.906379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.906395] Hardware name: WinLink E850-96 board (DT)
[   73.906415] Call trace:
[   73.906428]  show_stack+0x20/0x38 (C)
[   73.906459]  dump_stack_lvl+0x8c/0xd0
[   73.906492]  print_report+0x118/0x5d0
[   73.906520]  kasan_report+0xdc/0x128
[   73.906548]  kasan_check_range+0x100/0x1a8
[   73.906578]  __kasan_check_write+0x20/0x30
[   73.906610]  kasan_atomics_helper+0xeb8/0x4858
[   73.906646]  kasan_atomics+0x198/0x2e0
[   73.906682]  kunit_try_run_case+0x170/0x3f0
[   73.906715]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.906748]  kthread+0x328/0x630
[   73.906775]  ret_from_fork+0x10/0x20
[   73.906808] 
[   73.977761] Allocated by task 349:
[   73.981146]  kasan_save_stack+0x3c/0x68
[   73.984966]  kasan_save_track+0x20/0x40
[   73.988785]  kasan_save_alloc_info+0x40/0x58
[   73.993038]  __kasan_kmalloc+0xd4/0xd8
[   73.996771]  __kmalloc_cache_noprof+0x16c/0x3c0
[   74.001285]  kasan_atomics+0xb8/0x2e0
[   74.004931]  kunit_try_run_case+0x170/0x3f0
[   74.009097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.014566]  kthread+0x328/0x630
[   74.017778]  ret_from_fork+0x10/0x20
[   74.021336] 
[   74.022812] The buggy address belongs to the object at ffff000807848f80
[   74.022812]  which belongs to the cache kmalloc-64 of size 64
[   74.035139] The buggy address is located 0 bytes to the right of
[   74.035139]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   74.047985] 
[   74.049463] The buggy address belongs to the physical page:
[   74.055018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   74.063005] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   74.069513] page_type: f5(slab)
[   74.072649] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   74.080370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.088089] page dumped because: kasan: bad access detected
[   74.093644] 
[   74.095120] Memory state around the buggy address:
[   74.099898]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.107103]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.114308] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.121509]                                      ^
[   74.126287]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.133491]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.140693] ==================================================================
[   74.942849] ==================================================================
[   74.949884] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   74.957260] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   74.964638] 
[   74.966122] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   74.966175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.966193] Hardware name: WinLink E850-96 board (DT)
[   74.966211] Call trace:
[   74.966223]  show_stack+0x20/0x38 (C)
[   74.966255]  dump_stack_lvl+0x8c/0xd0
[   74.966284]  print_report+0x118/0x5d0
[   74.966313]  kasan_report+0xdc/0x128
[   74.966342]  kasan_check_range+0x100/0x1a8
[   74.966372]  __kasan_check_write+0x20/0x30
[   74.966403]  kasan_atomics_helper+0x1058/0x4858
[   74.966440]  kasan_atomics+0x198/0x2e0
[   74.966474]  kunit_try_run_case+0x170/0x3f0
[   74.966508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.966542]  kthread+0x328/0x630
[   74.966570]  ret_from_fork+0x10/0x20
[   74.966600] 
[   75.037641] Allocated by task 349:
[   75.041026]  kasan_save_stack+0x3c/0x68
[   75.044845]  kasan_save_track+0x20/0x40
[   75.048665]  kasan_save_alloc_info+0x40/0x58
[   75.052918]  __kasan_kmalloc+0xd4/0xd8
[   75.056651]  __kmalloc_cache_noprof+0x16c/0x3c0
[   75.061165]  kasan_atomics+0xb8/0x2e0
[   75.064811]  kunit_try_run_case+0x170/0x3f0
[   75.068977]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.074446]  kthread+0x328/0x630
[   75.077657]  ret_from_fork+0x10/0x20
[   75.081216] 
[   75.082692] The buggy address belongs to the object at ffff000807848f80
[   75.082692]  which belongs to the cache kmalloc-64 of size 64
[   75.095019] The buggy address is located 0 bytes to the right of
[   75.095019]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   75.107865] 
[   75.109341] The buggy address belongs to the physical page:
[   75.114897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   75.122882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   75.129393] page_type: f5(slab)
[   75.132527] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   75.140250] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.147969] page dumped because: kasan: bad access detected
[   75.153524] 
[   75.155000] Memory state around the buggy address:
[   75.159778]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.166983]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.174188] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.181389]                                      ^
[   75.186168]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   75.193371]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   75.200572] ==================================================================
[   69.402450] ==================================================================
[   69.409515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   69.416805] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   69.424183] 
[   69.425663] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   69.425710] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.425725] Hardware name: WinLink E850-96 board (DT)
[   69.425745] Call trace:
[   69.425758]  show_stack+0x20/0x38 (C)
[   69.425790]  dump_stack_lvl+0x8c/0xd0
[   69.425821]  print_report+0x118/0x5d0
[   69.425849]  kasan_report+0xdc/0x128
[   69.425877]  kasan_check_range+0x100/0x1a8
[   69.425907]  __kasan_check_write+0x20/0x30
[   69.425937]  kasan_atomics_helper+0x99c/0x4858
[   69.425971]  kasan_atomics+0x198/0x2e0
[   69.426004]  kunit_try_run_case+0x170/0x3f0
[   69.426038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.426072]  kthread+0x328/0x630
[   69.426099]  ret_from_fork+0x10/0x20
[   69.426129] 
[   69.497099] Allocated by task 349:
[   69.500485]  kasan_save_stack+0x3c/0x68
[   69.504304]  kasan_save_track+0x20/0x40
[   69.508123]  kasan_save_alloc_info+0x40/0x58
[   69.512377]  __kasan_kmalloc+0xd4/0xd8
[   69.516109]  __kmalloc_cache_noprof+0x16c/0x3c0
[   69.520623]  kasan_atomics+0xb8/0x2e0
[   69.524269]  kunit_try_run_case+0x170/0x3f0
[   69.528435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.533904]  kthread+0x328/0x630
[   69.537116]  ret_from_fork+0x10/0x20
[   69.540675] 
[   69.542150] The buggy address belongs to the object at ffff000807848f80
[   69.542150]  which belongs to the cache kmalloc-64 of size 64
[   69.554477] The buggy address is located 0 bytes to the right of
[   69.554477]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   69.567323] 
[   69.568799] The buggy address belongs to the physical page:
[   69.574355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   69.582341] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   69.588851] page_type: f5(slab)
[   69.591984] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   69.599708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.607427] page dumped because: kasan: bad access detected
[   69.612983] 
[   69.614458] Memory state around the buggy address:
[   69.619236]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.626441]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.633646] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.640847]                                      ^
[   69.645625]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   69.652829]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   69.660031] ==================================================================
[   72.041850] ==================================================================
[   72.048885] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   72.056262] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   72.063553] 
[   72.065035] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   72.065084] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.065100] Hardware name: WinLink E850-96 board (DT)
[   72.065119] Call trace:
[   72.065133]  show_stack+0x20/0x38 (C)
[   72.065164]  dump_stack_lvl+0x8c/0xd0
[   72.065197]  print_report+0x118/0x5d0
[   72.065226]  kasan_report+0xdc/0x128
[   72.065255]  __asan_report_load4_noabort+0x20/0x30
[   72.065288]  kasan_atomics_helper+0x3dd8/0x4858
[   72.065324]  kasan_atomics+0x198/0x2e0
[   72.065358]  kunit_try_run_case+0x170/0x3f0
[   72.065393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.065425]  kthread+0x328/0x630
[   72.065452]  ret_from_fork+0x10/0x20
[   72.065485] 
[   72.133170] Allocated by task 349:
[   72.136556]  kasan_save_stack+0x3c/0x68
[   72.140375]  kasan_save_track+0x20/0x40
[   72.144195]  kasan_save_alloc_info+0x40/0x58
[   72.148448]  __kasan_kmalloc+0xd4/0xd8
[   72.152180]  __kmalloc_cache_noprof+0x16c/0x3c0
[   72.156694]  kasan_atomics+0xb8/0x2e0
[   72.160340]  kunit_try_run_case+0x170/0x3f0
[   72.164507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.169975]  kthread+0x328/0x630
[   72.173187]  ret_from_fork+0x10/0x20
[   72.176746] 
[   72.178222] The buggy address belongs to the object at ffff000807848f80
[   72.178222]  which belongs to the cache kmalloc-64 of size 64
[   72.190548] The buggy address is located 0 bytes to the right of
[   72.190548]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   72.203395] 
[   72.204871] The buggy address belongs to the physical page:
[   72.210428] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   72.218413] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   72.224923] page_type: f5(slab)
[   72.228057] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   72.235780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.243499] page dumped because: kasan: bad access detected
[   72.249054] 
[   72.250530] Memory state around the buggy address:
[   72.255308]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.262512]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.269717] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.276918]                                      ^
[   72.281696]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   72.288901]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   72.296102] ==================================================================
[   65.435033] ==================================================================
[   65.442040] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   65.449417] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   65.456796] 
[   65.458279] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   65.458330] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.458346] Hardware name: WinLink E850-96 board (DT)
[   65.458369] Call trace:
[   65.458382]  show_stack+0x20/0x38 (C)
[   65.458416]  dump_stack_lvl+0x8c/0xd0
[   65.458449]  print_report+0x118/0x5d0
[   65.458477]  kasan_report+0xdc/0x128
[   65.458507]  __asan_report_store4_noabort+0x20/0x30
[   65.458540]  kasan_atomics_helper+0x3f94/0x4858
[   65.458576]  kasan_atomics+0x198/0x2e0
[   65.458608]  kunit_try_run_case+0x170/0x3f0
[   65.458643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.458676]  kthread+0x328/0x630
[   65.458704]  ret_from_fork+0x10/0x20
[   65.458740] 
[   65.526499] Allocated by task 349:
[   65.529884]  kasan_save_stack+0x3c/0x68
[   65.533704]  kasan_save_track+0x20/0x40
[   65.537523]  kasan_save_alloc_info+0x40/0x58
[   65.541776]  __kasan_kmalloc+0xd4/0xd8
[   65.545509]  __kmalloc_cache_noprof+0x16c/0x3c0
[   65.550023]  kasan_atomics+0xb8/0x2e0
[   65.553668]  kunit_try_run_case+0x170/0x3f0
[   65.557835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.563304]  kthread+0x328/0x630
[   65.566515]  ret_from_fork+0x10/0x20
[   65.570075] 
[   65.571550] The buggy address belongs to the object at ffff000807848f80
[   65.571550]  which belongs to the cache kmalloc-64 of size 64
[   65.583878] The buggy address is located 0 bytes to the right of
[   65.583878]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   65.596723] 
[   65.598202] The buggy address belongs to the physical page:
[   65.603757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   65.611744] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   65.618251] page_type: f5(slab)
[   65.621387] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   65.629108] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.636827] page dumped because: kasan: bad access detected
[   65.642382] 
[   65.643858] Memory state around the buggy address:
[   65.648637]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.655841]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.663048] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.670246]                                      ^
[   65.675024]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.682229]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.689430] ==================================================================
[   67.551236] ==================================================================
[   67.558327] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   67.565618] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   67.572996] 
[   67.574476] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   67.574526] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.574541] Hardware name: WinLink E850-96 board (DT)
[   67.574558] Call trace:
[   67.574571]  show_stack+0x20/0x38 (C)
[   67.574602]  dump_stack_lvl+0x8c/0xd0
[   67.574634]  print_report+0x118/0x5d0
[   67.574663]  kasan_report+0xdc/0x128
[   67.574690]  kasan_check_range+0x100/0x1a8
[   67.574720]  __kasan_check_write+0x20/0x30
[   67.574751]  kasan_atomics_helper+0x684/0x4858
[   67.574786]  kasan_atomics+0x198/0x2e0
[   67.574819]  kunit_try_run_case+0x170/0x3f0
[   67.574856]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.574888]  kthread+0x328/0x630
[   67.574916]  ret_from_fork+0x10/0x20
[   67.574948] 
[   67.645911] Allocated by task 349:
[   67.649298]  kasan_save_stack+0x3c/0x68
[   67.653116]  kasan_save_track+0x20/0x40
[   67.656936]  kasan_save_alloc_info+0x40/0x58
[   67.661189]  __kasan_kmalloc+0xd4/0xd8
[   67.664921]  __kmalloc_cache_noprof+0x16c/0x3c0
[   67.669435]  kasan_atomics+0xb8/0x2e0
[   67.673081]  kunit_try_run_case+0x170/0x3f0
[   67.677248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.682717]  kthread+0x328/0x630
[   67.685928]  ret_from_fork+0x10/0x20
[   67.689487] 
[   67.690963] The buggy address belongs to the object at ffff000807848f80
[   67.690963]  which belongs to the cache kmalloc-64 of size 64
[   67.703289] The buggy address is located 0 bytes to the right of
[   67.703289]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   67.716136] 
[   67.717612] The buggy address belongs to the physical page:
[   67.723168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   67.731153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   67.737663] page_type: f5(slab)
[   67.740798] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   67.748521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.756239] page dumped because: kasan: bad access detected
[   67.761795] 
[   67.763271] Memory state around the buggy address:
[   67.768049]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.775253]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.782458] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.789659]                                      ^
[   67.794437]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   67.801642]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   67.808843] ==================================================================
[   66.226644] ==================================================================
[   66.233694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   66.240985] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   66.248363] 
[   66.249846] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   66.249898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.249913] Hardware name: WinLink E850-96 board (DT)
[   66.249933] Call trace:
[   66.249946]  show_stack+0x20/0x38 (C)
[   66.249978]  dump_stack_lvl+0x8c/0xd0
[   66.250009]  print_report+0x118/0x5d0
[   66.250037]  kasan_report+0xdc/0x128
[   66.250065]  kasan_check_range+0x100/0x1a8
[   66.250093]  __kasan_check_write+0x20/0x30
[   66.250124]  kasan_atomics_helper+0x47c/0x4858
[   66.250158]  kasan_atomics+0x198/0x2e0
[   66.250190]  kunit_try_run_case+0x170/0x3f0
[   66.250226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.250258]  kthread+0x328/0x630
[   66.250286]  ret_from_fork+0x10/0x20
[   66.250321] 
[   66.321278] Allocated by task 349:
[   66.324664]  kasan_save_stack+0x3c/0x68
[   66.328484]  kasan_save_track+0x20/0x40
[   66.332303]  kasan_save_alloc_info+0x40/0x58
[   66.336556]  __kasan_kmalloc+0xd4/0xd8
[   66.340289]  __kmalloc_cache_noprof+0x16c/0x3c0
[   66.344803]  kasan_atomics+0xb8/0x2e0
[   66.348448]  kunit_try_run_case+0x170/0x3f0
[   66.352615]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.358083]  kthread+0x328/0x630
[   66.361295]  ret_from_fork+0x10/0x20
[   66.364854] 
[   66.366330] The buggy address belongs to the object at ffff000807848f80
[   66.366330]  which belongs to the cache kmalloc-64 of size 64
[   66.378657] The buggy address is located 0 bytes to the right of
[   66.378657]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   66.391503] 
[   66.392980] The buggy address belongs to the physical page:
[   66.398536] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   66.406523] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   66.413031] page_type: f5(slab)
[   66.416165] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   66.423888] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.431607] page dumped because: kasan: bad access detected
[   66.437162] 
[   66.438638] Memory state around the buggy address:
[   66.443418]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.450620]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.457825] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.465026]                                      ^
[   66.469804]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   66.477009]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   66.484210] ==================================================================

[   33.016890] ==================================================================
[   33.017156] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   33.017485] Write of size 4 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.017590] 
[   33.017692] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.018111] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.018230] Hardware name: linux,dummy-virt (DT)
[   33.018285] Call trace:
[   33.018310]  show_stack+0x20/0x38 (C)
[   33.018618]  dump_stack_lvl+0x8c/0xd0
[   33.018721]  print_report+0x118/0x5d0
[   33.018833]  kasan_report+0xdc/0x128
[   33.018920]  kasan_check_range+0x100/0x1a8
[   33.019225]  __kasan_check_write+0x20/0x30
[   33.019300]  kasan_atomics_helper+0xa6c/0x4858
[   33.019628]  kasan_atomics+0x198/0x2e0
[   33.019783]  kunit_try_run_case+0x170/0x3f0
[   33.019889]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.020227]  kthread+0x328/0x630
[   33.020305]  ret_from_fork+0x10/0x20
[   33.020364] 
[   33.020754] Allocated by task 296:
[   33.020841]  kasan_save_stack+0x3c/0x68
[   33.021223]  kasan_save_track+0x20/0x40
[   33.021343]  kasan_save_alloc_info+0x40/0x58
[   33.021452]  __kasan_kmalloc+0xd4/0xd8
[   33.021541]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.021845]  kasan_atomics+0xb8/0x2e0
[   33.021944]  kunit_try_run_case+0x170/0x3f0
[   33.022035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.022128]  kthread+0x328/0x630
[   33.022264]  ret_from_fork+0x10/0x20
[   33.022460] 
[   33.022487] The buggy address belongs to the object at fff00000c91a4d80
[   33.022487]  which belongs to the cache kmalloc-64 of size 64
[   33.022657] The buggy address is located 0 bytes to the right of
[   33.022657]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.022813] 
[   33.022876] The buggy address belongs to the physical page:
[   33.022955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.023162] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.023219] page_type: f5(slab)
[   33.023611] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.023708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.024083] page dumped because: kasan: bad access detected
[   33.024181] 
[   33.024240] Memory state around the buggy address:
[   33.024359]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.024446]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.024529] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.024567]                                      ^
[   33.024645]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.024875]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.025041] ==================================================================
[   33.272430] ==================================================================
[   33.272749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   33.272820] Read of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.273057] 
[   33.273133] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.273319] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.273371] Hardware name: linux,dummy-virt (DT)
[   33.273422] Call trace:
[   33.273461]  show_stack+0x20/0x38 (C)
[   33.273518]  dump_stack_lvl+0x8c/0xd0
[   33.273565]  print_report+0x118/0x5d0
[   33.273821]  kasan_report+0xdc/0x128
[   33.273988]  __asan_report_load8_noabort+0x20/0x30
[   33.274345]  kasan_atomics_helper+0x3db0/0x4858
[   33.274654]  kasan_atomics+0x198/0x2e0
[   33.274751]  kunit_try_run_case+0x170/0x3f0
[   33.275134]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.275196]  kthread+0x328/0x630
[   33.275270]  ret_from_fork+0x10/0x20
[   33.275944] 
[   33.275986] Allocated by task 296:
[   33.276123]  kasan_save_stack+0x3c/0x68
[   33.276175]  kasan_save_track+0x20/0x40
[   33.276266]  kasan_save_alloc_info+0x40/0x58
[   33.276357]  __kasan_kmalloc+0xd4/0xd8
[   33.276716]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.276885]  kasan_atomics+0xb8/0x2e0
[   33.277040]  kunit_try_run_case+0x170/0x3f0
[   33.277400]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.277475]  kthread+0x328/0x630
[   33.277553]  ret_from_fork+0x10/0x20
[   33.277943] 
[   33.278180] The buggy address belongs to the object at fff00000c91a4d80
[   33.278180]  which belongs to the cache kmalloc-64 of size 64
[   33.278275] The buggy address is located 0 bytes to the right of
[   33.278275]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.278469] 
[   33.278597] The buggy address belongs to the physical page:
[   33.278884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.279077] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.279184] page_type: f5(slab)
[   33.279238] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.279291] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.279521] page dumped because: kasan: bad access detected
[   33.279590] 
[   33.279621] Memory state around the buggy address:
[   33.279670]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.279718]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.279777] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.279831]                                      ^
[   33.279868]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.279923]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.279964] ==================================================================
[   33.242283] ==================================================================
[   33.242409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   33.242495] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.242549] 
[   33.242917] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.243054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.243119] Hardware name: linux,dummy-virt (DT)
[   33.243154] Call trace:
[   33.243195]  show_stack+0x20/0x38 (C)
[   33.243251]  dump_stack_lvl+0x8c/0xd0
[   33.243607]  print_report+0x118/0x5d0
[   33.243677]  kasan_report+0xdc/0x128
[   33.243723]  kasan_check_range+0x100/0x1a8
[   33.243769]  __kasan_check_write+0x20/0x30
[   33.243815]  kasan_atomics_helper+0x147c/0x4858
[   33.243918]  kasan_atomics+0x198/0x2e0
[   33.244008]  kunit_try_run_case+0x170/0x3f0
[   33.244061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.244448]  kthread+0x328/0x630
[   33.244501]  ret_from_fork+0x10/0x20
[   33.244561] 
[   33.244716] Allocated by task 296:
[   33.244758]  kasan_save_stack+0x3c/0x68
[   33.244921]  kasan_save_track+0x20/0x40
[   33.244976]  kasan_save_alloc_info+0x40/0x58
[   33.245018]  __kasan_kmalloc+0xd4/0xd8
[   33.245059]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.245390]  kasan_atomics+0xb8/0x2e0
[   33.245593]  kunit_try_run_case+0x170/0x3f0
[   33.245821]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.245955]  kthread+0x328/0x630
[   33.246056]  ret_from_fork+0x10/0x20
[   33.246209] 
[   33.246233] The buggy address belongs to the object at fff00000c91a4d80
[   33.246233]  which belongs to the cache kmalloc-64 of size 64
[   33.246302] The buggy address is located 0 bytes to the right of
[   33.246302]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.246379] 
[   33.246401] The buggy address belongs to the physical page:
[   33.246435] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.246911] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.247081] page_type: f5(slab)
[   33.247129] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.247182] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.247226] page dumped because: kasan: bad access detected
[   33.247305] 
[   33.247365] Memory state around the buggy address:
[   33.247417]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.247464]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.247517] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.247563]                                      ^
[   33.247599]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.247653]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.247701] ==================================================================
[   33.248705] ==================================================================
[   33.248794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   33.249194] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.249276] 
[   33.249314] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.249492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.249616] Hardware name: linux,dummy-virt (DT)
[   33.249684] Call trace:
[   33.249716]  show_stack+0x20/0x38 (C)
[   33.249960]  dump_stack_lvl+0x8c/0xd0
[   33.250125]  print_report+0x118/0x5d0
[   33.250388]  kasan_report+0xdc/0x128
[   33.250545]  kasan_check_range+0x100/0x1a8
[   33.250618]  __kasan_check_write+0x20/0x30
[   33.250766]  kasan_atomics_helper+0x14e4/0x4858
[   33.250842]  kasan_atomics+0x198/0x2e0
[   33.250989]  kunit_try_run_case+0x170/0x3f0
[   33.251092]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.251163]  kthread+0x328/0x630
[   33.251208]  ret_from_fork+0x10/0x20
[   33.251817] 
[   33.252049] Allocated by task 296:
[   33.252115]  kasan_save_stack+0x3c/0x68
[   33.252472]  kasan_save_track+0x20/0x40
[   33.252550]  kasan_save_alloc_info+0x40/0x58
[   33.252774]  __kasan_kmalloc+0xd4/0xd8
[   33.252899]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.253219]  kasan_atomics+0xb8/0x2e0
[   33.253413]  kunit_try_run_case+0x170/0x3f0
[   33.253560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.253678]  kthread+0x328/0x630
[   33.253882]  ret_from_fork+0x10/0x20
[   33.254155] 
[   33.254320] The buggy address belongs to the object at fff00000c91a4d80
[   33.254320]  which belongs to the cache kmalloc-64 of size 64
[   33.254519] The buggy address is located 0 bytes to the right of
[   33.254519]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.254908] 
[   33.254952] The buggy address belongs to the physical page:
[   33.255008] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.255079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.255315] page_type: f5(slab)
[   33.255513] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.255634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.255703] page dumped because: kasan: bad access detected
[   33.255745] 
[   33.255767] Memory state around the buggy address:
[   33.255807]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.255864]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.255909] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.255948]                                      ^
[   33.255993]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.256045]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.256100] ==================================================================
[   33.086567] ==================================================================
[   33.086627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   33.086684] Write of size 4 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.086736] 
[   33.086897] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.087026] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.087197] Hardware name: linux,dummy-virt (DT)
[   33.087234] Call trace:
[   33.087261]  show_stack+0x20/0x38 (C)
[   33.087355]  dump_stack_lvl+0x8c/0xd0
[   33.087417]  print_report+0x118/0x5d0
[   33.087470]  kasan_report+0xdc/0x128
[   33.087515]  kasan_check_range+0x100/0x1a8
[   33.087563]  __kasan_check_write+0x20/0x30
[   33.087610]  kasan_atomics_helper+0xd3c/0x4858
[   33.087661]  kasan_atomics+0x198/0x2e0
[   33.087710]  kunit_try_run_case+0x170/0x3f0
[   33.087760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.087812]  kthread+0x328/0x630
[   33.087856]  ret_from_fork+0x10/0x20
[   33.087916] 
[   33.087937] Allocated by task 296:
[   33.087969]  kasan_save_stack+0x3c/0x68
[   33.088022]  kasan_save_track+0x20/0x40
[   33.088064]  kasan_save_alloc_info+0x40/0x58
[   33.088104]  __kasan_kmalloc+0xd4/0xd8
[   33.088144]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.088188]  kasan_atomics+0xb8/0x2e0
[   33.088227]  kunit_try_run_case+0x170/0x3f0
[   33.088268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.088312]  kthread+0x328/0x630
[   33.089056]  ret_from_fork+0x10/0x20
[   33.089109] 
[   33.089133] The buggy address belongs to the object at fff00000c91a4d80
[   33.089133]  which belongs to the cache kmalloc-64 of size 64
[   33.089194] The buggy address is located 0 bytes to the right of
[   33.089194]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.089258] 
[   33.089527] The buggy address belongs to the physical page:
[   33.089742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.089803] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.089863] page_type: f5(slab)
[   33.089906] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.090293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.090586] page dumped because: kasan: bad access detected
[   33.090652] 
[   33.090723] Memory state around the buggy address:
[   33.090826]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.090949]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.091030] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.091112]                                      ^
[   33.091222]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.091284]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.091615] ==================================================================
[   33.208972] ==================================================================
[   33.209131] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   33.209190] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.209242] 
[   33.209279] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.209612] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.210058] Hardware name: linux,dummy-virt (DT)
[   33.210148] Call trace:
[   33.210206]  show_stack+0x20/0x38 (C)
[   33.210376]  dump_stack_lvl+0x8c/0xd0
[   33.210487]  print_report+0x118/0x5d0
[   33.210552]  kasan_report+0xdc/0x128
[   33.210894]  kasan_check_range+0x100/0x1a8
[   33.210979]  __kasan_check_write+0x20/0x30
[   33.211057]  kasan_atomics_helper+0x12d8/0x4858
[   33.211310]  kasan_atomics+0x198/0x2e0
[   33.211508]  kunit_try_run_case+0x170/0x3f0
[   33.211668]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.211772]  kthread+0x328/0x630
[   33.211856]  ret_from_fork+0x10/0x20
[   33.212030] 
[   33.212094] Allocated by task 296:
[   33.212174]  kasan_save_stack+0x3c/0x68
[   33.212318]  kasan_save_track+0x20/0x40
[   33.212371]  kasan_save_alloc_info+0x40/0x58
[   33.212418]  __kasan_kmalloc+0xd4/0xd8
[   33.212479]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.212601]  kasan_atomics+0xb8/0x2e0
[   33.212669]  kunit_try_run_case+0x170/0x3f0
[   33.212721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.212775]  kthread+0x328/0x630
[   33.212812]  ret_from_fork+0x10/0x20
[   33.212850] 
[   33.212873] The buggy address belongs to the object at fff00000c91a4d80
[   33.212873]  which belongs to the cache kmalloc-64 of size 64
[   33.212935] The buggy address is located 0 bytes to the right of
[   33.212935]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.213011] 
[   33.213053] The buggy address belongs to the physical page:
[   33.213093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.213157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.213208] page_type: f5(slab)
[   33.213250] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.213302] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.213357] page dumped because: kasan: bad access detected
[   33.213390] 
[   33.213720] Memory state around the buggy address:
[   33.214031]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.214105]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.214162] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.214435]                                      ^
[   33.214581]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.214654]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.214785] ==================================================================
[   33.216120] ==================================================================
[   33.216621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   33.216885] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.217150] 
[   33.217294] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.217405] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.217535] Hardware name: linux,dummy-virt (DT)
[   33.217684] Call trace:
[   33.217807]  show_stack+0x20/0x38 (C)
[   33.217897]  dump_stack_lvl+0x8c/0xd0
[   33.217977]  print_report+0x118/0x5d0
[   33.218305]  kasan_report+0xdc/0x128
[   33.218625]  kasan_check_range+0x100/0x1a8
[   33.218790]  __kasan_check_write+0x20/0x30
[   33.219050]  kasan_atomics_helper+0x1384/0x4858
[   33.219243]  kasan_atomics+0x198/0x2e0
[   33.219315]  kunit_try_run_case+0x170/0x3f0
[   33.219662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.219719]  kthread+0x328/0x630
[   33.220093]  ret_from_fork+0x10/0x20
[   33.220205] 
[   33.220483] Allocated by task 296:
[   33.220619]  kasan_save_stack+0x3c/0x68
[   33.220671]  kasan_save_track+0x20/0x40
[   33.221371]  kasan_save_alloc_info+0x40/0x58
[   33.221600]  __kasan_kmalloc+0xd4/0xd8
[   33.221839]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.222037]  kasan_atomics+0xb8/0x2e0
[   33.222108]  kunit_try_run_case+0x170/0x3f0
[   33.222260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.222560]  kthread+0x328/0x630
[   33.222633]  ret_from_fork+0x10/0x20
[   33.222787] 
[   33.222850] The buggy address belongs to the object at fff00000c91a4d80
[   33.222850]  which belongs to the cache kmalloc-64 of size 64
[   33.222942] The buggy address is located 0 bytes to the right of
[   33.222942]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.223010] 
[   33.223400] The buggy address belongs to the physical page:
[   33.223629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.223825] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.223883] page_type: f5(slab)
[   33.224082] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.224256] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.224335] page dumped because: kasan: bad access detected
[   33.224617] 
[   33.224723] Memory state around the buggy address:
[   33.224786]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.224910]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.224976] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.225035]                                      ^
[   33.225072]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.225117]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.225166] ==================================================================
[   33.110316] ==================================================================
[   33.110430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   33.110650] Read of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.110745] 
[   33.111051] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.111205] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.111240] Hardware name: linux,dummy-virt (DT)
[   33.111277] Call trace:
[   33.111632]  show_stack+0x20/0x38 (C)
[   33.111796]  dump_stack_lvl+0x8c/0xd0
[   33.111873]  print_report+0x118/0x5d0
[   33.112070]  kasan_report+0xdc/0x128
[   33.112243]  __asan_report_load8_noabort+0x20/0x30
[   33.112319]  kasan_atomics_helper+0x3f58/0x4858
[   33.112387]  kasan_atomics+0x198/0x2e0
[   33.112438]  kunit_try_run_case+0x170/0x3f0
[   33.112719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.112812]  kthread+0x328/0x630
[   33.113070]  ret_from_fork+0x10/0x20
[   33.113183] 
[   33.113217] Allocated by task 296:
[   33.113252]  kasan_save_stack+0x3c/0x68
[   33.113309]  kasan_save_track+0x20/0x40
[   33.113364]  kasan_save_alloc_info+0x40/0x58
[   33.113623]  __kasan_kmalloc+0xd4/0xd8
[   33.113677]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.113834]  kasan_atomics+0xb8/0x2e0
[   33.113920]  kunit_try_run_case+0x170/0x3f0
[   33.114036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.114254]  kthread+0x328/0x630
[   33.114417]  ret_from_fork+0x10/0x20
[   33.114495] 
[   33.114595] The buggy address belongs to the object at fff00000c91a4d80
[   33.114595]  which belongs to the cache kmalloc-64 of size 64
[   33.114673] The buggy address is located 0 bytes to the right of
[   33.114673]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.115245] 
[   33.115380] The buggy address belongs to the physical page:
[   33.115717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.115832] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.115895] page_type: f5(slab)
[   33.115936] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.116013] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.116066] page dumped because: kasan: bad access detected
[   33.116120] 
[   33.116146] Memory state around the buggy address:
[   33.116201]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.116264]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.116316] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.116383]                                      ^
[   33.116420]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.116473]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.116520] ==================================================================
[   32.987833] ==================================================================
[   32.987886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   32.987940] Read of size 4 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   32.987991] 
[   32.988022] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   32.988210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.988246] Hardware name: linux,dummy-virt (DT)
[   32.988295] Call trace:
[   32.988365]  show_stack+0x20/0x38 (C)
[   32.988420]  dump_stack_lvl+0x8c/0xd0
[   32.988479]  print_report+0x118/0x5d0
[   32.988535]  kasan_report+0xdc/0x128
[   32.988580]  __asan_report_load4_noabort+0x20/0x30
[   32.988687]  kasan_atomics_helper+0x42d8/0x4858
[   32.988763]  kasan_atomics+0x198/0x2e0
[   32.988867]  kunit_try_run_case+0x170/0x3f0
[   32.988921]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.989241]  kthread+0x328/0x630
[   32.989319]  ret_from_fork+0x10/0x20
[   32.989380] 
[   32.989491] Allocated by task 296:
[   32.989528]  kasan_save_stack+0x3c/0x68
[   32.989574]  kasan_save_track+0x20/0x40
[   32.989713]  kasan_save_alloc_info+0x40/0x58
[   32.989799]  __kasan_kmalloc+0xd4/0xd8
[   32.989940]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.990036]  kasan_atomics+0xb8/0x2e0
[   32.990143]  kunit_try_run_case+0x170/0x3f0
[   32.990187]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.990231]  kthread+0x328/0x630
[   32.990274]  ret_from_fork+0x10/0x20
[   32.990312] 
[   32.990343] The buggy address belongs to the object at fff00000c91a4d80
[   32.990343]  which belongs to the cache kmalloc-64 of size 64
[   32.990933] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   32.991080] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.991841] Memory state around the buggy address:
[   32.992438] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.992911]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.996041]  kasan_check_range+0x100/0x1a8
[   32.996969] Allocated by task 296:
[   32.997020]  kasan_save_stack+0x3c/0x68
[   32.997158]  kasan_save_track+0x20/0x40
[   32.997420]  kasan_save_alloc_info+0x40/0x58
[   32.997607]  __kasan_kmalloc+0xd4/0xd8
[   32.997649]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.997695]  kasan_atomics+0xb8/0x2e0
[   32.997762]  kunit_try_run_case+0x170/0x3f0
[   32.997808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.997853]  kthread+0x328/0x630
[   32.998220]  ret_from_fork+0x10/0x20
[   32.998301] 
[   32.998408] The buggy address belongs to the object at fff00000c91a4d80
[   32.998408]  which belongs to the cache kmalloc-64 of size 64
[   32.998522] The buggy address is located 0 bytes to the right of
[   32.998522]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   32.998842] 
[   32.998895] The buggy address belongs to the physical page:
[   32.998966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   32.999032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.999085] page_type: f5(slab)
[   32.999135] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.999188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.999231] page dumped because: kasan: bad access detected
[   32.999584] 
[   32.999655] Memory state around the buggy address:
[   32.999748]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.000029]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.000209] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.000454]                                      ^
[   33.000499]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.000652]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.000722] ==================================================================
[   33.226115] ==================================================================
[   33.226356] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   33.226578] Read of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.226639] 
[   33.226675] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.226971] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.227016] Hardware name: linux,dummy-virt (DT)
[   33.227081] Call trace:
[   33.227108]  show_stack+0x20/0x38 (C)
[   33.227162]  dump_stack_lvl+0x8c/0xd0
[   33.227209]  print_report+0x118/0x5d0
[   33.227423]  kasan_report+0xdc/0x128
[   33.228147]  __asan_report_load8_noabort+0x20/0x30
[   33.228288]  kasan_atomics_helper+0x3f04/0x4858
[   33.228505]  kasan_atomics+0x198/0x2e0
[   33.228583]  kunit_try_run_case+0x170/0x3f0
[   33.228736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.228941]  kthread+0x328/0x630
[   33.229405]  ret_from_fork+0x10/0x20
[   33.229793] 
[   33.229821] Allocated by task 296:
[   33.229872]  kasan_save_stack+0x3c/0x68
[   33.229921]  kasan_save_track+0x20/0x40
[   33.229963]  kasan_save_alloc_info+0x40/0x58
[   33.230262]  __kasan_kmalloc+0xd4/0xd8
[   33.230401]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.230583]  kasan_atomics+0xb8/0x2e0
[   33.230654]  kunit_try_run_case+0x170/0x3f0
[   33.230997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.231242]  kthread+0x328/0x630
[   33.231578]  ret_from_fork+0x10/0x20
[   33.231765] 
[   33.231821] The buggy address belongs to the object at fff00000c91a4d80
[   33.231821]  which belongs to the cache kmalloc-64 of size 64
[   33.232135] The buggy address is located 0 bytes to the right of
[   33.232135]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.232430] 
[   33.232625] The buggy address belongs to the physical page:
[   33.232693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.233032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.233211] page_type: f5(slab)
[   33.233287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.233357] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.233401] page dumped because: kasan: bad access detected
[   33.233434] 
[   33.233466] Memory state around the buggy address:
[   33.233501]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.233558]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.233602] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.233642]                                      ^
[   33.233686]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.233753]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.233804] ==================================================================
[   33.317646] ==================================================================
[   33.317708] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   33.317763] Read of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.317971] 
[   33.318045] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.318405] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.318467] Hardware name: linux,dummy-virt (DT)
[   33.318501] Call trace:
[   33.318582]  show_stack+0x20/0x38 (C)
[   33.318669]  dump_stack_lvl+0x8c/0xd0
[   33.318722]  print_report+0x118/0x5d0
[   33.318829]  kasan_report+0xdc/0x128
[   33.318895]  __asan_report_load8_noabort+0x20/0x30
[   33.318946]  kasan_atomics_helper+0x3e20/0x4858
[   33.319280]  kasan_atomics+0x198/0x2e0
[   33.319357]  kunit_try_run_case+0x170/0x3f0
[   33.319523]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.319591]  kthread+0x328/0x630
[   33.319636]  ret_from_fork+0x10/0x20
[   33.319921] 
[   33.320044] Allocated by task 296:
[   33.320249]  kasan_save_stack+0x3c/0x68
[   33.320444]  kasan_save_track+0x20/0x40
[   33.320500]  kasan_save_alloc_info+0x40/0x58
[   33.320572]  __kasan_kmalloc+0xd4/0xd8
[   33.320621]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.320802]  kasan_atomics+0xb8/0x2e0
[   33.320858]  kunit_try_run_case+0x170/0x3f0
[   33.321008]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.321062]  kthread+0x328/0x630
[   33.321230]  ret_from_fork+0x10/0x20
[   33.321285] 
[   33.321461] The buggy address belongs to the object at fff00000c91a4d80
[   33.321461]  which belongs to the cache kmalloc-64 of size 64
[   33.321580] The buggy address is located 0 bytes to the right of
[   33.321580]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.321872] 
[   33.321923] The buggy address belongs to the physical page:
