Hay
Date
July 14, 2025, 10:38 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   66.800594] ==================================================================
[   66.807623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   66.814914] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   66.822292] 
[   66.823773] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   66.823822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.823838] Hardware name: WinLink E850-96 board (DT)
[   66.823857] Call trace:
[   66.823870]  show_stack+0x20/0x38 (C)
[   66.823902]  dump_stack_lvl+0x8c/0xd0
[   66.823937]  print_report+0x118/0x5d0
[   66.823963]  kasan_report+0xdc/0x128
[   66.823990]  kasan_check_range+0x100/0x1a8
[   66.824020]  __kasan_check_write+0x20/0x30
[   66.824054]  kasan_atomics_helper+0x760/0x4858
[   66.824088]  kasan_atomics+0x198/0x2e0
[   66.824120]  kunit_try_run_case+0x170/0x3f0
[   66.824154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.824188]  kthread+0x328/0x630
[   66.824217]  ret_from_fork+0x10/0x20
[   66.824251] 
[   66.895207] Allocated by task 349:
[   66.898596]  kasan_save_stack+0x3c/0x68
[   66.902412]  kasan_save_track+0x20/0x40
[   66.906232]  kasan_save_alloc_info+0x40/0x58
[   66.910485]  __kasan_kmalloc+0xd4/0xd8
[   66.914217]  __kmalloc_cache_noprof+0x16c/0x3c0
[   66.918732]  kasan_atomics+0xb8/0x2e0
[   66.922377]  kunit_try_run_case+0x170/0x3f0
[   66.926544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.932013]  kthread+0x328/0x630
[   66.935224]  ret_from_fork+0x10/0x20
[   66.938783] 
[   66.940259] The buggy address belongs to the object at ffff000808448180
[   66.940259]  which belongs to the cache kmalloc-64 of size 64
[   66.952585] The buggy address is located 0 bytes to the right of
[   66.952585]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   66.965432] 
[   66.966908] The buggy address belongs to the physical page:
[   66.972465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   66.980449] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   66.986960] page_type: f5(slab)
[   66.990094] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   66.997817] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.005536] page dumped because: kasan: bad access detected
[   67.011091] 
[   67.012567] Memory state around the buggy address:
[   67.017347]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.024550]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.031754] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.038955]                                      ^
[   67.043733]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.050938]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.058139] ==================================================================
[   72.867464] ==================================================================
[   72.874546] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   72.881836] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   72.889215] 
[   72.890696] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   72.890746] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.890762] Hardware name: WinLink E850-96 board (DT)
[   72.890781] Call trace:
[   72.890796]  show_stack+0x20/0x38 (C)
[   72.890828]  dump_stack_lvl+0x8c/0xd0
[   72.890862]  print_report+0x118/0x5d0
[   72.890891]  kasan_report+0xdc/0x128
[   72.890918]  kasan_check_range+0x100/0x1a8
[   72.890947]  __kasan_check_write+0x20/0x30
[   72.890980]  kasan_atomics_helper+0xf20/0x4858
[   72.891013]  kasan_atomics+0x198/0x2e0
[   72.891046]  kunit_try_run_case+0x170/0x3f0
[   72.891080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.891116]  kthread+0x328/0x630
[   72.891146]  ret_from_fork+0x10/0x20
[   72.891177] 
[   72.962130] Allocated by task 349:
[   72.965515]  kasan_save_stack+0x3c/0x68
[   72.969335]  kasan_save_track+0x20/0x40
[   72.973155]  kasan_save_alloc_info+0x40/0x58
[   72.977408]  __kasan_kmalloc+0xd4/0xd8
[   72.981140]  __kmalloc_cache_noprof+0x16c/0x3c0
[   72.985654]  kasan_atomics+0xb8/0x2e0
[   72.989300]  kunit_try_run_case+0x170/0x3f0
[   72.993467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.998935]  kthread+0x328/0x630
[   73.002147]  ret_from_fork+0x10/0x20
[   73.005706] 
[   73.007181] The buggy address belongs to the object at ffff000808448180
[   73.007181]  which belongs to the cache kmalloc-64 of size 64
[   73.019510] The buggy address is located 0 bytes to the right of
[   73.019510]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   73.032355] 
[   73.033831] The buggy address belongs to the physical page:
[   73.039388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   73.047373] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   73.053882] page_type: f5(slab)
[   73.057017] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   73.064740] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.072458] page dumped because: kasan: bad access detected
[   73.078014] 
[   73.079490] Memory state around the buggy address:
[   73.084267]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.091472]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.098677] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.105878]                                      ^
[   73.110656]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.117860]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.125062] ==================================================================
[   63.627851] ==================================================================
[   63.634928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   63.642305] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   63.649597] 
[   63.651078] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   63.651132] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.651146] Hardware name: WinLink E850-96 board (DT)
[   63.651165] Call trace:
[   63.651178]  show_stack+0x20/0x38 (C)
[   63.651211]  dump_stack_lvl+0x8c/0xd0
[   63.651242]  print_report+0x118/0x5d0
[   63.651268]  kasan_report+0xdc/0x128
[   63.651294]  __asan_report_load4_noabort+0x20/0x30
[   63.651329]  kasan_atomics_helper+0x40fc/0x4858
[   63.651363]  kasan_atomics+0x198/0x2e0
[   63.651397]  kunit_try_run_case+0x170/0x3f0
[   63.651431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.651464]  kthread+0x328/0x630
[   63.651493]  ret_from_fork+0x10/0x20
[   63.651523] 
[   63.719213] Allocated by task 349:
[   63.722599]  kasan_save_stack+0x3c/0x68
[   63.726418]  kasan_save_track+0x20/0x40
[   63.730238]  kasan_save_alloc_info+0x40/0x58
[   63.734491]  __kasan_kmalloc+0xd4/0xd8
[   63.738224]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.742737]  kasan_atomics+0xb8/0x2e0
[   63.746384]  kunit_try_run_case+0x170/0x3f0
[   63.750550]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.756018]  kthread+0x328/0x630
[   63.759230]  ret_from_fork+0x10/0x20
[   63.762789] 
[   63.764265] The buggy address belongs to the object at ffff000808448180
[   63.764265]  which belongs to the cache kmalloc-64 of size 64
[   63.776592] The buggy address is located 0 bytes to the right of
[   63.776592]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   63.789438] 
[   63.790914] The buggy address belongs to the physical page:
[   63.796470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   63.804456] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.810966] page_type: f5(slab)
[   63.814100] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.821823] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.829541] page dumped because: kasan: bad access detected
[   63.835097] 
[   63.836572] Memory state around the buggy address:
[   63.841351]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.848555]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.855760] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.862961]                                      ^
[   63.867740]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.874944]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.882145] ==================================================================
[   71.814213] ==================================================================
[   71.821263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   71.828640] Read of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   71.835932] 
[   71.837415] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   71.837464] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.837481] Hardware name: WinLink E850-96 board (DT)
[   71.837498] Call trace:
[   71.837511]  show_stack+0x20/0x38 (C)
[   71.837543]  dump_stack_lvl+0x8c/0xd0
[   71.837575]  print_report+0x118/0x5d0
[   71.837603]  kasan_report+0xdc/0x128
[   71.837630]  __asan_report_load8_noabort+0x20/0x30
[   71.837665]  kasan_atomics_helper+0x3f58/0x4858
[   71.837701]  kasan_atomics+0x198/0x2e0
[   71.837733]  kunit_try_run_case+0x170/0x3f0
[   71.837769]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.837804]  kthread+0x328/0x630
[   71.837832]  ret_from_fork+0x10/0x20
[   71.837866] 
[   71.905549] Allocated by task 349:
[   71.908936]  kasan_save_stack+0x3c/0x68
[   71.912754]  kasan_save_track+0x20/0x40
[   71.916573]  kasan_save_alloc_info+0x40/0x58
[   71.920826]  __kasan_kmalloc+0xd4/0xd8
[   71.924559]  __kmalloc_cache_noprof+0x16c/0x3c0
[   71.929073]  kasan_atomics+0xb8/0x2e0
[   71.932719]  kunit_try_run_case+0x170/0x3f0
[   71.936885]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.942354]  kthread+0x328/0x630
[   71.945566]  ret_from_fork+0x10/0x20
[   71.949125] 
[   71.950600] The buggy address belongs to the object at ffff000808448180
[   71.950600]  which belongs to the cache kmalloc-64 of size 64