[   33.321977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.322090] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.322178] page_type: f5(slab)
[   33.322545] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.322647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.322753] page dumped because: kasan: bad access detected
[   33.322786] 
[   33.322806] Memory state around the buggy address:
[   33.323026]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.323215]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.323272] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.323313]                                      ^
[   33.323357]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.323435]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.323493] ==================================================================
[   33.162193] ==================================================================
[   33.162252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   33.162304] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.162378] 
[   33.162411] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.162508] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.162539] Hardware name: linux,dummy-virt (DT)
[   33.162573] Call trace:
[   33.162596]  show_stack+0x20/0x38 (C)
[   33.162647]  dump_stack_lvl+0x8c/0xd0
[   33.162694]  print_report+0x118/0x5d0
[   33.162740]  kasan_report+0xdc/0x128
[   33.162786]  kasan_check_range+0x100/0x1a8
[   33.162833]  __kasan_check_write+0x20/0x30
[   33.162901]  kasan_atomics_helper+0x1058/0x4858
[   33.162956]  kasan_atomics+0x198/0x2e0
[   33.163003]  kunit_try_run_case+0x170/0x3f0
[   33.163059]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.163116]  kthread+0x328/0x630
[   33.163159]  ret_from_fork+0x10/0x20
[   33.163209] 
[   33.163240] Allocated by task 296:
[   33.163270]  kasan_save_stack+0x3c/0x68
[   33.163316]  kasan_save_track+0x20/0x40
[   33.163523]  kasan_save_alloc_info+0x40/0x58
[   33.163699]  __kasan_kmalloc+0xd4/0xd8
[   33.163751]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.164179]  kasan_atomics+0xb8/0x2e0
[   33.164247]  kunit_try_run_case+0x170/0x3f0
[   33.164301]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.164637]  kthread+0x328/0x630
[   33.164706]  ret_from_fork+0x10/0x20
[   33.164749] 
[   33.164955] The buggy address belongs to the object at fff00000c91a4d80
[   33.164955]  which belongs to the cache kmalloc-64 of size 64
[   33.165045] The buggy address is located 0 bytes to the right of
[   33.165045]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.165125] 
[   33.165559] The buggy address belongs to the physical page:
[   33.165654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.165734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.165792] page_type: f5(slab)
[   33.165835] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.165894] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.166388] page dumped because: kasan: bad access detected
[   33.166531] 
[   33.166569] Memory state around the buggy address:
[   33.166854]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.167179]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.167417] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.167541]                                      ^
[   33.167616]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.167759]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.167814] ==================================================================
[   33.076348] ==================================================================
[   33.076410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   33.076739] Read of size 4 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.076820] 
[   33.077277] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.077654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.077709] Hardware name: linux,dummy-virt (DT)
[   33.077763] Call trace:
[   33.078201]  show_stack+0x20/0x38 (C)
[   33.078319]  dump_stack_lvl+0x8c/0xd0
[   33.078579]  print_report+0x118/0x5d0
[   33.078668]  kasan_report+0xdc/0x128
[   33.078740]  __asan_report_load4_noabort+0x20/0x30
[   33.078877]  kasan_atomics_helper+0x3dd8/0x4858
[   33.078940]  kasan_atomics+0x198/0x2e0
[   33.079255]  kunit_try_run_case+0x170/0x3f0
[   33.079576]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.079743]  kthread+0x328/0x630
[   33.079832]  ret_from_fork+0x10/0x20
[   33.080241] 
[   33.080305] Allocated by task 296:
[   33.080570]  kasan_save_stack+0x3c/0x68
[   33.080781]  kasan_save_track+0x20/0x40
[   33.080861]  kasan_save_alloc_info+0x40/0x58
[   33.081127]  __kasan_kmalloc+0xd4/0xd8
[   33.081211]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.081523]  kasan_atomics+0xb8/0x2e0
[   33.081663]  kunit_try_run_case+0x170/0x3f0
[   33.081750]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.081898]  kthread+0x328/0x630
[   33.081939]  ret_from_fork+0x10/0x20
[   33.081978] 
[   33.082133] The buggy address belongs to the object at fff00000c91a4d80
[   33.082133]  which belongs to the cache kmalloc-64 of size 64
[   33.082343] The buggy address is located 0 bytes to the right of
[   33.082343]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.082512] 
[   33.082572] The buggy address belongs to the physical page:
[   33.082852] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.083006] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.083117] page_type: f5(slab)
[   33.083236] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.083639] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.083735] page dumped because: kasan: bad access detected
[   33.083807] 
[   33.083916] Memory state around the buggy address:
[   33.083994]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.084061]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.084106] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.084454]                                      ^
[   33.084532]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.084851]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.084980] ==================================================================
[   33.002857] ==================================================================
[   33.002923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   33.003080] Write of size 4 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.003142] 
[   33.003178] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.003264] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.003291] Hardware name: linux,dummy-virt (DT)
[   33.003553] Call trace:
[   33.003747]  show_stack+0x20/0x38 (C)
[   33.003929]  dump_stack_lvl+0x8c/0xd0
[   33.003993]  print_report+0x118/0x5d0
[   33.004038]  kasan_report+0xdc/0x128
[   33.004083]  kasan_check_range+0x100/0x1a8
[   33.004129]  __kasan_check_write+0x20/0x30
[   33.004252]  kasan_atomics_helper+0x99c/0x4858
[   33.004578]  kasan_atomics+0x198/0x2e0
[   33.004698]  kunit_try_run_case+0x170/0x3f0
[   33.004755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.004808]  kthread+0x328/0x630
[   33.004885]  ret_from_fork+0x10/0x20
[   33.004947] 
[   33.004969] Allocated by task 296:
[   33.005002]  kasan_save_stack+0x3c/0x68
[   33.005046]  kasan_save_track+0x20/0x40
[   33.005098]  kasan_save_alloc_info+0x40/0x58
[   33.005138]  __kasan_kmalloc+0xd4/0xd8
[   33.005187]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.005232]  kasan_atomics+0xb8/0x2e0
[   33.005281]  kunit_try_run_case+0x170/0x3f0
[   33.005340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.005690]  kthread+0x328/0x630
[   33.005771]  ret_from_fork+0x10/0x20
[   33.005849] 
[   33.005910] The buggy address belongs to the object at fff00000c91a4d80
[   33.005910]  which belongs to the cache kmalloc-64 of size 64
[   33.006017] The buggy address is located 0 bytes to the right of
[   33.006017]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.006085] 
[   33.006107] The buggy address belongs to the physical page:
[   33.006142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.006197] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.006600] page_type: f5(slab)
[   33.006922] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.007055] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.007139] page dumped because: kasan: bad access detected
[   33.007221] 
[   33.007264] Memory state around the buggy address:
[   33.007307]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.007592]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.007911] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.007987]                                      ^
[   33.008093]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.008203]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.008320] ==================================================================
[   33.010510] ==================================================================
[   33.010710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   33.010784] Write of size 4 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.010838] 
[   33.011232] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.011357] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.011388] Hardware name: linux,dummy-virt (DT)
[   33.011420] Call trace:
[   33.011456]  show_stack+0x20/0x38 (C)
[   33.011660]  kasan_check_range+0x100/0x1a8
[   33.011956]  kthread+0x328/0x630
[   33.013145]  kunit_try_run_case+0x170/0x3f0
[   33.013472] The buggy address is located 0 bytes to the right of
[   33.013472]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.013538] 
[   33.013559] The buggy address belongs to the physical page:
[   33.013596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.013873] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.014021] page_type: f5(slab)
[   33.014435] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.014613] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.014704] page dumped because: kasan: bad access detected
[   33.014800] 
[   33.014870] Memory state around the buggy address:
[   33.014934]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.014982]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.015031] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.015373]                                      ^
[   33.015825]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.016194]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.016242] ==================================================================
[   33.092698] ==================================================================
[   33.092891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   33.092960] Read of size 4 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.093481] 
[   33.093757] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.093886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.093919] Hardware name: linux,dummy-virt (DT)
[   33.093987] Call trace:
[   33.094410]  show_stack+0x20/0x38 (C)
[   33.094729]  dump_stack_lvl+0x8c/0xd0
[   33.094829]  print_report+0x118/0x5d0
[   33.094930]  kasan_report+0xdc/0x128
[   33.094981]  __asan_report_load4_noabort+0x20/0x30
[   33.095220]  kasan_atomics_helper+0x3e04/0x4858
[   33.095426]  kasan_atomics+0x198/0x2e0
[   33.095706]  kunit_try_run_case+0x170/0x3f0
[   33.095879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.095942]  kthread+0x328/0x630
[   33.095989]  ret_from_fork+0x10/0x20
[   33.096234] 
[   33.096358] Allocated by task 296:
[   33.096660]  kasan_save_stack+0x3c/0x68
[   33.096781]  kasan_save_track+0x20/0x40
[   33.096829]  kasan_save_alloc_info+0x40/0x58
[   33.096903]  __kasan_kmalloc+0xd4/0xd8
[   33.097354]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.097523]  kasan_atomics+0xb8/0x2e0
[   33.097606]  kunit_try_run_case+0x170/0x3f0
[   33.097748]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.097818]  kthread+0x328/0x630
[   33.098147]  ret_from_fork+0x10/0x20
[   33.098228] 
[   33.098317] The buggy address belongs to the object at fff00000c91a4d80
[   33.098317]  which belongs to the cache kmalloc-64 of size 64
[   33.098585] The buggy address is located 0 bytes to the right of
[   33.098585]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.098789] 
[   33.098833] The buggy address belongs to the physical page:
[   33.098912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.099031] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.099090] page_type: f5(slab)
[   33.099245] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.099459] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.099811] page dumped because: kasan: bad access detected
[   33.099857] 
[   33.099878] Memory state around the buggy address:
[   33.099929]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.099993]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.100054] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.100100]                                      ^
[   33.100139]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.100191]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.100238] ==================================================================
[   33.324390] ==================================================================
[   33.324447] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   33.324500] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.324559] 
[   33.324594] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.324823] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.324920] Hardware name: linux,dummy-virt (DT)
[   33.324967] Call trace:
[   33.325186]  show_stack+0x20/0x38 (C)
[   33.325257]  dump_stack_lvl+0x8c/0xd0
[   33.325307]  print_report+0x118/0x5d0
[   33.325364]  kasan_report+0xdc/0x128
[   33.325410]  kasan_check_range+0x100/0x1a8
[   33.325612]  __kasan_check_write+0x20/0x30
[   33.325777]  kasan_atomics_helper+0x17ec/0x4858
[   33.325839]  kasan_atomics+0x198/0x2e0
[   33.325887]  kunit_try_run_case+0x170/0x3f0
[   33.325936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.325988]  kthread+0x328/0x630
[   33.326033]  ret_from_fork+0x10/0x20
[   33.326416] 
[   33.326484] Allocated by task 296:
[   33.326672]  kasan_save_stack+0x3c/0x68
[   33.326848]  kasan_save_track+0x20/0x40
[   33.326932]  kasan_save_alloc_info+0x40/0x58
[   33.327109]  __kasan_kmalloc+0xd4/0xd8
[   33.327294]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.327371]  kasan_atomics+0xb8/0x2e0
[   33.327544]  kunit_try_run_case+0x170/0x3f0
[   33.327712]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.327764]  kthread+0x328/0x630
[   33.327951]  ret_from_fork+0x10/0x20
[   33.328137] 
[   33.328191] The buggy address belongs to the object at fff00000c91a4d80
[   33.328191]  which belongs to the cache kmalloc-64 of size 64
[   33.328285] The buggy address is located 0 bytes to the right of
[   33.328285]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.328362] 
[   33.328386] The buggy address belongs to the physical page:
[   33.328419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.328475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.328526] page_type: f5(slab)
[   33.328567] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.328619] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.328673] page dumped because: kasan: bad access detected
[   33.328705] 
[   33.328736] Memory state around the buggy address:
[   33.328781]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.328825]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.328869] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.328924]                                      ^
[   33.328958]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.329026]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.329083] ==================================================================
[   33.177998] ==================================================================
[   33.178221] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   33.178488] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.178585] 
[   33.178624] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.178904] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.179080] Hardware name: linux,dummy-virt (DT)
[   33.179125] Call trace:
[   33.179151]  show_stack+0x20/0x38 (C)
[   33.179204]  dump_stack_lvl+0x8c/0xd0
[   33.179436]  print_report+0x118/0x5d0
[   33.179500]  kasan_report+0xdc/0x128
[   33.179547]  kasan_check_range+0x100/0x1a8
[   33.179601]  __kasan_check_write+0x20/0x30
[   33.179804]  kasan_atomics_helper+0x1128/0x4858
[   33.179889]  kasan_atomics+0x198/0x2e0
[   33.179939]  kunit_try_run_case+0x170/0x3f0
[   33.179999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.180051]  kthread+0x328/0x630
[   33.180148]  ret_from_fork+0x10/0x20
[   33.180201] 
[   33.180226] Allocated by task 296:
[   33.180259]  kasan_save_stack+0x3c/0x68
[   33.180306]  kasan_save_track+0x20/0x40
[   33.180358]  kasan_save_alloc_info+0x40/0x58
[   33.180398]  __kasan_kmalloc+0xd4/0xd8
[   33.180447]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.180502]  kasan_atomics+0xb8/0x2e0
[   33.180547]  kunit_try_run_case+0x170/0x3f0
[   33.180589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.180632]  kthread+0x328/0x630
[   33.180677]  ret_from_fork+0x10/0x20
[   33.180739] 
[   33.180769] The buggy address belongs to the object at fff00000c91a4d80
[   33.180769]  which belongs to the cache kmalloc-64 of size 64
[   33.180837] The buggy address is located 0 bytes to the right of
[   33.180837]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.180903] 
[   33.180926] The buggy address belongs to the physical page:
[   33.180958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.181012] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.181062] page_type: f5(slab)
[   33.181101] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.181153] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.181192] page dumped because: kasan: bad access detected
[   33.181242] 
[   33.181262] Memory state around the buggy address:
[   33.181296]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.182178]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.182244] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.182307]                                      ^
[   33.182364]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.182439]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.182480] ==================================================================
[   33.264902] ==================================================================
[   33.264967] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   33.265045] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.265099] 
[   33.265277] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.265674] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.265744] Hardware name: linux,dummy-virt (DT)
[   33.266124] Call trace:
[   33.266176]  show_stack+0x20/0x38 (C)
[   33.266251]  dump_stack_lvl+0x8c/0xd0
[   33.266384]  print_report+0x118/0x5d0
[   33.266433]  kasan_report+0xdc/0x128
[   33.266479]  kasan_check_range+0x100/0x1a8
[   33.266526]  __kasan_check_write+0x20/0x30
[   33.266573]  kasan_atomics_helper+0x15b4/0x4858
[   33.266624]  kasan_atomics+0x198/0x2e0
[   33.267034]  kunit_try_run_case+0x170/0x3f0
[   33.267225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.267427]  kthread+0x328/0x630
[   33.267620]  ret_from_fork+0x10/0x20
[   33.267692] 
[   33.267748] Allocated by task 296:
[   33.267932]  kasan_save_stack+0x3c/0x68
[   33.268215]  kasan_save_track+0x20/0x40
[   33.268395]  kasan_save_alloc_info+0x40/0x58
[   33.268574]  __kasan_kmalloc+0xd4/0xd8
[   33.268619]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.268697]  kasan_atomics+0xb8/0x2e0
[   33.269000]  kunit_try_run_case+0x170/0x3f0
[   33.269396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.269554]  kthread+0x328/0x630
[   33.269677]  ret_from_fork+0x10/0x20
[   33.269816] 
[   33.269841] The buggy address belongs to the object at fff00000c91a4d80
[   33.269841]  which belongs to the cache kmalloc-64 of size 64
[   33.269904] The buggy address is located 0 bytes to the right of
[   33.269904]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.269971] 
[   33.270129] The buggy address belongs to the physical page:
[   33.270273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.270593] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.270976] page_type: f5(slab)
[   33.271131] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.271184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.271358] page dumped because: kasan: bad access detected
[   33.271409] 
[   33.271447] Memory state around the buggy address:
[   33.271485]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.271542]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.271586] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.271632]                                      ^
[   33.271669]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.271722]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.271771] ==================================================================
[   33.140195] ==================================================================
[   33.140366] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   33.140441] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.140502] 
[   33.140598] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.140715] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.140748] Hardware name: linux,dummy-virt (DT)
[   33.140781] Call trace:
[   33.140959]  show_stack+0x20/0x38 (C)
[   33.141029]  dump_stack_lvl+0x8c/0xd0
[   33.141087]  print_report+0x118/0x5d0
[   33.141419]  kasan_report+0xdc/0x128
[   33.141493]  kasan_check_range+0x100/0x1a8
[   33.141731]  __kasan_check_write+0x20/0x30
[   33.142082]  kasan_atomics_helper+0xf20/0x4858
[   33.142175]  kasan_atomics+0x198/0x2e0
[   33.142358]  kunit_try_run_case+0x170/0x3f0
[   33.142416]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.142758]  kthread+0x328/0x630
[   33.142843]  ret_from_fork+0x10/0x20
[   33.143139] 
[   33.143232] Allocated by task 296:
[   33.143347]  kasan_save_stack+0x3c/0x68
[   33.143437]  kasan_save_track+0x20/0x40
[   33.143500]  kasan_save_alloc_info+0x40/0x58
[   33.143811]  __kasan_kmalloc+0xd4/0xd8
[   33.143886]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.143985]  kasan_atomics+0xb8/0x2e0
[   33.144174]  kunit_try_run_case+0x170/0x3f0
[   33.144348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.144479]  kthread+0x328/0x630
[   33.144593]  ret_from_fork+0x10/0x20
[   33.144634] 
[   33.144802] The buggy address belongs to the object at fff00000c91a4d80
[   33.144802]  which belongs to the cache kmalloc-64 of size 64
[   33.145028] The buggy address is located 0 bytes to the right of
[   33.145028]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.145402] 
[   33.145465] The buggy address belongs to the physical page:
[   33.145586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.145651] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.145834] page_type: f5(slab)
[   33.145882] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.146103] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.146208] page dumped because: kasan: bad access detected
[   33.146275] 
[   33.146616] Memory state around the buggy address:
[   33.146716]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.146799]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.146934] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.147026]                                      ^
[   33.147084]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.147179]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.147255] ==================================================================
[   33.295634] ==================================================================
[   33.295976] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   33.296159] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.296223] 
[   33.296259] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.296535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.296703] Hardware name: linux,dummy-virt (DT)
[   33.296843] Call trace:
[   33.296871]  show_stack+0x20/0x38 (C)
[   33.297045]  dump_stack_lvl+0x8c/0xd0
[   33.297108]  print_report+0x118/0x5d0
[   33.297155]  kasan_report+0xdc/0x128
[   33.297199]  kasan_check_range+0x100/0x1a8
[   33.297389]  __kasan_check_write+0x20/0x30
[   33.297493]  kasan_atomics_helper+0x16d0/0x4858
[   33.297715]  kasan_atomics+0x198/0x2e0
[   33.297777]  kunit_try_run_case+0x170/0x3f0
[   33.298127]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.298208]  kthread+0x328/0x630
[   33.298461]  ret_from_fork+0x10/0x20
[   33.298655] 
[   33.298714] Allocated by task 296:
[   33.298848]  kasan_save_stack+0x3c/0x68
[   33.298899]  kasan_save_track+0x20/0x40
[   33.298941]  kasan_save_alloc_info+0x40/0x58
[   33.298992]  __kasan_kmalloc+0xd4/0xd8
[   33.299038]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.299084]  kasan_atomics+0xb8/0x2e0
[   33.299133]  kunit_try_run_case+0x170/0x3f0
[   33.299176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.299229]  kthread+0x328/0x630
[   33.299274]  ret_from_fork+0x10/0x20
[   33.299344] 
[   33.299366] The buggy address belongs to the object at fff00000c91a4d80
[   33.299366]  which belongs to the cache kmalloc-64 of size 64
[   33.299637] The buggy address is located 0 bytes to the right of
[   33.299637]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.300001] 
[   33.300039] The buggy address belongs to the physical page:
[   33.300095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.300400] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.300501] page_type: f5(slab)
[   33.300739] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.300812] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.300885] page dumped because: kasan: bad access detected
[   33.300919] 
[   33.301363] Memory state around the buggy address:
[   33.301433]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.301769]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.301915] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.302032]                                      ^
[   33.302099]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.302163]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.302318] ==================================================================
[   33.256978] ==================================================================
[   33.257091] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   33.257301] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.257450] 
[   33.257513] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.257685] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.257734] Hardware name: linux,dummy-virt (DT)
[   33.257802] Call trace:
[   33.257844]  show_stack+0x20/0x38 (C)
[   33.258126]  dump_stack_lvl+0x8c/0xd0
[   33.258286]  print_report+0x118/0x5d0
[   33.258550]  kasan_report+0xdc/0x128
[   33.258640]  kasan_check_range+0x100/0x1a8
[   33.258697]  __kasan_check_write+0x20/0x30
[   33.259140]  kasan_atomics_helper+0x154c/0x4858
[   33.259374]  kasan_atomics+0x198/0x2e0
[   33.259568]  kunit_try_run_case+0x170/0x3f0
[   33.259629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.259998]  kthread+0x328/0x630
[   33.260091]  ret_from_fork+0x10/0x20
[   33.260577] 
[   33.260611] Allocated by task 296:
[   33.260809]  kasan_save_stack+0x3c/0x68
[   33.261178]  kasan_save_track+0x20/0x40
[   33.262347]  kasan_save_alloc_info+0x40/0x58
[   33.262412]  __kasan_kmalloc+0xd4/0xd8
[   33.262455]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.262502]  kasan_atomics+0xb8/0x2e0
[   33.262543]  kunit_try_run_case+0x170/0x3f0
[   33.262586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.262630]  kthread+0x328/0x630
[   33.262666]  ret_from_fork+0x10/0x20
[   33.262706] 
[   33.262729] The buggy address belongs to the object at fff00000c91a4d80
[   33.262729]  which belongs to the cache kmalloc-64 of size 64
[   33.262792] The buggy address is located 0 bytes to the right of
[   33.262792]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.262861] 
[   33.262884] The buggy address belongs to the physical page:
[   33.262920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.262975] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.263031] page_type: f5(slab)
[   33.263074] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.263124] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.263167] page dumped because: kasan: bad access detected
[   33.263200] 
[   33.263220] Memory state around the buggy address:
[   33.263256]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.263300]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.263414] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.263481]                                      ^
[   33.263713]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.263774]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.263814] ==================================================================
[   33.119050] ==================================================================
[   33.119140] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   33.119211] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.119281] 
[   33.119317] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.119427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.119565] Hardware name: linux,dummy-virt (DT)
[   33.119663] Call trace:
[   33.120105]  show_stack+0x20/0x38 (C)
[   33.120194]  dump_stack_lvl+0x8c/0xd0
[   33.120247]  print_report+0x118/0x5d0
[   33.120378]  kasan_report+0xdc/0x128
[   33.120432]  kasan_check_range+0x100/0x1a8
[   33.120483]  __kasan_check_write+0x20/0x30
[   33.120693]  kasan_atomics_helper+0xe44/0x4858
[   33.120764]  kasan_atomics+0x198/0x2e0
[   33.121151]  kunit_try_run_case+0x170/0x3f0
[   33.121238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.121296]  kthread+0x328/0x630
[   33.121352]  ret_from_fork+0x10/0x20
[   33.121511] 
[   33.121717] Allocated by task 296:
[   33.121783]  kasan_save_stack+0x3c/0x68
[   33.122112]  kasan_save_track+0x20/0x40
[   33.122236]  kasan_save_alloc_info+0x40/0x58
[   33.122294]  __kasan_kmalloc+0xd4/0xd8
[   33.122450]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.122505]  kasan_atomics+0xb8/0x2e0
[   33.122615]  kunit_try_run_case+0x170/0x3f0
[   33.122797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.122906]  kthread+0x328/0x630
[   33.123198]  ret_from_fork+0x10/0x20
[   33.123279] 
[   33.123350] The buggy address belongs to the object at fff00000c91a4d80
[   33.123350]  which belongs to the cache kmalloc-64 of size 64
[   33.123434] The buggy address is located 0 bytes to the right of
[   33.123434]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.123519] 
[   33.123813] The buggy address belongs to the physical page:
[   33.123876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.124258] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.124379] page_type: f5(slab)
[   33.124494] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.124592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.124960] page dumped because: kasan: bad access detected
[   33.125020] 
[   33.125071] Memory state around the buggy address:
[   33.125116]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.125177]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.125239] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.125285]                                      ^
[   33.125344]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.125634]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.125985] ==================================================================
[   33.287822] ==================================================================
[   33.288021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   33.288190] Read of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.288253] 
[   33.288290] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.288511] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.288546] Hardware name: linux,dummy-virt (DT)
[   33.288597] Call trace:
[   33.288624]  show_stack+0x20/0x38 (C)
[   33.288846]  dump_stack_lvl+0x8c/0xd0
[   33.288926]  print_report+0x118/0x5d0
[   33.288982]  kasan_report+0xdc/0x128
[   33.289029]  __asan_report_load8_noabort+0x20/0x30
[   33.289080]  kasan_atomics_helper+0x3df4/0x4858
[   33.289489]  kasan_atomics+0x198/0x2e0
[   33.289583]  kunit_try_run_case+0x170/0x3f0
[   33.289656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.289854]  kthread+0x328/0x630
[   33.289952]  ret_from_fork+0x10/0x20
[   33.290033] 
[   33.290229] Allocated by task 296:
[   33.290412]  kasan_save_stack+0x3c/0x68
[   33.290682]  kasan_save_track+0x20/0x40
[   33.290843]  kasan_save_alloc_info+0x40/0x58
[   33.290926]  __kasan_kmalloc+0xd4/0xd8
[   33.291153]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.291330]  kasan_atomics+0xb8/0x2e0
[   33.291403]  kunit_try_run_case+0x170/0x3f0
[   33.291755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.291848]  kthread+0x328/0x630
[   33.292054]  ret_from_fork+0x10/0x20
[   33.292175] 
[   33.292295] The buggy address belongs to the object at fff00000c91a4d80
[   33.292295]  which belongs to the cache kmalloc-64 of size 64
[   33.292530] The buggy address is located 0 bytes to the right of
[   33.292530]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.292605] 
[   33.292629] The buggy address belongs to the physical page:
[   33.292807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.293150] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.293309] page_type: f5(slab)
[   33.293503] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.293706] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.293772] page dumped because: kasan: bad access detected
[   33.293807] 
[   33.293841] Memory state around the buggy address:
[   33.293884]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.294243]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.294334] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.294391]                                      ^
[   33.294442]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.294849]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.295005] ==================================================================
[   33.101559] ==================================================================
[   33.101682] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   33.101817] Read of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.101984] 
[   33.102023] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.102391] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.102449] Hardware name: linux,dummy-virt (DT)
[   33.102520] Call trace:
[   33.102592]  show_stack+0x20/0x38 (C)
[   33.102669]  dump_stack_lvl+0x8c/0xd0
[   33.102976]  print_report+0x118/0x5d0
[   33.103069]  kasan_report+0xdc/0x128
[   33.103130]  kasan_check_range+0x100/0x1a8
[   33.103180]  __kasan_check_read+0x20/0x30
[   33.103535]  kasan_atomics_helper+0xdd4/0x4858
[   33.103847]  kasan_atomics+0x198/0x2e0
[   33.104011]  kunit_try_run_case+0x170/0x3f0
[   33.104088]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.104428]  kthread+0x328/0x630
[   33.104507]  ret_from_fork+0x10/0x20
[   33.104820] 
[   33.104872] Allocated by task 296:
[   33.105002]  kasan_save_stack+0x3c/0x68
[   33.105057]  kasan_save_track+0x20/0x40
[   33.105126]  kasan_save_alloc_info+0x40/0x58
[   33.105169]  __kasan_kmalloc+0xd4/0xd8
[   33.105212]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.105575]  kasan_atomics+0xb8/0x2e0
[   33.105849]  kunit_try_run_case+0x170/0x3f0
[   33.105905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.105955]  kthread+0x328/0x630
[   33.106004]  ret_from_fork+0x10/0x20
[   33.106198] 
[   33.106248] The buggy address belongs to the object at fff00000c91a4d80
[   33.106248]  which belongs to the cache kmalloc-64 of size 64
[   33.106418] The buggy address is located 0 bytes to the right of
[   33.106418]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.106536] 
[   33.106796] The buggy address belongs to the physical page:
[   33.106888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.107109] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.107278] page_type: f5(slab)
[   33.107637] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.107780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.107868] page dumped because: kasan: bad access detected
[   33.107956] 
[   33.107979] Memory state around the buggy address:
[   33.108028]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.108084]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.108137] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.108184]                                      ^
[   33.108221]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.108272]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.108338] ==================================================================
[   33.280380] ==================================================================
[   33.280461] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   33.280516] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.280576] 
[   33.280611] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.280698] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.280733] Hardware name: linux,dummy-virt (DT)
[   33.280765] Call trace:
[   33.280792]  show_stack+0x20/0x38 (C)
[   33.280846]  dump_stack_lvl+0x8c/0xd0
[   33.280896]  print_report+0x118/0x5d0
[   33.280942]  kasan_report+0xdc/0x128
[   33.280987]  kasan_check_range+0x100/0x1a8
[   33.281044]  __kasan_check_write+0x20/0x30
[   33.281091]  kasan_atomics_helper+0x1644/0x4858
[   33.281142]  kasan_atomics+0x198/0x2e0
[   33.281189]  kunit_try_run_case+0x170/0x3f0
[   33.281248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.281306]  kthread+0x328/0x630
[   33.281362]  ret_from_fork+0x10/0x20
[   33.282397] 
[   33.282453] Allocated by task 296:
[   33.282531]  kasan_save_stack+0x3c/0x68
[   33.282580]  kasan_save_track+0x20/0x40
[   33.282631]  kasan_save_alloc_info+0x40/0x58
[   33.282672]  __kasan_kmalloc+0xd4/0xd8
[   33.282762]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.283063]  kasan_atomics+0xb8/0x2e0
[   33.283184]  kunit_try_run_case+0x170/0x3f0
[   33.283596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.283659]  kthread+0x328/0x630
[   33.283697]  ret_from_fork+0x10/0x20
[   33.284016] 
[   33.284227] The buggy address belongs to the object at fff00000c91a4d80
[   33.284227]  which belongs to the cache kmalloc-64 of size 64
[   33.284400] The buggy address is located 0 bytes to the right of
[   33.284400]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.284539] 
[   33.284757] The buggy address belongs to the physical page:
[   33.284918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.285048] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.285136] page_type: f5(slab)
[   33.285442] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.285604] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.285911] page dumped because: kasan: bad access detected
[   33.286002] 
[   33.286051] Memory state around the buggy address:
[   33.286165]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.286270]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.286376] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.286734]                                      ^
[   33.286882]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.287077]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.287168] ==================================================================
[   33.302747] ==================================================================
[   33.302883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   33.302946] Read of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.303289] 
[   33.303477] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.303680] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.303751] Hardware name: linux,dummy-virt (DT)
[   33.303786] Call trace:
[   33.303834]  show_stack+0x20/0x38 (C)
[   33.303889]  dump_stack_lvl+0x8c/0xd0
[   33.304176]  print_report+0x118/0x5d0
[   33.304335]  kasan_report+0xdc/0x128
[   33.304403]  __asan_report_load8_noabort+0x20/0x30
[   33.304624]  kasan_atomics_helper+0x3e10/0x4858
[   33.304693]  kasan_atomics+0x198/0x2e0
[   33.304742]  kunit_try_run_case+0x170/0x3f0
[   33.304805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.305031]  kthread+0x328/0x630
[   33.305092]  ret_from_fork+0x10/0x20
[   33.305143] 
[   33.305165] Allocated by task 296:
[   33.305195]  kasan_save_stack+0x3c/0x68
[   33.305240]  kasan_save_track+0x20/0x40
[   33.305281]  kasan_save_alloc_info+0x40/0x58
[   33.305341]  __kasan_kmalloc+0xd4/0xd8
[   33.305608]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.305691]  kasan_atomics+0xb8/0x2e0
[   33.305899]  kunit_try_run_case+0x170/0x3f0
[   33.305952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.305997]  kthread+0x328/0x630
[   33.306492]  ret_from_fork+0x10/0x20
[   33.306634] 
[   33.306702] The buggy address belongs to the object at fff00000c91a4d80
[   33.306702]  which belongs to the cache kmalloc-64 of size 64
[   33.306811] The buggy address is located 0 bytes to the right of
[   33.306811]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.306929] 
[   33.307572] The buggy address belongs to the physical page:
[   33.307628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.307710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.307764] page_type: f5(slab)
[   33.307807] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.308035] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.308083] page dumped because: kasan: bad access detected
[   33.308395] 
[   33.308571] Memory state around the buggy address:
[   33.308635]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.308691]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.308811] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.308926]                                      ^
[   33.309235]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.309415]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.309491] ==================================================================
[   33.147869] ==================================================================
[   33.148042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   33.148126] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.148187] 
[   33.148219] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.148335] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.148375] Hardware name: linux,dummy-virt (DT)
[   33.148412] Call trace:
[   33.148435]  show_stack+0x20/0x38 (C)
[   33.148486]  dump_stack_lvl+0x8c/0xd0
[   33.148546]  print_report+0x118/0x5d0
[   33.148592]  kasan_report+0xdc/0x128
[   33.148636]  kasan_check_range+0x100/0x1a8
[   33.148686]  __kasan_check_write+0x20/0x30
[   33.148742]  kasan_atomics_helper+0xf88/0x4858
[   33.148801]  kasan_atomics+0x198/0x2e0
[   33.148851]  kunit_try_run_case+0x170/0x3f0
[   33.148903]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.148959]  kthread+0x328/0x630
[   33.149014]  ret_from_fork+0x10/0x20
[   33.149063] 
[   33.149085] Allocated by task 296:
[   33.149115]  kasan_save_stack+0x3c/0x68
[   33.149161]  kasan_save_track+0x20/0x40
[   33.149204]  kasan_save_alloc_info+0x40/0x58
[   33.149246]  __kasan_kmalloc+0xd4/0xd8
[   33.149286]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.149343]  kasan_atomics+0xb8/0x2e0
[   33.150104]  kunit_try_run_case+0x170/0x3f0
[   33.150165]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.150215]  kthread+0x328/0x630
[   33.150252]  ret_from_fork+0x10/0x20
[   33.150314] 
[   33.150514] The buggy address belongs to the object at fff00000c91a4d80
[   33.150514]  which belongs to the cache kmalloc-64 of size 64
[   33.150769] The buggy address is located 0 bytes to the right of
[   33.150769]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.151176] 
[   33.151219] The buggy address belongs to the physical page:
[   33.151259] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.151728] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.152187] page_type: f5(slab)
[   33.152441] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.152524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.152759] page dumped because: kasan: bad access detected
[   33.152894] 
[   33.152940] Memory state around the buggy address:
[   33.153051]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.153136]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.153525] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.153597]                                      ^
[   33.153697]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.153780]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.153850] ==================================================================
[   33.133773] ==================================================================
[   33.133838] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   33.133894] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.133953] 
[   33.134277] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.134637] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.134800] Hardware name: linux,dummy-virt (DT)
[   33.134845] Call trace:
[   33.134872]  show_stack+0x20/0x38 (C)
[   33.134928]  dump_stack_lvl+0x8c/0xd0
[   33.135074]  print_report+0x118/0x5d0
[   33.135128]  kasan_report+0xdc/0x128
[   33.135240]  kasan_check_range+0x100/0x1a8
[   33.135295]  __kasan_check_write+0x20/0x30
[   33.135356]  kasan_atomics_helper+0xeb8/0x4858
[   33.135427]  kasan_atomics+0x198/0x2e0
[   33.135479]  kunit_try_run_case+0x170/0x3f0
[   33.135804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.136177]  kthread+0x328/0x630
[   33.136248]  ret_from_fork+0x10/0x20
[   33.136668] 
[   33.136706] Allocated by task 296:
[   33.136742]  kasan_save_stack+0x3c/0x68
[   33.136793]  kasan_save_track+0x20/0x40
[   33.136853]  kasan_save_alloc_info+0x40/0x58
[   33.136898]  __kasan_kmalloc+0xd4/0xd8
[   33.137085]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.137264]  kasan_atomics+0xb8/0x2e0
[   33.137320]  kunit_try_run_case+0x170/0x3f0
[   33.137376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.137424]  kthread+0x328/0x630
[   33.137460]  ret_from_fork+0x10/0x20
[   33.137500] 
[   33.137525] The buggy address belongs to the object at fff00000c91a4d80
[   33.137525]  which belongs to the cache kmalloc-64 of size 64
[   33.137660] The buggy address is located 0 bytes to the right of
[   33.137660]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.137744] 
[   33.137768] The buggy address belongs to the physical page:
[   33.137804] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.137875] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.137930] page_type: f5(slab)
[   33.137989] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.138058] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.138114] page dumped because: kasan: bad access detected
[   33.138152] 
[   33.138178] Memory state around the buggy address:
[   33.138215]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.138267]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.138317] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.138973]                                      ^
[   33.139081]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.139174]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.139222] ==================================================================
[   33.310031] ==================================================================
[   33.310084] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   33.310373] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.310768] 