[   71.962927] The buggy address is located 0 bytes to the right of
[   71.962927]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   71.975774] 
[   71.977251] The buggy address belongs to the physical page:
[   71.982805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   71.990791] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   71.997301] page_type: f5(slab)
[   72.000434] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   72.008158] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.015877] page dumped because: kasan: bad access detected
[   72.021433] 
[   72.022908] Memory state around the buggy address:
[   72.027686]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.034891]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.042096] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.049297]                                      ^
[   72.054075]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.061279]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.068480] ==================================================================
[   68.916773] ==================================================================
[   68.923740] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   68.931028] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   68.938406] 
[   68.939890] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   68.939941] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.939957] Hardware name: WinLink E850-96 board (DT)
[   68.939980] Call trace:
[   68.939994]  show_stack+0x20/0x38 (C)
[   68.940027]  dump_stack_lvl+0x8c/0xd0
[   68.940060]  print_report+0x118/0x5d0
[   68.940088]  kasan_report+0xdc/0x128
[   68.940115]  kasan_check_range+0x100/0x1a8
[   68.940145]  __kasan_check_write+0x20/0x30
[   68.940176]  kasan_atomics_helper+0xad4/0x4858
[   68.940211]  kasan_atomics+0x198/0x2e0
[   68.940244]  kunit_try_run_case+0x170/0x3f0
[   68.940279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.940312]  kthread+0x328/0x630
[   68.940345]  ret_from_fork+0x10/0x20
[   68.940377] 
[   69.011321] Allocated by task 349:
[   69.014707]  kasan_save_stack+0x3c/0x68
[   69.018526]  kasan_save_track+0x20/0x40
[   69.022346]  kasan_save_alloc_info+0x40/0x58
[   69.026599]  __kasan_kmalloc+0xd4/0xd8
[   69.030332]  __kmalloc_cache_noprof+0x16c/0x3c0
[   69.034845]  kasan_atomics+0xb8/0x2e0
[   69.038491]  kunit_try_run_case+0x170/0x3f0
[   69.042658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.048128]  kthread+0x328/0x630
[   69.051338]  ret_from_fork+0x10/0x20
[   69.054897] 
[   69.056373] The buggy address belongs to the object at ffff000808448180
[   69.056373]  which belongs to the cache kmalloc-64 of size 64
[   69.068700] The buggy address is located 0 bytes to the right of
[   69.068700]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   69.081546] 
[   69.083023] The buggy address belongs to the physical page:
[   69.088580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   69.096565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   69.103074] page_type: f5(slab)
[   69.106210] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   69.113931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.121650] page dumped because: kasan: bad access detected
[   69.127205] 
[   69.128681] Memory state around the buggy address:
[   69.133461]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.140664]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.147868] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.155069]                                      ^
[   69.159847]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.167052]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.174253] ==================================================================
[   76.839974] ==================================================================
[   76.847056] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   76.854433] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   76.861812] 
[   76.863295] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   76.863344] Tainted: [B]=BAD_PAGE, [N]=TEST
[   76.863358] Hardware name: WinLink E850-96 board (DT)
[   76.863378] Call trace:
[   76.863390]  show_stack+0x20/0x38 (C)
[   76.863424]  dump_stack_lvl+0x8c/0xd0
[   76.863457]  print_report+0x118/0x5d0
[   76.863485]  kasan_report+0xdc/0x128
[   76.863514]  kasan_check_range+0x100/0x1a8
[   76.863545]  __kasan_check_write+0x20/0x30
[   76.863578]  kasan_atomics_helper+0x154c/0x4858
[   76.863615]  kasan_atomics+0x198/0x2e0
[   76.863647]  kunit_try_run_case+0x170/0x3f0
[   76.863683]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.863716]  kthread+0x328/0x630
[   76.863746]  ret_from_fork+0x10/0x20
[   76.863781] 
[   76.934814] Allocated by task 349:
[   76.938201]  kasan_save_stack+0x3c/0x68
[   76.942018]  kasan_save_track+0x20/0x40