[   33.310814] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.310905] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.310933] Hardware name: linux,dummy-virt (DT)
[   33.311082] Call trace:
[   33.311141]  show_stack+0x20/0x38 (C)
[   33.311195]  dump_stack_lvl+0x8c/0xd0
[   33.311610]  print_report+0x118/0x5d0
[   33.311677]  kasan_report+0xdc/0x128
[   33.311995]  kasan_check_range+0x100/0x1a8
[   33.312073]  __kasan_check_write+0x20/0x30
[   33.312349]  kasan_atomics_helper+0x175c/0x4858
[   33.312522]  kasan_atomics+0x198/0x2e0
[   33.312759]  kunit_try_run_case+0x170/0x3f0
[   33.313004]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.313095]  kthread+0x328/0x630
[   33.313283]  ret_from_fork+0x10/0x20
[   33.313358] 
[   33.313380] Allocated by task 296:
[   33.313547]  kasan_save_stack+0x3c/0x68
[   33.313702]  kasan_save_track+0x20/0x40
[   33.313779]  kasan_save_alloc_info+0x40/0x58
[   33.313935]  __kasan_kmalloc+0xd4/0xd8
[   33.314122]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.314176]  kasan_atomics+0xb8/0x2e0
[   33.314218]  kunit_try_run_case+0x170/0x3f0
[   33.314262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.314307]  kthread+0x328/0x630
[   33.314648]  ret_from_fork+0x10/0x20
[   33.314748] 
[   33.314809] The buggy address belongs to the object at fff00000c91a4d80
[   33.314809]  which belongs to the cache kmalloc-64 of size 64
[   33.315031] The buggy address is located 0 bytes to the right of
[   33.315031]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.315354] 
[   33.315561] The buggy address belongs to the physical page:
[   33.315613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.315797] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.315987] page_type: f5(slab)
[   33.316035] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.316199] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.316245] page dumped because: kasan: bad access detected
[   33.316279] 
[   33.316434] Memory state around the buggy address:
[   33.316477]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.316560]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.316614] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.316672]                                      ^
[   33.316709]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.316761]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.316811] ==================================================================
[   33.154923] ==================================================================
[   33.155018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   33.155202] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.155401] 
[   33.155447] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.155859] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.155994] Hardware name: linux,dummy-virt (DT)
[   33.156060] Call trace:
[   33.156108]  show_stack+0x20/0x38 (C)
[   33.156172]  dump_stack_lvl+0x8c/0xd0
[   33.156502]  print_report+0x118/0x5d0
[   33.156633]  kasan_report+0xdc/0x128
[   33.156711]  kasan_check_range+0x100/0x1a8
[   33.156813]  __kasan_check_write+0x20/0x30
[   33.156868]  kasan_atomics_helper+0xff0/0x4858
[   33.156956]  kasan_atomics+0x198/0x2e0
[   33.157013]  kunit_try_run_case+0x170/0x3f0
[   33.157065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.157531]  kthread+0x328/0x630
[   33.157719]  ret_from_fork+0x10/0x20
[   33.157868] 
[   33.157895] Allocated by task 296:
[   33.157928]  kasan_save_stack+0x3c/0x68
[   33.157997]  kasan_save_track+0x20/0x40
[   33.158047]  kasan_save_alloc_info+0x40/0x58
[   33.158348]  __kasan_kmalloc+0xd4/0xd8
[   33.158529]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.158705]  kasan_atomics+0xb8/0x2e0
[   33.158782]  kunit_try_run_case+0x170/0x3f0
[   33.158918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.158990]  kthread+0x328/0x630
[   33.159034]  ret_from_fork+0x10/0x20
[   33.159336] 
[   33.159414] The buggy address belongs to the object at fff00000c91a4d80
[   33.159414]  which belongs to the cache kmalloc-64 of size 64
[   33.159621] The buggy address is located 0 bytes to the right of
[   33.159621]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.159847] 
[   33.159892] The buggy address belongs to the physical page:
[   33.159931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.159997] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.160394] page_type: f5(slab)
[   33.160448] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.160742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.160885] page dumped because: kasan: bad access detected
[   33.160958] 
[   33.161064] Memory state around the buggy address:
[   33.161147]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.161233]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.161579] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.161719]                                      ^
[   33.161802]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.161868]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.161952] ==================================================================
[   33.026543] ==================================================================
[   33.026663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   33.026725] Write of size 4 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.026793] 
[   33.027002] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.027118] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.027268] Hardware name: linux,dummy-virt (DT)
[   33.027312] Call trace:
[   33.027349]  show_stack+0x20/0x38 (C)
[   33.027404]  dump_stack_lvl+0x8c/0xd0
[   33.027453]  print_report+0x118/0x5d0
[   33.027507]  kasan_report+0xdc/0x128
[   33.027664]  kasan_atomics_helper+0xad4/0x4858
[   33.028050]  kasan_save_stack+0x3c/0x68
[   33.028571] The buggy address is located 0 bytes to the right of
[   33.028571]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.028644] 
[   33.028668] The buggy address belongs to the physical page:
[   33.028708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.028761] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.028821] page_type: f5(slab)
[   33.028862] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.028916] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.028967] page dumped because: kasan: bad access detected
[   33.029001] 
[   33.029020] Memory state around the buggy address:
[   33.029052]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.029106]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.029152] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.029195]                                      ^
[   33.029230]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.029274]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.030589] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   33.031375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.032917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.034616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.035613] 
[   33.035658] The buggy address belongs to the physical page:
[   33.036427] page dumped because: kasan: bad access detected
[   33.036909]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.037587] ==================================================================
[   33.183537] ==================================================================
[   33.183592] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   33.183718] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.183794] 
[   33.183839] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.184212] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.184274] Hardware name: linux,dummy-virt (DT)
[   33.184310] Call trace:
[   33.184344]  show_stack+0x20/0x38 (C)
[   33.184400]  dump_stack_lvl+0x8c/0xd0
[   33.184445]  print_report+0x118/0x5d0
[   33.184490]  kasan_report+0xdc/0x128
[   33.184797]  kasan_check_range+0x100/0x1a8
[   33.184947]  __kasan_check_write+0x20/0x30
[   33.185044]  kasan_atomics_helper+0x1190/0x4858
[   33.185109]  kasan_atomics+0x198/0x2e0
[   33.185160]  kunit_try_run_case+0x170/0x3f0
[   33.185454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.185611]  kthread+0x328/0x630
[   33.186047]  ret_from_fork+0x10/0x20
[   33.186183] 
[   33.186208] Allocated by task 296:
[   33.186240]  kasan_save_stack+0x3c/0x68
[   33.186469]  kasan_save_track+0x20/0x40
[   33.186651]  kasan_save_alloc_info+0x40/0x58
[   33.186735]  __kasan_kmalloc+0xd4/0xd8
[   33.186933]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.187105]  kasan_atomics+0xb8/0x2e0
[   33.187188]  kunit_try_run_case+0x170/0x3f0
[   33.187261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.187475]  kthread+0x328/0x630
[   33.187645]  ret_from_fork+0x10/0x20
[   33.187721] 
[   33.187908] The buggy address belongs to the object at fff00000c91a4d80
[   33.187908]  which belongs to the cache kmalloc-64 of size 64
[   33.188018] The buggy address is located 0 bytes to the right of
[   33.188018]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.188204] 
[   33.188533] The buggy address belongs to the physical page:
[   33.188602] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.188825] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.189051] page_type: f5(slab)
[   33.189110] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.189488] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.189647] page dumped because: kasan: bad access detected
[   33.189717] 
[   33.190006] Memory state around the buggy address:
[   33.190053]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.190237]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.190425] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.190815]                                      ^
[   33.190922]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.191086]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.191156] ==================================================================
[   33.168707] ==================================================================
[   33.169063] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   33.169220] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.169306] 
[   33.169352] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.169580] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.169718] Hardware name: linux,dummy-virt (DT)
[   33.169795] Call trace:
[   33.169828]  show_stack+0x20/0x38 (C)
[   33.170058]  dump_stack_lvl+0x8c/0xd0
[   33.170229]  print_report+0x118/0x5d0
[   33.170459]  kasan_report+0xdc/0x128
[   33.170636]  kasan_check_range+0x100/0x1a8
[   33.170720]  __kasan_check_write+0x20/0x30
[   33.170911]  kasan_atomics_helper+0x10c0/0x4858
[   33.171104]  kasan_atomics+0x198/0x2e0
[   33.171185]  kunit_try_run_case+0x170/0x3f0
[   33.171541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.171635]  kthread+0x328/0x630
[   33.171831]  ret_from_fork+0x10/0x20
[   33.172045] 
[   33.172089] Allocated by task 296:
[   33.172381]  kasan_save_stack+0x3c/0x68
[   33.172489]  kasan_save_track+0x20/0x40
[   33.172815]  kasan_save_alloc_info+0x40/0x58
[   33.173053]  __kasan_kmalloc+0xd4/0xd8
[   33.173196]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.173368]  kasan_atomics+0xb8/0x2e0
[   33.173803]  kunit_try_run_case+0x170/0x3f0
[   33.173899]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.174007]  kthread+0x328/0x630
[   33.174293]  ret_from_fork+0x10/0x20
[   33.174378] 
[   33.174560] The buggy address belongs to the object at fff00000c91a4d80
[   33.174560]  which belongs to the cache kmalloc-64 of size 64
[   33.174821] The buggy address is located 0 bytes to the right of
[   33.174821]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.175237] 
[   33.175274] The buggy address belongs to the physical page:
[   33.175464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.175542] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.175651] page_type: f5(slab)
[   33.175736] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.176197] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.176345] page dumped because: kasan: bad access detected
[   33.176421] 
[   33.176475] Memory state around the buggy address:
[   33.176710]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.176951]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.177036] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.177137]                                      ^
[   33.177180]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.177240]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.177293] ==================================================================
[   33.200245] ==================================================================
[   33.200308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   33.200378] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.200630] 
[   33.200803] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.200903] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.201219] Hardware name: linux,dummy-virt (DT)
[   33.201335] Call trace:
[   33.201449]  show_stack+0x20/0x38 (C)
[   33.201514]  dump_stack_lvl+0x8c/0xd0
[   33.201563]  print_report+0x118/0x5d0
[   33.201640]  kasan_report+0xdc/0x128
[   33.201769]  kasan_check_range+0x100/0x1a8
[   33.201820]  __kasan_check_write+0x20/0x30
[   33.201867]  kasan_atomics_helper+0x126c/0x4858
[   33.201925]  kasan_atomics+0x198/0x2e0
[   33.201972]  kunit_try_run_case+0x170/0x3f0
[   33.202420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.202528]  kthread+0x328/0x630
[   33.202908]  ret_from_fork+0x10/0x20
[   33.203376] 
[   33.203427] Allocated by task 296:
[   33.203491]  kasan_save_stack+0x3c/0x68
[   33.203719]  kasan_save_track+0x20/0x40
[   33.203889]  kasan_save_alloc_info+0x40/0x58
[   33.204188]  __kasan_kmalloc+0xd4/0xd8
[   33.204361]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.204618]  kasan_atomics+0xb8/0x2e0
[   33.204827]  kunit_try_run_case+0x170/0x3f0
[   33.204958]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.205137]  kthread+0x328/0x630
[   33.205523]  ret_from_fork+0x10/0x20
[   33.205733] 
[   33.205785] The buggy address belongs to the object at fff00000c91a4d80
[   33.205785]  which belongs to the cache kmalloc-64 of size 64
[   33.206029] The buggy address is located 0 bytes to the right of
[   33.206029]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.206109] 
[   33.206140] The buggy address belongs to the physical page:
[   33.206175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.206234] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.206506] page_type: f5(slab)
[   33.206593] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.206967] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.207050] page dumped because: kasan: bad access detected
[   33.207192] 
[   33.207227] Memory state around the buggy address:
[   33.207262]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.207342]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.207398] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.207439]                                      ^
[   33.207475]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.207520]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.207627] ==================================================================
[   33.234714] ==================================================================
[   33.234778] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   33.234865] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.235181] 
[   33.235311] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.235483] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.235517] Hardware name: linux,dummy-virt (DT)
[   33.235595] Call trace:
[   33.235654]  show_stack+0x20/0x38 (C)
[   33.235728]  dump_stack_lvl+0x8c/0xd0
[   33.235821]  print_report+0x118/0x5d0
[   33.236005]  kasan_report+0xdc/0x128
[   33.236070]  kasan_check_range+0x100/0x1a8
[   33.236356]  __kasan_check_write+0x20/0x30
[   33.236427]  kasan_atomics_helper+0x1414/0x4858
[   33.236680]  kasan_atomics+0x198/0x2e0
[   33.236871]  kunit_try_run_case+0x170/0x3f0
[   33.236934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.237292]  kthread+0x328/0x630
[   33.237370]  ret_from_fork+0x10/0x20
[   33.237424] 
[   33.237446] Allocated by task 296:
[   33.237478]  kasan_save_stack+0x3c/0x68
[   33.237864]  kasan_save_track+0x20/0x40
[   33.238001]  kasan_save_alloc_info+0x40/0x58
[   33.238096]  __kasan_kmalloc+0xd4/0xd8
[   33.238344]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.238497]  kasan_atomics+0xb8/0x2e0
[   33.238690]  kunit_try_run_case+0x170/0x3f0
[   33.238867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.238939]  kthread+0x328/0x630
[   33.239351]  ret_from_fork+0x10/0x20
[   33.239437] 
[   33.239498] The buggy address belongs to the object at fff00000c91a4d80
[   33.239498]  which belongs to the cache kmalloc-64 of size 64
[   33.239565] The buggy address is located 0 bytes to the right of
[   33.239565]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.239868] 
[   33.240143] The buggy address belongs to the physical page:
[   33.240276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.240454] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.240508] page_type: f5(slab)
[   33.240816] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.240889] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.240935] page dumped because: kasan: bad access detected
[   33.240982] 
[   33.241015] Memory state around the buggy address:
[   33.241052]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.241108]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.241197] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.241235]                                      ^
[   33.241272]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.241317]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.241373] ==================================================================
[   33.126611] ==================================================================
[   33.126678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   33.126734] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.126986] 
[   33.127141] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.127270] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.127330] Hardware name: linux,dummy-virt (DT)
[   33.127366] Call trace:
[   33.127523]  show_stack+0x20/0x38 (C)
[   33.127704]  dump_stack_lvl+0x8c/0xd0
[   33.127767]  print_report+0x118/0x5d0
[   33.127860]  kasan_report+0xdc/0x128
[   33.127937]  __asan_report_store8_noabort+0x20/0x30
[   33.128063]  kasan_atomics_helper+0x3e5c/0x4858
[   33.128124]  kasan_atomics+0x198/0x2e0
[   33.128177]  kunit_try_run_case+0x170/0x3f0
[   33.128386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.128589]  kthread+0x328/0x630
[   33.128653]  ret_from_fork+0x10/0x20
[   33.128705] 
[   33.128765] Allocated by task 296:
[   33.128796]  kasan_save_stack+0x3c/0x68
[   33.128853]  kasan_save_track+0x20/0x40
[   33.128896]  kasan_save_alloc_info+0x40/0x58
[   33.128938]  __kasan_kmalloc+0xd4/0xd8
[   33.128979]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.129029]  kasan_atomics+0xb8/0x2e0
[   33.129078]  kunit_try_run_case+0x170/0x3f0
[   33.129143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.129197]  kthread+0x328/0x630
[   33.129234]  ret_from_fork+0x10/0x20
[   33.129273] 
[   33.129295] The buggy address belongs to the object at fff00000c91a4d80
[   33.129295]  which belongs to the cache kmalloc-64 of size 64
[   33.129521] The buggy address is located 0 bytes to the right of
[   33.129521]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.130167] 
[   33.130229] The buggy address belongs to the physical page:
[   33.130339] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.130606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.130808] page_type: f5(slab)
[   33.130999] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.131225] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.131502] page dumped because: kasan: bad access detected
[   33.131665] 
[   33.131950] Memory state around the buggy address:
[   33.132149]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.132267]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.132362] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.132419]                                      ^
[   33.132459]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.132663]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.132838] ==================================================================
[   33.192154] ==================================================================
[   33.192400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   33.192506] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296
[   33.192842] 
[   33.192904] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.193013] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.193043] Hardware name: linux,dummy-virt (DT)
[   33.193076] Call trace:
[   33.193260]  show_stack+0x20/0x38 (C)
[   33.193369]  dump_stack_lvl+0x8c/0xd0
[   33.193525]  print_report+0x118/0x5d0
[   33.193577]  kasan_report+0xdc/0x128
[   33.193623]  kasan_check_range+0x100/0x1a8
[   33.193884]  __kasan_check_write+0x20/0x30
[   33.194045]  kasan_atomics_helper+0x11f8/0x4858
[   33.194419]  kasan_atomics+0x198/0x2e0
[   33.194507]  kunit_try_run_case+0x170/0x3f0
[   33.194680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.194739]  kthread+0x328/0x630
[   33.195391]  ret_from_fork+0x10/0x20
[   33.195577] 
[   33.195629] Allocated by task 296:
[   33.195663]  kasan_save_stack+0x3c/0x68
[   33.195746]  kasan_save_track+0x20/0x40
[   33.196108]  kasan_save_alloc_info+0x40/0x58
[   33.196542]  __kasan_kmalloc+0xd4/0xd8
[   33.196643]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.196692]  kasan_atomics+0xb8/0x2e0
[   33.196742]  kunit_try_run_case+0x170/0x3f0
[   33.196785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.196840]  kthread+0x328/0x630
[   33.196888]  ret_from_fork+0x10/0x20
[   33.196932] 
[   33.196957] The buggy address belongs to the object at fff00000c91a4d80
[   33.196957]  which belongs to the cache kmalloc-64 of size 64
[   33.197045] The buggy address is located 0 bytes to the right of
[   33.197045]  allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0)
[   33.197128] 
[   33.197151] The buggy address belongs to the physical page:
[   33.197194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4
[   33.197262] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.197316] page_type: f5(slab)
[   33.197372] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.197443] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.197487] page dumped because: kasan: bad access detected
[   33.197521] 
[   33.197541] Memory state around the buggy address:
[   33.198197]  fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.198274]  fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.198347] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.198590]                                      ^
[   33.198699]  fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.198783]  fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.198969] ==================================================================

[   26.372398] ==================================================================
[   26.372700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   26.373044] Read of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315
[   26.373782] 
[   26.374056] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.374114] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.374128] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.374152] Call Trace:
[   26.374174]  <TASK>
[   26.374194]  dump_stack_lvl+0x73/0xb0
[   26.374228]  print_report+0xd1/0x610
[   26.374252]  ? __virt_addr_valid+0x1db/0x2d0
[   26.374545]  ? kasan_atomics_helper+0x3df/0x5450
[   26.374571]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.374598]  ? kasan_atomics_helper+0x3df/0x5450
[   26.374621]  kasan_report+0x141/0x180
[   26.374644]  ? kasan_atomics_helper+0x3df/0x5450
[   26.374671]  kasan_check_range+0x10c/0x1c0
[   26.374695]  __kasan_check_read+0x15/0x20
[   26.374719]  kasan_atomics_helper+0x3df/0x5450
[   26.374757]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.374784]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.374811]  ? kasan_atomics+0x152/0x310
[   26.374838]  kasan_atomics+0x1dc/0x310
[   26.374862]  ? __pfx_kasan_atomics+0x10/0x10
[   26.374887]  ? __pfx_read_tsc+0x10/0x10
[   26.374910]  ? ktime_get_ts64+0x86/0x230
[   26.374937]  kunit_try_run_case+0x1a5/0x480
[   26.374961]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.374983]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.375009]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.375034]  ? __kthread_parkme+0x82/0x180
[   26.375056]  ? preempt_count_sub+0x50/0x80
[   26.375083]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.375106]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.375133]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.375160]  kthread+0x337/0x6f0
[   26.375182]  ? trace_preempt_on+0x20/0xc0
[   26.375207]  ? __pfx_kthread+0x10/0x10
[   26.375230]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.375253]  ? calculate_sigpending+0x7b/0xa0
[   26.375297]  ? __pfx_kthread+0x10/0x10
[   26.375321]  ret_from_fork+0x116/0x1d0
[   26.375341]  ? __pfx_kthread+0x10/0x10
[   26.375364]  ret_from_fork_asm+0x1a/0x30
[   26.375396]  </TASK>
[   26.375418] 
[   26.387157] Allocated by task 315:
[   26.387426]  kasan_save_stack+0x45/0x70
[   26.387798]  kasan_save_track+0x18/0x40
[   26.388100]  kasan_save_alloc_info+0x3b/0x50
[   26.388359]  __kasan_kmalloc+0xb7/0xc0
[   26.388688]  __kmalloc_cache_noprof+0x189/0x420
[   26.389011]  kasan_atomics+0x95/0x310
[   26.389255]  kunit_try_run_case+0x1a5/0x480
[   26.389757]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.390107]  kthread+0x337/0x6f0
[   26.390243]  ret_from_fork+0x116/0x1d0
[   26.390745]  ret_from_fork_asm+0x1a/0x30
[   26.390979] 
[   26.391214] The buggy address belongs to the object at ffff88810613ea80
[   26.391214]  which belongs to the cache kmalloc-64 of size 64
[   26.391849] The buggy address is located 0 bytes to the right of
[   26.391849]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   26.392697] 
[   26.392794] The buggy address belongs to the physical page:
[   26.393048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   26.393660] flags: 0x200000000000000(node=0|zone=2)
[   26.393866] page_type: f5(slab)
[   26.394187] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.394978] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.395333] page dumped because: kasan: bad access detected
[   26.395837] 
[   26.395934] Memory state around the buggy address:
[   26.396341]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.396854]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.397330] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.397719]                                      ^
[   26.398065]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.398597]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.398919] ==================================================================
[   27.139122] ==================================================================
[   27.139386] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   27.140301] Read of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315
[   27.140796] 
[   27.141173] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   27.141237] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.141252] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.141278] Call Trace:
[   27.141303]  <TASK>
[   27.141324]  dump_stack_lvl+0x73/0xb0
[   27.141369]  print_report+0xd1/0x610
[   27.141393]  ? __virt_addr_valid+0x1db/0x2d0
[   27.141419]  ? kasan_atomics_helper+0x13b5/0x5450
[   27.141529]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.141562]  ? kasan_atomics_helper+0x13b5/0x5450
[   27.141586]  kasan_report+0x141/0x180
[   27.141610]  ? kasan_atomics_helper+0x13b5/0x5450
[   27.141636]  kasan_check_range+0x10c/0x1c0
[   27.141662]  __kasan_check_read+0x15/0x20
[   27.141686]  kasan_atomics_helper+0x13b5/0x5450
[   27.141709]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.141748]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.141775]  ? kasan_atomics+0x152/0x310
[   27.141801]  kasan_atomics+0x1dc/0x310
[   27.141825]  ? __pfx_kasan_atomics+0x10/0x10
[   27.141850]  ? __pfx_read_tsc+0x10/0x10
[   27.141873]  ? ktime_get_ts64+0x86/0x230
[   27.141900]  kunit_try_run_case+0x1a5/0x480
[   27.141924]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.141945]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.141971]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.141996]  ? __kthread_parkme+0x82/0x180
[   27.142018]  ? preempt_count_sub+0x50/0x80
[   27.142043]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.142066]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.142091]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.142118]  kthread+0x337/0x6f0
[   27.142140]  ? trace_preempt_on+0x20/0xc0
[   27.142164]  ? __pfx_kthread+0x10/0x10
[   27.142188]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.142211]  ? calculate_sigpending+0x7b/0xa0
[   27.142237]  ? __pfx_kthread+0x10/0x10
[   27.142261]  ret_from_fork+0x116/0x1d0
[   27.142293]  ? __pfx_kthread+0x10/0x10
[   27.142316]  ret_from_fork_asm+0x1a/0x30
[   27.142349]  </TASK>
[   27.142362] 
[   27.152944] Allocated by task 315:
[   27.153116]  kasan_save_stack+0x45/0x70
[   27.153501]  kasan_save_track+0x18/0x40
[   27.153901]  kasan_save_alloc_info+0x3b/0x50
[   27.154069]  __kasan_kmalloc+0xb7/0xc0
[   27.154418]  __kmalloc_cache_noprof+0x189/0x420
[   27.154687]  kasan_atomics+0x95/0x310
[   27.154988]  kunit_try_run_case+0x1a5/0x480
[   27.155157]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.155416]  kthread+0x337/0x6f0
[   27.155655]  ret_from_fork+0x116/0x1d0
[   27.155949]  ret_from_fork_asm+0x1a/0x30
[   27.156418] 
[   27.156552] The buggy address belongs to the object at ffff88810613ea80
[   27.156552]  which belongs to the cache kmalloc-64 of size 64
[   27.157246] The buggy address is located 0 bytes to the right of
[   27.157246]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.157827] 
[   27.157917] The buggy address belongs to the physical page:
[   27.158137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.158798] flags: 0x200000000000000(node=0|zone=2)
[   27.159098] page_type: f5(slab)
[   27.159244] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.159688] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.160167] page dumped because: kasan: bad access detected
[   27.160422] 
[   27.160526] Memory state around the buggy address:
[   27.160858]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.161422]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.161914] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.162269]                                      ^
[   27.162495]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.162998]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.163360] ==================================================================
[   27.512997] ==================================================================
[   27.514004] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   27.514678] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315
[   27.514988] 
[   27.515098] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   27.515153] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.515167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.515192] Call Trace:
[   27.515215]  <TASK>
[   27.515235]  dump_stack_lvl+0x73/0xb0
[   27.515268]  print_report+0xd1/0x610
[   27.515293]  ? __virt_addr_valid+0x1db/0x2d0
[   27.515322]  ? kasan_atomics_helper+0x1b22/0x5450
[   27.515346]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.515373]  ? kasan_atomics_helper+0x1b22/0x5450
[   27.515404]  kasan_report+0x141/0x180
[   27.515427]  ? kasan_atomics_helper+0x1b22/0x5450
[   27.515454]  kasan_check_range+0x10c/0x1c0
[   27.515479]  __kasan_check_write+0x18/0x20
[   27.515504]  kasan_atomics_helper+0x1b22/0x5450
[   27.515526]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.515554]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.515580]  ? kasan_atomics+0x152/0x310
[   27.515607]  kasan_atomics+0x1dc/0x310
[   27.515630]  ? __pfx_kasan_atomics+0x10/0x10
[   27.515655]  ? __pfx_read_tsc+0x10/0x10
[   27.515678]  ? ktime_get_ts64+0x86/0x230
[   27.515705]  kunit_try_run_case+0x1a5/0x480
[   27.515728]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.515983]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.516026]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.516051]  ? __kthread_parkme+0x82/0x180
[   27.516076]  ? preempt_count_sub+0x50/0x80
[   27.516322]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.516363]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.516392]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.516429]  kthread+0x337/0x6f0
[   27.516454]  ? trace_preempt_on+0x20/0xc0
[   27.516479]  ? __pfx_kthread+0x10/0x10
[   27.516513]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.516538]  ? calculate_sigpending+0x7b/0xa0
[   27.516564]  ? __pfx_kthread+0x10/0x10
[   27.516589]  ret_from_fork+0x116/0x1d0
[   27.516610]  ? __pfx_kthread+0x10/0x10
[   27.516633]  ret_from_fork_asm+0x1a/0x30
[   27.516665]  </TASK>
[   27.516679] 
[   27.529841] Allocated by task 315:
[   27.530011]  kasan_save_stack+0x45/0x70
[   27.530197]  kasan_save_track+0x18/0x40
[   27.530787]  kasan_save_alloc_info+0x3b/0x50
[   27.531080]  __kasan_kmalloc+0xb7/0xc0
[   27.531459]  __kmalloc_cache_noprof+0x189/0x420
[   27.531805]  kasan_atomics+0x95/0x310
[   27.531997]  kunit_try_run_case+0x1a5/0x480
[   27.532186]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.532795]  kthread+0x337/0x6f0
[   27.533381]  ret_from_fork+0x116/0x1d0
[   27.533685]  ret_from_fork_asm+0x1a/0x30
[   27.533998] 
[   27.534071] The buggy address belongs to the object at ffff88810613ea80
[   27.534071]  which belongs to the cache kmalloc-64 of size 64
[   27.534997] The buggy address is located 0 bytes to the right of
[   27.534997]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.536328] 
[   27.536403] The buggy address belongs to the physical page:
[   27.536582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.537374] flags: 0x200000000000000(node=0|zone=2)
[   27.537876] page_type: f5(slab)
[   27.538178] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.538559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.539326] page dumped because: kasan: bad access detected
[   27.539532] 
[   27.539702] Memory state around the buggy address:
[   27.540154]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.540872]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.541313] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.542088]                                      ^
[   27.542252]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.543009]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.543441] ==================================================================
[   27.330577] ==================================================================
[   27.330915] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   27.331230] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315
[   27.331648] 
[   27.333051] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   27.333116] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.333131] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.333156] Call Trace:
[   27.333179]  <TASK>
[   27.333199]  dump_stack_lvl+0x73/0xb0
[   27.333236]  print_report+0xd1/0x610
[   27.333317]  ? __virt_addr_valid+0x1db/0x2d0
[   27.333348]  ? kasan_atomics_helper+0x177f/0x5450
[   27.333372]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.333416]  ? kasan_atomics_helper+0x177f/0x5450
[   27.333441]  kasan_report+0x141/0x180
[   27.333464]  ? kasan_atomics_helper+0x177f/0x5450
[   27.333491]  kasan_check_range+0x10c/0x1c0
[   27.333516]  __kasan_check_write+0x18/0x20
[   27.333540]  kasan_atomics_helper+0x177f/0x5450
[   27.333564]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.333591]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.333618]  ? kasan_atomics+0x152/0x310
[   27.333646]  kasan_atomics+0x1dc/0x310
[   27.333670]  ? __pfx_kasan_atomics+0x10/0x10
[   27.333695]  ? __pfx_read_tsc+0x10/0x10
[   27.333719]  ? ktime_get_ts64+0x86/0x230
[   27.333755]  kunit_try_run_case+0x1a5/0x480
[   27.333779]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.333801]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.333829]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.333854]  ? __kthread_parkme+0x82/0x180
[   27.333877]  ? preempt_count_sub+0x50/0x80
[   27.333903]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.333926]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.333954]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.333981]  kthread+0x337/0x6f0
[   27.334003]  ? trace_preempt_on+0x20/0xc0
[   27.334029]  ? __pfx_kthread+0x10/0x10
[   27.334052]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.334076]  ? calculate_sigpending+0x7b/0xa0
[   27.334103]  ? __pfx_kthread+0x10/0x10
[   27.334127]  ret_from_fork+0x116/0x1d0
[   27.334147]  ? __pfx_kthread+0x10/0x10
[   27.334170]  ret_from_fork_asm+0x1a/0x30
[   27.334203]  </TASK>
[   27.334216] 
[   27.345127] Allocated by task 315:
[   27.345434]  kasan_save_stack+0x45/0x70
[   27.345803]  kasan_save_track+0x18/0x40
[   27.346136]  kasan_save_alloc_info+0x3b/0x50
[   27.346498]  __kasan_kmalloc+0xb7/0xc0
[   27.346943]  __kmalloc_cache_noprof+0x189/0x420
[   27.347495]  kasan_atomics+0x95/0x310
[   27.347891]  kunit_try_run_case+0x1a5/0x480
[   27.348379]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.348952]  kthread+0x337/0x6f0
[   27.349259]  ret_from_fork+0x116/0x1d0
[   27.349633]  ret_from_fork_asm+0x1a/0x30
[   27.350064] 
[   27.350241] The buggy address belongs to the object at ffff88810613ea80
[   27.350241]  which belongs to the cache kmalloc-64 of size 64
[   27.351442] The buggy address is located 0 bytes to the right of
[   27.351442]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.352715] 
[   27.352909] The buggy address belongs to the physical page:
[   27.353522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.354306] flags: 0x200000000000000(node=0|zone=2)
[   27.354833] page_type: f5(slab)
[   27.355136] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.356024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.356948] page dumped because: kasan: bad access detected
[   27.357518] 
[   27.357710] Memory state around the buggy address:
[   27.358203]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.358839]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.359636] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.359859]                                      ^
[   27.360012]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.360223]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.360785] ==================================================================
[   26.575650] ==================================================================
[   26.576368] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   26.576709] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315
[   26.576998] 
[   26.577081] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.577133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.577147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.577170] Call Trace:
[   26.577188]  <TASK>
[   26.577205]  dump_stack_lvl+0x73/0xb0
[   26.577237]  print_report+0xd1/0x610
[   26.577259]  ? __virt_addr_valid+0x1db/0x2d0
[   26.577286]  ? kasan_atomics_helper+0x7c7/0x5450
[   26.577309]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.577337]  ? kasan_atomics_helper+0x7c7/0x5450
[   26.577360]  kasan_report+0x141/0x180
[   26.577384]  ? kasan_atomics_helper+0x7c7/0x5450
[   26.577412]  kasan_check_range+0x10c/0x1c0
[   26.577439]  __kasan_check_write+0x18/0x20
[   26.577464]  kasan_atomics_helper+0x7c7/0x5450
[   26.577487]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.577514]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.577541]  ? kasan_atomics+0x152/0x310
[   26.577569]  kasan_atomics+0x1dc/0x310
[   26.577594]  ? __pfx_kasan_atomics+0x10/0x10
[   26.577619]  ? __pfx_read_tsc+0x10/0x10
[   26.577643]  ? ktime_get_ts64+0x86/0x230
[   26.577669]  kunit_try_run_case+0x1a5/0x480
[   26.577692]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.577714]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.577766]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.577791]  ? __kthread_parkme+0x82/0x180
[   26.577827]  ? preempt_count_sub+0x50/0x80
[   26.577853]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.577876]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.577902]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.577968]  kthread+0x337/0x6f0
[   26.578019]  ? trace_preempt_on+0x20/0xc0
[   26.578044]  ? __pfx_kthread+0x10/0x10
[   26.578067]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.578091]  ? calculate_sigpending+0x7b/0xa0
[   26.578117]  ? __pfx_kthread+0x10/0x10
[   26.578140]  ret_from_fork+0x116/0x1d0
[   26.578160]  ? __pfx_kthread+0x10/0x10
[   26.578183]  ret_from_fork_asm+0x1a/0x30
[   26.578215]  </TASK>
[   26.578227] 
[   26.589267] Allocated by task 315:
[   26.590428]  kasan_save_stack+0x45/0x70
[   26.590639]  kasan_save_track+0x18/0x40
[   26.590783]  kasan_save_alloc_info+0x3b/0x50
[   26.590929]  __kasan_kmalloc+0xb7/0xc0
[   26.591056]  __kmalloc_cache_noprof+0x189/0x420
[   26.591792]  kasan_atomics+0x95/0x310
[   26.592059]  kunit_try_run_case+0x1a5/0x480
[   26.592436]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.592815]  kthread+0x337/0x6f0
[   26.592986]  ret_from_fork+0x116/0x1d0
[   26.593155]  ret_from_fork_asm+0x1a/0x30
[   26.593683] 
[   26.593966] The buggy address belongs to the object at ffff88810613ea80
[   26.593966]  which belongs to the cache kmalloc-64 of size 64
[   26.594893] The buggy address is located 0 bytes to the right of
[   26.594893]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   26.595622] 
[   26.595866] The buggy address belongs to the physical page:
[   26.596247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   26.596621] flags: 0x200000000000000(node=0|zone=2)
[   26.596843] page_type: f5(slab)
[   26.596998] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.597613] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.597862] page dumped because: kasan: bad access detected
[   26.598083] 
[   26.598167] Memory state around the buggy address:
[   26.598625]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.599287]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.599626] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.599918]                                      ^
[   26.600125]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.600842]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.601354] ==================================================================
[   27.270030] ==================================================================
[   27.270576] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   27.270860] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315
[   27.271230] 
[   27.271405] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   27.271512] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.271526] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.271550] Call Trace:
[   27.271570]  <TASK>
[   27.271589]  dump_stack_lvl+0x73/0xb0
[   27.271621]  print_report+0xd1/0x610
[   27.271644]  ? __virt_addr_valid+0x1db/0x2d0
[   27.271670]  ? kasan_atomics_helper+0x15b6/0x5450
[   27.271693]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.271720]  ? kasan_atomics_helper+0x15b6/0x5450
[   27.271755]  kasan_report+0x141/0x180
[   27.271778]  ? kasan_atomics_helper+0x15b6/0x5450
[   27.271805]  kasan_check_range+0x10c/0x1c0
[   27.271830]  __kasan_check_write+0x18/0x20
[   27.271864]  kasan_atomics_helper+0x15b6/0x5450
[   27.271888]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.271914]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.271951]  ? kasan_atomics+0x152/0x310
[   27.271978]  kasan_atomics+0x1dc/0x310
[   27.272001]  ? __pfx_kasan_atomics+0x10/0x10
[   27.272026]  ? __pfx_read_tsc+0x10/0x10
[   27.272050]  ? ktime_get_ts64+0x86/0x230
[   27.272076]  kunit_try_run_case+0x1a5/0x480
[   27.272099]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.272121]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.272148]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.272173]  ? __kthread_parkme+0x82/0x180
[   27.272196]  ? preempt_count_sub+0x50/0x80
[   27.272221]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.272245]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.272312]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.272359]  kthread+0x337/0x6f0
[   27.272382]  ? trace_preempt_on+0x20/0xc0
[   27.272419]  ? __pfx_kthread+0x10/0x10
[   27.272443]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.272467]  ? calculate_sigpending+0x7b/0xa0
[   27.272493]  ? __pfx_kthread+0x10/0x10
[   27.272536]  ret_from_fork+0x116/0x1d0
[   27.272558]  ? __pfx_kthread+0x10/0x10
[   27.272591]  ret_from_fork_asm+0x1a/0x30
[   27.272623]  </TASK>
[   27.272636] 
[   27.280698] Allocated by task 315:
[   27.280891]  kasan_save_stack+0x45/0x70
[   27.281088]  kasan_save_track+0x18/0x40
[   27.281258]  kasan_save_alloc_info+0x3b/0x50
[   27.281712]  __kasan_kmalloc+0xb7/0xc0
[   27.281914]  __kmalloc_cache_noprof+0x189/0x420
[   27.282134]  kasan_atomics+0x95/0x310
[   27.282386]  kunit_try_run_case+0x1a5/0x480
[   27.282621]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.282872]  kthread+0x337/0x6f0
[   27.283041]  ret_from_fork+0x116/0x1d0
[   27.283196]  ret_from_fork_asm+0x1a/0x30
[   27.283357] 
[   27.283455] The buggy address belongs to the object at ffff88810613ea80
[   27.283455]  which belongs to the cache kmalloc-64 of size 64
[   27.284122] The buggy address is located 0 bytes to the right of
[   27.284122]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.284714] 
[   27.284832] The buggy address belongs to the physical page:
[   27.285053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.285463] flags: 0x200000000000000(node=0|zone=2)
[   27.285711] page_type: f5(slab)
[   27.285911] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.286183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.286407] page dumped because: kasan: bad access detected
[   27.286580] 
[   27.286645] Memory state around the buggy address:
[   27.286803]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.287361]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.288239] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.288672]                                      ^
[   27.288841]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.289051]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.289257] ==================================================================
[   27.544418] ==================================================================
[   27.545133] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   27.545983] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315
[   27.546655] 
[   27.546927] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   27.546985] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.546998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.547022] Call Trace:
[   27.547039]  <TASK>
[   27.547057]  dump_stack_lvl+0x73/0xb0
[   27.547092]  print_report+0xd1/0x610