[   76.945838]  kasan_save_alloc_info+0x40/0x58
[   76.950091]  __kasan_kmalloc+0xd4/0xd8
[   76.953824]  __kmalloc_cache_noprof+0x16c/0x3c0
[   76.958338]  kasan_atomics+0xb8/0x2e0
[   76.961983]  kunit_try_run_case+0x170/0x3f0
[   76.966150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.971619]  kthread+0x328/0x630
[   76.974830]  ret_from_fork+0x10/0x20
[   76.978389] 
[   76.979865] The buggy address belongs to the object at ffff000808448180
[   76.979865]  which belongs to the cache kmalloc-64 of size 64
[   76.992192] The buggy address is located 0 bytes to the right of
[   76.992192]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   77.005038] 
[   77.006514] The buggy address belongs to the physical page:
[   77.012071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   77.020056] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   77.026566] page_type: f5(slab)
[   77.029699] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   77.037423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   77.045142] page dumped because: kasan: bad access detected
[   77.050697] 
[   77.052173] Memory state around the buggy address:
[   77.056951]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.064156]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.071360] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.078562]                                      ^
[   77.083339]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.090544]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.097745] ==================================================================
[   64.681185] ==================================================================
[   64.688212] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   64.695501] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   64.702879] 
[   64.704361] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   64.704413] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.704430] Hardware name: WinLink E850-96 board (DT)
[   64.704450] Call trace:
[   64.704463]  show_stack+0x20/0x38 (C)
[   64.704497]  dump_stack_lvl+0x8c/0xd0
[   64.704529]  print_report+0x118/0x5d0
[   64.704557]  kasan_report+0xdc/0x128
[   64.704584]  kasan_check_range+0x100/0x1a8
[   64.704614]  __kasan_check_write+0x20/0x30
[   64.704644]  kasan_atomics_helper+0x414/0x4858
[   64.704678]  kasan_atomics+0x198/0x2e0
[   64.704710]  kunit_try_run_case+0x170/0x3f0
[   64.704745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.704778]  kthread+0x328/0x630
[   64.704804]  ret_from_fork+0x10/0x20
[   64.704836] 
[   64.775794] Allocated by task 349:
[   64.779182]  kasan_save_stack+0x3c/0x68
[   64.783000]  kasan_save_track+0x20/0x40
[   64.786819]  kasan_save_alloc_info+0x40/0x58
[   64.791073]  __kasan_kmalloc+0xd4/0xd8
[   64.794805]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.799319]  kasan_atomics+0xb8/0x2e0
[   64.802964]  kunit_try_run_case+0x170/0x3f0
[   64.807131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.812600]  kthread+0x328/0x630
[   64.815811]  ret_from_fork+0x10/0x20
[   64.819371] 
[   64.820846] The buggy address belongs to the object at ffff000808448180
[   64.820846]  which belongs to the cache kmalloc-64 of size 64
[   64.833172] The buggy address is located 0 bytes to the right of
[   64.833172]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   64.846019] 
[   64.847495] The buggy address belongs to the physical page:
[   64.853053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   64.861037] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   64.867547] page_type: f5(slab)
[   64.870680] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   64.878404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.886123] page dumped because: kasan: bad access detected
[   64.891678] 
[   64.893154] Memory state around the buggy address:
[   64.897932]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.905137]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.912341] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.919543]                                      ^
[   64.924320]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.931525]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.938727] ==================================================================
[   76.044790] ==================================================================
[   76.051757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   76.059133] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   76.066511] 
[   76.067994] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   76.068044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   76.068059] Hardware name: WinLink E850-96 board (DT)
[   76.068082] Call trace:
[   76.068097]  show_stack+0x20/0x38 (C)
[   76.068127]  dump_stack_lvl+0x8c/0xd0
[   76.068160]  print_report+0x118/0x5d0
[   76.068190]  kasan_report+0xdc/0x128
[   76.068219]  kasan_check_range+0x100/0x1a8
[   76.068250]  __kasan_check_write+0x20/0x30
[   76.068284]  kasan_atomics_helper+0x1414/0x4858
[   76.068319]  kasan_atomics+0x198/0x2e0
[   76.068351]  kunit_try_run_case+0x170/0x3f0
[   76.068388]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.068421]  kthread+0x328/0x630
[   76.068452]  ret_from_fork+0x10/0x20
[   76.068488] 
[   76.139513] Allocated by task 349:
[   76.142900]  kasan_save_stack+0x3c/0x68
[   76.146718]  kasan_save_track+0x20/0x40
[   76.150537]  kasan_save_alloc_info+0x40/0x58
[   76.154791]  __kasan_kmalloc+0xd4/0xd8
[   76.158523]  __kmalloc_cache_noprof+0x16c/0x3c0
[   76.163037]  kasan_atomics+0xb8/0x2e0
[   76.166683]  kunit_try_run_case+0x170/0x3f0
[   76.170850]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.176319]  kthread+0x328/0x630
[   76.179530]  ret_from_fork+0x10/0x20
[   76.183089] 
[   76.184564] The buggy address belongs to the object at ffff000808448180
[   76.184564]  which belongs to the cache kmalloc-64 of size 64
[   76.196891] The buggy address is located 0 bytes to the right of
[   76.196891]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   76.209738] 
[   76.211214] The buggy address belongs to the physical page:
[   76.216771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   76.224755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   76.231265] page_type: f5(slab)
[   76.234400] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   76.242122] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   76.249841] page dumped because: kasan: bad access detected
[   76.255397] 
[   76.256872] Memory state around the buggy address:
[   76.261653]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   76.268855]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   76.276060] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   76.283261]                                      ^
[   76.288040]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.295243]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.302445] ==================================================================
[   68.651764] ==================================================================
[   68.658811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   68.666101] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   68.673479] 
[   68.674963] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   68.675012] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.675032] Hardware name: WinLink E850-96 board (DT)
[   68.675051] Call trace:
[   68.675063]  show_stack+0x20/0x38 (C)
[   68.675096]  dump_stack_lvl+0x8c/0xd0
[   68.675130]  print_report+0x118/0x5d0
[   68.675158]  kasan_report+0xdc/0x128
[   68.675187]  kasan_check_range+0x100/0x1a8
[   68.675216]  __kasan_check_write+0x20/0x30
[   68.675249]  kasan_atomics_helper+0xa6c/0x4858
[   68.675283]  kasan_atomics+0x198/0x2e0
[   68.675315]  kunit_try_run_case+0x170/0x3f0
[   68.675350]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.675386]  kthread+0x328/0x630
[   68.675414]  ret_from_fork+0x10/0x20
[   68.675448] 
[   68.746395] Allocated by task 349:
[   68.749780]  kasan_save_stack+0x3c/0x68
[   68.753600]  kasan_save_track+0x20/0x40
[   68.757419]  kasan_save_alloc_info+0x40/0x58
[   68.761673]  __kasan_kmalloc+0xd4/0xd8
[   68.765405]  __kmalloc_cache_noprof+0x16c/0x3c0
[   68.769919]  kasan_atomics+0xb8/0x2e0
[   68.773564]  kunit_try_run_case+0x170/0x3f0
[   68.777731]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.783201]  kthread+0x328/0x630
[   68.786412]  ret_from_fork+0x10/0x20
[   68.789971] 
[   68.791446] The buggy address belongs to the object at ffff000808448180
[   68.791446]  which belongs to the cache kmalloc-64 of size 64
[   68.803773] The buggy address is located 0 bytes to the right of
[   68.803773]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   68.816619] 
[   68.818095] The buggy address belongs to the physical page:
[   68.823653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   68.831637] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   68.838147] page_type: f5(slab)
[   68.841281] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   68.849004] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.856723] page dumped because: kasan: bad access detected
[   68.862278] 
[   68.863754] Memory state around the buggy address:
[   68.868532]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.875737]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.882942] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.890143]                                      ^
[   68.894921]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.902125]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.909327] ==================================================================