[   27.547115]  ? __virt_addr_valid+0x1db/0x2d0
[   27.547141]  ? kasan_atomics_helper+0x1c18/0x5450
[   27.547164]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.547191]  ? kasan_atomics_helper+0x1c18/0x5450
[   27.547214]  kasan_report+0x141/0x180
[   27.547237]  ? kasan_atomics_helper+0x1c18/0x5450
[   27.547264]  kasan_check_range+0x10c/0x1c0
[   27.547287]  __kasan_check_write+0x18/0x20
[   27.547312]  kasan_atomics_helper+0x1c18/0x5450
[   27.547336]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.547363]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.547388]  ? kasan_atomics+0x152/0x310
[   27.547425]  kasan_atomics+0x1dc/0x310
[   27.547448]  ? __pfx_kasan_atomics+0x10/0x10
[   27.547473]  ? __pfx_read_tsc+0x10/0x10
[   27.547496]  ? ktime_get_ts64+0x86/0x230
[   27.547522]  kunit_try_run_case+0x1a5/0x480
[   27.547546]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.547568]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.547592]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.547617]  ? __kthread_parkme+0x82/0x180
[   27.547640]  ? preempt_count_sub+0x50/0x80
[   27.547664]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.547687]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.547713]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.547752]  kthread+0x337/0x6f0
[   27.547777]  ? trace_preempt_on+0x20/0xc0
[   27.547801]  ? __pfx_kthread+0x10/0x10
[   27.547823]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.547847]  ? calculate_sigpending+0x7b/0xa0
[   27.547873]  ? __pfx_kthread+0x10/0x10
[   27.547896]  ret_from_fork+0x116/0x1d0
[   27.547916]  ? __pfx_kthread+0x10/0x10
[   27.547939]  ret_from_fork_asm+0x1a/0x30
[   27.547972]  </TASK>
[   27.547984] 
[   27.559109] Allocated by task 315:
[   27.559442]  kasan_save_stack+0x45/0x70
[   27.559815]  kasan_save_track+0x18/0x40
[   27.560151]  kasan_save_alloc_info+0x3b/0x50
[   27.560880]  __kasan_kmalloc+0xb7/0xc0
[   27.561238]  __kmalloc_cache_noprof+0x189/0x420
[   27.561675]  kasan_atomics+0x95/0x310
[   27.562029]  kunit_try_run_case+0x1a5/0x480
[   27.562408]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.562908]  kthread+0x337/0x6f0
[   27.563214]  ret_from_fork+0x116/0x1d0
[   27.563594]  ret_from_fork_asm+0x1a/0x30
[   27.563965] 
[   27.564118] The buggy address belongs to the object at ffff88810613ea80
[   27.564118]  which belongs to the cache kmalloc-64 of size 64
[   27.565152] The buggy address is located 0 bytes to the right of
[   27.565152]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.565884] 
[   27.565960] The buggy address belongs to the physical page:
[   27.566130] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.566364] flags: 0x200000000000000(node=0|zone=2)
[   27.566796] page_type: f5(slab)
[   27.567083] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.567787] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.568420] page dumped because: kasan: bad access detected
[   27.569026] 
[   27.569178] Memory state around the buggy address:
[   27.569612]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.570225]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.570949] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.571515]                                      ^
[   27.571666]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.571884]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.572094] ==================================================================
[   27.828376] ==================================================================
[   27.828750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   27.829023] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315
[   27.829244] 
[   27.829430] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   27.829479] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.829493] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.829516] Call Trace:
[   27.829533]  <TASK>
[   27.829549]  dump_stack_lvl+0x73/0xb0
[   27.829579]  print_report+0xd1/0x610
[   27.829603]  ? __virt_addr_valid+0x1db/0x2d0
[   27.829628]  ? kasan_atomics_helper+0x218a/0x5450
[   27.829650]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.829678]  ? kasan_atomics_helper+0x218a/0x5450
[   27.829702]  kasan_report+0x141/0x180
[   27.829725]  ? kasan_atomics_helper+0x218a/0x5450
[   27.829774]  kasan_check_range+0x10c/0x1c0
[   27.829799]  __kasan_check_write+0x18/0x20
[   27.829823]  kasan_atomics_helper+0x218a/0x5450
[   27.829857]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.829884]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.829911]  ? kasan_atomics+0x152/0x310
[   27.829947]  kasan_atomics+0x1dc/0x310
[   27.829970]  ? __pfx_kasan_atomics+0x10/0x10
[   27.829996]  ? __pfx_read_tsc+0x10/0x10
[   27.830029]  ? ktime_get_ts64+0x86/0x230
[   27.830056]  kunit_try_run_case+0x1a5/0x480
[   27.830079]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.830101]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.830135]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.830161]  ? __kthread_parkme+0x82/0x180
[   27.830193]  ? preempt_count_sub+0x50/0x80
[   27.830219]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.830243]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.830277]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.830305]  kthread+0x337/0x6f0
[   27.830328]  ? trace_preempt_on+0x20/0xc0
[   27.830363]  ? __pfx_kthread+0x10/0x10
[   27.830386]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.830418]  ? calculate_sigpending+0x7b/0xa0
[   27.830452]  ? __pfx_kthread+0x10/0x10
[   27.830477]  ret_from_fork+0x116/0x1d0
[   27.830497]  ? __pfx_kthread+0x10/0x10
[   27.830530]  ret_from_fork_asm+0x1a/0x30
[   27.830563]  </TASK>
[   27.830575] 
[   27.837995] Allocated by task 315:
[   27.838121]  kasan_save_stack+0x45/0x70
[   27.838257]  kasan_save_track+0x18/0x40
[   27.838386]  kasan_save_alloc_info+0x3b/0x50
[   27.838527]  __kasan_kmalloc+0xb7/0xc0
[   27.838653]  __kmalloc_cache_noprof+0x189/0x420
[   27.838915]  kasan_atomics+0x95/0x310
[   27.839098]  kunit_try_run_case+0x1a5/0x480
[   27.839297]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.839724]  kthread+0x337/0x6f0
[   27.839898]  ret_from_fork+0x116/0x1d0
[   27.840079]  ret_from_fork_asm+0x1a/0x30
[   27.840269] 
[   27.840363] The buggy address belongs to the object at ffff88810613ea80
[   27.840363]  which belongs to the cache kmalloc-64 of size 64
[   27.841172] The buggy address is located 0 bytes to the right of
[   27.841172]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.841543] 
[   27.841610] The buggy address belongs to the physical page:
[   27.841787] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.842020] flags: 0x200000000000000(node=0|zone=2)
[   27.842177] page_type: f5(slab)
[   27.842339] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.842919] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.843290] page dumped because: kasan: bad access detected
[   27.843569] 
[   27.843662] Memory state around the buggy address:
[   27.843897]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.844263]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.844628] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.844902]                                      ^
[   27.845142]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.845356]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.845640] ==================================================================
[   26.303578] ==================================================================
[   26.304051] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   26.304527] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315
[   26.304835] 
[   26.305258] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.305365] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.305378] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.305402] Call Trace:
[   26.305428]  <TASK>
[   26.305452]  dump_stack_lvl+0x73/0xb0
[   26.305487]  print_report+0xd1/0x610
[   26.305509]  ? __virt_addr_valid+0x1db/0x2d0
[   26.305533]  ? kasan_atomics_helper+0x4ba2/0x5450
[   26.305564]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.305589]  ? kasan_atomics_helper+0x4ba2/0x5450
[   26.305621]  kasan_report+0x141/0x180
[   26.305643]  ? kasan_atomics_helper+0x4ba2/0x5450
[   26.305669]  __asan_report_store4_noabort+0x1b/0x30
[   26.305694]  kasan_atomics_helper+0x4ba2/0x5450
[   26.305716]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.305752]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.305786]  ? kasan_atomics+0x152/0x310
[   26.305812]  kasan_atomics+0x1dc/0x310
[   26.305835]  ? __pfx_kasan_atomics+0x10/0x10
[   26.305870]  ? __pfx_read_tsc+0x10/0x10
[   26.305892]  ? ktime_get_ts64+0x86/0x230
[   26.305918]  kunit_try_run_case+0x1a5/0x480
[   26.305941]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.305962]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.305985]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.306010]  ? __kthread_parkme+0x82/0x180
[   26.306040]  ? preempt_count_sub+0x50/0x80
[   26.306064]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.306086]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.306121]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.306147]  kthread+0x337/0x6f0
[   26.306168]  ? trace_preempt_on+0x20/0xc0
[   26.306192]  ? __pfx_kthread+0x10/0x10
[   26.306213]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.306235]  ? calculate_sigpending+0x7b/0xa0
[   26.306260]  ? __pfx_kthread+0x10/0x10
[   26.306330]  ret_from_fork+0x116/0x1d0
[   26.306362]  ? __pfx_kthread+0x10/0x10
[   26.306384]  ret_from_fork_asm+0x1a/0x30
[   26.306425]  </TASK>
[   26.306438] 
[   26.315273] Allocated by task 315:
[   26.315471]  kasan_save_stack+0x45/0x70
[   26.315713]  kasan_save_track+0x18/0x40
[   26.315995]  kasan_save_alloc_info+0x3b/0x50
[   26.316255]  __kasan_kmalloc+0xb7/0xc0
[   26.316503]  __kmalloc_cache_noprof+0x189/0x420
[   26.316722]  kasan_atomics+0x95/0x310
[   26.316932]  kunit_try_run_case+0x1a5/0x480
[   26.317072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.317420]  kthread+0x337/0x6f0
[   26.317620]  ret_from_fork+0x116/0x1d0
[   26.317818]  ret_from_fork_asm+0x1a/0x30
[   26.318013] 
[   26.318101] The buggy address belongs to the object at ffff88810613ea80
[   26.318101]  which belongs to the cache kmalloc-64 of size 64
[   26.318790] The buggy address is located 0 bytes to the right of
[   26.318790]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   26.319490] 
[   26.319603] The buggy address belongs to the physical page:
[   26.319844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   26.320142] flags: 0x200000000000000(node=0|zone=2)
[   26.320301] page_type: f5(slab)
[   26.320424] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.320798] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.321344] page dumped because: kasan: bad access detected
[   26.321506] 
[   26.321569] Memory state around the buggy address:
[   26.321716]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.321996]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.322389] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.323146]                                      ^
[   26.323617]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.324002]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.324217] ==================================================================
[   26.480719] ==================================================================
[   26.480980] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   26.481325] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315
[   26.482198] 
[   26.482414] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.482551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.482570] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.482596] Call Trace:
[   26.482621]  <TASK>
[   26.482644]  dump_stack_lvl+0x73/0xb0
[   26.482679]  print_report+0xd1/0x610
[   26.482703]  ? __virt_addr_valid+0x1db/0x2d0
[   26.482747]  ? kasan_atomics_helper+0x565/0x5450
[   26.482771]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.482798]  ? kasan_atomics_helper+0x565/0x5450
[   26.482820]  kasan_report+0x141/0x180
[   26.482844]  ? kasan_atomics_helper+0x565/0x5450
[   26.482871]  kasan_check_range+0x10c/0x1c0
[   26.482896]  __kasan_check_write+0x18/0x20
[   26.482920]  kasan_atomics_helper+0x565/0x5450
[   26.482943]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.482970]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.482996]  ? kasan_atomics+0x152/0x310
[   26.483023]  kasan_atomics+0x1dc/0x310
[   26.483045]  ? __pfx_kasan_atomics+0x10/0x10
[   26.483071]  ? __pfx_read_tsc+0x10/0x10
[   26.483094]  ? ktime_get_ts64+0x86/0x230
[   26.483120]  kunit_try_run_case+0x1a5/0x480
[   26.483144]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.483166]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.483192]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.483216]  ? __kthread_parkme+0x82/0x180
[   26.483239]  ? preempt_count_sub+0x50/0x80
[   26.483263]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.483338]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.483365]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.483392]  kthread+0x337/0x6f0
[   26.483425]  ? trace_preempt_on+0x20/0xc0
[   26.483450]  ? __pfx_kthread+0x10/0x10
[   26.483473]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.483497]  ? calculate_sigpending+0x7b/0xa0
[   26.483525]  ? __pfx_kthread+0x10/0x10
[   26.483549]  ret_from_fork+0x116/0x1d0
[   26.483569]  ? __pfx_kthread+0x10/0x10
[   26.483592]  ret_from_fork_asm+0x1a/0x30
[   26.483625]  </TASK>
[   26.483638] 
[   26.494075] Allocated by task 315:
[   26.494255]  kasan_save_stack+0x45/0x70
[   26.494819]  kasan_save_track+0x18/0x40
[   26.495004]  kasan_save_alloc_info+0x3b/0x50
[   26.495398]  __kasan_kmalloc+0xb7/0xc0
[   26.495663]  __kmalloc_cache_noprof+0x189/0x420
[   26.495904]  kasan_atomics+0x95/0x310
[   26.496072]  kunit_try_run_case+0x1a5/0x480
[   26.496252]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.496910]  kthread+0x337/0x6f0
[   26.497054]  ret_from_fork+0x116/0x1d0
[   26.497238]  ret_from_fork_asm+0x1a/0x30
[   26.497684] 
[   26.497787] The buggy address belongs to the object at ffff88810613ea80
[   26.497787]  which belongs to the cache kmalloc-64 of size 64
[   26.498268] The buggy address is located 0 bytes to the right of
[   26.498268]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   26.499069] 
[   26.499347] The buggy address belongs to the physical page:
[   26.499650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   26.499994] flags: 0x200000000000000(node=0|zone=2)
[   26.500209] page_type: f5(slab)
[   26.500658] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.500959] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.501699] page dumped because: kasan: bad access detected
[   26.501958] 
[   26.502034] Memory state around the buggy address:
[   26.502242]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.502886]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.503170] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.503674]                                      ^
[   26.503956]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.504359]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.504831] ==================================================================
[   27.059138] ==================================================================
[   27.059364] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   27.059691] Read of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315
[   27.060101] 
[   27.060225] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   27.060281] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.060295] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.060325] Call Trace:
[   27.060348]  <TASK>
[   27.060369]  dump_stack_lvl+0x73/0xb0
[   27.060428]  print_report+0xd1/0x610
[   27.060452]  ? __virt_addr_valid+0x1db/0x2d0
[   27.060479]  ? kasan_atomics_helper+0x49e8/0x5450
[   27.060501]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.060528]  ? kasan_atomics_helper+0x49e8/0x5450
[   27.060621]  kasan_report+0x141/0x180
[   27.060651]  ? kasan_atomics_helper+0x49e8/0x5450
[   27.060679]  __asan_report_load4_noabort+0x18/0x20
[   27.060704]  kasan_atomics_helper+0x49e8/0x5450
[   27.060727]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.060765]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.060791]  ? kasan_atomics+0x152/0x310
[   27.060820]  kasan_atomics+0x1dc/0x310
[   27.060844]  ? __pfx_kasan_atomics+0x10/0x10
[   27.060868]  ? __pfx_read_tsc+0x10/0x10
[   27.060892]  ? ktime_get_ts64+0x86/0x230
[   27.060918]  kunit_try_run_case+0x1a5/0x480
[   27.060942]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.060964]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.060992]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.061016]  ? __kthread_parkme+0x82/0x180
[   27.061039]  ? preempt_count_sub+0x50/0x80
[   27.061065]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.061088]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.061115]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.061141]  kthread+0x337/0x6f0
[   27.061165]  ? trace_preempt_on+0x20/0xc0
[   27.061190]  ? __pfx_kthread+0x10/0x10
[   27.061212]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.061236]  ? calculate_sigpending+0x7b/0xa0
[   27.062285]  ? __pfx_kthread+0x10/0x10
[   27.062322]  ret_from_fork+0x116/0x1d0
[   27.062344]  ? __pfx_kthread+0x10/0x10
[   27.062369]  ret_from_fork_asm+0x1a/0x30
[   27.062418]  </TASK>
[   27.062433] 
[   27.074829] Allocated by task 315:
[   27.075282]  kasan_save_stack+0x45/0x70
[   27.075687]  kasan_save_track+0x18/0x40
[   27.076179]  kasan_save_alloc_info+0x3b/0x50
[   27.076726]  __kasan_kmalloc+0xb7/0xc0
[   27.077176]  __kmalloc_cache_noprof+0x189/0x420
[   27.077740]  kasan_atomics+0x95/0x310
[   27.078181]  kunit_try_run_case+0x1a5/0x480
[   27.078823]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.079485]  kthread+0x337/0x6f0
[   27.079923]  ret_from_fork+0x116/0x1d0
[   27.080368]  ret_from_fork_asm+0x1a/0x30
[   27.080876] 
[   27.081058] The buggy address belongs to the object at ffff88810613ea80
[   27.081058]  which belongs to the cache kmalloc-64 of size 64
[   27.082409] The buggy address is located 0 bytes to the right of
[   27.082409]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.083767] 
[   27.084001] The buggy address belongs to the physical page:
[   27.084177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.084972] flags: 0x200000000000000(node=0|zone=2)
[   27.085704] page_type: f5(slab)
[   27.086135] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.086802] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.087031] page dumped because: kasan: bad access detected
[   27.087197] 
[   27.087264] Memory state around the buggy address:
[   27.087432]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.087801]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.088480] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.088873]                                      ^
[   27.089114]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.089408]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.090077] ==================================================================
[   27.419464] ==================================================================
[   27.419699] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   27.420382] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315
[   27.421024] 
[   27.421200] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   27.421254] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.421308] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.421334] Call Trace:
[   27.421356]  <TASK>
[   27.421374]  dump_stack_lvl+0x73/0xb0
[   27.421408]  print_report+0xd1/0x610
[   27.421433]  ? __virt_addr_valid+0x1db/0x2d0
[   27.421470]  ? kasan_atomics_helper+0x194a/0x5450
[   27.421492]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.421519]  ? kasan_atomics_helper+0x194a/0x5450
[   27.421541]  kasan_report+0x141/0x180
[   27.421564]  ? kasan_atomics_helper+0x194a/0x5450
[   27.421591]  kasan_check_range+0x10c/0x1c0
[   27.421615]  __kasan_check_write+0x18/0x20
[   27.421639]  kasan_atomics_helper+0x194a/0x5450
[   27.421662]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.421689]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.421715]  ? kasan_atomics+0x152/0x310
[   27.421754]  kasan_atomics+0x1dc/0x310
[   27.421777]  ? __pfx_kasan_atomics+0x10/0x10
[   27.421803]  ? __pfx_read_tsc+0x10/0x10
[   27.421826]  ? ktime_get_ts64+0x86/0x230
[   27.421852]  kunit_try_run_case+0x1a5/0x480
[   27.421875]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.421898]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.421922]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.421946]  ? __kthread_parkme+0x82/0x180
[   27.421969]  ? preempt_count_sub+0x50/0x80
[   27.421994]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.422017]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.422044]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.422071]  kthread+0x337/0x6f0
[   27.422093]  ? trace_preempt_on+0x20/0xc0
[   27.422117]  ? __pfx_kthread+0x10/0x10
[   27.422141]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.422163]  ? calculate_sigpending+0x7b/0xa0
[   27.422190]  ? __pfx_kthread+0x10/0x10
[   27.422214]  ret_from_fork+0x116/0x1d0
[   27.422235]  ? __pfx_kthread+0x10/0x10
[   27.422258]  ret_from_fork_asm+0x1a/0x30
[   27.422325]  </TASK>
[   27.422340] 
[   27.435097] Allocated by task 315:
[   27.435227]  kasan_save_stack+0x45/0x70
[   27.435648]  kasan_save_track+0x18/0x40
[   27.436009]  kasan_save_alloc_info+0x3b/0x50
[   27.436469]  __kasan_kmalloc+0xb7/0xc0
[   27.436811]  __kmalloc_cache_noprof+0x189/0x420
[   27.437201]  kasan_atomics+0x95/0x310
[   27.437576]  kunit_try_run_case+0x1a5/0x480
[   27.437955]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.438487]  kthread+0x337/0x6f0
[   27.438872]  ret_from_fork+0x116/0x1d0
[   27.439249]  ret_from_fork_asm+0x1a/0x30
[   27.439833] 
[   27.440029] The buggy address belongs to the object at ffff88810613ea80
[   27.440029]  which belongs to the cache kmalloc-64 of size 64
[   27.441215] The buggy address is located 0 bytes to the right of
[   27.441215]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.441923] 
[   27.441997] The buggy address belongs to the physical page:
[   27.442164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.442548] flags: 0x200000000000000(node=0|zone=2)
[   27.442973] page_type: f5(slab)
[   27.443253] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.444022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.444926] page dumped because: kasan: bad access detected
[   27.445512] 
[   27.445880] Memory state around the buggy address:
[   27.446458]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.446895]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.447110] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.447376]                                      ^
[   27.447805]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.448478]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.449091] ==================================================================
[   27.474071] ==================================================================
[   27.474776] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   27.475510] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315
[   27.476423] 
[   27.476626] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   27.476679] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.476716] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.476752] Call Trace:
[   27.476774]  <TASK>
[   27.476793]  dump_stack_lvl+0x73/0xb0
[   27.476829]  print_report+0xd1/0x610
[   27.476853]  ? __virt_addr_valid+0x1db/0x2d0
[   27.476878]  ? kasan_atomics_helper+0x1a7f/0x5450
[   27.476902]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.476929]  ? kasan_atomics_helper+0x1a7f/0x5450
[   27.476952]  kasan_report+0x141/0x180
[   27.476975]  ? kasan_atomics_helper+0x1a7f/0x5450
[   27.477002]  kasan_check_range+0x10c/0x1c0
[   27.477027]  __kasan_check_write+0x18/0x20
[   27.477051]  kasan_atomics_helper+0x1a7f/0x5450
[   27.477074]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.477100]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.477126]  ? kasan_atomics+0x152/0x310
[   27.477153]  kasan_atomics+0x1dc/0x310
[   27.477176]  ? __pfx_kasan_atomics+0x10/0x10
[   27.477201]  ? __pfx_read_tsc+0x10/0x10
[   27.477224]  ? ktime_get_ts64+0x86/0x230
[   27.477250]  kunit_try_run_case+0x1a5/0x480
[   27.477290]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.477311]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.477337]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.477368]  ? __kthread_parkme+0x82/0x180
[   27.477391]  ? preempt_count_sub+0x50/0x80
[   27.477438]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.477461]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.477495]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.477522]  kthread+0x337/0x6f0
[   27.477544]  ? trace_preempt_on+0x20/0xc0
[   27.477590]  ? __pfx_kthread+0x10/0x10
[   27.477614]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.477647]  ? calculate_sigpending+0x7b/0xa0
[   27.477673]  ? __pfx_kthread+0x10/0x10
[   27.477697]  ret_from_fork+0x116/0x1d0
[   27.477717]  ? __pfx_kthread+0x10/0x10
[   27.477750]  ret_from_fork_asm+0x1a/0x30
[   27.477781]  </TASK>
[   27.477794] 
[   27.493151] Allocated by task 315:
[   27.493589]  kasan_save_stack+0x45/0x70
[   27.493963]  kasan_save_track+0x18/0x40
[   27.494685]  kasan_save_alloc_info+0x3b/0x50
[   27.495184]  __kasan_kmalloc+0xb7/0xc0
[   27.495564]  __kmalloc_cache_noprof+0x189/0x420
[   27.495958]  kasan_atomics+0x95/0x310
[   27.496090]  kunit_try_run_case+0x1a5/0x480
[   27.496230]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.496406]  kthread+0x337/0x6f0
[   27.496821]  ret_from_fork+0x116/0x1d0
[   27.497150]  ret_from_fork_asm+0x1a/0x30
[   27.497494] 
[   27.497647] The buggy address belongs to the object at ffff88810613ea80
[   27.497647]  which belongs to the cache kmalloc-64 of size 64
[   27.498634] The buggy address is located 0 bytes to the right of
[   27.498634]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.500079] 
[   27.500652] The buggy address belongs to the physical page:
[   27.501077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.502054] flags: 0x200000000000000(node=0|zone=2)
[   27.502321] page_type: f5(slab)
[   27.502486] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.504065] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.505722] page dumped because: kasan: bad access detected
[   27.505983] 
[   27.506073] Memory state around the buggy address:
[   27.507198]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.508139]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.508935] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.509723]                                      ^
[   27.510108]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.511257]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.511723] ==================================================================
[   26.934209] ==================================================================
[   26.934635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   26.935316] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315
[   26.935632] 
[   26.935758] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.935813] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.935828] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.935853] Call Trace:
[   26.935876]  <TASK>
[   26.935897]  dump_stack_lvl+0x73/0xb0
[   26.935930]  print_report+0xd1/0x610
[   26.935955]  ? __virt_addr_valid+0x1db/0x2d0
[   26.935981]  ? kasan_atomics_helper+0x1079/0x5450
[   26.936004]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.936030]  ? kasan_atomics_helper+0x1079/0x5450
[   26.936055]  kasan_report+0x141/0x180
[   26.936078]  ? kasan_atomics_helper+0x1079/0x5450
[   26.936105]  kasan_check_range+0x10c/0x1c0
[   26.936129]  __kasan_check_write+0x18/0x20
[   26.936153]  kasan_atomics_helper+0x1079/0x5450
[   26.936176]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.936202]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.936230]  ? kasan_atomics+0x152/0x310
[   26.936256]  kasan_atomics+0x1dc/0x310
[   26.936443]  ? __pfx_kasan_atomics+0x10/0x10
[   26.936472]  ? __pfx_read_tsc+0x10/0x10
[   26.936505]  ? ktime_get_ts64+0x86/0x230
[   26.936532]  kunit_try_run_case+0x1a5/0x480
[   26.936556]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.936617]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.936643]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.936670]  ? __kthread_parkme+0x82/0x180
[   26.936692]  ? preempt_count_sub+0x50/0x80
[   26.936718]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.936755]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.936782]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.936809]  kthread+0x337/0x6f0
[   26.936832]  ? trace_preempt_on+0x20/0xc0
[   26.936857]  ? __pfx_kthread+0x10/0x10
[   26.936881]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.936906]  ? calculate_sigpending+0x7b/0xa0
[   26.936932]  ? __pfx_kthread+0x10/0x10
[   26.936955]  ret_from_fork+0x116/0x1d0
[   26.936976]  ? __pfx_kthread+0x10/0x10
[   26.936999]  ret_from_fork_asm+0x1a/0x30
[   26.937032]  </TASK>
[   26.937045] 
[   26.949945] Allocated by task 315:
[   26.950128]  kasan_save_stack+0x45/0x70
[   26.950541]  kasan_save_track+0x18/0x40
[   26.950793]  kasan_save_alloc_info+0x3b/0x50
[   26.951104]  __kasan_kmalloc+0xb7/0xc0
[   26.951465]  __kmalloc_cache_noprof+0x189/0x420
[   26.951749]  kasan_atomics+0x95/0x310
[   26.951932]  kunit_try_run_case+0x1a5/0x480
[   26.952116]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.952556]  kthread+0x337/0x6f0
[   26.952839]  ret_from_fork+0x116/0x1d0
[   26.953207]  ret_from_fork_asm+0x1a/0x30
[   26.953538] 
[   26.953779] The buggy address belongs to the object at ffff88810613ea80
[   26.953779]  which belongs to the cache kmalloc-64 of size 64
[   26.954469] The buggy address is located 0 bytes to the right of
[   26.954469]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   26.955236] 
[   26.955511] The buggy address belongs to the physical page:
[   26.955762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   26.956086] flags: 0x200000000000000(node=0|zone=2)
[   26.956519] page_type: f5(slab)
[   26.956810] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.957480] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.957814] page dumped because: kasan: bad access detected
[   26.958041] 
[   26.958127] Memory state around the buggy address:
[   26.958626]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.959130]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.959863] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.960425]                                      ^
[   26.960812]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.961108]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.961811] ==================================================================
[   27.289768] ==================================================================
[   27.290184] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   27.290796] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315
[   27.291405] 
[   27.291493] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   27.291596] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.291612] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.291637] Call Trace:
[   27.291659]  <TASK>
[   27.291679]  dump_stack_lvl+0x73/0xb0
[   27.291712]  print_report+0xd1/0x610
[   27.291756]  ? __virt_addr_valid+0x1db/0x2d0
[   27.291782]  ? kasan_atomics_helper+0x164f/0x5450
[   27.291816]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.291843]  ? kasan_atomics_helper+0x164f/0x5450
[   27.291866]  kasan_report+0x141/0x180
[   27.291889]  ? kasan_atomics_helper+0x164f/0x5450
[   27.291924]  kasan_check_range+0x10c/0x1c0
[   27.291950]  __kasan_check_write+0x18/0x20
[   27.291975]  kasan_atomics_helper+0x164f/0x5450
[   27.292009]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.292038]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.292067]  ? kasan_atomics+0x152/0x310
[   27.292096]  kasan_atomics+0x1dc/0x310
[   27.292120]  ? __pfx_kasan_atomics+0x10/0x10
[   27.292147]  ? __pfx_read_tsc+0x10/0x10
[   27.292169]  ? ktime_get_ts64+0x86/0x230
[   27.292196]  kunit_try_run_case+0x1a5/0x480
[   27.292220]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.292242]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.292268]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.292293]  ? __kthread_parkme+0x82/0x180
[   27.292322]  ? preempt_count_sub+0x50/0x80
[   27.292347]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.292370]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.292406]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.292433]  kthread+0x337/0x6f0
[   27.292466]  ? trace_preempt_on+0x20/0xc0
[   27.292492]  ? __pfx_kthread+0x10/0x10
[   27.292515]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.292539]  ? calculate_sigpending+0x7b/0xa0
[   27.292565]  ? __pfx_kthread+0x10/0x10
[   27.292589]  ret_from_fork+0x116/0x1d0
[   27.292610]  ? __pfx_kthread+0x10/0x10
[   27.292633]  ret_from_fork_asm+0x1a/0x30
[   27.292664]  </TASK>
[   27.292678] 
[   27.300908] Allocated by task 315:
[   27.301113]  kasan_save_stack+0x45/0x70
[   27.301405]  kasan_save_track+0x18/0x40
[   27.301572]  kasan_save_alloc_info+0x3b/0x50
[   27.301811]  __kasan_kmalloc+0xb7/0xc0
[   27.301989]  __kmalloc_cache_noprof+0x189/0x420
[   27.302203]  kasan_atomics+0x95/0x310
[   27.302465]  kunit_try_run_case+0x1a5/0x480
[   27.302667]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.302898]  kthread+0x337/0x6f0
[   27.303017]  ret_from_fork+0x116/0x1d0
[   27.303218]  ret_from_fork_asm+0x1a/0x30
[   27.303408] 
[   27.303498] The buggy address belongs to the object at ffff88810613ea80
[   27.303498]  which belongs to the cache kmalloc-64 of size 64
[   27.304297] The buggy address is located 0 bytes to the right of
[   27.304297]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.304761] 
[   27.305008] The buggy address belongs to the physical page:
[   27.305257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.305750] flags: 0x200000000000000(node=0|zone=2)
[   27.306002] page_type: f5(slab)
[   27.306122] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.306348] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.306566] page dumped because: kasan: bad access detected
[   27.306819] 
[   27.306907] Memory state around the buggy address:
[   27.307124]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.307461]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.307727] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.307938]                                      ^
[   27.308085]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.308294]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.308860] ==================================================================
[   26.705406] ==================================================================
[   26.705681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   26.705965] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315
[   26.706381] 
[   26.706634] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.706717] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.706764] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.706790] Call Trace:
[   26.706812]  <TASK>
[   26.706842]  dump_stack_lvl+0x73/0xb0
[   26.706875]  print_report+0xd1/0x610
[   26.706899]  ? __virt_addr_valid+0x1db/0x2d0
[   26.706924]  ? kasan_atomics_helper+0xac7/0x5450
[   26.706947]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.706975]  ? kasan_atomics_helper+0xac7/0x5450
[   26.706997]  kasan_report+0x141/0x180
[   26.707020]  ? kasan_atomics_helper+0xac7/0x5450
[   26.707047]  kasan_check_range+0x10c/0x1c0
[   26.707071]  __kasan_check_write+0x18/0x20
[   26.707095]  kasan_atomics_helper+0xac7/0x5450
[   26.707119]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.707146]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.707172]  ? kasan_atomics+0x152/0x310
[   26.707199]  kasan_atomics+0x1dc/0x310
[   26.707222]  ? __pfx_kasan_atomics+0x10/0x10
[   26.707247]  ? __pfx_read_tsc+0x10/0x10
[   26.707270]  ? ktime_get_ts64+0x86/0x230
[   26.707296]  kunit_try_run_case+0x1a5/0x480
[   26.707322]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.707344]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.707369]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.707394]  ? __kthread_parkme+0x82/0x180
[   26.707416]  ? preempt_count_sub+0x50/0x80
[   26.707441]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.707466]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.707513]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.707554]  kthread+0x337/0x6f0
[   26.707609]  ? trace_preempt_on+0x20/0xc0
[   26.707637]  ? __pfx_kthread+0x10/0x10
[   26.707661]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.707748]  ? calculate_sigpending+0x7b/0xa0
[   26.707778]  ? __pfx_kthread+0x10/0x10
[   26.707802]  ret_from_fork+0x116/0x1d0
[   26.707823]  ? __pfx_kthread+0x10/0x10
[   26.707847]  ret_from_fork_asm+0x1a/0x30
[   26.707880]  </TASK>
[   26.707893] 
[   26.724112] Allocated by task 315:
[   26.724281]  kasan_save_stack+0x45/0x70
[   26.724803]  kasan_save_track+0x18/0x40
[   26.725066]  kasan_save_alloc_info+0x3b/0x50
[   26.725332]  __kasan_kmalloc+0xb7/0xc0
[   26.725529]  __kmalloc_cache_noprof+0x189/0x420
[   26.725705]  kasan_atomics+0x95/0x310
[   26.726031]  kunit_try_run_case+0x1a5/0x480
[   26.726407]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.726638]  kthread+0x337/0x6f0
[   26.726855]  ret_from_fork+0x116/0x1d0
[   26.727126]  ret_from_fork_asm+0x1a/0x30
[   26.727337] 
[   26.727451] The buggy address belongs to the object at ffff88810613ea80
[   26.727451]  which belongs to the cache kmalloc-64 of size 64
[   26.728293] The buggy address is located 0 bytes to the right of
[   26.728293]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   26.728896] 
[   26.729003] The buggy address belongs to the physical page:
[   26.729419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   26.730124] flags: 0x200000000000000(node=0|zone=2)
[   26.730550] page_type: f5(slab)
[   26.730754] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.731071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.731477] page dumped because: kasan: bad access detected
[   26.731889] 
[   26.731967] Memory state around the buggy address:
[   26.732242]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.732574]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.732912] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.733213]                                      ^
[   26.733526]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.733770]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.734063] ==================================================================
[   26.602229] ==================================================================
[   26.603238] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   26.603494] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315
[   26.603716] 
[   26.604082] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.604141] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.604156] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.604181] Call Trace:
[   26.604205]  <TASK>
[   26.604224]  dump_stack_lvl+0x73/0xb0
[   26.604346]  print_report+0xd1/0x610
[   26.604377]  ? __virt_addr_valid+0x1db/0x2d0
[   26.604427]  ? kasan_atomics_helper+0x860/0x5450
[   26.604449]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.604476]  ? kasan_atomics_helper+0x860/0x5450
[   26.604499]  kasan_report+0x141/0x180
[   26.604551]  ? kasan_atomics_helper+0x860/0x5450
[   26.604579]  kasan_check_range+0x10c/0x1c0
[   26.604605]  __kasan_check_write+0x18/0x20
[   26.604640]  kasan_atomics_helper+0x860/0x5450
[   26.604663]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.604715]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.604757]  ? kasan_atomics+0x152/0x310
[   26.604784]  kasan_atomics+0x1dc/0x310
[   26.604807]  ? __pfx_kasan_atomics+0x10/0x10
[   26.604833]  ? __pfx_read_tsc+0x10/0x10
[   26.604857]  ? ktime_get_ts64+0x86/0x230
[   26.604883]  kunit_try_run_case+0x1a5/0x480
[   26.604907]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.604929]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.604955]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.604979]  ? __kthread_parkme+0x82/0x180
[   26.605001]  ? preempt_count_sub+0x50/0x80
[   26.605027]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.605050]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.605076]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.605103]  kthread+0x337/0x6f0
[   26.605126]  ? trace_preempt_on+0x20/0xc0
[   26.605150]  ? __pfx_kthread+0x10/0x10
[   26.605173]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.605196]  ? calculate_sigpending+0x7b/0xa0
[   26.605222]  ? __pfx_kthread+0x10/0x10
[   26.605246]  ret_from_fork+0x116/0x1d0
[   26.605323]  ? __pfx_kthread+0x10/0x10
[   26.605347]  ret_from_fork_asm+0x1a/0x30
[   26.605379]  </TASK>
[   26.605392] 
[   26.619876] Allocated by task 315:
[   26.620223]  kasan_save_stack+0x45/0x70
[   26.620703]  kasan_save_track+0x18/0x40
[   26.621097]  kasan_save_alloc_info+0x3b/0x50
[   26.621404]  __kasan_kmalloc+0xb7/0xc0
[   26.621839]  __kmalloc_cache_noprof+0x189/0x420
[   26.621994]  kasan_atomics+0x95/0x310
[   26.622121]  kunit_try_run_case+0x1a5/0x480
[   26.622260]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.622950]  kthread+0x337/0x6f0
[   26.623336]  ret_from_fork+0x116/0x1d0
[   26.623841]  ret_from_fork_asm+0x1a/0x30
[   26.624322] 
[   26.624484] The buggy address belongs to the object at ffff88810613ea80
[   26.624484]  which belongs to the cache kmalloc-64 of size 64
[   26.625203] The buggy address is located 0 bytes to the right of
[   26.625203]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   26.626214] 
[   26.626420] The buggy address belongs to the physical page:
[   26.627012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   26.627773] flags: 0x200000000000000(node=0|zone=2)
[   26.627951] page_type: f5(slab)
[   26.628072] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.628324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.628846] page dumped because: kasan: bad access detected
[   26.629450] 
[   26.629658] Memory state around the buggy address:
[   26.630119]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.630849]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.631601] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.631914]                                      ^
[   26.632071]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.632436]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.633275] ==================================================================
[   27.599787] ==================================================================
[   27.600100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   27.600493] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315
[   27.600977] 
[   27.601074] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   27.601129] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.601143] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.601168] Call Trace:
[   27.601191]  <TASK>
[   27.601211]  dump_stack_lvl+0x73/0xb0
[   27.601245]  print_report+0xd1/0x610
[   27.601272]  ? __virt_addr_valid+0x1db/0x2d0
[   27.601298]  ? kasan_atomics_helper+0x1ce1/0x5450
[   27.601346]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.601373]  ? kasan_atomics_helper+0x1ce1/0x5450
[   27.601408]  kasan_report+0x141/0x180
[   27.601450]  ? kasan_atomics_helper+0x1ce1/0x5450
[   27.601478]  kasan_check_range+0x10c/0x1c0
[   27.601502]  __kasan_check_write+0x18/0x20
[   27.601526]  kasan_atomics_helper+0x1ce1/0x5450
[   27.601550]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.601576]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.601603]  ? kasan_atomics+0x152/0x310
[   27.601629]  kasan_atomics+0x1dc/0x310
[   27.601652]  ? __pfx_kasan_atomics+0x10/0x10
[   27.601677]  ? __pfx_read_tsc+0x10/0x10
[   27.601701]  ? ktime_get_ts64+0x86/0x230
[   27.601757]  kunit_try_run_case+0x1a5/0x480
[   27.601780]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.601802]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.601827]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.601852]  ? __kthread_parkme+0x82/0x180
[   27.601875]  ? preempt_count_sub+0x50/0x80
[   27.601900]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.601923]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.601948]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.601975]  kthread+0x337/0x6f0
[   27.601998]  ? trace_preempt_on+0x20/0xc0
[   27.602022]  ? __pfx_kthread+0x10/0x10
[   27.602045]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.602068]  ? calculate_sigpending+0x7b/0xa0
[   27.602094]  ? __pfx_kthread+0x10/0x10
[   27.602117]  ret_from_fork+0x116/0x1d0
[   27.602137]  ? __pfx_kthread+0x10/0x10
[   27.602160]  ret_from_fork_asm+0x1a/0x30
[   27.602193]  </TASK>
[   27.602205] 
[   27.611833] Allocated by task 315:
[   27.612018]  kasan_save_stack+0x45/0x70
[   27.612203]  kasan_save_track+0x18/0x40
[   27.612376]  kasan_save_alloc_info+0x3b/0x50
[   27.612816]  __kasan_kmalloc+0xb7/0xc0
[   27.613091]  __kmalloc_cache_noprof+0x189/0x420
[   27.613398]  kasan_atomics+0x95/0x310
[   27.613758]  kunit_try_run_case+0x1a5/0x480
[   27.614060]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.614313]  kthread+0x337/0x6f0
[   27.614740]  ret_from_fork+0x116/0x1d0
[   27.614951]  ret_from_fork_asm+0x1a/0x30
[   27.615245] 
[   27.615344] The buggy address belongs to the object at ffff88810613ea80
[   27.615344]  which belongs to the cache kmalloc-64 of size 64
[   27.615962] The buggy address is located 0 bytes to the right of
[   27.615962]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.616813] 
[   27.616927] The buggy address belongs to the physical page:
[   27.617296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.617784] flags: 0x200000000000000(node=0|zone=2)
[   27.618113] page_type: f5(slab)
[   27.618515] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.618863] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.619167] page dumped because: kasan: bad access detected
[   27.619388] 
[   27.619664] Memory state around the buggy address:
[   27.619986]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.620629]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.621111] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.621693]                                      ^
[   27.621906]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.622127]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.622343] ==================================================================
[   27.772661] ==================================================================
[   27.772948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   27.773348] Read of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315
[   27.773646] 
[   27.773782] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   27.773836] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.773860] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.773895] Call Trace:
[   27.773917]  <TASK>
[   27.774234]  dump_stack_lvl+0x73/0xb0
[   27.774267]  print_report+0xd1/0x610
[   27.774291]  ? __virt_addr_valid+0x1db/0x2d0
[   27.774316]  ? kasan_atomics_helper+0x4f98/0x5450
[   27.774339]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.774366]  ? kasan_atomics_helper+0x4f98/0x5450
[   27.774388]  kasan_report+0x141/0x180
[   27.774411]  ? kasan_atomics_helper+0x4f98/0x5450
[   27.774438]  __asan_report_load8_noabort+0x18/0x20
[   27.774463]  kasan_atomics_helper+0x4f98/0x5450
[   27.774486]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.774513]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.774540]  ? kasan_atomics+0x152/0x310
[   27.774568]  kasan_atomics+0x1dc/0x310
[   27.774592]  ? __pfx_kasan_atomics+0x10/0x10
[   27.774627]  ? __pfx_read_tsc+0x10/0x10
[   27.774651]  ? ktime_get_ts64+0x86/0x230
[   27.774677]  kunit_try_run_case+0x1a5/0x480
[   27.774701]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.774723]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.774775]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.774801]  ? __kthread_parkme+0x82/0x180
[   27.774824]  ? preempt_count_sub+0x50/0x80
[   27.774849]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.774873]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.774899]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.774926]  kthread+0x337/0x6f0
[   27.774948]  ? trace_preempt_on+0x20/0xc0
[   27.774972]  ? __pfx_kthread+0x10/0x10
[   27.774995]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.775018]  ? calculate_sigpending+0x7b/0xa0
[   27.775044]  ? __pfx_kthread+0x10/0x10
[   27.775068]  ret_from_fork+0x116/0x1d0
[   27.775088]  ? __pfx_kthread+0x10/0x10
[   27.775110]  ret_from_fork_asm+0x1a/0x30
[   27.775143]  </TASK>
[   27.775155] 
[   27.782677] Allocated by task 315:
[   27.782811]  kasan_save_stack+0x45/0x70
[   27.783025]  kasan_save_track+0x18/0x40
[   27.783226]  kasan_save_alloc_info+0x3b/0x50
[   27.783404]  __kasan_kmalloc+0xb7/0xc0
[   27.783590]  __kmalloc_cache_noprof+0x189/0x420
[   27.783807]  kasan_atomics+0x95/0x310
[   27.783999]  kunit_try_run_case+0x1a5/0x480
[   27.784200]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.784467]  kthread+0x337/0x6f0
[   27.784634]  ret_from_fork+0x116/0x1d0
[   27.784794]  ret_from_fork_asm+0x1a/0x30
[   27.784964] 
[   27.785068] The buggy address belongs to the object at ffff88810613ea80
[   27.785068]  which belongs to the cache kmalloc-64 of size 64
[   27.785675] The buggy address is located 0 bytes to the right of
[   27.785675]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.786092] 
[   27.786160] The buggy address belongs to the physical page:
[   27.786327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.786560] flags: 0x200000000000000(node=0|zone=2)
[   27.786944] page_type: f5(slab)
[   27.787273] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.787632] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.788134] page dumped because: kasan: bad access detected
[   27.788305] 
[   27.788373] Memory state around the buggy address:
[   27.788986]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.789253]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.790128] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.790582]                                      ^
[   27.790818]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.791086]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.791315] ==================================================================
[   27.809507] ==================================================================
[   27.809877] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   27.810214] Read of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315
[   27.810911] 
[   27.811021] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   27.811091] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.811105] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.811147] Call Trace:
[   27.811166]  <TASK>
[   27.811184]  dump_stack_lvl+0x73/0xb0
[   27.811216]  print_report+0xd1/0x610
[   27.811239]  ? __virt_addr_valid+0x1db/0x2d0
[   27.811264]  ? kasan_atomics_helper+0x4fb2/0x5450
[   27.811287]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.811314]  ? kasan_atomics_helper+0x4fb2/0x5450
[   27.811337]  kasan_report+0x141/0x180
[   27.811359]  ? kasan_atomics_helper+0x4fb2/0x5450
[   27.811387]  __asan_report_load8_noabort+0x18/0x20
[   27.811413]  kasan_atomics_helper+0x4fb2/0x5450
[   27.811435]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.811462]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.811508]  ? kasan_atomics+0x152/0x310
[   27.811535]  kasan_atomics+0x1dc/0x310
[   27.811570]  ? __pfx_kasan_atomics+0x10/0x10
[   27.811595]  ? __pfx_read_tsc+0x10/0x10
[   27.811618]  ? ktime_get_ts64+0x86/0x230
[   27.811644]  kunit_try_run_case+0x1a5/0x480
[   27.811667]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.811689]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.811715]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.811751]  ? __kthread_parkme+0x82/0x180
[   27.811774]  ? preempt_count_sub+0x50/0x80
[   27.811799]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.811822]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.811848]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.811875]  kthread+0x337/0x6f0
[   27.811897]  ? trace_preempt_on+0x20/0xc0
[   27.811922]  ? __pfx_kthread+0x10/0x10
[   27.811945]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.811968]  ? calculate_sigpending+0x7b/0xa0
[   27.812003]  ? __pfx_kthread+0x10/0x10
[   27.812027]  ret_from_fork+0x116/0x1d0
[   27.812048]  ? __pfx_kthread+0x10/0x10
[   27.812081]  ret_from_fork_asm+0x1a/0x30
[   27.812112]  </TASK>
[   27.812125] 
[   27.819777] Allocated by task 315:
[   27.819985]  kasan_save_stack+0x45/0x70
[   27.820171]  kasan_save_track+0x18/0x40
[   27.820369]  kasan_save_alloc_info+0x3b/0x50
[   27.820650]  __kasan_kmalloc+0xb7/0xc0
[   27.820822]  __kmalloc_cache_noprof+0x189/0x420
[   27.820972]  kasan_atomics+0x95/0x310
[   27.821100]  kunit_try_run_case+0x1a5/0x480
[   27.821239]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.821410]  kthread+0x337/0x6f0
[   27.821526]  ret_from_fork+0x116/0x1d0
[   27.821654]  ret_from_fork_asm+0x1a/0x30
[   27.821798] 
[   27.821863] The buggy address belongs to the object at ffff88810613ea80
[   27.821863]  which belongs to the cache kmalloc-64 of size 64
[   27.822742] The buggy address is located 0 bytes to the right of
[   27.822742]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.823288] 
[   27.823380] The buggy address belongs to the physical page:
[   27.823626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.823927] flags: 0x200000000000000(node=0|zone=2)
[   27.824086] page_type: f5(slab)
[   27.824202] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.824432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.824651] page dumped because: kasan: bad access detected
[   27.824910] 
[   27.825001] Memory state around the buggy address:
[   27.825226]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.825590]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.826081] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.826539]                                      ^
[   27.826885]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.827362]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.827708] ==================================================================
[   26.867040] ==================================================================
[   26.867605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   26.868004] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315
[   26.868404] 
[   26.868542] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.868609] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.868624] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.868648] Call Trace:
[   26.868673]  <TASK>
[   26.868695]  dump_stack_lvl+0x73/0xb0
[   26.868756]  print_report+0xd1/0x610
[   26.868781]  ? __virt_addr_valid+0x1db/0x2d0
[   26.868807]  ? kasan_atomics_helper+0xf10/0x5450
[   26.868829]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.868857]  ? kasan_atomics_helper+0xf10/0x5450
[   26.868880]  kasan_report+0x141/0x180
[   26.868903]  ? kasan_atomics_helper+0xf10/0x5450
[   26.868930]  kasan_check_range+0x10c/0x1c0
[   26.868954]  __kasan_check_write+0x18/0x20
[   26.868979]  kasan_atomics_helper+0xf10/0x5450
[   26.869002]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.869029]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.869056]  ? kasan_atomics+0x152/0x310
[   26.869083]  kasan_atomics+0x1dc/0x310
[   26.869117]  ? __pfx_kasan_atomics+0x10/0x10
[   26.869142]  ? __pfx_read_tsc+0x10/0x10
[   26.869175]  ? ktime_get_ts64+0x86/0x230
[   26.869203]  kunit_try_run_case+0x1a5/0x480
[   26.869227]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.869249]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.869275]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.869301]  ? __kthread_parkme+0x82/0x180
[   26.869324]  ? preempt_count_sub+0x50/0x80
[   26.869349]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.869373]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.869417]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.869444]  kthread+0x337/0x6f0
[   26.869467]  ? trace_preempt_on+0x20/0xc0
[   26.869492]  ? __pfx_kthread+0x10/0x10
[   26.869516]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.869540]  ? calculate_sigpending+0x7b/0xa0
[   26.869567]  ? __pfx_kthread+0x10/0x10
[   26.869649]  ret_from_fork+0x116/0x1d0
[   26.869685]  ? __pfx_kthread+0x10/0x10
[   26.869710]  ret_from_fork_asm+0x1a/0x30
[   26.869752]  </TASK>
[   26.869766] 
[   26.878106] Allocated by task 315:
[   26.878339]  kasan_save_stack+0x45/0x70
[   26.878777]  kasan_save_track+0x18/0x40
[   26.878953]  kasan_save_alloc_info+0x3b/0x50
[   26.879099]  __kasan_kmalloc+0xb7/0xc0
[   26.879226]  __kmalloc_cache_noprof+0x189/0x420
[   26.879417]  kasan_atomics+0x95/0x310
[   26.879596]  kunit_try_run_case+0x1a5/0x480
[   26.879855]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.880262]  kthread+0x337/0x6f0
[   26.880505]  ret_from_fork+0x116/0x1d0
[   26.880641]  ret_from_fork_asm+0x1a/0x30
[   26.880789] 
[   26.880858] The buggy address belongs to the object at ffff88810613ea80
[   26.880858]  which belongs to the cache kmalloc-64 of size 64
[   26.881309] The buggy address is located 0 bytes to the right of
[   26.881309]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   26.881950] 
[   26.882047] The buggy address belongs to the physical page:
[   26.882455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   26.882921] flags: 0x200000000000000(node=0|zone=2)
[   26.883158] page_type: f5(slab)
[   26.883426] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.883750] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.884056] page dumped because: kasan: bad access detected
[   26.884373] 
[   26.884500] Memory state around the buggy address:
[   26.884701]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.885007]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.885217] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.885821]                                      ^
[   26.886128]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.886543]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.886841] ==================================================================
[   27.882094] ==================================================================
[   27.882496] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   27.882862] Read of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315
[   27.883153] 
[   27.883273] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   27.883337] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.883351] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.883375] Call Trace:
[   27.883393]  <TASK>
[   27.883433]  dump_stack_lvl+0x73/0xb0
[   27.883474]  print_report+0xd1/0x610
[   27.883497]  ? __virt_addr_valid+0x1db/0x2d0
[   27.883523]  ? kasan_atomics_helper+0x5115/0x5450
[   27.883557]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.883584]  ? kasan_atomics_helper+0x5115/0x5450
[   27.883607]  kasan_report+0x141/0x180
[   27.883639]  ? kasan_atomics_helper+0x5115/0x5450
[   27.883666]  __asan_report_load8_noabort+0x18/0x20
[   27.883691]  kasan_atomics_helper+0x5115/0x5450
[   27.883726]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.883761]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.883787]  ? kasan_atomics+0x152/0x310
[   27.883813]  kasan_atomics+0x1dc/0x310
[   27.883837]  ? __pfx_kasan_atomics+0x10/0x10
[   27.883863]  ? __pfx_read_tsc+0x10/0x10
[   27.883886]  ? ktime_get_ts64+0x86/0x230
[   27.883913]  kunit_try_run_case+0x1a5/0x480
[   27.883937]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.883959]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.883985]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.884010]  ? __kthread_parkme+0x82/0x180
[   27.884033]  ? preempt_count_sub+0x50/0x80
[   27.884059]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.884092]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.884118]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.884145]  kthread+0x337/0x6f0
[   27.884178]  ? trace_preempt_on+0x20/0xc0
[   27.884204]  ? __pfx_kthread+0x10/0x10
[   27.884227]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.884250]  ? calculate_sigpending+0x7b/0xa0
[   27.884277]  ? __pfx_kthread+0x10/0x10
[   27.884301]  ret_from_fork+0x116/0x1d0
[   27.884328]  ? __pfx_kthread+0x10/0x10
[   27.884351]  ret_from_fork_asm+0x1a/0x30
[   27.884383]  </TASK>
[   27.884395] 
[   27.891697] Allocated by task 315:
[   27.891836]  kasan_save_stack+0x45/0x70
[   27.891975]  kasan_save_track+0x18/0x40
[   27.892157]  kasan_save_alloc_info+0x3b/0x50
[   27.892376]  __kasan_kmalloc+0xb7/0xc0
[   27.892791]  __kmalloc_cache_noprof+0x189/0x420
[   27.893026]  kasan_atomics+0x95/0x310
[   27.893155]  kunit_try_run_case+0x1a5/0x480
[   27.893296]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.893625]  kthread+0x337/0x6f0
[   27.893821]  ret_from_fork+0x116/0x1d0
[   27.893994]  ret_from_fork_asm+0x1a/0x30
[   27.894128] 
[   27.894194] The buggy address belongs to the object at ffff88810613ea80
[   27.894194]  which belongs to the cache kmalloc-64 of size 64
[   27.894898] The buggy address is located 0 bytes to the right of
[   27.894898]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.895515] 
[   27.895590] The buggy address belongs to the physical page:
[   27.895832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.896158] flags: 0x200000000000000(node=0|zone=2)
[   27.896397] page_type: f5(slab)
[   27.896574] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.896910] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.897226] page dumped because: kasan: bad access detected
[   27.897490] 
[   27.897582] Memory state around the buggy address:
[   27.897814]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.898113]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.898423] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.898715]                                      ^
[   27.898905]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.899116]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.899322] ==================================================================
[   26.554627] ==================================================================
[   26.554945] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   26.555286] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315
[   26.555588] 
[   26.555704] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.555813] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.555829] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.555856] Call Trace:
[   26.555877]  <TASK>
[   26.555898]  dump_stack_lvl+0x73/0xb0
[   26.555931]  print_report+0xd1/0x610
[   26.555956]  ? __virt_addr_valid+0x1db/0x2d0
[   26.555993]  ? kasan_atomics_helper+0x72f/0x5450
[   26.556015]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.556042]  ? kasan_atomics_helper+0x72f/0x5450
[   26.556065]  kasan_report+0x141/0x180
[   26.556088]  ? kasan_atomics_helper+0x72f/0x5450
[   26.556114]  kasan_check_range+0x10c/0x1c0
[   26.556139]  __kasan_check_write+0x18/0x20
[   26.556163]  kasan_atomics_helper+0x72f/0x5450
[   26.556185]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.556212]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.556238]  ? kasan_atomics+0x152/0x310
[   26.556265]  kasan_atomics+0x1dc/0x310
[   26.556289]  ? __pfx_kasan_atomics+0x10/0x10
[   26.556319]  ? __pfx_read_tsc+0x10/0x10
[   26.556342]  ? ktime_get_ts64+0x86/0x230
[   26.556369]  kunit_try_run_case+0x1a5/0x480
[   26.556392]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.556414]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.556439]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.556464]  ? __kthread_parkme+0x82/0x180
[   26.556486]  ? preempt_count_sub+0x50/0x80
[   26.556544]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.556592]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.556642]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.556692]  kthread+0x337/0x6f0
[   26.556714]  ? trace_preempt_on+0x20/0xc0
[   26.556776]  ? __pfx_kthread+0x10/0x10
[   26.556832]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.556856]  ? calculate_sigpending+0x7b/0xa0
[   26.556882]  ? __pfx_kthread+0x10/0x10
[   26.556915]  ret_from_fork+0x116/0x1d0
[   26.556935]  ? __pfx_kthread+0x10/0x10
[   26.556958]  ret_from_fork_asm+0x1a/0x30
[   26.556990]  </TASK>
[   26.557003] 
[   26.566474] Allocated by task 315:
[   26.566677]  kasan_save_stack+0x45/0x70
[   26.566937]  kasan_save_track+0x18/0x40
[   26.567106]  kasan_save_alloc_info+0x3b/0x50
[   26.567256]  __kasan_kmalloc+0xb7/0xc0
[   26.567474]  __kmalloc_cache_noprof+0x189/0x420
[   26.567729]  kasan_atomics+0x95/0x310
[   26.568002]  kunit_try_run_case+0x1a5/0x480
[   26.568271]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.568563]  kthread+0x337/0x6f0
[   26.568783]  ret_from_fork+0x116/0x1d0
[   26.569013]  ret_from_fork_asm+0x1a/0x30
[   26.569243] 
[   26.569355] The buggy address belongs to the object at ffff88810613ea80
[   26.569355]  which belongs to the cache kmalloc-64 of size 64
[   26.569998] The buggy address is located 0 bytes to the right of
[   26.569998]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   26.570555] 
[   26.570625] The buggy address belongs to the physical page:
[   26.570804] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   26.571255] flags: 0x200000000000000(node=0|zone=2)
[   26.571746] page_type: f5(slab)
[   26.571924] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.572165] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.572390] page dumped because: kasan: bad access detected
[   26.573005] 
[   26.573097] Memory state around the buggy address:
[   26.573319]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.573712]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.573927] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.574129]                                      ^
[   26.574279]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.574484]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.575101] ==================================================================
[   26.908261] ==================================================================
[   26.908946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   26.909261] Read of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315
[   26.910063] 
[   26.910179] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.910234] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.910248] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.910536] Call Trace:
[   26.910580]  <TASK>
[   26.910599]  dump_stack_lvl+0x73/0xb0
[   26.910639]  print_report+0xd1/0x610
[   26.910664]  ? __virt_addr_valid+0x1db/0x2d0
[   26.910691]  ? kasan_atomics_helper+0x4a36/0x5450
[   26.910714]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.910751]  ? kasan_atomics_helper+0x4a36/0x5450
[   26.910775]  kasan_report+0x141/0x180
[   26.910800]  ? kasan_atomics_helper+0x4a36/0x5450
[   26.910829]  __asan_report_load4_noabort+0x18/0x20
[   26.910856]  kasan_atomics_helper+0x4a36/0x5450
[   26.910880]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.910907]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.910933]  ? kasan_atomics+0x152/0x310
[   26.910960]  kasan_atomics+0x1dc/0x310
[   26.910984]  ? __pfx_kasan_atomics+0x10/0x10
[   26.911010]  ? __pfx_read_tsc+0x10/0x10
[   26.911035]  ? ktime_get_ts64+0x86/0x230
[   26.911062]  kunit_try_run_case+0x1a5/0x480
[   26.911087]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.911109]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.911135]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.911160]  ? __kthread_parkme+0x82/0x180
[   26.911183]  ? preempt_count_sub+0x50/0x80
[   26.911208]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.911232]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.911258]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.911526]  kthread+0x337/0x6f0
[   26.911568]  ? trace_preempt_on+0x20/0xc0
[   26.911594]  ? __pfx_kthread+0x10/0x10
[   26.911617]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.911644]  ? calculate_sigpending+0x7b/0xa0
[   26.911670]  ? __pfx_kthread+0x10/0x10
[   26.911694]  ret_from_fork+0x116/0x1d0
[   26.911715]  ? __pfx_kthread+0x10/0x10
[   26.911749]  ret_from_fork_asm+0x1a/0x30
[   26.911782]  </TASK>
[   26.911795] 
[   26.922490] Allocated by task 315:
[   26.922664]  kasan_save_stack+0x45/0x70
[   26.922865]  kasan_save_track+0x18/0x40
[   26.923038]  kasan_save_alloc_info+0x3b/0x50
[   26.923218]  __kasan_kmalloc+0xb7/0xc0
[   26.923691]  __kmalloc_cache_noprof+0x189/0x420
[   26.923922]  kasan_atomics+0x95/0x310
[   26.924091]  kunit_try_run_case+0x1a5/0x480
[   26.924340]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.924781]  kthread+0x337/0x6f0
[   26.924936]  ret_from_fork+0x116/0x1d0
[   26.925104]  ret_from_fork_asm+0x1a/0x30
[   26.925325] 
[   26.925424] The buggy address belongs to the object at ffff88810613ea80
[   26.925424]  which belongs to the cache kmalloc-64 of size 64
[   26.925905] The buggy address is located 0 bytes to the right of
[   26.925905]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   26.926491] 
[   26.926583] The buggy address belongs to the physical page:
[   26.926818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   26.927141] flags: 0x200000000000000(node=0|zone=2)
[   26.928541] page_type: f5(slab)
[   26.928687] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.928935] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.929237] page dumped because: kasan: bad access detected
[   26.930217] 
[   26.930518] Memory state around the buggy address:
[   26.930759]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.931046]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.931600] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.932024]                                      ^
[   26.932228]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.932772]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.933073] ==================================================================
[   26.426761] ==================================================================
[   26.427086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   26.427415] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315
[   26.428245] 
[   26.428419] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.428474] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.428575] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.428600] Call Trace:
[   26.428682]  <TASK>
[   26.428706]  dump_stack_lvl+0x73/0xb0
[   26.428755]  print_report+0xd1/0x610
[   26.428781]  ? __virt_addr_valid+0x1db/0x2d0
[   26.428806]  ? kasan_atomics_helper+0x4a0/0x5450
[   26.428829]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.428857]  ? kasan_atomics_helper+0x4a0/0x5450
[   26.428878]  kasan_report+0x141/0x180
[   26.428902]  ? kasan_atomics_helper+0x4a0/0x5450
[   26.428928]  kasan_check_range+0x10c/0x1c0
[   26.428952]  __kasan_check_write+0x18/0x20
[   26.428976]  kasan_atomics_helper+0x4a0/0x5450
[   26.428999]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.429025]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.429052]  ? kasan_atomics+0x152/0x310
[   26.429079]  kasan_atomics+0x1dc/0x310
[   26.429102]  ? __pfx_kasan_atomics+0x10/0x10
[   26.429127]  ? __pfx_read_tsc+0x10/0x10
[   26.429151]  ? ktime_get_ts64+0x86/0x230
[   26.429177]  kunit_try_run_case+0x1a5/0x480
[   26.429202]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.429224]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.429249]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.429329]  ? __kthread_parkme+0x82/0x180
[   26.429354]  ? preempt_count_sub+0x50/0x80
[   26.429380]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.429402]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.429429]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.429455]  kthread+0x337/0x6f0
[   26.429478]  ? trace_preempt_on+0x20/0xc0
[   26.429503]  ? __pfx_kthread+0x10/0x10
[   26.429526]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.429550]  ? calculate_sigpending+0x7b/0xa0
[   26.429576]  ? __pfx_kthread+0x10/0x10
[   26.429600]  ret_from_fork+0x116/0x1d0
[   26.429621]  ? __pfx_kthread+0x10/0x10
[   26.429644]  ret_from_fork_asm+0x1a/0x30
[   26.429676]  </TASK>
[   26.429689] 
[   26.440522] Allocated by task 315:
[   26.440711]  kasan_save_stack+0x45/0x70
[   26.440910]  kasan_save_track+0x18/0x40
[   26.441073]  kasan_save_alloc_info+0x3b/0x50
[   26.441696]  __kasan_kmalloc+0xb7/0xc0
[   26.441898]  __kmalloc_cache_noprof+0x189/0x420
[   26.442068]  kasan_atomics+0x95/0x310
[   26.442258]  kunit_try_run_case+0x1a5/0x480
[   26.442427]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.442856]  kthread+0x337/0x6f0
[   26.443026]  ret_from_fork+0x116/0x1d0
[   26.443190]  ret_from_fork_asm+0x1a/0x30
[   26.443379] 
[   26.443904] The buggy address belongs to the object at ffff88810613ea80
[   26.443904]  which belongs to the cache kmalloc-64 of size 64
[   26.444361] The buggy address is located 0 bytes to the right of
[   26.444361]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   26.444953] 
[   26.445044] The buggy address belongs to the physical page:
[   26.445636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   26.445976] flags: 0x200000000000000(node=0|zone=2)
[   26.446271] page_type: f5(slab)
[   26.446578] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.446888] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.447212] page dumped because: kasan: bad access detected
[   26.447872] 
[   26.447961] Memory state around the buggy address:
[   26.448186]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.448673]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.449006] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.449563]                                      ^
[   26.449729]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.450986]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.451739] ==================================================================
[   27.114446] ==================================================================
[   27.114749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   27.115008] Read of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315
[   27.115802] 
[   27.115930] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   27.115986] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.116069] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.116096] Call Trace:
[   27.116120]  <TASK>
[   27.116140]  dump_stack_lvl+0x73/0xb0
[   27.116298]  print_report+0xd1/0x610
[   27.116329]  ? __virt_addr_valid+0x1db/0x2d0
[   27.116356]  ? kasan_atomics_helper+0x49ce/0x5450
[   27.116381]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.116416]  ? kasan_atomics_helper+0x49ce/0x5450
[   27.116439]  kasan_report+0x141/0x180
[   27.116462]  ? kasan_atomics_helper+0x49ce/0x5450
[   27.116490]  __asan_report_load4_noabort+0x18/0x20
[   27.116515]  kasan_atomics_helper+0x49ce/0x5450
[   27.116539]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.116565]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.116592]  ? kasan_atomics+0x152/0x310
[   27.116618]  kasan_atomics+0x1dc/0x310
[   27.116642]  ? __pfx_kasan_atomics+0x10/0x10
[   27.116667]  ? __pfx_read_tsc+0x10/0x10
[   27.116691]  ? ktime_get_ts64+0x86/0x230
[   27.116718]  kunit_try_run_case+0x1a5/0x480
[   27.116754]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.116776]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.116802]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.116827]  ? __kthread_parkme+0x82/0x180
[   27.116849]  ? preempt_count_sub+0x50/0x80
[   27.116874]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.116898]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.116924]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.116950]  kthread+0x337/0x6f0
[   27.116974]  ? trace_preempt_on+0x20/0xc0
[   27.116999]  ? __pfx_kthread+0x10/0x10
[   27.117022]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.117045]  ? calculate_sigpending+0x7b/0xa0
[   27.117072]  ? __pfx_kthread+0x10/0x10
[   27.117096]  ret_from_fork+0x116/0x1d0
[   27.117117]  ? __pfx_kthread+0x10/0x10
[   27.117140]  ret_from_fork_asm+0x1a/0x30
[   27.117173]  </TASK>
[   27.117187] 
[   27.127742] Allocated by task 315:
[   27.127930]  kasan_save_stack+0x45/0x70
[   27.128087]  kasan_save_track+0x18/0x40
[   27.128277]  kasan_save_alloc_info+0x3b/0x50
[   27.128704]  __kasan_kmalloc+0xb7/0xc0
[   27.128904]  __kmalloc_cache_noprof+0x189/0x420
[   27.129168]  kasan_atomics+0x95/0x310
[   27.129389]  kunit_try_run_case+0x1a5/0x480
[   27.129821]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.130145]  kthread+0x337/0x6f0
[   27.130283]  ret_from_fork+0x116/0x1d0
[   27.130653]  ret_from_fork_asm+0x1a/0x30
[   27.131118] 
[   27.131197] The buggy address belongs to the object at ffff88810613ea80
[   27.131197]  which belongs to the cache kmalloc-64 of size 64
[   27.131949] The buggy address is located 0 bytes to the right of
[   27.131949]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.132713] 
[   27.132921] The buggy address belongs to the physical page:
[   27.133252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.133681] flags: 0x200000000000000(node=0|zone=2)
[   27.133920] page_type: f5(slab)
[   27.134080] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.134688] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.134993] page dumped because: kasan: bad access detected
[   27.135659] 
[   27.135775] Memory state around the buggy address:
[   27.135966]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.136586]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.136990] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.137401]                                      ^
[   27.137749]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.138117]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.138627] ==================================================================
[   27.164077] ==================================================================
[   27.164335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   27.164942] Read of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315
[   27.165250] 
[   27.165423] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   27.165546] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.165617] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.165642] Call Trace:
[   27.165665]  <TASK>
[   27.165685]  dump_stack_lvl+0x73/0xb0
[   27.165719]  print_report+0xd1/0x610
[   27.165755]  ? __virt_addr_valid+0x1db/0x2d0
[   27.165780]  ? kasan_atomics_helper+0x4eae/0x5450
[   27.165803]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.165830]  ? kasan_atomics_helper+0x4eae/0x5450
[   27.165956]  kasan_report+0x141/0x180
[   27.165980]  ? kasan_atomics_helper+0x4eae/0x5450
[   27.166007]  __asan_report_load8_noabort+0x18/0x20
[   27.166032]  kasan_atomics_helper+0x4eae/0x5450
[   27.166054]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.166081]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.166107]  ? kasan_atomics+0x152/0x310
[   27.166135]  kasan_atomics+0x1dc/0x310
[   27.166158]  ? __pfx_kasan_atomics+0x10/0x10
[   27.166183]  ? __pfx_read_tsc+0x10/0x10
[   27.166206]  ? ktime_get_ts64+0x86/0x230
[   27.166232]  kunit_try_run_case+0x1a5/0x480
[   27.166257]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.166292]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.166319]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.166343]  ? __kthread_parkme+0x82/0x180
[   27.166366]  ? preempt_count_sub+0x50/0x80
[   27.166392]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.166421]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.166448]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.166475]  kthread+0x337/0x6f0
[   27.166497]  ? trace_preempt_on+0x20/0xc0
[   27.166522]  ? __pfx_kthread+0x10/0x10
[   27.166545]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.166568]  ? calculate_sigpending+0x7b/0xa0
[   27.166595]  ? __pfx_kthread+0x10/0x10
[   27.166618]  ret_from_fork+0x116/0x1d0
[   27.166639]  ? __pfx_kthread+0x10/0x10
[   27.166662]  ret_from_fork_asm+0x1a/0x30
[   27.166693]  </TASK>
[   27.166706] 
[   27.176550] Allocated by task 315:
[   27.176817]  kasan_save_stack+0x45/0x70
[   27.177321]  kasan_save_track+0x18/0x40
[   27.177539]  kasan_save_alloc_info+0x3b/0x50
[   27.177741]  __kasan_kmalloc+0xb7/0xc0
[   27.177908]  __kmalloc_cache_noprof+0x189/0x420
[   27.178111]  kasan_atomics+0x95/0x310
[   27.178587]  kunit_try_run_case+0x1a5/0x480
[   27.178795]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.179008]  kthread+0x337/0x6f0
[   27.179239]  ret_from_fork+0x116/0x1d0
[   27.179498]  ret_from_fork_asm+0x1a/0x30
[   27.179821] 
[   27.179924] The buggy address belongs to the object at ffff88810613ea80
[   27.179924]  which belongs to the cache kmalloc-64 of size 64
[   27.180409] The buggy address is located 0 bytes to the right of
[   27.180409]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.181196] 
[   27.181369] The buggy address belongs to the physical page:
[   27.181555] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.181910] flags: 0x200000000000000(node=0|zone=2)
[   27.182385] page_type: f5(slab)
[   27.182585] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.183278] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.183663] page dumped because: kasan: bad access detected
[   27.183903] 
[   27.183974] Memory state around the buggy address:
[   27.184175]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.184508]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.185101] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.185541]                                      ^
[   27.185844]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.186229]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.186705] ==================================================================
[   27.863877] ==================================================================
[   27.864107] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   27.864407] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315
[   27.864978] 
[   27.865091] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   27.865153] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.865167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.865191] Call Trace:
[   27.865210]  <TASK>
[   27.865238]  dump_stack_lvl+0x73/0xb0
[   27.865269]  print_report+0xd1/0x610
[   27.865292]  ? __virt_addr_valid+0x1db/0x2d0
[   27.865318]  ? kasan_atomics_helper+0x224c/0x5450
[   27.865340]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.865368]  ? kasan_atomics_helper+0x224c/0x5450
[   27.865390]  kasan_report+0x141/0x180
[   27.865413]  ? kasan_atomics_helper+0x224c/0x5450
[   27.865440]  kasan_check_range+0x10c/0x1c0
[   27.865464]  __kasan_check_write+0x18/0x20
[   27.865488]  kasan_atomics_helper+0x224c/0x5450
[   27.865512]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.865539]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.865565]  ? kasan_atomics+0x152/0x310
[   27.865592]  kasan_atomics+0x1dc/0x310
[   27.865616]  ? __pfx_kasan_atomics+0x10/0x10
[   27.865641]  ? __pfx_read_tsc+0x10/0x10
[   27.865665]  ? ktime_get_ts64+0x86/0x230
[   27.865691]  kunit_try_run_case+0x1a5/0x480
[   27.865714]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.865747]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.865773]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.865798]  ? __kthread_parkme+0x82/0x180
[   27.865821]  ? preempt_count_sub+0x50/0x80
[   27.865847]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.865870]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.865896]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.865924]  kthread+0x337/0x6f0
[   27.865947]  ? trace_preempt_on+0x20/0xc0
[   27.865972]  ? __pfx_kthread+0x10/0x10
[   27.865995]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.866018]  ? calculate_sigpending+0x7b/0xa0
[   27.866044]  ? __pfx_kthread+0x10/0x10
[   27.866068]  ret_from_fork+0x116/0x1d0
[   27.866089]  ? __pfx_kthread+0x10/0x10
[   27.866112]  ret_from_fork_asm+0x1a/0x30
[   27.866144]  </TASK>
[   27.866156] 
[   27.874187] Allocated by task 315:
[   27.874401]  kasan_save_stack+0x45/0x70
[   27.874636]  kasan_save_track+0x18/0x40
[   27.874855]  kasan_save_alloc_info+0x3b/0x50
[   27.875037]  __kasan_kmalloc+0xb7/0xc0
[   27.875213]  __kmalloc_cache_noprof+0x189/0x420
[   27.875476]  kasan_atomics+0x95/0x310
[   27.875638]  kunit_try_run_case+0x1a5/0x480
[   27.875788]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.875959]  kthread+0x337/0x6f0
[   27.876076]  ret_from_fork+0x116/0x1d0
[   27.876204]  ret_from_fork_asm+0x1a/0x30
[   27.876346] 
[   27.876413] The buggy address belongs to the object at ffff88810613ea80
[   27.876413]  which belongs to the cache kmalloc-64 of size 64
[   27.876937] The buggy address is located 0 bytes to the right of
[   27.876937]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.877625] 
[   27.877694] The buggy address belongs to the physical page:
[   27.877962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.878271] flags: 0x200000000000000(node=0|zone=2)
[   27.878482] page_type: f5(slab)
[   27.878646] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.878953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.879174] page dumped because: kasan: bad access detected
[   27.879375] 
[   27.879549] Memory state around the buggy address:
[   27.879802]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.880116]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.880421] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.880717]                                      ^
[   27.880948]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.881246]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.881595] ==================================================================
[   27.846171] ==================================================================
[   27.846614] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   27.846938] Read of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315
[   27.847234] 
[   27.847362] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   27.847421] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.847435] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.847459] Call Trace:
[   27.847477]  <TASK>
[   27.847504]  dump_stack_lvl+0x73/0xb0
[   27.847535]  print_report+0xd1/0x610
[   27.847558]  ? __virt_addr_valid+0x1db/0x2d0
[   27.847596]  ? kasan_atomics_helper+0x4fa5/0x5450
[   27.847618]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.847645]  ? kasan_atomics_helper+0x4fa5/0x5450
[   27.847675]  kasan_report+0x141/0x180
[   27.847699]  ? kasan_atomics_helper+0x4fa5/0x5450
[   27.847726]  __asan_report_load8_noabort+0x18/0x20
[   27.847767]  kasan_atomics_helper+0x4fa5/0x5450
[   27.847791]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.847818]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.847852]  ? kasan_atomics+0x152/0x310
[   27.847879]  kasan_atomics+0x1dc/0x310
[   27.847902]  ? __pfx_kasan_atomics+0x10/0x10
[   27.847938]  ? __pfx_read_tsc+0x10/0x10
[   27.847961]  ? ktime_get_ts64+0x86/0x230
[   27.847987]  kunit_try_run_case+0x1a5/0x480
[   27.848019]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.848041]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.848066]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.848102]  ? __kthread_parkme+0x82/0x180
[   27.848124]  ? preempt_count_sub+0x50/0x80
[   27.848150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.848182]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.848208]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.848245]  kthread+0x337/0x6f0
[   27.848268]  ? trace_preempt_on+0x20/0xc0
[   27.848293]  ? __pfx_kthread+0x10/0x10
[   27.848331]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.848355]  ? calculate_sigpending+0x7b/0xa0
[   27.848380]  ? __pfx_kthread+0x10/0x10
[   27.848426]  ret_from_fork+0x116/0x1d0
[   27.848447]  ? __pfx_kthread+0x10/0x10
[   27.848481]  ret_from_fork_asm+0x1a/0x30
[   27.848513]  </TASK>
[   27.848525] 
[   27.856229] Allocated by task 315:
[   27.856424]  kasan_save_stack+0x45/0x70
[   27.856596]  kasan_save_track+0x18/0x40
[   27.856798]  kasan_save_alloc_info+0x3b/0x50
[   27.856948]  __kasan_kmalloc+0xb7/0xc0
[   27.857144]  __kmalloc_cache_noprof+0x189/0x420
[   27.857360]  kasan_atomics+0x95/0x310
[   27.857583]  kunit_try_run_case+0x1a5/0x480
[   27.857766]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.857972]  kthread+0x337/0x6f0
[   27.858135]  ret_from_fork+0x116/0x1d0
[   27.858290]  ret_from_fork_asm+0x1a/0x30
[   27.858524] 
[   27.858602] The buggy address belongs to the object at ffff88810613ea80
[   27.858602]  which belongs to the cache kmalloc-64 of size 64
[   27.859104] The buggy address is located 0 bytes to the right of
[   27.859104]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.859571] 
[   27.859675] The buggy address belongs to the physical page:
[   27.859927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.860262] flags: 0x200000000000000(node=0|zone=2)
[   27.860556] page_type: f5(slab)
[   27.860718] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.861043] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.861342] page dumped because: kasan: bad access detected
[   27.861627] 
[   27.861710] Memory state around the buggy address:
[   27.861915]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.862192]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.862547] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.862821]                                      ^
[   27.863041]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.863253]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.863458] ==================================================================
[   27.792002] ==================================================================
[   27.792444] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   27.792769] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315
[   27.793057] 
[   27.793167] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   27.793229] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.793243] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.793279] Call Trace:
[   27.793297]  <TASK>
[   27.793315]  dump_stack_lvl+0x73/0xb0
[   27.793347]  print_report+0xd1/0x610
[   27.793371]  ? __virt_addr_valid+0x1db/0x2d0
[   27.793405]  ? kasan_atomics_helper+0x20c8/0x5450
[   27.793439]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.793476]  ? kasan_atomics_helper+0x20c8/0x5450
[   27.793499]  kasan_report+0x141/0x180
[   27.793523]  ? kasan_atomics_helper+0x20c8/0x5450
[   27.793551]  kasan_check_range+0x10c/0x1c0
[   27.793576]  __kasan_check_write+0x18/0x20
[   27.793608]  kasan_atomics_helper+0x20c8/0x5450
[   27.793633]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.793661]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.793697]  ? kasan_atomics+0x152/0x310
[   27.793724]  kasan_atomics+0x1dc/0x310
[   27.793757]  ? __pfx_kasan_atomics+0x10/0x10
[   27.793791]  ? __pfx_read_tsc+0x10/0x10
[   27.793814]  ? ktime_get_ts64+0x86/0x230
[   27.793840]  kunit_try_run_case+0x1a5/0x480
[   27.793874]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.793897]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.793923]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.793948]  ? __kthread_parkme+0x82/0x180
[   27.793970]  ? preempt_count_sub+0x50/0x80
[   27.793995]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.794019]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.794045]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.794071]  kthread+0x337/0x6f0
[   27.794094]  ? trace_preempt_on+0x20/0xc0
[   27.794119]  ? __pfx_kthread+0x10/0x10
[   27.794143]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.794166]  ? calculate_sigpending+0x7b/0xa0
[   27.794191]  ? __pfx_kthread+0x10/0x10
[   27.794215]  ret_from_fork+0x116/0x1d0
[   27.794235]  ? __pfx_kthread+0x10/0x10
[   27.794257]  ret_from_fork_asm+0x1a/0x30
[   27.794290]  </TASK>
[   27.794302] 
[   27.801764] Allocated by task 315:
[   27.801968]  kasan_save_stack+0x45/0x70
[   27.802131]  kasan_save_track+0x18/0x40
[   27.802312]  kasan_save_alloc_info+0x3b/0x50
[   27.802563]  __kasan_kmalloc+0xb7/0xc0
[   27.802759]  __kmalloc_cache_noprof+0x189/0x420
[   27.802958]  kasan_atomics+0x95/0x310
[   27.803146]  kunit_try_run_case+0x1a5/0x480
[   27.803333]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.803610]  kthread+0x337/0x6f0
[   27.803739]  ret_from_fork+0x116/0x1d0
[   27.803920]  ret_from_fork_asm+0x1a/0x30
[   27.804136] 
[   27.804233] The buggy address belongs to the object at ffff88810613ea80
[   27.804233]  which belongs to the cache kmalloc-64 of size 64
[   27.804761] The buggy address is located 0 bytes to the right of
[   27.804761]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.805305] 
[   27.805424] The buggy address belongs to the physical page:
[   27.805655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.806147] flags: 0x200000000000000(node=0|zone=2)
[   27.806386] page_type: f5(slab)
[   27.806550] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.806814] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.807039] page dumped because: kasan: bad access detected
[   27.807208] 
[   27.807279] Memory state around the buggy address:
[   27.807452]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.807773]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.808111] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.808432]                                      ^
[   27.808629]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.808848]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.809055] ==================================================================
[   26.845878] ==================================================================
[   26.846193] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   26.847856] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315
[   26.848208] 
[   26.848390] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.848455] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.848471] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.848497] Call Trace:
[   26.848518]  <TASK>
[   26.848537]  dump_stack_lvl+0x73/0xb0
[   26.848572]  print_report+0xd1/0x610
[   26.848595]  ? __virt_addr_valid+0x1db/0x2d0
[   26.848622]  ? kasan_atomics_helper+0xe78/0x5450
[   26.848644]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.848672]  ? kasan_atomics_helper+0xe78/0x5450
[   26.848695]  kasan_report+0x141/0x180
[   26.848719]  ? kasan_atomics_helper+0xe78/0x5450
[   26.848757]  kasan_check_range+0x10c/0x1c0
[   26.848782]  __kasan_check_write+0x18/0x20
[   26.848806]  kasan_atomics_helper+0xe78/0x5450
[   26.848830]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.848858]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.848884]  ? kasan_atomics+0x152/0x310
[   26.848910]  kasan_atomics+0x1dc/0x310
[   26.848934]  ? __pfx_kasan_atomics+0x10/0x10
[   26.848959]  ? __pfx_read_tsc+0x10/0x10
[   26.848983]  ? ktime_get_ts64+0x86/0x230
[   26.849009]  kunit_try_run_case+0x1a5/0x480
[   26.849033]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.849055]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.849081]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.849106]  ? __kthread_parkme+0x82/0x180
[   26.849128]  ? preempt_count_sub+0x50/0x80
[   26.849154]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.849177]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.849203]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.849230]  kthread+0x337/0x6f0
[   26.849252]  ? trace_preempt_on+0x20/0xc0
[   26.849320]  ? __pfx_kthread+0x10/0x10
[   26.849345]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.849368]  ? calculate_sigpending+0x7b/0xa0
[   26.849395]  ? __pfx_kthread+0x10/0x10
[   26.849419]  ret_from_fork+0x116/0x1d0
[   26.849440]  ? __pfx_kthread+0x10/0x10
[   26.849463]  ret_from_fork_asm+0x1a/0x30
[   26.849496]  </TASK>
[   26.849509] 
[   26.858256] Allocated by task 315:
[   26.858402]  kasan_save_stack+0x45/0x70
[   26.858554]  kasan_save_track+0x18/0x40
[   26.858776]  kasan_save_alloc_info+0x3b/0x50
[   26.858984]  __kasan_kmalloc+0xb7/0xc0
[   26.859168]  __kmalloc_cache_noprof+0x189/0x420
[   26.859429]  kasan_atomics+0x95/0x310
[   26.859729]  kunit_try_run_case+0x1a5/0x480
[   26.859883]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.860095]  kthread+0x337/0x6f0
[   26.860265]  ret_from_fork+0x116/0x1d0
[   26.860545]  ret_from_fork_asm+0x1a/0x30
[   26.860751] 
[   26.860835] The buggy address belongs to the object at ffff88810613ea80
[   26.860835]  which belongs to the cache kmalloc-64 of size 64
[   26.861185] The buggy address is located 0 bytes to the right of
[   26.861185]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   26.861589] 
[   26.861778] The buggy address belongs to the physical page:
[   26.862026] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   26.862372] flags: 0x200000000000000(node=0|zone=2)
[   26.862876] page_type: f5(slab)
[   26.863087] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.863518] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.863810] page dumped because: kasan: bad access detected
[   26.863979] 
[   26.864067] Memory state around the buggy address:
[   26.864285]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.864813]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.865033] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.865237]                                      ^
[   26.865384]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.865982]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.866345] ==================================================================
[   27.705570] ==================================================================
[   27.705923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   27.706679] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315
[   27.707373] 
[   27.707543] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   27.707595] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.707609] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.707633] Call Trace:
[   27.707652]  <TASK>
[   27.707670]  dump_stack_lvl+0x73/0xb0
[   27.707703]  print_report+0xd1/0x610
[   27.707750]  ? __virt_addr_valid+0x1db/0x2d0
[   27.707777]  ? kasan_atomics_helper+0x1f43/0x5450
[   27.707802]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.707829]  ? kasan_atomics_helper+0x1f43/0x5450
[   27.707871]  kasan_report+0x141/0x180
[   27.707894]  ? kasan_atomics_helper+0x1f43/0x5450
[   27.707922]  kasan_check_range+0x10c/0x1c0
[   27.707946]  __kasan_check_write+0x18/0x20
[   27.707970]  kasan_atomics_helper+0x1f43/0x5450
[   27.708004]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.708031]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.708056]  ? kasan_atomics+0x152/0x310
[   27.708103]  kasan_atomics+0x1dc/0x310
[   27.708127]  ? __pfx_kasan_atomics+0x10/0x10
[   27.708152]  ? __pfx_read_tsc+0x10/0x10
[   27.708184]  ? ktime_get_ts64+0x86/0x230
[   27.708211]  kunit_try_run_case+0x1a5/0x480
[   27.708234]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.708255]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.708281]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.708306]  ? __kthread_parkme+0x82/0x180
[   27.708336]  ? preempt_count_sub+0x50/0x80
[   27.708361]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.708385]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.708420]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.708447]  kthread+0x337/0x6f0
[   27.708469]  ? trace_preempt_on+0x20/0xc0
[   27.708494]  ? __pfx_kthread+0x10/0x10
[   27.708518]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.708540]  ? calculate_sigpending+0x7b/0xa0
[   27.708566]  ? __pfx_kthread+0x10/0x10
[   27.708590]  ret_from_fork+0x116/0x1d0
[   27.708610]  ? __pfx_kthread+0x10/0x10
[   27.708633]  ret_from_fork_asm+0x1a/0x30
[   27.708665]  </TASK>
[   27.708678] 
[   27.721094] Allocated by task 315:
[   27.721226]  kasan_save_stack+0x45/0x70
[   27.721364]  kasan_save_track+0x18/0x40
[   27.721706]  kasan_save_alloc_info+0x3b/0x50
[   27.722116]  __kasan_kmalloc+0xb7/0xc0
[   27.722459]  __kmalloc_cache_noprof+0x189/0x420
[   27.722931]  kasan_atomics+0x95/0x310
[   27.723276]  kunit_try_run_case+0x1a5/0x480
[   27.723703]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.724344]  kthread+0x337/0x6f0
[   27.724579]  ret_from_fork+0x116/0x1d0
[   27.724954]  ret_from_fork_asm+0x1a/0x30
[   27.725145] 
[   27.725320] The buggy address belongs to the object at ffff88810613ea80
[   27.725320]  which belongs to the cache kmalloc-64 of size 64
[   27.725912] The buggy address is located 0 bytes to the right of
[   27.725912]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.726263] 
[   27.726329] The buggy address belongs to the physical page:
[   27.726505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.726941] flags: 0x200000000000000(node=0|zone=2)
[   27.727561] page_type: f5(slab)
[   27.727878] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.728199] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.728438] page dumped because: kasan: bad access detected
[   27.728956] 
[   27.729110] Memory state around the buggy address:
[   27.729619]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.730290]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.730761] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.730962]                                      ^
[   27.731106]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.731307]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.731560] ==================================================================
[   27.677495] ==================================================================
[   27.678353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   27.678720] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315
[   27.678947] 
[   27.679029] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   27.679081] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.679095] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.679120] Call Trace:
[   27.679139]  <TASK>
[   27.679157]  dump_stack_lvl+0x73/0xb0
[   27.679188]  print_report+0xd1/0x610
[   27.679212]  ? __virt_addr_valid+0x1db/0x2d0
[   27.679238]  ? kasan_atomics_helper+0x1eaa/0x5450
[   27.679261]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.679289]  ? kasan_atomics_helper+0x1eaa/0x5450
[   27.679312]  kasan_report+0x141/0x180
[   27.679335]  ? kasan_atomics_helper+0x1eaa/0x5450
[   27.679362]  kasan_check_range+0x10c/0x1c0
[   27.679387]  __kasan_check_write+0x18/0x20
[   27.679424]  kasan_atomics_helper+0x1eaa/0x5450
[   27.679448]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.679475]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.679501]  ? kasan_atomics+0x152/0x310
[   27.679528]  kasan_atomics+0x1dc/0x310
[   27.679551]  ? __pfx_kasan_atomics+0x10/0x10
[   27.679575]  ? __pfx_read_tsc+0x10/0x10
[   27.679599]  ? ktime_get_ts64+0x86/0x230
[   27.679635]  kunit_try_run_case+0x1a5/0x480
[   27.679659]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.679680]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.679717]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.679750]  ? __kthread_parkme+0x82/0x180
[   27.679772]  ? preempt_count_sub+0x50/0x80
[   27.679798]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.679820]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.679848]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.679875]  kthread+0x337/0x6f0
[   27.679897]  ? trace_preempt_on+0x20/0xc0
[   27.679921]  ? __pfx_kthread+0x10/0x10
[   27.679945]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.679977]  ? calculate_sigpending+0x7b/0xa0
[   27.680002]  ? __pfx_kthread+0x10/0x10
[   27.680026]  ret_from_fork+0x116/0x1d0
[   27.680057]  ? __pfx_kthread+0x10/0x10
[   27.680087]  ret_from_fork_asm+0x1a/0x30
[   27.680120]  </TASK>
[   27.680131] 
[   27.693268] Allocated by task 315:
[   27.693693]  kasan_save_stack+0x45/0x70
[   27.694061]  kasan_save_track+0x18/0x40
[   27.694192]  kasan_save_alloc_info+0x3b/0x50
[   27.694330]  __kasan_kmalloc+0xb7/0xc0
[   27.694555]  __kmalloc_cache_noprof+0x189/0x420
[   27.694981]  kasan_atomics+0x95/0x310
[   27.695328]  kunit_try_run_case+0x1a5/0x480
[   27.695769]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.696241]  kthread+0x337/0x6f0
[   27.696569]  ret_from_fork+0x116/0x1d0
[   27.696878]  ret_from_fork_asm+0x1a/0x30
[   27.697033] 
[   27.697099] The buggy address belongs to the object at ffff88810613ea80
[   27.697099]  which belongs to the cache kmalloc-64 of size 64
[   27.698155] The buggy address is located 0 bytes to the right of
[   27.698155]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.698661] 
[   27.698846] The buggy address belongs to the physical page:
[   27.699337] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.700058] flags: 0x200000000000000(node=0|zone=2)
[   27.700523] page_type: f5(slab)
[   27.700789] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.701009] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.701219] page dumped because: kasan: bad access detected
[   27.701379] 
[   27.701523] Memory state around the buggy address:
[   27.701963]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.702620]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.703257] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.703953]                                      ^
[   27.704385]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.704883]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.705088] ==================================================================
[   27.732082] ==================================================================
[   27.732559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   27.732899] Read of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315
[   27.733165] 
[   27.733272] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   27.733335] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.733350] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.733373] Call Trace:
[   27.733404]  <TASK>
[   27.733432]  dump_stack_lvl+0x73/0xb0
[   27.733473]  print_report+0xd1/0x610
[   27.733497]  ? __virt_addr_valid+0x1db/0x2d0
[   27.733534]  ? kasan_atomics_helper+0x4f71/0x5450
[   27.733557]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.733594]  ? kasan_atomics_helper+0x4f71/0x5450
[   27.733617]  kasan_report+0x141/0x180
[   27.733652]  ? kasan_atomics_helper+0x4f71/0x5450
[   27.733679]  __asan_report_load8_noabort+0x18/0x20
[   27.733704]  kasan_atomics_helper+0x4f71/0x5450
[   27.733728]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.733765]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.733791]  ? kasan_atomics+0x152/0x310
[   27.733818]  kasan_atomics+0x1dc/0x310
[   27.733841]  ? __pfx_kasan_atomics+0x10/0x10
[   27.733866]  ? __pfx_read_tsc+0x10/0x10
[   27.733889]  ? ktime_get_ts64+0x86/0x230
[   27.733915]  kunit_try_run_case+0x1a5/0x480
[   27.733939]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.733961]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.733987]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.734012]  ? __kthread_parkme+0x82/0x180
[   27.734034]  ? preempt_count_sub+0x50/0x80
[   27.734058]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.734082]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.734108]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.734134]  kthread+0x337/0x6f0
[   27.734165]  ? trace_preempt_on+0x20/0xc0
[   27.734190]  ? __pfx_kthread+0x10/0x10
[   27.734213]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.734247]  ? calculate_sigpending+0x7b/0xa0
[   27.734272]  ? __pfx_kthread+0x10/0x10
[   27.734296]  ret_from_fork+0x116/0x1d0
[   27.734316]  ? __pfx_kthread+0x10/0x10
[   27.734340]  ret_from_fork_asm+0x1a/0x30
[   27.734372]  </TASK>
[   27.734384] 
[   27.741801] Allocated by task 315:
[   27.741983]  kasan_save_stack+0x45/0x70
[   27.742121]  kasan_save_track+0x18/0x40
[   27.742298]  kasan_save_alloc_info+0x3b/0x50
[   27.742615]  __kasan_kmalloc+0xb7/0xc0
[   27.742815]  __kmalloc_cache_noprof+0x189/0x420
[   27.743030]  kasan_atomics+0x95/0x310
[   27.743209]  kunit_try_run_case+0x1a5/0x480
[   27.743432]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.743699]  kthread+0x337/0x6f0
[   27.743892]  ret_from_fork+0x116/0x1d0
[   27.744039]  ret_from_fork_asm+0x1a/0x30
[   27.744227] 
[   27.744323] The buggy address belongs to the object at ffff88810613ea80
[   27.744323]  which belongs to the cache kmalloc-64 of size 64
[   27.744873] The buggy address is located 0 bytes to the right of
[   27.744873]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.745372] 
[   27.745458] The buggy address belongs to the physical page:
[   27.745700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.745939] flags: 0x200000000000000(node=0|zone=2)
[   27.746093] page_type: f5(slab)
[   27.746206] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.746424] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.746867] page dumped because: kasan: bad access detected
[   27.747111] 
[   27.747198] Memory state around the buggy address:
[   27.747410]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.747700]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.747980] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.748255]                                      ^
[   27.748407]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.748746]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.749078] ==================================================================
[   26.734899] ==================================================================
[   26.735191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   26.735878] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315
[   26.736230] 
[   26.736380] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.736448] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.736462] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.736486] Call Trace:
[   26.736511]  <TASK>
[   26.736533]  dump_stack_lvl+0x73/0xb0
[   26.736567]  print_report+0xd1/0x610
[   26.736590]  ? __virt_addr_valid+0x1db/0x2d0
[   26.736708]  ? kasan_atomics_helper+0xb6a/0x5450
[   26.736784]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.736813]  ? kasan_atomics_helper+0xb6a/0x5450
[   26.736859]  kasan_report+0x141/0x180
[   26.736882]  ? kasan_atomics_helper+0xb6a/0x5450
[   26.736909]  kasan_check_range+0x10c/0x1c0
[   26.736933]  __kasan_check_write+0x18/0x20
[   26.736957]  kasan_atomics_helper+0xb6a/0x5450
[   26.736980]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.737006]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.737033]  ? kasan_atomics+0x152/0x310
[   26.737060]  kasan_atomics+0x1dc/0x310
[   26.737083]  ? __pfx_kasan_atomics+0x10/0x10
[   26.737107]  ? __pfx_read_tsc+0x10/0x10
[   26.737132]  ? ktime_get_ts64+0x86/0x230
[   26.737158]  kunit_try_run_case+0x1a5/0x480
[   26.737182]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.737203]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.737228]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.737253]  ? __kthread_parkme+0x82/0x180
[   26.737319]  ? preempt_count_sub+0x50/0x80
[   26.737345]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.737369]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.737395]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.737435]  kthread+0x337/0x6f0
[   26.737457]  ? trace_preempt_on+0x20/0xc0
[   26.737482]  ? __pfx_kthread+0x10/0x10
[   26.737505]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.737529]  ? calculate_sigpending+0x7b/0xa0
[   26.737555]  ? __pfx_kthread+0x10/0x10
[   26.737579]  ret_from_fork+0x116/0x1d0
[   26.737600]  ? __pfx_kthread+0x10/0x10
[   26.737623]  ret_from_fork_asm+0x1a/0x30
[   26.737655]  </TASK>
[   26.737669] 
[   26.746137] Allocated by task 315:
[   26.746333]  kasan_save_stack+0x45/0x70
[   26.746539]  kasan_save_track+0x18/0x40
[   26.746742]  kasan_save_alloc_info+0x3b/0x50
[   26.746930]  __kasan_kmalloc+0xb7/0xc0
[   26.747058]  __kmalloc_cache_noprof+0x189/0x420
[   26.747612]  kasan_atomics+0x95/0x310
[   26.747825]  kunit_try_run_case+0x1a5/0x480
[   26.748025]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.748198]  kthread+0x337/0x6f0
[   26.748322]  ret_from_fork+0x116/0x1d0
[   26.748450]  ret_from_fork_asm+0x1a/0x30
[   26.748584] 
[   26.748653] The buggy address belongs to the object at ffff88810613ea80
[   26.748653]  which belongs to the cache kmalloc-64 of size 64
[   26.749320] The buggy address is located 0 bytes to the right of
[   26.749320]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   26.749890] 
[   26.749985] The buggy address belongs to the physical page:
[   26.750241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   26.750716] flags: 0x200000000000000(node=0|zone=2)
[   26.750986] page_type: f5(slab)
[   26.751136] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.751607] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.752006] page dumped because: kasan: bad access detected
[   26.752178] 
[   26.752243] Memory state around the buggy address:
[   26.752476]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.753033]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.753854] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.754168]                                      ^
[   26.754516]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.754883]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.755095] ==================================================================
[   26.993067] ==================================================================
[   26.993299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   26.993526] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315
[   26.993812] 
[   26.994133] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.994190] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.994232] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.994275] Call Trace:
[   26.994298]  <TASK>
[   26.994319]  dump_stack_lvl+0x73/0xb0
[   26.994354]  print_report+0xd1/0x610
[   26.994379]  ? __virt_addr_valid+0x1db/0x2d0
[   26.994422]  ? kasan_atomics_helper+0x1148/0x5450
[   26.994445]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.994473]  ? kasan_atomics_helper+0x1148/0x5450
[   26.994496]  kasan_report+0x141/0x180
[   26.994519]  ? kasan_atomics_helper+0x1148/0x5450
[   26.994547]  kasan_check_range+0x10c/0x1c0
[   26.994572]  __kasan_check_write+0x18/0x20
[   26.994596]  kasan_atomics_helper+0x1148/0x5450
[   26.994619]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.994646]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.994673]  ? kasan_atomics+0x152/0x310
[   26.994699]  kasan_atomics+0x1dc/0x310
[   26.994723]  ? __pfx_kasan_atomics+0x10/0x10
[   26.994757]  ? __pfx_read_tsc+0x10/0x10
[   26.994781]  ? ktime_get_ts64+0x86/0x230
[   26.994808]  kunit_try_run_case+0x1a5/0x480
[   26.994832]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.994856]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.994885]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.994911]  ? __kthread_parkme+0x82/0x180
[   26.994934]  ? preempt_count_sub+0x50/0x80
[   26.994960]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.994983]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.995010]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.995036]  kthread+0x337/0x6f0
[   26.995059]  ? trace_preempt_on+0x20/0xc0
[   26.995084]  ? __pfx_kthread+0x10/0x10
[   26.995108]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.995132]  ? calculate_sigpending+0x7b/0xa0
[   26.995160]  ? __pfx_kthread+0x10/0x10
[   26.995185]  ret_from_fork+0x116/0x1d0
[   26.995229]  ? __pfx_kthread+0x10/0x10
[   26.995272]  ret_from_fork_asm+0x1a/0x30
[   26.995306]  </TASK>
[   26.995320] 
[   27.009008] Allocated by task 315:
[   27.009194]  kasan_save_stack+0x45/0x70
[   27.009552]  kasan_save_track+0x18/0x40
[   27.009766]  kasan_save_alloc_info+0x3b/0x50
[   27.009913]  __kasan_kmalloc+0xb7/0xc0
[   27.010040]  __kmalloc_cache_noprof+0x189/0x420
[   27.010278]  kasan_atomics+0x95/0x310
[   27.010510]  kunit_try_run_case+0x1a5/0x480
[   27.010714]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.010979]  kthread+0x337/0x6f0
[   27.011110]  ret_from_fork+0x116/0x1d0
[   27.011240]  ret_from_fork_asm+0x1a/0x30
[   27.011382] 
[   27.011450] The buggy address belongs to the object at ffff88810613ea80
[   27.011450]  which belongs to the cache kmalloc-64 of size 64
[   27.012023] The buggy address is located 0 bytes to the right of
[   27.012023]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.012648] 
[   27.012718] The buggy address belongs to the physical page:
[   27.012898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.013550] flags: 0x200000000000000(node=0|zone=2)
[   27.013804] page_type: f5(slab)
[   27.013927] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.014432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.014768] page dumped because: kasan: bad access detected
[   27.014935] 
[   27.015002] Memory state around the buggy address:
[   27.015204]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.015521]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.016176] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.016510]                                      ^
[   27.016717]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.016934]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.017205] ==================================================================
[   27.248112] ==================================================================
[   27.248545] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   27.248925] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315
[   27.249223] 
[   27.249319] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   27.249376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.249390] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.249423] Call Trace:
[   27.249447]  <TASK>
[   27.249467]  dump_stack_lvl+0x73/0xb0
[   27.249502]  print_report+0xd1/0x610
[   27.249536]  ? __virt_addr_valid+0x1db/0x2d0
[   27.249750]  ? kasan_atomics_helper+0x151d/0x5450
[   27.249774]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.249806]  ? kasan_atomics_helper+0x151d/0x5450
[   27.249830]  kasan_report+0x141/0x180
[   27.249854]  ? kasan_atomics_helper+0x151d/0x5450
[   27.249881]  kasan_check_range+0x10c/0x1c0
[   27.249905]  __kasan_check_write+0x18/0x20
[   27.249930]  kasan_atomics_helper+0x151d/0x5450
[   27.249954]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.249981]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.250008]  ? kasan_atomics+0x152/0x310
[   27.250035]  kasan_atomics+0x1dc/0x310
[   27.250059]  ? __pfx_kasan_atomics+0x10/0x10
[   27.250084]  ? __pfx_read_tsc+0x10/0x10
[   27.250108]  ? ktime_get_ts64+0x86/0x230
[   27.250135]  kunit_try_run_case+0x1a5/0x480
[   27.250159]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.250181]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.250207]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.250233]  ? __kthread_parkme+0x82/0x180
[   27.250256]  ? preempt_count_sub+0x50/0x80
[   27.250293]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.250317]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.250344]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.250370]  kthread+0x337/0x6f0
[   27.250392]  ? trace_preempt_on+0x20/0xc0
[   27.250423]  ? __pfx_kthread+0x10/0x10
[   27.250446]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.250469]  ? calculate_sigpending+0x7b/0xa0
[   27.250495]  ? __pfx_kthread+0x10/0x10
[   27.250519]  ret_from_fork+0x116/0x1d0
[   27.250539]  ? __pfx_kthread+0x10/0x10
[   27.250562]  ret_from_fork_asm+0x1a/0x30
[   27.250594]  </TASK>
[   27.250607] 
[   27.261092] Allocated by task 315:
[   27.261377]  kasan_save_stack+0x45/0x70
[   27.261602]  kasan_save_track+0x18/0x40
[   27.261785]  kasan_save_alloc_info+0x3b/0x50
[   27.262038]  __kasan_kmalloc+0xb7/0xc0
[   27.262235]  __kmalloc_cache_noprof+0x189/0x420
[   27.262509]  kasan_atomics+0x95/0x310
[   27.262646]  kunit_try_run_case+0x1a5/0x480
[   27.262854]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.263132]  kthread+0x337/0x6f0
[   27.263378]  ret_from_fork+0x116/0x1d0
[   27.263532]  ret_from_fork_asm+0x1a/0x30
[   27.263697] 
[   27.263803] The buggy address belongs to the object at ffff88810613ea80
[   27.263803]  which belongs to the cache kmalloc-64 of size 64
[   27.264362] The buggy address is located 0 bytes to the right of
[   27.264362]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.264973] 
[   27.265068] The buggy address belongs to the physical page:
[   27.265321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.265906] flags: 0x200000000000000(node=0|zone=2)
[   27.266182] page_type: f5(slab)
[   27.266379] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.266634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.266902] page dumped because: kasan: bad access detected
[   27.267268] 
[   27.267417] Memory state around the buggy address:
[   27.267679]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.267906]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.268226] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.268617]                                      ^
[   27.268822]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.269138]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.269554] ==================================================================
[   27.572685] ==================================================================
[   27.572999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   27.573247] Read of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315
[   27.573498] 
[   27.573589] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   27.573643] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.573657] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.573682] Call Trace:
[   27.573704]  <TASK>
[   27.573724]  dump_stack_lvl+0x73/0xb0
[   27.573769]  print_report+0xd1/0x610
[   27.573792]  ? __virt_addr_valid+0x1db/0x2d0
[   27.573817]  ? kasan_atomics_helper+0x4f30/0x5450
[   27.573840]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.573866]  ? kasan_atomics_helper+0x4f30/0x5450
[   27.574096]  kasan_report+0x141/0x180
[   27.574122]  ? kasan_atomics_helper+0x4f30/0x5450
[   27.574149]  __asan_report_load8_noabort+0x18/0x20
[   27.574173]  kasan_atomics_helper+0x4f30/0x5450
[   27.574200]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.575182]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.575245]  ? kasan_atomics+0x152/0x310
[   27.575275]  kasan_atomics+0x1dc/0x310
[   27.575299]  ? __pfx_kasan_atomics+0x10/0x10
[   27.575326]  ? __pfx_read_tsc+0x10/0x10
[   27.575349]  ? ktime_get_ts64+0x86/0x230
[   27.575378]  kunit_try_run_case+0x1a5/0x480
[   27.575402]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.576262]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.576301]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.576335]  ? __kthread_parkme+0x82/0x180
[   27.576360]  ? preempt_count_sub+0x50/0x80
[   27.576385]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.576422]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.576450]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.576479]  kthread+0x337/0x6f0
[   27.576502]  ? trace_preempt_on+0x20/0xc0
[   27.576527]  ? __pfx_kthread+0x10/0x10
[   27.576551]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.576575]  ? calculate_sigpending+0x7b/0xa0
[   27.576601]  ? __pfx_kthread+0x10/0x10
[   27.576625]  ret_from_fork+0x116/0x1d0
[   27.576646]  ? __pfx_kthread+0x10/0x10
[   27.576669]  ret_from_fork_asm+0x1a/0x30
[   27.576702]  </TASK>
[   27.576715] 
[   27.588670] Allocated by task 315:
[   27.589037]  kasan_save_stack+0x45/0x70
[   27.589239]  kasan_save_track+0x18/0x40
[   27.589636]  kasan_save_alloc_info+0x3b/0x50
[   27.589869]  __kasan_kmalloc+0xb7/0xc0
[   27.590049]  __kmalloc_cache_noprof+0x189/0x420
[   27.590253]  kasan_atomics+0x95/0x310
[   27.590681]  kunit_try_run_case+0x1a5/0x480
[   27.590933]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.591302]  kthread+0x337/0x6f0
[   27.591450]  ret_from_fork+0x116/0x1d0
[   27.591679]  ret_from_fork_asm+0x1a/0x30
[   27.591883] 
[   27.591953] The buggy address belongs to the object at ffff88810613ea80
[   27.591953]  which belongs to the cache kmalloc-64 of size 64
[   27.592489] The buggy address is located 0 bytes to the right of
[   27.592489]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.593001] 
[   27.593100] The buggy address belongs to the physical page:
[   27.593327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.593718] flags: 0x200000000000000(node=0|zone=2)
[   27.593887] page_type: f5(slab)
[   27.594143] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.595216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.595793] page dumped because: kasan: bad access detected
[   27.596114] 
[   27.596215] Memory state around the buggy address:
[   27.596602]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.597584]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.597978] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.598289]                                      ^
[   27.598538]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.598847]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.599143] ==================================================================
[   27.017882] ==================================================================
[   27.018356] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   27.018706] Read of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315
[   27.019075] 
[   27.019231] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   27.019284] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.019297] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.019331] Call Trace:
[   27.019353]  <TASK>
[   27.019371]  dump_stack_lvl+0x73/0xb0
[   27.019444]  print_report+0xd1/0x610
[   27.019469]  ? __virt_addr_valid+0x1db/0x2d0
[   27.019494]  ? kasan_atomics_helper+0x4a02/0x5450
[   27.019518]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.019544]  ? kasan_atomics_helper+0x4a02/0x5450
[   27.019567]  kasan_report+0x141/0x180
[   27.019590]  ? kasan_atomics_helper+0x4a02/0x5450
[   27.019643]  __asan_report_load4_noabort+0x18/0x20
[   27.019669]  kasan_atomics_helper+0x4a02/0x5450
[   27.019692]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.019718]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.019756]  ? kasan_atomics+0x152/0x310
[   27.019782]  kasan_atomics+0x1dc/0x310
[   27.019805]  ? __pfx_kasan_atomics+0x10/0x10
[   27.019830]  ? __pfx_read_tsc+0x10/0x10
[   27.019854]  ? ktime_get_ts64+0x86/0x230
[   27.019881]  kunit_try_run_case+0x1a5/0x480
[   27.019905]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.019928]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.019955]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.019980]  ? __kthread_parkme+0x82/0x180
[   27.020002]  ? preempt_count_sub+0x50/0x80
[   27.020028]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.020641]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.020668]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.020695]  kthread+0x337/0x6f0
[   27.020718]  ? trace_preempt_on+0x20/0xc0
[   27.020752]  ? __pfx_kthread+0x10/0x10
[   27.020796]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.020819]  ? calculate_sigpending+0x7b/0xa0
[   27.020845]  ? __pfx_kthread+0x10/0x10
[   27.020869]  ret_from_fork+0x116/0x1d0
[   27.020890]  ? __pfx_kthread+0x10/0x10
[   27.020912]  ret_from_fork_asm+0x1a/0x30
[   27.020964]  </TASK>
[   27.020977] 
[   27.029226] Allocated by task 315:
[   27.029350]  kasan_save_stack+0x45/0x70
[   27.029707]  kasan_save_track+0x18/0x40
[   27.030133]  kasan_save_alloc_info+0x3b/0x50
[   27.030383]  __kasan_kmalloc+0xb7/0xc0
[   27.030549]  __kmalloc_cache_noprof+0x189/0x420
[   27.030698]  kasan_atomics+0x95/0x310
[   27.030833]  kunit_try_run_case+0x1a5/0x480
[   27.031000]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.031277]  kthread+0x337/0x6f0
[   27.031582]  ret_from_fork+0x116/0x1d0
[   27.031762]  ret_from_fork_asm+0x1a/0x30
[   27.031934] 
[   27.032001] The buggy address belongs to the object at ffff88810613ea80
[   27.032001]  which belongs to the cache kmalloc-64 of size 64
[   27.032347] The buggy address is located 0 bytes to the right of
[   27.032347]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.033021] 
[   27.033113] The buggy address belongs to the physical page:
[   27.033360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.033706] flags: 0x200000000000000(node=0|zone=2)
[   27.034036] page_type: f5(slab)
[   27.034155] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.034382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.035109] page dumped because: kasan: bad access detected
[   27.035330] 
[   27.035395] Memory state around the buggy address:
[   27.035760]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.036063]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.036628] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.037116]                                      ^
[   27.037492]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.037780]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.038071] ==================================================================
[   26.280217] ==================================================================
[   26.282054] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   26.283113] Read of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315
[   26.283949] 
[   26.284289] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.284359] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.284373] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.284399] Call Trace:
[   26.284416]  <TASK>
[   26.284437]  dump_stack_lvl+0x73/0xb0
[   26.284475]  print_report+0xd1/0x610
[   26.284500]  ? __virt_addr_valid+0x1db/0x2d0
[   26.284527]  ? kasan_atomics_helper+0x4bbc/0x5450
[   26.284549]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.284574]  ? kasan_atomics_helper+0x4bbc/0x5450
[   26.284596]  kasan_report+0x141/0x180
[   26.284618]  ? kasan_atomics_helper+0x4bbc/0x5450
[   26.284642]  __asan_report_load4_noabort+0x18/0x20
[   26.284667]  kasan_atomics_helper+0x4bbc/0x5450
[   26.284689]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.284714]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.284750]  ? kasan_atomics+0x152/0x310
[   26.284777]  kasan_atomics+0x1dc/0x310
[   26.284798]  ? __pfx_kasan_atomics+0x10/0x10
[   26.284822]  ? __pfx_read_tsc+0x10/0x10
[   26.284845]  ? ktime_get_ts64+0x86/0x230
[   26.284874]  kunit_try_run_case+0x1a5/0x480
[   26.284899]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.284920]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.284945]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.284969]  ? __kthread_parkme+0x82/0x180
[   26.284990]  ? preempt_count_sub+0x50/0x80
[   26.285068]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.285102]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.285128]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.285153]  kthread+0x337/0x6f0
[   26.285175]  ? trace_preempt_on+0x20/0xc0
[   26.285200]  ? __pfx_kthread+0x10/0x10
[   26.285222]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.285244]  ? calculate_sigpending+0x7b/0xa0
[   26.285527]  ? __pfx_kthread+0x10/0x10
[   26.285558]  ret_from_fork+0x116/0x1d0
[   26.285580]  ? __pfx_kthread+0x10/0x10
[   26.285602]  ret_from_fork_asm+0x1a/0x30
[   26.285635]  </TASK>
[   26.285648] 
[   26.294461] Allocated by task 315:
[   26.294685]  kasan_save_stack+0x45/0x70
[   26.294899]  kasan_save_track+0x18/0x40
[   26.295178]  kasan_save_alloc_info+0x3b/0x50
[   26.295410]  __kasan_kmalloc+0xb7/0xc0
[   26.295619]  __kmalloc_cache_noprof+0x189/0x420
[   26.295780]  kasan_atomics+0x95/0x310
[   26.296227]  kunit_try_run_case+0x1a5/0x480
[   26.296588]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.296868]  kthread+0x337/0x6f0
[   26.297029]  ret_from_fork+0x116/0x1d0
[   26.297227]  ret_from_fork_asm+0x1a/0x30
[   26.297544] 
[   26.297662] The buggy address belongs to the object at ffff88810613ea80
[   26.297662]  which belongs to the cache kmalloc-64 of size 64
[   26.298145] The buggy address is located 0 bytes to the right of
[   26.298145]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   26.298502] 
[   26.298571] The buggy address belongs to the physical page:
[   26.298770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   26.299216] flags: 0x200000000000000(node=0|zone=2)
[   26.299696] page_type: f5(slab)
[   26.299848] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.300074] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.300311] page dumped because: kasan: bad access detected
[   26.300568] 
[   26.300657] Memory state around the buggy address:
[   26.300892]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.301265]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.301710] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.301958]                                      ^
[   26.302425]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.302743]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.302952] ==================================================================
[   27.211896] ==================================================================
[   27.212236] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   27.212886] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315
[   27.213123] 
[   27.213240] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   27.213295] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.213309] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.213334] Call Trace:
[   27.213350]  <TASK>
[   27.213369]  dump_stack_lvl+0x73/0xb0
[   27.213402]  print_report+0xd1/0x610
[   27.213660]  ? __virt_addr_valid+0x1db/0x2d0
[   27.213688]  ? kasan_atomics_helper+0x50d4/0x5450
[   27.213711]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.213751]  ? kasan_atomics_helper+0x50d4/0x5450
[   27.213774]  kasan_report+0x141/0x180
[   27.213798]  ? kasan_atomics_helper+0x50d4/0x5450
[   27.213825]  __asan_report_store8_noabort+0x1b/0x30
[   27.213850]  kasan_atomics_helper+0x50d4/0x5450
[   27.213874]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.213902]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.213927]  ? kasan_atomics+0x152/0x310
[   27.213955]  kasan_atomics+0x1dc/0x310
[   27.213979]  ? __pfx_kasan_atomics+0x10/0x10
[   27.214004]  ? __pfx_read_tsc+0x10/0x10
[   27.214027]  ? ktime_get_ts64+0x86/0x230
[   27.214054]  kunit_try_run_case+0x1a5/0x480
[   27.214078]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.214100]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.214126]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.214152]  ? __kthread_parkme+0x82/0x180
[   27.214176]  ? preempt_count_sub+0x50/0x80
[   27.214202]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.214226]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.214252]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.214292]  kthread+0x337/0x6f0
[   27.214315]  ? trace_preempt_on+0x20/0xc0
[   27.214341]  ? __pfx_kthread+0x10/0x10
[   27.214363]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.214387]  ? calculate_sigpending+0x7b/0xa0
[   27.214413]  ? __pfx_kthread+0x10/0x10
[   27.214437]  ret_from_fork+0x116/0x1d0
[   27.214457]  ? __pfx_kthread+0x10/0x10
[   27.214480]  ret_from_fork_asm+0x1a/0x30
[   27.214512]  </TASK>
[   27.214525] 
[   27.229983] Allocated by task 315:
[   27.230610]  kasan_save_stack+0x45/0x70
[   27.231108]  kasan_save_track+0x18/0x40
[   27.231494]  kasan_save_alloc_info+0x3b/0x50
[   27.231839]  __kasan_kmalloc+0xb7/0xc0
[   27.231981]  __kmalloc_cache_noprof+0x189/0x420
[   27.232134]  kasan_atomics+0x95/0x310
[   27.232261]  kunit_try_run_case+0x1a5/0x480
[   27.232999]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.235374]  kthread+0x337/0x6f0
[   27.235695]  ret_from_fork+0x116/0x1d0
[   27.236212]  ret_from_fork_asm+0x1a/0x30
[   27.236465] 
[   27.236544] The buggy address belongs to the object at ffff88810613ea80
[   27.236544]  which belongs to the cache kmalloc-64 of size 64
[   27.237867] The buggy address is located 0 bytes to the right of
[   27.237867]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.239212] 
[   27.239328] The buggy address belongs to the physical page:
[   27.239592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.239968] flags: 0x200000000000000(node=0|zone=2)
[   27.240204] page_type: f5(slab)
[   27.240377] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.240661] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.242438] page dumped because: kasan: bad access detected
[   27.243759] 
[   27.244042] Memory state around the buggy address:
[   27.244497]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.245135]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.245791] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.246450]                                      ^
[   27.246977]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.247239]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.247654] ==================================================================
[   26.755938] ==================================================================
[   26.756467] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   26.756881] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315
[   26.757187] 
[   26.757344] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.757436] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.757451] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.757475] Call Trace:
[   26.757509]  <TASK>
[   26.757530]  dump_stack_lvl+0x73/0xb0
[   26.757592]  print_report+0xd1/0x610
[   26.757616]  ? __virt_addr_valid+0x1db/0x2d0
[   26.757653]  ? kasan_atomics_helper+0xc70/0x5450
[   26.757675]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.757702]  ? kasan_atomics_helper+0xc70/0x5450
[   26.757724]  kasan_report+0x141/0x180
[   26.757758]  ? kasan_atomics_helper+0xc70/0x5450
[   26.757785]  kasan_check_range+0x10c/0x1c0
[   26.757810]  __kasan_check_write+0x18/0x20
[   26.757834]  kasan_atomics_helper+0xc70/0x5450
[   26.757857]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.757884]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.757911]  ? kasan_atomics+0x152/0x310
[   26.757968]  kasan_atomics+0x1dc/0x310
[   26.758015]  ? __pfx_kasan_atomics+0x10/0x10
[   26.758040]  ? __pfx_read_tsc+0x10/0x10
[   26.758064]  ? ktime_get_ts64+0x86/0x230
[   26.758091]  kunit_try_run_case+0x1a5/0x480
[   26.758114]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.758136]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.758161]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.758187]  ? __kthread_parkme+0x82/0x180
[   26.758208]  ? preempt_count_sub+0x50/0x80
[   26.758234]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.758256]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.758337]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.758365]  kthread+0x337/0x6f0
[   26.758388]  ? trace_preempt_on+0x20/0xc0
[   26.758424]  ? __pfx_kthread+0x10/0x10
[   26.758447]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.758472]  ? calculate_sigpending+0x7b/0xa0
[   26.758497]  ? __pfx_kthread+0x10/0x10
[   26.758520]  ret_from_fork+0x116/0x1d0
[   26.758541]  ? __pfx_kthread+0x10/0x10
[   26.758564]  ret_from_fork_asm+0x1a/0x30
[   26.758597]  </TASK>
[   26.758609] 
[   26.767512] Allocated by task 315:
[   26.767710]  kasan_save_stack+0x45/0x70
[   26.767861]  kasan_save_track+0x18/0x40
[   26.767987]  kasan_save_alloc_info+0x3b/0x50
[   26.768180]  __kasan_kmalloc+0xb7/0xc0
[   26.768529]  __kmalloc_cache_noprof+0x189/0x420
[   26.768785]  kasan_atomics+0x95/0x310
[   26.769066]  kunit_try_run_case+0x1a5/0x480
[   26.769325]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.769613]  kthread+0x337/0x6f0
[   26.769752]  ret_from_fork+0x116/0x1d0
[   26.769898]  ret_from_fork_asm+0x1a/0x30
[   26.770092] 
[   26.770183] The buggy address belongs to the object at ffff88810613ea80
[   26.770183]  which belongs to the cache kmalloc-64 of size 64
[   26.770986] The buggy address is located 0 bytes to the right of
[   26.770986]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   26.771703] 
[   26.771824] The buggy address belongs to the physical page:
[   26.772158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   26.772623] flags: 0x200000000000000(node=0|zone=2)
[   26.772807] page_type: f5(slab)
[   26.772928] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.773207] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.773598] page dumped because: kasan: bad access detected
[   26.773862] 
[   26.773954] Memory state around the buggy address:
[   26.774331]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.774825]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.775047] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.775346]                                      ^
[   26.775805]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.776176]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.776516] ==================================================================
[   26.505843] ==================================================================
[   26.506473] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   26.506804] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315
[   26.507112] 
[   26.507226] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.507283] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.507297] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.507593] Call Trace:
[   26.507628]  <TASK>
[   26.507651]  dump_stack_lvl+0x73/0xb0
[   26.507688]  print_report+0xd1/0x610
[   26.507713]  ? __virt_addr_valid+0x1db/0x2d0
[   26.507756]  ? kasan_atomics_helper+0x5fe/0x5450
[   26.507780]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.507808]  ? kasan_atomics_helper+0x5fe/0x5450
[   26.507830]  kasan_report+0x141/0x180
[   26.507853]  ? kasan_atomics_helper+0x5fe/0x5450
[   26.507880]  kasan_check_range+0x10c/0x1c0
[   26.507904]  __kasan_check_write+0x18/0x20
[   26.507929]  kasan_atomics_helper+0x5fe/0x5450
[   26.507952]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.507978]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.508004]  ? kasan_atomics+0x152/0x310
[   26.508031]  kasan_atomics+0x1dc/0x310
[   26.508054]  ? __pfx_kasan_atomics+0x10/0x10
[   26.508079]  ? __pfx_read_tsc+0x10/0x10
[   26.508102]  ? ktime_get_ts64+0x86/0x230
[   26.508129]  kunit_try_run_case+0x1a5/0x480
[   26.508153]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.508175]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.508202]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.508226]  ? __kthread_parkme+0x82/0x180
[   26.508249]  ? preempt_count_sub+0x50/0x80
[   26.508402]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.508430]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.508458]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.508484]  kthread+0x337/0x6f0
[   26.508508]  ? trace_preempt_on+0x20/0xc0
[   26.508533]  ? __pfx_kthread+0x10/0x10
[   26.508557]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.508581]  ? calculate_sigpending+0x7b/0xa0
[   26.508607]  ? __pfx_kthread+0x10/0x10
[   26.508631]  ret_from_fork+0x116/0x1d0
[   26.508652]  ? __pfx_kthread+0x10/0x10
[   26.508674]  ret_from_fork_asm+0x1a/0x30
[   26.508707]  </TASK>
[   26.508720] 
[   26.519187] Allocated by task 315:
[   26.519691]  kasan_save_stack+0x45/0x70
[   26.519913]  kasan_save_track+0x18/0x40
[   26.520052]  kasan_save_alloc_info+0x3b/0x50
[   26.520262]  __kasan_kmalloc+0xb7/0xc0
[   26.520840]  __kmalloc_cache_noprof+0x189/0x420
[   26.521021]  kasan_atomics+0x95/0x310
[   26.521212]  kunit_try_run_case+0x1a5/0x480
[   26.521436]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.522003]  kthread+0x337/0x6f0
[   26.522183]  ret_from_fork+0x116/0x1d0
[   26.522340]  ret_from_fork_asm+0x1a/0x30
[   26.522566] 
[   26.522647] The buggy address belongs to the object at ffff88810613ea80
[   26.522647]  which belongs to the cache kmalloc-64 of size 64
[   26.523159] The buggy address is located 0 bytes to the right of
[   26.523159]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   26.524014] 
[   26.524121] The buggy address belongs to the physical page:
[   26.524627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   26.525047] flags: 0x200000000000000(node=0|zone=2)
[   26.525386] page_type: f5(slab)
[   26.525649] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.525999] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.526716] page dumped because: kasan: bad access detected
[   26.526969] 
[   26.527044] Memory state around the buggy address:
[   26.527462]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.527875]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.528173] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.528693]                                      ^
[   26.528883]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.529346]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.529637] ==================================================================
[   26.634235] ==================================================================
[   26.635106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   26.635765] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315
[   26.636486] 
[   26.636634] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.636722] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.636750] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.636775] Call Trace:
[   26.636833]  <TASK>
[   26.636854]  dump_stack_lvl+0x73/0xb0
[   26.636894]  print_report+0xd1/0x610
[   26.636917]  ? __virt_addr_valid+0x1db/0x2d0
[   26.636943]  ? kasan_atomics_helper+0x8f9/0x5450
[   26.636966]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.636993]  ? kasan_atomics_helper+0x8f9/0x5450
[   26.637016]  kasan_report+0x141/0x180
[   26.637039]  ? kasan_atomics_helper+0x8f9/0x5450
[   26.637066]  kasan_check_range+0x10c/0x1c0
[   26.637090]  __kasan_check_write+0x18/0x20
[   26.637114]  kasan_atomics_helper+0x8f9/0x5450
[   26.637138]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.637165]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.637192]  ? kasan_atomics+0x152/0x310
[   26.637219]  kasan_atomics+0x1dc/0x310
[   26.637242]  ? __pfx_kasan_atomics+0x10/0x10
[   26.637312]  ? __pfx_read_tsc+0x10/0x10
[   26.637339]  ? ktime_get_ts64+0x86/0x230
[   26.637367]  kunit_try_run_case+0x1a5/0x480
[   26.637391]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.637426]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.637453]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.637477]  ? __kthread_parkme+0x82/0x180
[   26.637500]  ? preempt_count_sub+0x50/0x80
[   26.637525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.637548]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.637575]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.637601]  kthread+0x337/0x6f0
[   26.637623]  ? trace_preempt_on+0x20/0xc0
[   26.637648]  ? __pfx_kthread+0x10/0x10
[   26.637670]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.637694]  ? calculate_sigpending+0x7b/0xa0
[   26.637720]  ? __pfx_kthread+0x10/0x10
[   26.637755]  ret_from_fork+0x116/0x1d0
[   26.637775]  ? __pfx_kthread+0x10/0x10
[   26.637798]  ret_from_fork_asm+0x1a/0x30
[   26.637830]  </TASK>
[   26.637844] 
[   26.650830] Allocated by task 315:
[   26.651097]  kasan_save_stack+0x45/0x70
[   26.651431]  kasan_save_track+0x18/0x40
[   26.651610]  kasan_save_alloc_info+0x3b/0x50
[   26.651869]  __kasan_kmalloc+0xb7/0xc0
[   26.652062]  __kmalloc_cache_noprof+0x189/0x420
[   26.652257]  kasan_atomics+0x95/0x310
[   26.652393]  kunit_try_run_case+0x1a5/0x480
[   26.652588]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.652953]  kthread+0x337/0x6f0
[   26.653101]  ret_from_fork+0x116/0x1d0
[   26.653245]  ret_from_fork_asm+0x1a/0x30
[   26.653588] 
[   26.653726] The buggy address belongs to the object at ffff88810613ea80
[   26.653726]  which belongs to the cache kmalloc-64 of size 64
[   26.654241] The buggy address is located 0 bytes to the right of
[   26.654241]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   26.655063] 
[   26.655170] The buggy address belongs to the physical page:
[   26.655584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   26.655978] flags: 0x200000000000000(node=0|zone=2)
[   26.656221] page_type: f5(slab)
[   26.656456] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.656837] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.657189] page dumped because: kasan: bad access detected
[   26.657526] 
[   26.657634] Memory state around the buggy address:
[   26.657897]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.658240]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.658674] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.659115]                                      ^
[   26.659371]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.659725]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.660443] ==================================================================
[   26.530196] ==================================================================
[   26.530447] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   26.531367] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315
[   26.531832] 
[   26.532025] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.532083] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.532192] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.532220] Call Trace:
[   26.532243]  <TASK>
[   26.532277]  dump_stack_lvl+0x73/0xb0
[   26.532312]  print_report+0xd1/0x610
[   26.532342]  ? __virt_addr_valid+0x1db/0x2d0
[   26.532368]  ? kasan_atomics_helper+0x697/0x5450
[   26.532390]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.532469]  ? kasan_atomics_helper+0x697/0x5450
[   26.532494]  kasan_report+0x141/0x180
[   26.532517]  ? kasan_atomics_helper+0x697/0x5450
[   26.532545]  kasan_check_range+0x10c/0x1c0
[   26.532571]  __kasan_check_write+0x18/0x20
[   26.532595]  kasan_atomics_helper+0x697/0x5450
[   26.532618]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.532645]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.532671]  ? kasan_atomics+0x152/0x310
[   26.532697]  kasan_atomics+0x1dc/0x310
[   26.532721]  ? __pfx_kasan_atomics+0x10/0x10
[   26.532758]  ? __pfx_read_tsc+0x10/0x10
[   26.532783]  ? ktime_get_ts64+0x86/0x230
[   26.532810]  kunit_try_run_case+0x1a5/0x480
[   26.532835]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.532856]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.532882]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.532907]  ? __kthread_parkme+0x82/0x180
[   26.532929]  ? preempt_count_sub+0x50/0x80
[   26.532955]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.532979]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.533006]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.533031]  kthread+0x337/0x6f0
[   26.533055]  ? trace_preempt_on+0x20/0xc0
[   26.533079]  ? __pfx_kthread+0x10/0x10
[   26.533103]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.533126]  ? calculate_sigpending+0x7b/0xa0
[   26.533151]  ? __pfx_kthread+0x10/0x10
[   26.533175]  ret_from_fork+0x116/0x1d0
[   26.533196]  ? __pfx_kthread+0x10/0x10
[   26.533219]  ret_from_fork_asm+0x1a/0x30
[   26.533251]  </TASK>
[   26.533263] 
[   26.544023] Allocated by task 315:
[   26.544340]  kasan_save_stack+0x45/0x70
[   26.544633]  kasan_save_track+0x18/0x40
[   26.544824]  kasan_save_alloc_info+0x3b/0x50
[   26.545014]  __kasan_kmalloc+0xb7/0xc0
[   26.545181]  __kmalloc_cache_noprof+0x189/0x420
[   26.545834]  kasan_atomics+0x95/0x310
[   26.545994]  kunit_try_run_case+0x1a5/0x480
[   26.546419]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.546765]  kthread+0x337/0x6f0
[   26.546934]  ret_from_fork+0x116/0x1d0
[   26.547095]  ret_from_fork_asm+0x1a/0x30
[   26.547278] 
[   26.547616] The buggy address belongs to the object at ffff88810613ea80
[   26.547616]  which belongs to the cache kmalloc-64 of size 64
[   26.548119] The buggy address is located 0 bytes to the right of
[   26.548119]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   26.548897] 
[   26.549014] The buggy address belongs to the physical page:
[   26.549524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   26.549903] flags: 0x200000000000000(node=0|zone=2)
[   26.550128] page_type: f5(slab)
[   26.550273] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.550975] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.551217] page dumped because: kasan: bad access detected
[   26.551397] 
[   26.551465] Memory state around the buggy address:
[   26.551618]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.552029]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.552457] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.553128]                                      ^
[   26.553563]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.553984]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.554202] ==================================================================
[   26.345144] ==================================================================
[   26.346004] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   26.346781] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315
[   26.347515] 
[   26.347843] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.347900] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.347914] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.347940] Call Trace:
[   26.347962]  <TASK>
[   26.347981]  dump_stack_lvl+0x73/0xb0
[   26.348109]  print_report+0xd1/0x610
[   26.348133]  ? __virt_addr_valid+0x1db/0x2d0
[   26.348160]  ? kasan_atomics_helper+0x4b6e/0x5450
[   26.348183]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.348210]  ? kasan_atomics_helper+0x4b6e/0x5450
[   26.348234]  kasan_report+0x141/0x180
[   26.348257]  ? kasan_atomics_helper+0x4b6e/0x5450
[   26.348350]  __asan_report_store4_noabort+0x1b/0x30
[   26.348379]  kasan_atomics_helper+0x4b6e/0x5450
[   26.348402]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.348443]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.348470]  ? kasan_atomics+0x152/0x310
[   26.348498]  kasan_atomics+0x1dc/0x310
[   26.348521]  ? __pfx_kasan_atomics+0x10/0x10
[   26.348546]  ? __pfx_read_tsc+0x10/0x10
[   26.348570]  ? ktime_get_ts64+0x86/0x230
[   26.348596]  kunit_try_run_case+0x1a5/0x480
[   26.348620]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.348642]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.348668]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.348694]  ? __kthread_parkme+0x82/0x180
[   26.348716]  ? preempt_count_sub+0x50/0x80
[   26.348755]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.348778]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.348804]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.348831]  kthread+0x337/0x6f0
[   26.348854]  ? trace_preempt_on+0x20/0xc0
[   26.348879]  ? __pfx_kthread+0x10/0x10
[   26.348902]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.348925]  ? calculate_sigpending+0x7b/0xa0
[   26.348951]  ? __pfx_kthread+0x10/0x10
[   26.348976]  ret_from_fork+0x116/0x1d0
[   26.348996]  ? __pfx_kthread+0x10/0x10
[   26.349019]  ret_from_fork_asm+0x1a/0x30
[   26.349052]  </TASK>
[   26.349064] 
[   26.360662] Allocated by task 315:
[   26.360813]  kasan_save_stack+0x45/0x70
[   26.361177]  kasan_save_track+0x18/0x40
[   26.361640]  kasan_save_alloc_info+0x3b/0x50
[   26.361828]  __kasan_kmalloc+0xb7/0xc0
[   26.362120]  __kmalloc_cache_noprof+0x189/0x420
[   26.362284]  kasan_atomics+0x95/0x310
[   26.362767]  kunit_try_run_case+0x1a5/0x480
[   26.362986]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.363416]  kthread+0x337/0x6f0
[   26.363771]  ret_from_fork+0x116/0x1d0
[   26.363919]  ret_from_fork_asm+0x1a/0x30
[   26.364229] 
[   26.364404] The buggy address belongs to the object at ffff88810613ea80
[   26.364404]  which belongs to the cache kmalloc-64 of size 64
[   26.365109] The buggy address is located 0 bytes to the right of
[   26.365109]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   26.365803] 
[   26.365999] The buggy address belongs to the physical page:
[   26.366187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   26.366994] flags: 0x200000000000000(node=0|zone=2)
[   26.367180] page_type: f5(slab)
[   26.367638] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.368036] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.368330] page dumped because: kasan: bad access detected
[   26.368753] 
[   26.368853] Memory state around the buggy address:
[   26.369075]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.369646]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.370048] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.370468]                                      ^
[   26.370818]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.371213]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.371838] ==================================================================
[   26.682756] ==================================================================
[   26.683113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   26.683519] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315
[   26.683951] 
[   26.684104] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.684159] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.684184] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.684210] Call Trace:
[   26.684256]  <TASK>
[   26.684275]  dump_stack_lvl+0x73/0xb0
[   26.684308]  print_report+0xd1/0x610
[   26.684396]  ? __virt_addr_valid+0x1db/0x2d0
[   26.684467]  ? kasan_atomics_helper+0xa2b/0x5450
[   26.684489]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.684518]  ? kasan_atomics_helper+0xa2b/0x5450
[   26.684551]  kasan_report+0x141/0x180
[   26.684574]  ? kasan_atomics_helper+0xa2b/0x5450
[   26.684601]  kasan_check_range+0x10c/0x1c0
[   26.684627]  __kasan_check_write+0x18/0x20
[   26.684676]  kasan_atomics_helper+0xa2b/0x5450
[   26.684700]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.684727]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.684772]  ? kasan_atomics+0x152/0x310
[   26.684799]  kasan_atomics+0x1dc/0x310
[   26.684850]  ? __pfx_kasan_atomics+0x10/0x10
[   26.684875]  ? __pfx_read_tsc+0x10/0x10
[   26.684899]  ? ktime_get_ts64+0x86/0x230
[   26.684936]  kunit_try_run_case+0x1a5/0x480
[   26.684961]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.685008]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.685052]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.685088]  ? __kthread_parkme+0x82/0x180
[   26.685110]  ? preempt_count_sub+0x50/0x80
[   26.685136]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.685159]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.685186]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.685213]  kthread+0x337/0x6f0
[   26.685237]  ? trace_preempt_on+0x20/0xc0
[   26.685261]  ? __pfx_kthread+0x10/0x10
[   26.685345]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.685383]  ? calculate_sigpending+0x7b/0xa0
[   26.685419]  ? __pfx_kthread+0x10/0x10
[   26.685453]  ret_from_fork+0x116/0x1d0
[   26.685475]  ? __pfx_kthread+0x10/0x10
[   26.685509]  ret_from_fork_asm+0x1a/0x30
[   26.685543]  </TASK>
[   26.685556] 
[   26.695147] Allocated by task 315:
[   26.695338]  kasan_save_stack+0x45/0x70
[   26.695639]  kasan_save_track+0x18/0x40
[   26.695869]  kasan_save_alloc_info+0x3b/0x50
[   26.696032]  __kasan_kmalloc+0xb7/0xc0
[   26.696260]  __kmalloc_cache_noprof+0x189/0x420
[   26.696677]  kasan_atomics+0x95/0x310
[   26.696875]  kunit_try_run_case+0x1a5/0x480
[   26.697088]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.697455]  kthread+0x337/0x6f0
[   26.697651]  ret_from_fork+0x116/0x1d0
[   26.697867]  ret_from_fork_asm+0x1a/0x30
[   26.698079] 
[   26.698203] The buggy address belongs to the object at ffff88810613ea80
[   26.698203]  which belongs to the cache kmalloc-64 of size 64
[   26.699090] The buggy address is located 0 bytes to the right of
[   26.699090]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   26.699707] 
[   26.699814] The buggy address belongs to the physical page:
[   26.700057] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   26.700293] flags: 0x200000000000000(node=0|zone=2)
[   26.700828] page_type: f5(slab)
[   26.701063] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.701522] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.701935] page dumped because: kasan: bad access detected
[   26.702230] 
[   26.702362] Memory state around the buggy address:
[   26.702654]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.702985]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.703343] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.703722]                                      ^
[   26.703985]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.704383]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.704899] ==================================================================
[   26.798004] ==================================================================
[   26.798256] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   26.798662] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315
[   26.799286] 
[   26.799451] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.799520] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.799535] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.799561] Call Trace:
[   26.799596]  <TASK>
[   26.799618]  dump_stack_lvl+0x73/0xb0
[   26.799664]  print_report+0xd1/0x610
[   26.799689]  ? __virt_addr_valid+0x1db/0x2d0
[   26.799715]  ? kasan_atomics_helper+0xd47/0x5450
[   26.799755]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.799783]  ? kasan_atomics_helper+0xd47/0x5450
[   26.799805]  kasan_report+0x141/0x180
[   26.799841]  ? kasan_atomics_helper+0xd47/0x5450
[   26.799868]  kasan_check_range+0x10c/0x1c0
[   26.799998]  __kasan_check_write+0x18/0x20
[   26.800030]  kasan_atomics_helper+0xd47/0x5450
[   26.800065]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.800092]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.800119]  ? kasan_atomics+0x152/0x310
[   26.800146]  kasan_atomics+0x1dc/0x310
[   26.800170]  ? __pfx_kasan_atomics+0x10/0x10
[   26.800195]  ? __pfx_read_tsc+0x10/0x10
[   26.800218]  ? ktime_get_ts64+0x86/0x230
[   26.800246]  kunit_try_run_case+0x1a5/0x480
[   26.800312]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.800344]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.800370]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.800394]  ? __kthread_parkme+0x82/0x180
[   26.800426]  ? preempt_count_sub+0x50/0x80
[   26.800451]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.800476]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.800504]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.800532]  kthread+0x337/0x6f0
[   26.800556]  ? trace_preempt_on+0x20/0xc0
[   26.800581]  ? __pfx_kthread+0x10/0x10
[   26.800606]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.800629]  ? calculate_sigpending+0x7b/0xa0
[   26.800656]  ? __pfx_kthread+0x10/0x10
[   26.800679]  ret_from_fork+0x116/0x1d0
[   26.800701]  ? __pfx_kthread+0x10/0x10
[   26.800725]  ret_from_fork_asm+0x1a/0x30
[   26.800770]  </TASK>
[   26.800783] 
[   26.809690] Allocated by task 315:
[   26.809938]  kasan_save_stack+0x45/0x70
[   26.810172]  kasan_save_track+0x18/0x40
[   26.810307]  kasan_save_alloc_info+0x3b/0x50
[   26.810452]  __kasan_kmalloc+0xb7/0xc0
[   26.810633]  __kmalloc_cache_noprof+0x189/0x420
[   26.810933]  kasan_atomics+0x95/0x310
[   26.811128]  kunit_try_run_case+0x1a5/0x480
[   26.811333]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.811588]  kthread+0x337/0x6f0
[   26.811752]  ret_from_fork+0x116/0x1d0
[   26.812023]  ret_from_fork_asm+0x1a/0x30
[   26.812335] 
[   26.812451] The buggy address belongs to the object at ffff88810613ea80
[   26.812451]  which belongs to the cache kmalloc-64 of size 64
[   26.813549] The buggy address is located 0 bytes to the right of
[   26.813549]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   26.814650] 
[   26.814846] The buggy address belongs to the physical page:
[   26.815390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   26.816188] flags: 0x200000000000000(node=0|zone=2)
[   26.816806] page_type: f5(slab)
[   26.817172] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.817988] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.819405] page dumped because: kasan: bad access detected
[   26.819746] 
[   26.820057] Memory state around the buggy address:
[   26.820709]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.821039]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.821654] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.822098]                                      ^
[   26.822758]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.823333]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.823982] ==================================================================
[   27.450037] ==================================================================
[   27.450709] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   27.451039] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315
[   27.451260] 
[   27.451473] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   27.451537] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.451551] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.451577] Call Trace:
[   27.451596]  <TASK>
[   27.451613]  dump_stack_lvl+0x73/0xb0
[   27.451645]  print_report+0xd1/0x610
[   27.451668]  ? __virt_addr_valid+0x1db/0x2d0
[   27.451694]  ? kasan_atomics_helper+0x19e3/0x5450
[   27.451715]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.451756]  ? kasan_atomics_helper+0x19e3/0x5450
[   27.451779]  kasan_report+0x141/0x180
[   27.451802]  ? kasan_atomics_helper+0x19e3/0x5450
[   27.451828]  kasan_check_range+0x10c/0x1c0
[   27.451853]  __kasan_check_write+0x18/0x20
[   27.451876]  kasan_atomics_helper+0x19e3/0x5450
[   27.451900]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.451926]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.451952]  ? kasan_atomics+0x152/0x310
[   27.451979]  kasan_atomics+0x1dc/0x310
[   27.452002]  ? __pfx_kasan_atomics+0x10/0x10
[   27.452027]  ? __pfx_read_tsc+0x10/0x10
[   27.452050]  ? ktime_get_ts64+0x86/0x230
[   27.452077]  kunit_try_run_case+0x1a5/0x480
[   27.452100]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.452122]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.452146]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.452172]  ? __kthread_parkme+0x82/0x180
[   27.452194]  ? preempt_count_sub+0x50/0x80
[   27.452219]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.452243]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.452269]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.452344]  kthread+0x337/0x6f0
[   27.452369]  ? trace_preempt_on+0x20/0xc0
[   27.452394]  ? __pfx_kthread+0x10/0x10
[   27.452429]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.452453]  ? calculate_sigpending+0x7b/0xa0
[   27.452479]  ? __pfx_kthread+0x10/0x10
[   27.452503]  ret_from_fork+0x116/0x1d0
[   27.452523]  ? __pfx_kthread+0x10/0x10
[   27.452546]  ret_from_fork_asm+0x1a/0x30
[   27.452578]  </TASK>
[   27.452591] 
[   27.464141] Allocated by task 315:
[   27.464460]  kasan_save_stack+0x45/0x70
[   27.464697]  kasan_save_track+0x18/0x40
[   27.464888]  kasan_save_alloc_info+0x3b/0x50
[   27.465036]  __kasan_kmalloc+0xb7/0xc0
[   27.465211]  __kmalloc_cache_noprof+0x189/0x420
[   27.465509]  kasan_atomics+0x95/0x310
[   27.465817]  kunit_try_run_case+0x1a5/0x480
[   27.466071]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.466445]  kthread+0x337/0x6f0
[   27.466762]  ret_from_fork+0x116/0x1d0
[   27.466906]  ret_from_fork_asm+0x1a/0x30
[   27.467045] 
[   27.467114] The buggy address belongs to the object at ffff88810613ea80
[   27.467114]  which belongs to the cache kmalloc-64 of size 64
[   27.467649] The buggy address is located 0 bytes to the right of
[   27.467649]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.468192] 
[   27.468292] The buggy address belongs to the physical page:
[   27.469304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.469815] flags: 0x200000000000000(node=0|zone=2)
[   27.469991] page_type: f5(slab)
[   27.470111] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.470347] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.470571] page dumped because: kasan: bad access detected
[   27.470745] 
[   27.470811] Memory state around the buggy address:
[   27.470965]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.471178]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.471389] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.471598]                                      ^
[   27.471821]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.472433]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.473027] ==================================================================
[   27.361405] ==================================================================
[   27.362225] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   27.362916] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315
[   27.363748] 
[   27.364099] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   27.364166] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.364181] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.364205] Call Trace:
[   27.364227]  <TASK>
[   27.364246]  dump_stack_lvl+0x73/0xb0
[   27.364401]  print_report+0xd1/0x610
[   27.364435]  ? __virt_addr_valid+0x1db/0x2d0
[   27.364480]  ? kasan_atomics_helper+0x1818/0x5450
[   27.364503]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.364530]  ? kasan_atomics_helper+0x1818/0x5450
[   27.364552]  kasan_report+0x141/0x180
[   27.364575]  ? kasan_atomics_helper+0x1818/0x5450
[   27.364601]  kasan_check_range+0x10c/0x1c0
[   27.364626]  __kasan_check_write+0x18/0x20
[   27.364650]  kasan_atomics_helper+0x1818/0x5450
[   27.364673]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.364700]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.364726]  ? kasan_atomics+0x152/0x310
[   27.364780]  kasan_atomics+0x1dc/0x310
[   27.364805]  ? __pfx_kasan_atomics+0x10/0x10
[   27.364830]  ? __pfx_read_tsc+0x10/0x10
[   27.364853]  ? ktime_get_ts64+0x86/0x230
[   27.364880]  kunit_try_run_case+0x1a5/0x480
[   27.364904]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.364926]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.364971]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.364997]  ? __kthread_parkme+0x82/0x180
[   27.365022]  ? preempt_count_sub+0x50/0x80
[   27.365048]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.365072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.365099]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.365126]  kthread+0x337/0x6f0
[   27.365149]  ? trace_preempt_on+0x20/0xc0
[   27.365174]  ? __pfx_kthread+0x10/0x10
[   27.365197]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.365221]  ? calculate_sigpending+0x7b/0xa0
[   27.365248]  ? __pfx_kthread+0x10/0x10
[   27.365289]  ret_from_fork+0x116/0x1d0
[   27.365317]  ? __pfx_kthread+0x10/0x10
[   27.365341]  ret_from_fork_asm+0x1a/0x30
[   27.365373]  </TASK>
[   27.365386] 
[   27.377954] Allocated by task 315:
[   27.378170]  kasan_save_stack+0x45/0x70
[   27.378326]  kasan_save_track+0x18/0x40
[   27.378458]  kasan_save_alloc_info+0x3b/0x50
[   27.378773]  __kasan_kmalloc+0xb7/0xc0
[   27.379135]  __kmalloc_cache_noprof+0x189/0x420
[   27.379289]  kasan_atomics+0x95/0x310
[   27.379417]  kunit_try_run_case+0x1a5/0x480
[   27.379556]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.380051]  kthread+0x337/0x6f0
[   27.380282]  ret_from_fork+0x116/0x1d0
[   27.380441]  ret_from_fork_asm+0x1a/0x30
[   27.380628] 
[   27.380695] The buggy address belongs to the object at ffff88810613ea80
[   27.380695]  which belongs to the cache kmalloc-64 of size 64
[   27.381144] The buggy address is located 0 bytes to the right of
[   27.381144]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.381902] 
[   27.382100] The buggy address belongs to the physical page:
[   27.382314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.382810] flags: 0x200000000000000(node=0|zone=2)
[   27.383200] page_type: f5(slab)
[   27.383340] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.383565] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.383911] page dumped because: kasan: bad access detected
[   27.384352] 
[   27.384448] Memory state around the buggy address:
[   27.384695]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.384945]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.385291] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.385639]                                      ^
[   27.385936]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.386149]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.386416] ==================================================================
[   26.399562] ==================================================================
[   26.399888] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   26.400208] Read of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315
[   26.401396] 
[   26.401631] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.401779] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.401797] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.401821] Call Trace:
[   26.401838]  <TASK>
[   26.401859]  dump_stack_lvl+0x73/0xb0
[   26.401894]  print_report+0xd1/0x610
[   26.401919]  ? __virt_addr_valid+0x1db/0x2d0
[   26.401945]  ? kasan_atomics_helper+0x4b54/0x5450
[   26.401968]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.401995]  ? kasan_atomics_helper+0x4b54/0x5450
[   26.402017]  kasan_report+0x141/0x180
[   26.402041]  ? kasan_atomics_helper+0x4b54/0x5450
[   26.402067]  __asan_report_load4_noabort+0x18/0x20
[   26.402092]  kasan_atomics_helper+0x4b54/0x5450
[   26.402115]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.402142]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.402169]  ? kasan_atomics+0x152/0x310
[   26.402196]  kasan_atomics+0x1dc/0x310
[   26.402218]  ? __pfx_kasan_atomics+0x10/0x10
[   26.402243]  ? __pfx_read_tsc+0x10/0x10
[   26.402285]  ? ktime_get_ts64+0x86/0x230
[   26.402324]  kunit_try_run_case+0x1a5/0x480
[   26.402348]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.402369]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.402396]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.402429]  ? __kthread_parkme+0x82/0x180
[   26.402452]  ? preempt_count_sub+0x50/0x80
[   26.402478]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.402501]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.402528]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.402555]  kthread+0x337/0x6f0
[   26.402577]  ? trace_preempt_on+0x20/0xc0
[   26.402602]  ? __pfx_kthread+0x10/0x10
[   26.402625]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.402648]  ? calculate_sigpending+0x7b/0xa0
[   26.402675]  ? __pfx_kthread+0x10/0x10
[   26.402698]  ret_from_fork+0x116/0x1d0
[   26.402719]  ? __pfx_kthread+0x10/0x10
[   26.402753]  ret_from_fork_asm+0x1a/0x30
[   26.402785]  </TASK>
[   26.402798] 
[   26.414145] Allocated by task 315:
[   26.414467]  kasan_save_stack+0x45/0x70
[   26.414844]  kasan_save_track+0x18/0x40
[   26.415028]  kasan_save_alloc_info+0x3b/0x50
[   26.415393]  __kasan_kmalloc+0xb7/0xc0
[   26.415557]  __kmalloc_cache_noprof+0x189/0x420
[   26.415915]  kasan_atomics+0x95/0x310
[   26.416488]  kunit_try_run_case+0x1a5/0x480
[   26.416708]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.416982]  kthread+0x337/0x6f0
[   26.417147]  ret_from_fork+0x116/0x1d0
[   26.417717]  ret_from_fork_asm+0x1a/0x30
[   26.417926] 
[   26.418006] The buggy address belongs to the object at ffff88810613ea80
[   26.418006]  which belongs to the cache kmalloc-64 of size 64
[   26.419018] The buggy address is located 0 bytes to the right of
[   26.419018]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   26.419742] 
[   26.419826] The buggy address belongs to the physical page:
[   26.420245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   26.420864] flags: 0x200000000000000(node=0|zone=2)
[   26.421325] page_type: f5(slab)
[   26.421515] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.422021] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.422505] page dumped because: kasan: bad access detected
[   26.422855] 
[   26.422931] Memory state around the buggy address:
[   26.423166]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.423690]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.424130] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.424624]                                      ^
[   26.424945]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.425511]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.425935] ==================================================================
[   27.749599] ==================================================================
[   27.750172] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   27.750583] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315
[   27.750821] 
[   27.750901] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   27.750951] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.750964] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.750988] Call Trace:
[   27.751005]  <TASK>
[   27.751021]  dump_stack_lvl+0x73/0xb0
[   27.751052]  print_report+0xd1/0x610
[   27.751075]  ? __virt_addr_valid+0x1db/0x2d0
[   27.751099]  ? kasan_atomics_helper+0x2006/0x5450
[   27.751122]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.751149]  ? kasan_atomics_helper+0x2006/0x5450
[   27.751172]  kasan_report+0x141/0x180
[   27.751195]  ? kasan_atomics_helper+0x2006/0x5450
[   27.751222]  kasan_check_range+0x10c/0x1c0
[   27.751247]  __kasan_check_write+0x18/0x20
[   27.751284]  kasan_atomics_helper+0x2006/0x5450
[   27.751308]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.751348]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.751374]  ? kasan_atomics+0x152/0x310
[   27.751401]  kasan_atomics+0x1dc/0x310
[   27.751425]  ? __pfx_kasan_atomics+0x10/0x10
[   27.751450]  ? __pfx_read_tsc+0x10/0x10
[   27.751475]  ? ktime_get_ts64+0x86/0x230
[   27.751502]  kunit_try_run_case+0x1a5/0x480
[   27.751525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.751547]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.751582]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.751607]  ? __kthread_parkme+0x82/0x180
[   27.751630]  ? preempt_count_sub+0x50/0x80
[   27.751673]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.751697]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.751722]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.751759]  kthread+0x337/0x6f0
[   27.751790]  ? trace_preempt_on+0x20/0xc0
[   27.751815]  ? __pfx_kthread+0x10/0x10
[   27.751838]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.751872]  ? calculate_sigpending+0x7b/0xa0
[   27.751897]  ? __pfx_kthread+0x10/0x10
[   27.751922]  ret_from_fork+0x116/0x1d0
[   27.751941]  ? __pfx_kthread+0x10/0x10
[   27.751974]  ret_from_fork_asm+0x1a/0x30
[   27.752007]  </TASK>
[   27.752019] 
[   27.761530] Allocated by task 315:
[   27.762525]  kasan_save_stack+0x45/0x70
[   27.763877]  kasan_save_track+0x18/0x40
[   27.764030]  kasan_save_alloc_info+0x3b/0x50
[   27.764178]  __kasan_kmalloc+0xb7/0xc0
[   27.764578]  __kmalloc_cache_noprof+0x189/0x420
[   27.764811]  kasan_atomics+0x95/0x310
[   27.765085]  kunit_try_run_case+0x1a5/0x480
[   27.765621]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.765908]  kthread+0x337/0x6f0
[   27.766063]  ret_from_fork+0x116/0x1d0
[   27.766236]  ret_from_fork_asm+0x1a/0x30
[   27.766370] 
[   27.766437] The buggy address belongs to the object at ffff88810613ea80
[   27.766437]  which belongs to the cache kmalloc-64 of size 64
[   27.766833] The buggy address is located 0 bytes to the right of
[   27.766833]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.767372] 
[   27.767529] The buggy address belongs to the physical page:
[   27.767697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.767970] flags: 0x200000000000000(node=0|zone=2)
[   27.768127] page_type: f5(slab)
[   27.768240] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.768564] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.768789] page dumped because: kasan: bad access detected
[   27.769547] 
[   27.769623] Memory state around the buggy address:
[   27.769883]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.770212]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.770802] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.771137]                                      ^
[   27.771361]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.771718]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.772057] ==================================================================
[   26.452140] ==================================================================
[   26.452380] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   26.453575] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315
[   26.454430] 
[   26.454796] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.454857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.454880] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.454908] Call Trace:
[   26.454933]  <TASK>
[   26.454953]  dump_stack_lvl+0x73/0xb0
[   26.454988]  print_report+0xd1/0x610
[   26.455011]  ? __virt_addr_valid+0x1db/0x2d0
[   26.455037]  ? kasan_atomics_helper+0x4b3a/0x5450
[   26.455059]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.455092]  ? kasan_atomics_helper+0x4b3a/0x5450
[   26.455117]  kasan_report+0x141/0x180
[   26.455140]  ? kasan_atomics_helper+0x4b3a/0x5450
[   26.455167]  __asan_report_store4_noabort+0x1b/0x30
[   26.455368]  kasan_atomics_helper+0x4b3a/0x5450
[   26.455453]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.455485]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.455513]  ? kasan_atomics+0x152/0x310
[   26.455541]  kasan_atomics+0x1dc/0x310
[   26.455564]  ? __pfx_kasan_atomics+0x10/0x10
[   26.455590]  ? __pfx_read_tsc+0x10/0x10
[   26.455615]  ? ktime_get_ts64+0x86/0x230
[   26.455641]  kunit_try_run_case+0x1a5/0x480
[   26.455665]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.455686]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.455713]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.455750]  ? __kthread_parkme+0x82/0x180
[   26.455788]  ? preempt_count_sub+0x50/0x80
[   26.455833]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.455857]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.455884]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.455910]  kthread+0x337/0x6f0
[   26.455933]  ? trace_preempt_on+0x20/0xc0
[   26.455958]  ? __pfx_kthread+0x10/0x10
[   26.455981]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.456004]  ? calculate_sigpending+0x7b/0xa0
[   26.456030]  ? __pfx_kthread+0x10/0x10
[   26.456055]  ret_from_fork+0x116/0x1d0
[   26.456075]  ? __pfx_kthread+0x10/0x10
[   26.456097]  ret_from_fork_asm+0x1a/0x30
[   26.456131]  </TASK>
[   26.456143] 
[   26.469629] Allocated by task 315:
[   26.469815]  kasan_save_stack+0x45/0x70
[   26.470032]  kasan_save_track+0x18/0x40
[   26.470212]  kasan_save_alloc_info+0x3b/0x50
[   26.470828]  __kasan_kmalloc+0xb7/0xc0
[   26.471020]  __kmalloc_cache_noprof+0x189/0x420
[   26.471193]  kasan_atomics+0x95/0x310
[   26.471408]  kunit_try_run_case+0x1a5/0x480
[   26.471672]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.471921]  kthread+0x337/0x6f0
[   26.472080]  ret_from_fork+0x116/0x1d0
[   26.472249]  ret_from_fork_asm+0x1a/0x30
[   26.472977] 
[   26.473056] The buggy address belongs to the object at ffff88810613ea80
[   26.473056]  which belongs to the cache kmalloc-64 of size 64
[   26.473719] The buggy address is located 0 bytes to the right of
[   26.473719]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   26.474249] 
[   26.474343] The buggy address belongs to the physical page:
[   26.474567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   26.475261] flags: 0x200000000000000(node=0|zone=2)
[   26.475655] page_type: f5(slab)
[   26.475829] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.476257] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.476840] page dumped because: kasan: bad access detected
[   26.477162] 
[   26.477246] Memory state around the buggy address:
[   26.477447]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.477977]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.478598] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.478908]                                      ^
[   26.479123]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.479714]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.480022] ==================================================================
[   26.962569] ==================================================================
[   26.963368] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   26.963938] Read of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315
[   26.964169] 
[   26.964270] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.964329] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.964344] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.964369] Call Trace:
[   26.964392]  <TASK>
[   26.964417]  dump_stack_lvl+0x73/0xb0
[   26.964452]  print_report+0xd1/0x610
[   26.964474]  ? __virt_addr_valid+0x1db/0x2d0
[   26.964501]  ? kasan_atomics_helper+0x4a1c/0x5450
[   26.964525]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.964552]  ? kasan_atomics_helper+0x4a1c/0x5450
[   26.964575]  kasan_report+0x141/0x180
[   26.964597]  ? kasan_atomics_helper+0x4a1c/0x5450
[   26.964625]  __asan_report_load4_noabort+0x18/0x20
[   26.964650]  kasan_atomics_helper+0x4a1c/0x5450
[   26.964672]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.964699]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.964725]  ? kasan_atomics+0x152/0x310
[   26.965499]  kasan_atomics+0x1dc/0x310
[   26.965530]  ? __pfx_kasan_atomics+0x10/0x10
[   26.965557]  ? __pfx_read_tsc+0x10/0x10
[   26.965585]  ? ktime_get_ts64+0x86/0x230
[   26.965613]  kunit_try_run_case+0x1a5/0x480
[   26.965638]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.965661]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.965687]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.965712]  ? __kthread_parkme+0x82/0x180
[   26.965747]  ? preempt_count_sub+0x50/0x80
[   26.965772]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.965795]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.965822]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.965849]  kthread+0x337/0x6f0
[   26.965872]  ? trace_preempt_on+0x20/0xc0
[   26.965897]  ? __pfx_kthread+0x10/0x10
[   26.965920]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.965944]  ? calculate_sigpending+0x7b/0xa0
[   26.965971]  ? __pfx_kthread+0x10/0x10
[   26.965995]  ret_from_fork+0x116/0x1d0
[   26.966015]  ? __pfx_kthread+0x10/0x10
[   26.966038]  ret_from_fork_asm+0x1a/0x30
[   26.966072]  </TASK>
[   26.966088] 
[   26.980849] Allocated by task 315:
[   26.981505]  kasan_save_stack+0x45/0x70
[   26.981917]  kasan_save_track+0x18/0x40
[   26.982277]  kasan_save_alloc_info+0x3b/0x50
[   26.983020]  __kasan_kmalloc+0xb7/0xc0
[   26.983498]  __kmalloc_cache_noprof+0x189/0x420
[   26.983873]  kasan_atomics+0x95/0x310
[   26.984017]  kunit_try_run_case+0x1a5/0x480
[   26.984159]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.984346]  kthread+0x337/0x6f0
[   26.984466]  ret_from_fork+0x116/0x1d0
[   26.984596]  ret_from_fork_asm+0x1a/0x30
[   26.984742] 
[   26.984813] The buggy address belongs to the object at ffff88810613ea80
[   26.984813]  which belongs to the cache kmalloc-64 of size 64
[   26.985247] The buggy address is located 0 bytes to the right of
[   26.985247]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   26.985939] 
[   26.986049] The buggy address belongs to the physical page:
[   26.986255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   26.987010] flags: 0x200000000000000(node=0|zone=2)
[   26.987560] page_type: f5(slab)
[   26.987972] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.988700] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.989657] page dumped because: kasan: bad access detected
[   26.990077] 
[   26.990147] Memory state around the buggy address:
[   26.990498]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.991340]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.991841] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.992055]                                      ^
[   26.992205]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.992421]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.992628] ==================================================================
[   26.661017] ==================================================================
[   26.661462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   26.661828] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315
[   26.662166] 