[   63.098166] ==================================================================
[   63.105249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   63.112540] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   63.119917] 
[   63.121400] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   63.121455] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.121473] Hardware name: WinLink E850-96 board (DT)
[   63.121494] Call trace:
[   63.121510]  show_stack+0x20/0x38 (C)
[   63.121544]  dump_stack_lvl+0x8c/0xd0
[   63.121580]  print_report+0x118/0x5d0
[   63.121607]  kasan_report+0xdc/0x128
[   63.121634]  kasan_check_range+0x100/0x1a8
[   63.121663]  __kasan_check_write+0x20/0x30
[   63.121695]  kasan_atomics_helper+0x24c/0x4858
[   63.121730]  kasan_atomics+0x198/0x2e0
[   63.121763]  kunit_try_run_case+0x170/0x3f0
[   63.121801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.121833]  kthread+0x328/0x630
[   63.121862]  ret_from_fork+0x10/0x20
[   63.121894] 
[   63.192832] Allocated by task 349:
[   63.196220]  kasan_save_stack+0x3c/0x68
[   63.200038]  kasan_save_track+0x20/0x40
[   63.203857]  kasan_save_alloc_info+0x40/0x58
[   63.208110]  __kasan_kmalloc+0xd4/0xd8
[   63.211843]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.216356]  kasan_atomics+0xb8/0x2e0
[   63.220002]  kunit_try_run_case+0x170/0x3f0
[   63.224169]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.229638]  kthread+0x328/0x630
[   63.232849]  ret_from_fork+0x10/0x20
[   63.236408] 
[   63.237884] The buggy address belongs to the object at ffff000808448180
[   63.237884]  which belongs to the cache kmalloc-64 of size 64
[   63.250211] The buggy address is located 0 bytes to the right of
[   63.250211]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   63.263057] 
[   63.264535] The buggy address belongs to the physical page:
[   63.270090] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   63.278075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.284585] page_type: f5(slab)
[   63.287719] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.295442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.303161] page dumped because: kasan: bad access detected
[   63.308716] 
[   63.310192] Memory state around the buggy address:
[   63.314970]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.322175]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.329379] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.336580]                                      ^
[   63.341359]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.348563]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.355764] ==================================================================
[   65.740864] ==================================================================
[   65.747917] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   65.755207] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   65.762586] 
[   65.764065] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   65.764114] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.764132] Hardware name: WinLink E850-96 board (DT)
[   65.764151] Call trace:
[   65.764163]  show_stack+0x20/0x38 (C)
[   65.764195]  dump_stack_lvl+0x8c/0xd0
[   65.764229]  print_report+0x118/0x5d0
[   65.764256]  kasan_report+0xdc/0x128
[   65.764284]  kasan_check_range+0x100/0x1a8
[   65.764313]  __kasan_check_write+0x20/0x30
[   65.764344]  kasan_atomics_helper+0x5b4/0x4858
[   65.764380]  kasan_atomics+0x198/0x2e0
[   65.764411]  kunit_try_run_case+0x170/0x3f0
[   65.764445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.764481]  kthread+0x328/0x630
[   65.764509]  ret_from_fork+0x10/0x20
[   65.764540] 
[   65.835501] Allocated by task 349:
[   65.838886]  kasan_save_stack+0x3c/0x68
[   65.842706]  kasan_save_track+0x20/0x40
[   65.846525]  kasan_save_alloc_info+0x40/0x58
[   65.850779]  __kasan_kmalloc+0xd4/0xd8
[   65.854511]  __kmalloc_cache_noprof+0x16c/0x3c0
[   65.859025]  kasan_atomics+0xb8/0x2e0
[   65.862671]  kunit_try_run_case+0x170/0x3f0
[   65.866837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.872306]  kthread+0x328/0x630
[   65.875518]  ret_from_fork+0x10/0x20
[   65.879077] 
[   65.880552] The buggy address belongs to the object at ffff000808448180
[   65.880552]  which belongs to the cache kmalloc-64 of size 64
[   65.892879] The buggy address is located 0 bytes to the right of
[   65.892879]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   65.905726] 
[   65.907202] The buggy address belongs to the physical page:
[   65.912759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   65.920743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   65.927253] page_type: f5(slab)
[   65.930386] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   65.938110] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.945829] page dumped because: kasan: bad access detected
[   65.951385] 
[   65.952860] Memory state around the buggy address:
[   65.957638]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.964843]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.972048] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.979249]                                      ^
[   65.984027]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.991231]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.998433] ==================================================================
[   77.370202] ==================================================================
[   77.377257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   77.384633] Read of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   77.391925] 
[   77.393408] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   77.393457] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.393472] Hardware name: WinLink E850-96 board (DT)
[   77.393491] Call trace:
[   77.393506]  show_stack+0x20/0x38 (C)
[   77.393538]  dump_stack_lvl+0x8c/0xd0
[   77.393569]  print_report+0x118/0x5d0
[   77.393597]  kasan_report+0xdc/0x128
[   77.393625]  __asan_report_load8_noabort+0x20/0x30
[   77.393660]  kasan_atomics_helper+0x3db0/0x4858
[   77.393695]  kasan_atomics+0x198/0x2e0
[   77.393730]  kunit_try_run_case+0x170/0x3f0
[   77.393767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.393802]  kthread+0x328/0x630
[   77.393829]  ret_from_fork+0x10/0x20
[   77.393863] 
[   77.461542] Allocated by task 349:
[   77.464929]  kasan_save_stack+0x3c/0x68
[   77.468747]  kasan_save_track+0x20/0x40
[   77.472566]  kasan_save_alloc_info+0x40/0x58
[   77.476819]  __kasan_kmalloc+0xd4/0xd8
[   77.480552]  __kmalloc_cache_noprof+0x16c/0x3c0
[   77.485066]  kasan_atomics+0xb8/0x2e0
[   77.488712]  kunit_try_run_case+0x170/0x3f0
[   77.492878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.498347]  kthread+0x328/0x630
[   77.501559]  ret_from_fork+0x10/0x20
[   77.505118] 
[   77.506593] The buggy address belongs to the object at ffff000808448180
[   77.506593]  which belongs to the cache kmalloc-64 of size 64
[   77.518920] The buggy address is located 0 bytes to the right of
[   77.518920]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   77.531766] 
[   77.533242] The buggy address belongs to the physical page:
[   77.538798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   77.546784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   77.553294] page_type: f5(slab)
[   77.556428] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   77.564151] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   77.571870] page dumped because: kasan: bad access detected
[   77.577425] 
[   77.578901] Memory state around the buggy address:
[   77.583679]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.590884]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.598089] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.605290]                                      ^
[   77.610068]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.617272]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.624473] ==================================================================
[   74.722703] ==================================================================
[   74.729727] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   74.737104] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   74.744482] 
[   74.745964] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   74.746014] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.746031] Hardware name: WinLink E850-96 board (DT)
[   74.746052] Call trace:
[   74.746065]  show_stack+0x20/0x38 (C)
[   74.746096]  dump_stack_lvl+0x8c/0xd0
[   74.746128]  print_report+0x118/0x5d0
[   74.746157]  kasan_report+0xdc/0x128
[   74.746183]  kasan_check_range+0x100/0x1a8
[   74.746212]  __kasan_check_write+0x20/0x30
[   74.746247]  kasan_atomics_helper+0x11f8/0x4858
[   74.746283]  kasan_atomics+0x198/0x2e0
[   74.746316]  kunit_try_run_case+0x170/0x3f0
[   74.746351]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.746386]  kthread+0x328/0x630
[   74.746416]  ret_from_fork+0x10/0x20
[   74.746450] 
[   74.817484] Allocated by task 349:
[   74.820870]  kasan_save_stack+0x3c/0x68
[   74.824689]  kasan_save_track+0x20/0x40
[   74.828509]  kasan_save_alloc_info+0x40/0x58
[   74.832762]  __kasan_kmalloc+0xd4/0xd8
[   74.836494]  __kmalloc_cache_noprof+0x16c/0x3c0
[   74.841009]  kasan_atomics+0xb8/0x2e0
[   74.844654]  kunit_try_run_case+0x170/0x3f0
[   74.848820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.854291]  kthread+0x328/0x630
[   74.857501]  ret_from_fork+0x10/0x20
[   74.861060] 
[   74.862535] The buggy address belongs to the object at ffff000808448180
[   74.862535]  which belongs to the cache kmalloc-64 of size 64
[   74.874864] The buggy address is located 0 bytes to the right of