[   26.662316] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.662382] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.662396] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.662466] Call Trace:
[   26.662510]  <TASK>
[   26.662539]  dump_stack_lvl+0x73/0xb0
[   26.662573]  print_report+0xd1/0x610
[   26.662607]  ? __virt_addr_valid+0x1db/0x2d0
[   26.662634]  ? kasan_atomics_helper+0x992/0x5450
[   26.662656]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.662707]  ? kasan_atomics_helper+0x992/0x5450
[   26.662745]  kasan_report+0x141/0x180
[   26.662768]  ? kasan_atomics_helper+0x992/0x5450
[   26.662795]  kasan_check_range+0x10c/0x1c0
[   26.662820]  __kasan_check_write+0x18/0x20
[   26.662843]  kasan_atomics_helper+0x992/0x5450
[   26.662867]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.662894]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.662920]  ? kasan_atomics+0x152/0x310
[   26.662947]  kasan_atomics+0x1dc/0x310
[   26.662999]  ? __pfx_kasan_atomics+0x10/0x10
[   26.663024]  ? __pfx_read_tsc+0x10/0x10
[   26.663073]  ? ktime_get_ts64+0x86/0x230
[   26.663114]  kunit_try_run_case+0x1a5/0x480
[   26.663151]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.663173]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.663199]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.663238]  ? __kthread_parkme+0x82/0x180
[   26.663275]  ? preempt_count_sub+0x50/0x80
[   26.663300]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.663323]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.663350]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.663377]  kthread+0x337/0x6f0
[   26.663480]  ? trace_preempt_on+0x20/0xc0
[   26.663517]  ? __pfx_kthread+0x10/0x10
[   26.663540]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.663565]  ? calculate_sigpending+0x7b/0xa0
[   26.663591]  ? __pfx_kthread+0x10/0x10
[   26.663616]  ret_from_fork+0x116/0x1d0
[   26.663636]  ? __pfx_kthread+0x10/0x10
[   26.663659]  ret_from_fork_asm+0x1a/0x30
[   26.663692]  </TASK>
[   26.663705] 
[   26.672857] Allocated by task 315:
[   26.672996]  kasan_save_stack+0x45/0x70
[   26.673141]  kasan_save_track+0x18/0x40
[   26.673271]  kasan_save_alloc_info+0x3b/0x50
[   26.673495]  __kasan_kmalloc+0xb7/0xc0
[   26.673681]  __kmalloc_cache_noprof+0x189/0x420
[   26.674033]  kasan_atomics+0x95/0x310
[   26.674269]  kunit_try_run_case+0x1a5/0x480
[   26.674538]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.675035]  kthread+0x337/0x6f0
[   26.675224]  ret_from_fork+0x116/0x1d0
[   26.675526]  ret_from_fork_asm+0x1a/0x30
[   26.675782] 
[   26.675873] The buggy address belongs to the object at ffff88810613ea80
[   26.675873]  which belongs to the cache kmalloc-64 of size 64
[   26.676301] The buggy address is located 0 bytes to the right of
[   26.676301]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   26.676878] 
[   26.677016] The buggy address belongs to the physical page:
[   26.677601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   26.677993] flags: 0x200000000000000(node=0|zone=2)
[   26.678258] page_type: f5(slab)
[   26.678498] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.678727] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.679115] page dumped because: kasan: bad access detected
[   26.679518] 
[   26.679625] Memory state around the buggy address:
[   26.679873]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.680212]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.680604] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.680868]                                      ^
[   26.681073]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.681691]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.681942] ==================================================================
[   26.887607] ==================================================================
[   26.887919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   26.888148] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315
[   26.888777] 
[   26.888872] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.888925] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.888940] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.888964] Call Trace:
[   26.888986]  <TASK>
[   26.889006]  dump_stack_lvl+0x73/0xb0
[   26.889038]  print_report+0xd1/0x610
[   26.889062]  ? __virt_addr_valid+0x1db/0x2d0
[   26.889088]  ? kasan_atomics_helper+0xfa9/0x5450
[   26.889123]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.889161]  ? kasan_atomics_helper+0xfa9/0x5450
[   26.889184]  kasan_report+0x141/0x180
[   26.889207]  ? kasan_atomics_helper+0xfa9/0x5450
[   26.889245]  kasan_check_range+0x10c/0x1c0
[   26.889313]  __kasan_check_write+0x18/0x20
[   26.889342]  kasan_atomics_helper+0xfa9/0x5450
[   26.889366]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.889403]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.889438]  ? kasan_atomics+0x152/0x310
[   26.889476]  kasan_atomics+0x1dc/0x310
[   26.889501]  ? __pfx_kasan_atomics+0x10/0x10
[   26.889529]  ? __pfx_read_tsc+0x10/0x10
[   26.889555]  ? ktime_get_ts64+0x86/0x230
[   26.889583]  kunit_try_run_case+0x1a5/0x480
[   26.889610]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.889632]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.889659]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.889684]  ? __kthread_parkme+0x82/0x180
[   26.889708]  ? preempt_count_sub+0x50/0x80
[   26.889745]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.889769]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.889797]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.889824]  kthread+0x337/0x6f0
[   26.889847]  ? trace_preempt_on+0x20/0xc0
[   26.889872]  ? __pfx_kthread+0x10/0x10
[   26.889895]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.889919]  ? calculate_sigpending+0x7b/0xa0
[   26.889945]  ? __pfx_kthread+0x10/0x10
[   26.889969]  ret_from_fork+0x116/0x1d0
[   26.889991]  ? __pfx_kthread+0x10/0x10
[   26.890015]  ret_from_fork_asm+0x1a/0x30
[   26.890049]  </TASK>
[   26.890062] 
[   26.898818] Allocated by task 315:
[   26.899006]  kasan_save_stack+0x45/0x70
[   26.899210]  kasan_save_track+0x18/0x40
[   26.899489]  kasan_save_alloc_info+0x3b/0x50
[   26.899641]  __kasan_kmalloc+0xb7/0xc0
[   26.899783]  __kmalloc_cache_noprof+0x189/0x420
[   26.900013]  kasan_atomics+0x95/0x310
[   26.900212]  kunit_try_run_case+0x1a5/0x480
[   26.900641]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.900911]  kthread+0x337/0x6f0
[   26.901067]  ret_from_fork+0x116/0x1d0
[   26.901200]  ret_from_fork_asm+0x1a/0x30
[   26.901412] 
[   26.901561] The buggy address belongs to the object at ffff88810613ea80
[   26.901561]  which belongs to the cache kmalloc-64 of size 64
[   26.902083] The buggy address is located 0 bytes to the right of
[   26.902083]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   26.902779] 
[   26.902884] The buggy address belongs to the physical page:
[   26.903207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   26.903651] flags: 0x200000000000000(node=0|zone=2)
[   26.903879] page_type: f5(slab)
[   26.904059] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.904298] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.904524] page dumped because: kasan: bad access detected
[   26.904689] 
[   26.904789] Memory state around the buggy address:
[   26.905008]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.905540]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.905792] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.905997]                                      ^
[   26.906143]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.906918]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.907331] ==================================================================
[   27.309662] ==================================================================
[   27.310022] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   27.310523] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315
[   27.310815] 
[   27.310930] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   27.310994] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.311009] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.311043] Call Trace:
[   27.311063]  <TASK>
[   27.311082]  dump_stack_lvl+0x73/0xb0
[   27.311114]  print_report+0xd1/0x610
[   27.311148]  ? __virt_addr_valid+0x1db/0x2d0
[   27.311173]  ? kasan_atomics_helper+0x16e7/0x5450
[   27.311196]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.311235]  ? kasan_atomics_helper+0x16e7/0x5450
[   27.311258]  kasan_report+0x141/0x180
[   27.311343]  ? kasan_atomics_helper+0x16e7/0x5450
[   27.311371]  kasan_check_range+0x10c/0x1c0
[   27.311396]  __kasan_check_write+0x18/0x20
[   27.311442]  kasan_atomics_helper+0x16e7/0x5450
[   27.311465]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.311492]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.311527]  ? kasan_atomics+0x152/0x310
[   27.311554]  kasan_atomics+0x1dc/0x310
[   27.311578]  ? __pfx_kasan_atomics+0x10/0x10
[   27.311613]  ? __pfx_read_tsc+0x10/0x10
[   27.311637]  ? ktime_get_ts64+0x86/0x230
[   27.311664]  kunit_try_run_case+0x1a5/0x480
[   27.311694]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.311717]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.311760]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.311785]  ? __kthread_parkme+0x82/0x180
[   27.311808]  ? preempt_count_sub+0x50/0x80
[   27.311833]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.311866]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.311892]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.311919]  kthread+0x337/0x6f0
[   27.311952]  ? trace_preempt_on+0x20/0xc0
[   27.311977]  ? __pfx_kthread+0x10/0x10
[   27.312001]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.312033]  ? calculate_sigpending+0x7b/0xa0
[   27.312059]  ? __pfx_kthread+0x10/0x10
[   27.312083]  ret_from_fork+0x116/0x1d0
[   27.312114]  ? __pfx_kthread+0x10/0x10
[   27.312137]  ret_from_fork_asm+0x1a/0x30
[   27.312178]  </TASK>
[   27.312191] 
[   27.320756] Allocated by task 315:
[   27.320897]  kasan_save_stack+0x45/0x70
[   27.321042]  kasan_save_track+0x18/0x40
[   27.321174]  kasan_save_alloc_info+0x3b/0x50
[   27.321349]  __kasan_kmalloc+0xb7/0xc0
[   27.321810]  __kmalloc_cache_noprof+0x189/0x420
[   27.322313]  kasan_atomics+0x95/0x310
[   27.322532]  kunit_try_run_case+0x1a5/0x480
[   27.322762]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.322935]  kthread+0x337/0x6f0
[   27.323052]  ret_from_fork+0x116/0x1d0
[   27.323180]  ret_from_fork_asm+0x1a/0x30
[   27.323548] 
[   27.323673] The buggy address belongs to the object at ffff88810613ea80
[   27.323673]  which belongs to the cache kmalloc-64 of size 64
[   27.324334] The buggy address is located 0 bytes to the right of
[   27.324334]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.324690] 
[   27.324878] The buggy address belongs to the physical page:
[   27.325328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.326101] flags: 0x200000000000000(node=0|zone=2)
[   27.326458] page_type: f5(slab)
[   27.326586] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.326825] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.327161] page dumped because: kasan: bad access detected
[   27.327533] 
[   27.327644] Memory state around the buggy address:
[   27.327890]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.328173]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.328549] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.328870]                                      ^
[   27.329086]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.329592]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.330009] ==================================================================
[   27.622804] ==================================================================
[   27.623036] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   27.623263] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315
[   27.624536] 
[   27.624822] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   27.624977] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.624996] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.625022] Call Trace:
[   27.625042]  <TASK>
[   27.625062]  dump_stack_lvl+0x73/0xb0
[   27.625132]  print_report+0xd1/0x610
[   27.625157]  ? __virt_addr_valid+0x1db/0x2d0
[   27.625185]  ? kasan_atomics_helper+0x1d7a/0x5450
[   27.625208]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.625235]  ? kasan_atomics_helper+0x1d7a/0x5450
[   27.625257]  kasan_report+0x141/0x180
[   27.625280]  ? kasan_atomics_helper+0x1d7a/0x5450
[   27.625306]  kasan_check_range+0x10c/0x1c0
[   27.625330]  __kasan_check_write+0x18/0x20
[   27.625354]  kasan_atomics_helper+0x1d7a/0x5450
[   27.625378]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.625412]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.625438]  ? kasan_atomics+0x152/0x310
[   27.625465]  kasan_atomics+0x1dc/0x310
[   27.625489]  ? __pfx_kasan_atomics+0x10/0x10
[   27.625513]  ? __pfx_read_tsc+0x10/0x10
[   27.625537]  ? ktime_get_ts64+0x86/0x230
[   27.625562]  kunit_try_run_case+0x1a5/0x480
[   27.625586]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.625607]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.625633]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.625658]  ? __kthread_parkme+0x82/0x180
[   27.625681]  ? preempt_count_sub+0x50/0x80
[   27.625706]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.625729]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.625768]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.625794]  kthread+0x337/0x6f0
[   27.625817]  ? trace_preempt_on+0x20/0xc0
[   27.625841]  ? __pfx_kthread+0x10/0x10
[   27.625864]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.625887]  ? calculate_sigpending+0x7b/0xa0
[   27.625914]  ? __pfx_kthread+0x10/0x10
[   27.625937]  ret_from_fork+0x116/0x1d0
[   27.625957]  ? __pfx_kthread+0x10/0x10
[   27.625979]  ret_from_fork_asm+0x1a/0x30
[   27.626012]  </TASK>
[   27.626024] 
[   27.637449] Allocated by task 315:
[   27.637748]  kasan_save_stack+0x45/0x70
[   27.638036]  kasan_save_track+0x18/0x40
[   27.638237]  kasan_save_alloc_info+0x3b/0x50
[   27.638584]  __kasan_kmalloc+0xb7/0xc0
[   27.638883]  __kmalloc_cache_noprof+0x189/0x420
[   27.639193]  kasan_atomics+0x95/0x310
[   27.639390]  kunit_try_run_case+0x1a5/0x480
[   27.639728]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.639979]  kthread+0x337/0x6f0
[   27.640138]  ret_from_fork+0x116/0x1d0
[   27.640311]  ret_from_fork_asm+0x1a/0x30
[   27.640715] 
[   27.640946] The buggy address belongs to the object at ffff88810613ea80
[   27.640946]  which belongs to the cache kmalloc-64 of size 64
[   27.641804] The buggy address is located 0 bytes to the right of
[   27.641804]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.642578] 
[   27.642682] The buggy address belongs to the physical page:
[   27.643091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.643593] flags: 0x200000000000000(node=0|zone=2)
[   27.643883] page_type: f5(slab)
[   27.644155] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.644614] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.645118] page dumped because: kasan: bad access detected
[   27.645310] 
[   27.645379] Memory state around the buggy address:
[   27.645543]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.645769]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.645981] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.646190]                                      ^
[   27.646344]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.646556]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.646861] ==================================================================
[   27.038466] ==================================================================
[   27.039028] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   27.039427] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315
[   27.039725] 
[   27.039850] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   27.039903] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.039918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.039941] Call Trace:
[   27.039963]  <TASK>
[   27.039980]  dump_stack_lvl+0x73/0xb0
[   27.040011]  print_report+0xd1/0x610
[   27.040033]  ? __virt_addr_valid+0x1db/0x2d0
[   27.040059]  ? kasan_atomics_helper+0x1217/0x5450
[   27.040103]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.040130]  ? kasan_atomics_helper+0x1217/0x5450
[   27.040153]  kasan_report+0x141/0x180
[   27.040177]  ? kasan_atomics_helper+0x1217/0x5450
[   27.040203]  kasan_check_range+0x10c/0x1c0
[   27.040228]  __kasan_check_write+0x18/0x20
[   27.040251]  kasan_atomics_helper+0x1217/0x5450
[   27.040275]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.040303]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.040336]  ? kasan_atomics+0x152/0x310
[   27.040362]  kasan_atomics+0x1dc/0x310
[   27.040389]  ? __pfx_kasan_atomics+0x10/0x10
[   27.040416]  ? __pfx_read_tsc+0x10/0x10
[   27.040442]  ? ktime_get_ts64+0x86/0x230
[   27.040467]  kunit_try_run_case+0x1a5/0x480
[   27.040492]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.040514]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.040540]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.040565]  ? __kthread_parkme+0x82/0x180
[   27.040587]  ? preempt_count_sub+0x50/0x80
[   27.040613]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.040637]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.040677]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.040705]  kthread+0x337/0x6f0
[   27.040762]  ? trace_preempt_on+0x20/0xc0
[   27.040806]  ? __pfx_kthread+0x10/0x10
[   27.040831]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.040854]  ? calculate_sigpending+0x7b/0xa0
[   27.040879]  ? __pfx_kthread+0x10/0x10
[   27.040904]  ret_from_fork+0x116/0x1d0
[   27.040925]  ? __pfx_kthread+0x10/0x10
[   27.040948]  ret_from_fork_asm+0x1a/0x30
[   27.040980]  </TASK>
[   27.040993] 
[   27.049102] Allocated by task 315:
[   27.049275]  kasan_save_stack+0x45/0x70
[   27.049494]  kasan_save_track+0x18/0x40
[   27.049706]  kasan_save_alloc_info+0x3b/0x50
[   27.049920]  __kasan_kmalloc+0xb7/0xc0
[   27.050102]  __kmalloc_cache_noprof+0x189/0x420
[   27.050265]  kasan_atomics+0x95/0x310
[   27.050388]  kunit_try_run_case+0x1a5/0x480
[   27.050825]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.050999]  kthread+0x337/0x6f0
[   27.051116]  ret_from_fork+0x116/0x1d0
[   27.051513]  ret_from_fork_asm+0x1a/0x30
[   27.051692] 
[   27.051766] The buggy address belongs to the object at ffff88810613ea80
[   27.051766]  which belongs to the cache kmalloc-64 of size 64
[   27.052425] The buggy address is located 0 bytes to the right of
[   27.052425]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.053081] 
[   27.053259] The buggy address belongs to the physical page:
[   27.053504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.053750] flags: 0x200000000000000(node=0|zone=2)
[   27.053989] page_type: f5(slab)
[   27.054160] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.054566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.054937] page dumped because: kasan: bad access detected
[   27.055163] 
[   27.055229] Memory state around the buggy address:
[   27.055382]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.055627]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.056784] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.057667]                                      ^
[   27.058087]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.058430]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.058720] ==================================================================
[   26.777011] ==================================================================
[   26.777627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   26.777900] Read of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315
[   26.778250] 
[   26.778490] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.778597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.778612] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.778637] Call Trace:
[   26.778679]  <TASK>
[   26.778701]  dump_stack_lvl+0x73/0xb0
[   26.778752]  print_report+0xd1/0x610
[   26.778777]  ? __virt_addr_valid+0x1db/0x2d0
[   26.778802]  ? kasan_atomics_helper+0x4a84/0x5450
[   26.778825]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.778852]  ? kasan_atomics_helper+0x4a84/0x5450
[   26.778875]  kasan_report+0x141/0x180
[   26.778898]  ? kasan_atomics_helper+0x4a84/0x5450
[   26.778924]  __asan_report_load4_noabort+0x18/0x20
[   26.778949]  kasan_atomics_helper+0x4a84/0x5450
[   26.778973]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.779002]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.779029]  ? kasan_atomics+0x152/0x310
[   26.779056]  kasan_atomics+0x1dc/0x310
[   26.779080]  ? __pfx_kasan_atomics+0x10/0x10
[   26.779105]  ? __pfx_read_tsc+0x10/0x10
[   26.779129]  ? ktime_get_ts64+0x86/0x230
[   26.779156]  kunit_try_run_case+0x1a5/0x480
[   26.779179]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.779200]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.779226]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.779250]  ? __kthread_parkme+0x82/0x180
[   26.779315]  ? preempt_count_sub+0x50/0x80
[   26.779378]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.779403]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.779440]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.779493]  kthread+0x337/0x6f0
[   26.779517]  ? trace_preempt_on+0x20/0xc0
[   26.779553]  ? __pfx_kthread+0x10/0x10
[   26.779575]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.779599]  ? calculate_sigpending+0x7b/0xa0
[   26.779626]  ? __pfx_kthread+0x10/0x10
[   26.779649]  ret_from_fork+0x116/0x1d0
[   26.779670]  ? __pfx_kthread+0x10/0x10
[   26.779693]  ret_from_fork_asm+0x1a/0x30
[   26.779726]  </TASK>
[   26.779749] 
[   26.788221] Allocated by task 315:
[   26.788657]  kasan_save_stack+0x45/0x70
[   26.788907]  kasan_save_track+0x18/0x40
[   26.789119]  kasan_save_alloc_info+0x3b/0x50
[   26.789267]  __kasan_kmalloc+0xb7/0xc0
[   26.789413]  __kmalloc_cache_noprof+0x189/0x420
[   26.789680]  kasan_atomics+0x95/0x310
[   26.790095]  kunit_try_run_case+0x1a5/0x480
[   26.790589]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.790791]  kthread+0x337/0x6f0
[   26.790914]  ret_from_fork+0x116/0x1d0
[   26.791091]  ret_from_fork_asm+0x1a/0x30
[   26.791342] 
[   26.791460] The buggy address belongs to the object at ffff88810613ea80
[   26.791460]  which belongs to the cache kmalloc-64 of size 64
[   26.792077] The buggy address is located 0 bytes to the right of
[   26.792077]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   26.792511] 
[   26.792639] The buggy address belongs to the physical page:
[   26.792916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   26.793633] flags: 0x200000000000000(node=0|zone=2)
[   26.793864] page_type: f5(slab)
[   26.794032] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.794410] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.794764] page dumped because: kasan: bad access detected
[   26.794982] 
[   26.795070] Memory state around the buggy address:
[   26.795263]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.795701]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.795987] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.796221]                                      ^
[   26.796469]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.796869]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.797147] ==================================================================
[   27.187514] ==================================================================
[   27.187889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   27.188221] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315
[   27.188591] 
[   27.188685] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   27.188752] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.188767] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.188791] Call Trace:
[   27.188809]  <TASK>
[   27.188829]  dump_stack_lvl+0x73/0xb0
[   27.188866]  print_report+0xd1/0x610
[   27.188889]  ? __virt_addr_valid+0x1db/0x2d0
[   27.188915]  ? kasan_atomics_helper+0x1467/0x5450
[   27.188942]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.188970]  ? kasan_atomics_helper+0x1467/0x5450
[   27.188992]  kasan_report+0x141/0x180
[   27.189016]  ? kasan_atomics_helper+0x1467/0x5450
[   27.189043]  kasan_check_range+0x10c/0x1c0
[   27.189068]  __kasan_check_write+0x18/0x20
[   27.189093]  kasan_atomics_helper+0x1467/0x5450
[   27.189116]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.189143]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.189169]  ? kasan_atomics+0x152/0x310
[   27.189197]  kasan_atomics+0x1dc/0x310
[   27.189220]  ? __pfx_kasan_atomics+0x10/0x10
[   27.189245]  ? __pfx_read_tsc+0x10/0x10
[   27.189670]  ? ktime_get_ts64+0x86/0x230
[   27.189707]  kunit_try_run_case+0x1a5/0x480
[   27.189744]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.189766]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.189793]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.189818]  ? __kthread_parkme+0x82/0x180
[   27.189842]  ? preempt_count_sub+0x50/0x80
[   27.189868]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.189891]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.189917]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.189944]  kthread+0x337/0x6f0
[   27.189969]  ? trace_preempt_on+0x20/0xc0
[   27.189994]  ? __pfx_kthread+0x10/0x10
[   27.190017]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.190041]  ? calculate_sigpending+0x7b/0xa0
[   27.190066]  ? __pfx_kthread+0x10/0x10
[   27.190091]  ret_from_fork+0x116/0x1d0
[   27.190111]  ? __pfx_kthread+0x10/0x10
[   27.190134]  ret_from_fork_asm+0x1a/0x30
[   27.190167]  </TASK>
[   27.190181] 
[   27.201034] Allocated by task 315:
[   27.201213]  kasan_save_stack+0x45/0x70
[   27.201408]  kasan_save_track+0x18/0x40
[   27.201904]  kasan_save_alloc_info+0x3b/0x50
[   27.202150]  __kasan_kmalloc+0xb7/0xc0
[   27.202349]  __kmalloc_cache_noprof+0x189/0x420
[   27.202756]  kasan_atomics+0x95/0x310
[   27.202939]  kunit_try_run_case+0x1a5/0x480
[   27.203127]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.203350]  kthread+0x337/0x6f0
[   27.203656]  ret_from_fork+0x116/0x1d0
[   27.203848]  ret_from_fork_asm+0x1a/0x30
[   27.204164] 
[   27.204263] The buggy address belongs to the object at ffff88810613ea80
[   27.204263]  which belongs to the cache kmalloc-64 of size 64
[   27.205025] The buggy address is located 0 bytes to the right of
[   27.205025]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.205536] 
[   27.205853] The buggy address belongs to the physical page:
[   27.206053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.206634] flags: 0x200000000000000(node=0|zone=2)
[   27.206839] page_type: f5(slab)
[   27.207129] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.207661] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.208093] page dumped because: kasan: bad access detected
[   27.208288] 
[   27.208424] Memory state around the buggy address:
[   27.208725]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.209084]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.209566] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.210014]                                      ^
[   27.210202]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.210652]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.211112] ==================================================================
[   26.825165] ==================================================================
[   26.825775] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   26.826087] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315
[   26.826706] 
[   26.827017] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.827151] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.827170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.827207] Call Trace:
[   26.827231]  <TASK>
[   26.827253]  dump_stack_lvl+0x73/0xb0
[   26.827376]  print_report+0xd1/0x610
[   26.827402]  ? __virt_addr_valid+0x1db/0x2d0
[   26.827440]  ? kasan_atomics_helper+0xde0/0x5450
[   26.827463]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.827490]  ? kasan_atomics_helper+0xde0/0x5450
[   26.827515]  kasan_report+0x141/0x180
[   26.827539]  ? kasan_atomics_helper+0xde0/0x5450
[   26.827566]  kasan_check_range+0x10c/0x1c0
[   26.827591]  __kasan_check_write+0x18/0x20
[   26.827615]  kasan_atomics_helper+0xde0/0x5450
[   26.827638]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.827666]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.827693]  ? kasan_atomics+0x152/0x310
[   26.827720]  kasan_atomics+0x1dc/0x310
[   26.827758]  ? __pfx_kasan_atomics+0x10/0x10
[   26.827783]  ? __pfx_read_tsc+0x10/0x10
[   26.827807]  ? ktime_get_ts64+0x86/0x230
[   26.827833]  kunit_try_run_case+0x1a5/0x480
[   26.827857]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.827880]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.827905]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.827931]  ? __kthread_parkme+0x82/0x180
[   26.827954]  ? preempt_count_sub+0x50/0x80
[   26.827979]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.828003]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.828029]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.828056]  kthread+0x337/0x6f0
[   26.828079]  ? trace_preempt_on+0x20/0xc0
[   26.828103]  ? __pfx_kthread+0x10/0x10
[   26.828127]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.828150]  ? calculate_sigpending+0x7b/0xa0
[   26.828176]  ? __pfx_kthread+0x10/0x10
[   26.828200]  ret_from_fork+0x116/0x1d0
[   26.828220]  ? __pfx_kthread+0x10/0x10
[   26.828244]  ret_from_fork_asm+0x1a/0x30
[   26.828328]  </TASK>
[   26.828344] 
[   26.837149] Allocated by task 315:
[   26.837327]  kasan_save_stack+0x45/0x70
[   26.837524]  kasan_save_track+0x18/0x40
[   26.837700]  kasan_save_alloc_info+0x3b/0x50
[   26.837853]  __kasan_kmalloc+0xb7/0xc0
[   26.837979]  __kmalloc_cache_noprof+0x189/0x420
[   26.838255]  kasan_atomics+0x95/0x310
[   26.838498]  kunit_try_run_case+0x1a5/0x480
[   26.838840]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.839113]  kthread+0x337/0x6f0
[   26.839232]  ret_from_fork+0x116/0x1d0
[   26.839468]  ret_from_fork_asm+0x1a/0x30
[   26.839700] 
[   26.839808] The buggy address belongs to the object at ffff88810613ea80
[   26.839808]  which belongs to the cache kmalloc-64 of size 64
[   26.840589] The buggy address is located 0 bytes to the right of
[   26.840589]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   26.841086] 
[   26.841184] The buggy address belongs to the physical page:
[   26.841553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   26.841817] flags: 0x200000000000000(node=0|zone=2)
[   26.841980] page_type: f5(slab)
[   26.842143] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.842471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.842976] page dumped because: kasan: bad access detected
[   26.843171] 
[   26.843237] Memory state around the buggy address:
[   26.843386]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.843845]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.844139] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.844550]                                      ^
[   26.844772]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.845063]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.845395] ==================================================================
[   27.648665] ==================================================================
[   27.649657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   27.650607] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315
[   27.651365] 
[   27.651614] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   27.651672] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.651687] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.651712] Call Trace:
[   27.651775]  <TASK>
[   27.651796]  dump_stack_lvl+0x73/0xb0
[   27.651831]  print_report+0xd1/0x610
[   27.651867]  ? __virt_addr_valid+0x1db/0x2d0
[   27.651894]  ? kasan_atomics_helper+0x1e12/0x5450
[   27.651917]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.651944]  ? kasan_atomics_helper+0x1e12/0x5450
[   27.651967]  kasan_report+0x141/0x180
[   27.651992]  ? kasan_atomics_helper+0x1e12/0x5450
[   27.652020]  kasan_check_range+0x10c/0x1c0
[   27.652044]  __kasan_check_write+0x18/0x20
[   27.652067]  kasan_atomics_helper+0x1e12/0x5450
[   27.652091]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.652117]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.652145]  ? kasan_atomics+0x152/0x310
[   27.652171]  kasan_atomics+0x1dc/0x310
[   27.652195]  ? __pfx_kasan_atomics+0x10/0x10
[   27.652220]  ? __pfx_read_tsc+0x10/0x10
[   27.652244]  ? ktime_get_ts64+0x86/0x230
[   27.652271]  kunit_try_run_case+0x1a5/0x480
[   27.652294]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.652319]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.652345]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.652370]  ? __kthread_parkme+0x82/0x180
[   27.652393]  ? preempt_count_sub+0x50/0x80
[   27.652430]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.652454]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.652480]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.652506]  kthread+0x337/0x6f0
[   27.652529]  ? trace_preempt_on+0x20/0xc0
[   27.652556]  ? __pfx_kthread+0x10/0x10
[   27.652579]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.652602]  ? calculate_sigpending+0x7b/0xa0
[   27.652628]  ? __pfx_kthread+0x10/0x10
[   27.652651]  ret_from_fork+0x116/0x1d0
[   27.652672]  ? __pfx_kthread+0x10/0x10
[   27.652695]  ret_from_fork_asm+0x1a/0x30
[   27.652728]  </TASK>
[   27.652751] 
[   27.665282] Allocated by task 315:
[   27.665455]  kasan_save_stack+0x45/0x70
[   27.665885]  kasan_save_track+0x18/0x40
[   27.666206]  kasan_save_alloc_info+0x3b/0x50
[   27.666588]  __kasan_kmalloc+0xb7/0xc0
[   27.666763]  __kmalloc_cache_noprof+0x189/0x420
[   27.667158]  kasan_atomics+0x95/0x310
[   27.667554]  kunit_try_run_case+0x1a5/0x480
[   27.667779]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.667954]  kthread+0x337/0x6f0
[   27.668072]  ret_from_fork+0x116/0x1d0
[   27.668203]  ret_from_fork_asm+0x1a/0x30
[   27.668344] 
[   27.668448] The buggy address belongs to the object at ffff88810613ea80
[   27.668448]  which belongs to the cache kmalloc-64 of size 64
[   27.669661] The buggy address is located 0 bytes to the right of
[   27.669661]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.670860] 
[   27.671017] The buggy address belongs to the physical page:
[   27.671603] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.672051] flags: 0x200000000000000(node=0|zone=2)
[   27.672210] page_type: f5(slab)
[   27.672333] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.672860] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.673146] page dumped because: kasan: bad access detected
[   27.673407] 
[   27.673482] Memory state around the buggy address:
[   27.673851]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.674267]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.674534] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.675212]                                      ^
[   27.675715]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.676195]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.676402] ==================================================================
[   26.325227] ==================================================================
[   26.325576] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   26.326029] Read of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315
[   26.326550] 
[   26.326675] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   26.326750] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.326764] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.326788] Call Trace:
[   26.326805]  <TASK>
[   26.326824]  dump_stack_lvl+0x73/0xb0
[   26.326867]  print_report+0xd1/0x610
[   26.326890]  ? __virt_addr_valid+0x1db/0x2d0
[   26.326916]  ? kasan_atomics_helper+0x4b88/0x5450
[   26.326949]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.326976]  ? kasan_atomics_helper+0x4b88/0x5450
[   26.326999]  kasan_report+0x141/0x180
[   26.327031]  ? kasan_atomics_helper+0x4b88/0x5450
[   26.327059]  __asan_report_load4_noabort+0x18/0x20
[   26.327084]  kasan_atomics_helper+0x4b88/0x5450
[   26.327118]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.327144]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.327181]  ? kasan_atomics+0x152/0x310
[   26.327208]  kasan_atomics+0x1dc/0x310
[   26.327232]  ? __pfx_kasan_atomics+0x10/0x10
[   26.327267]  ? __pfx_read_tsc+0x10/0x10
[   26.327351]  ? ktime_get_ts64+0x86/0x230
[   26.327389]  kunit_try_run_case+0x1a5/0x480
[   26.327414]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.327447]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.327475]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.327499]  ? __kthread_parkme+0x82/0x180
[   26.327522]  ? preempt_count_sub+0x50/0x80
[   26.327547]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.327570]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.327597]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.327624]  kthread+0x337/0x6f0
[   26.327646]  ? trace_preempt_on+0x20/0xc0
[   26.327670]  ? __pfx_kthread+0x10/0x10
[   26.327694]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.327717]  ? calculate_sigpending+0x7b/0xa0
[   26.327752]  ? __pfx_kthread+0x10/0x10
[   26.327777]  ret_from_fork+0x116/0x1d0
[   26.327797]  ? __pfx_kthread+0x10/0x10
[   26.327829]  ret_from_fork_asm+0x1a/0x30
[   26.327861]  </TASK>
[   26.327886] 
[   26.335672] Allocated by task 315:
[   26.335922]  kasan_save_stack+0x45/0x70
[   26.336125]  kasan_save_track+0x18/0x40
[   26.336309]  kasan_save_alloc_info+0x3b/0x50
[   26.336515]  __kasan_kmalloc+0xb7/0xc0
[   26.336700]  __kmalloc_cache_noprof+0x189/0x420
[   26.336874]  kasan_atomics+0x95/0x310
[   26.337002]  kunit_try_run_case+0x1a5/0x480
[   26.337597]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.337897]  kthread+0x337/0x6f0
[   26.338054]  ret_from_fork+0x116/0x1d0
[   26.338184]  ret_from_fork_asm+0x1a/0x30
[   26.338348] 
[   26.338441] The buggy address belongs to the object at ffff88810613ea80
[   26.338441]  which belongs to the cache kmalloc-64 of size 64
[   26.339043] The buggy address is located 0 bytes to the right of
[   26.339043]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   26.339637] 
[   26.339769] The buggy address belongs to the physical page:
[   26.340079] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   26.340329] flags: 0x200000000000000(node=0|zone=2)
[   26.340489] page_type: f5(slab)
[   26.340728] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.341070] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.341708] page dumped because: kasan: bad access detected
[   26.341993] 
[   26.342062] Memory state around the buggy address:
[   26.342214]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.342616]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.342983] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.343239]                                      ^
[   26.343636]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.343995]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.344446] ==================================================================
[   27.090802] ==================================================================
[   27.091125] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   27.091754] Write of size 4 at addr ffff88810613eab0 by task kunit_try_catch/315
[   27.092115] 
[   27.092417] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   27.092475] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.092546] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.092571] Call Trace:
[   27.092594]  <TASK>
[   27.092614]  dump_stack_lvl+0x73/0xb0
[   27.092648]  print_report+0xd1/0x610
[   27.092672]  ? __virt_addr_valid+0x1db/0x2d0
[   27.092697]  ? kasan_atomics_helper+0x12e6/0x5450
[   27.092720]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.092761]  ? kasan_atomics_helper+0x12e6/0x5450
[   27.092784]  kasan_report+0x141/0x180
[   27.092807]  ? kasan_atomics_helper+0x12e6/0x5450
[   27.092834]  kasan_check_range+0x10c/0x1c0
[   27.092858]  __kasan_check_write+0x18/0x20
[   27.092883]  kasan_atomics_helper+0x12e6/0x5450
[   27.092907]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.092934]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.092960]  ? kasan_atomics+0x152/0x310
[   27.092987]  kasan_atomics+0x1dc/0x310
[   27.093011]  ? __pfx_kasan_atomics+0x10/0x10
[   27.093036]  ? __pfx_read_tsc+0x10/0x10
[   27.093060]  ? ktime_get_ts64+0x86/0x230
[   27.093086]  kunit_try_run_case+0x1a5/0x480
[   27.093109]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.093131]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.093157]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.093181]  ? __kthread_parkme+0x82/0x180
[   27.093204]  ? preempt_count_sub+0x50/0x80
[   27.093230]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.093254]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.093298]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.093325]  kthread+0x337/0x6f0
[   27.093348]  ? trace_preempt_on+0x20/0xc0
[   27.093373]  ? __pfx_kthread+0x10/0x10
[   27.093396]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.093426]  ? calculate_sigpending+0x7b/0xa0
[   27.093452]  ? __pfx_kthread+0x10/0x10
[   27.093476]  ret_from_fork+0x116/0x1d0
[   27.093497]  ? __pfx_kthread+0x10/0x10
[   27.093520]  ret_from_fork_asm+0x1a/0x30
[   27.093552]  </TASK>
[   27.093565] 
[   27.103533] Allocated by task 315:
[   27.103670]  kasan_save_stack+0x45/0x70
[   27.103888]  kasan_save_track+0x18/0x40
[   27.104069]  kasan_save_alloc_info+0x3b/0x50
[   27.104602]  __kasan_kmalloc+0xb7/0xc0
[   27.104901]  __kmalloc_cache_noprof+0x189/0x420
[   27.105193]  kasan_atomics+0x95/0x310
[   27.105477]  kunit_try_run_case+0x1a5/0x480
[   27.105657]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.105989]  kthread+0x337/0x6f0
[   27.106155]  ret_from_fork+0x116/0x1d0
[   27.106324]  ret_from_fork_asm+0x1a/0x30
[   27.106714] 
[   27.106809] The buggy address belongs to the object at ffff88810613ea80
[   27.106809]  which belongs to the cache kmalloc-64 of size 64
[   27.107395] The buggy address is located 0 bytes to the right of
[   27.107395]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.108309] 
[   27.108480] The buggy address belongs to the physical page:
[   27.108709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.109176] flags: 0x200000000000000(node=0|zone=2)
[   27.109389] page_type: f5(slab)
[   27.109786] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.110152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.110613] page dumped because: kasan: bad access detected
[   27.111055] 
[   27.111162] Memory state around the buggy address:
[   27.111438]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.111922]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.112242] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.112753]                                      ^
[   27.112986]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.113313]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.113870] ==================================================================
[   27.386994] ==================================================================
[   27.387450] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   27.387781] Write of size 8 at addr ffff88810613eab0 by task kunit_try_catch/315
[   27.388034] 
[   27.388212] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   27.388264] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.388278] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.388302] Call Trace:
[   27.388330]  <TASK>
[   27.388356]  dump_stack_lvl+0x73/0xb0
[   27.388390]  print_report+0xd1/0x610
[   27.388413]  ? __virt_addr_valid+0x1db/0x2d0
[   27.389036]  ? kasan_atomics_helper+0x18b1/0x5450
[   27.389064]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.389193]  ? kasan_atomics_helper+0x18b1/0x5450
[   27.389219]  kasan_report+0x141/0x180
[   27.389244]  ? kasan_atomics_helper+0x18b1/0x5450
[   27.389279]  kasan_check_range+0x10c/0x1c0
[   27.389303]  __kasan_check_write+0x18/0x20
[   27.389328]  kasan_atomics_helper+0x18b1/0x5450
[   27.389351]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.389378]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.389405]  ? kasan_atomics+0x152/0x310
[   27.389432]  kasan_atomics+0x1dc/0x310
[   27.389456]  ? __pfx_kasan_atomics+0x10/0x10
[   27.389481]  ? __pfx_read_tsc+0x10/0x10
[   27.389505]  ? ktime_get_ts64+0x86/0x230
[   27.389532]  kunit_try_run_case+0x1a5/0x480
[   27.389554]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.389576]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.389602]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.389626]  ? __kthread_parkme+0x82/0x180
[   27.389651]  ? preempt_count_sub+0x50/0x80
[   27.389677]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.389700]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.389726]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.389764]  kthread+0x337/0x6f0
[   27.389787]  ? trace_preempt_on+0x20/0xc0
[   27.389812]  ? __pfx_kthread+0x10/0x10
[   27.389834]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.389858]  ? calculate_sigpending+0x7b/0xa0
[   27.389884]  ? __pfx_kthread+0x10/0x10
[   27.389908]  ret_from_fork+0x116/0x1d0
[   27.389928]  ? __pfx_kthread+0x10/0x10
[   27.389951]  ret_from_fork_asm+0x1a/0x30
[   27.389983]  </TASK>
[   27.389997] 
[   27.405102] Allocated by task 315:
[   27.405245]  kasan_save_stack+0x45/0x70
[   27.405681]  kasan_save_track+0x18/0x40
[   27.406054]  kasan_save_alloc_info+0x3b/0x50
[   27.406499]  __kasan_kmalloc+0xb7/0xc0
[   27.406857]  __kmalloc_cache_noprof+0x189/0x420
[   27.407271]  kasan_atomics+0x95/0x310
[   27.407622]  kunit_try_run_case+0x1a5/0x480
[   27.407929]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.408102]  kthread+0x337/0x6f0
[   27.408220]  ret_from_fork+0x116/0x1d0
[   27.408420]  ret_from_fork_asm+0x1a/0x30
[   27.408862] 
[   27.409018] The buggy address belongs to the object at ffff88810613ea80
[   27.409018]  which belongs to the cache kmalloc-64 of size 64
[   27.410364] The buggy address is located 0 bytes to the right of
[   27.410364]  allocated 48-byte region [ffff88810613ea80, ffff88810613eab0)
[   27.411542] 
[   27.411787] The buggy address belongs to the physical page:
[   27.412201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613e
[   27.412810] flags: 0x200000000000000(node=0|zone=2)
[   27.413254] page_type: f5(slab)
[   27.413615] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.413904] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.414125] page dumped because: kasan: bad access detected
[   27.414458] 
[   27.414636] Memory state around the buggy address:
[   27.415182]  ffff88810613e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.415886]  ffff88810613ea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.416635] >ffff88810613ea80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.417306]                                      ^
[   27.417845]  ffff88810613eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.418534]  ffff88810613eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.419015] ==================================================================