[   74.874864]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   74.887709] 
[   74.889185] The buggy address belongs to the physical page:
[   74.894741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   74.902727] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   74.909236] page_type: f5(slab)
[   74.912369] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   74.920093] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.927813] page dumped because: kasan: bad access detected
[   74.933368] 
[   74.934844] Memory state around the buggy address:
[   74.939623]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.946826]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.954031] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.961232]                                      ^
[   74.966010]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.973215]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.980416] ==================================================================
[   66.270698] ==================================================================
[   66.277770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   66.285061] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   66.292439] 
[   66.293922] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   66.293970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.293988] Hardware name: WinLink E850-96 board (DT)
[   66.294008] Call trace:
[   66.294022]  show_stack+0x20/0x38 (C)
[   66.294055]  dump_stack_lvl+0x8c/0xd0
[   66.294088]  print_report+0x118/0x5d0
[   66.294115]  kasan_report+0xdc/0x128
[   66.294143]  kasan_check_range+0x100/0x1a8
[   66.294172]  __kasan_check_write+0x20/0x30
[   66.294207]  kasan_atomics_helper+0x684/0x4858
[   66.294242]  kasan_atomics+0x198/0x2e0
[   66.294274]  kunit_try_run_case+0x170/0x3f0
[   66.294308]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.294343]  kthread+0x328/0x630
[   66.294374]  ret_from_fork+0x10/0x20
[   66.294409] 
[   66.365354] Allocated by task 349:
[   66.368742]  kasan_save_stack+0x3c/0x68
[   66.372559]  kasan_save_track+0x20/0x40
[   66.376379]  kasan_save_alloc_info+0x40/0x58
[   66.380632]  __kasan_kmalloc+0xd4/0xd8
[   66.384365]  __kmalloc_cache_noprof+0x16c/0x3c0
[   66.388878]  kasan_atomics+0xb8/0x2e0
[   66.392524]  kunit_try_run_case+0x170/0x3f0
[   66.396691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.402159]  kthread+0x328/0x630
[   66.405371]  ret_from_fork+0x10/0x20
[   66.408930] 
[   66.410405] The buggy address belongs to the object at ffff000808448180
[   66.410405]  which belongs to the cache kmalloc-64 of size 64
[   66.422732] The buggy address is located 0 bytes to the right of
[   66.422732]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   66.435579] 
[   66.437057] The buggy address belongs to the physical page:
[   66.442613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   66.450598] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   66.457107] page_type: f5(slab)
[   66.460240] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   66.467964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.475683] page dumped because: kasan: bad access detected
[   66.481238] 
[   66.482714] Memory state around the buggy address:
[   66.487493]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.494696]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.501901] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.509102]                                      ^
[   66.513880]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.521085]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.528286] ==================================================================
[   71.549457] ==================================================================
[   71.556510] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   71.563801] Read of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   71.571092] 
[   71.572577] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   71.572627] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.572642] Hardware name: WinLink E850-96 board (DT)
[   71.572662] Call trace:
[   71.572677]  show_stack+0x20/0x38 (C)
[   71.572708]  dump_stack_lvl+0x8c/0xd0
[   71.572741]  print_report+0x118/0x5d0
[   71.572769]  kasan_report+0xdc/0x128
[   71.572795]  kasan_check_range+0x100/0x1a8
[   71.572827]  __kasan_check_read+0x20/0x30
[   71.572858]  kasan_atomics_helper+0xdd4/0x4858
[   71.572894]  kasan_atomics+0x198/0x2e0
[   71.572925]  kunit_try_run_case+0x170/0x3f0
[   71.572962]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.572995]  kthread+0x328/0x630
[   71.573025]  ret_from_fork+0x10/0x20
[   71.573055] 
[   71.643921] Allocated by task 349:
[   71.647308]  kasan_save_stack+0x3c/0x68
[   71.651125]  kasan_save_track+0x20/0x40
[   71.654945]  kasan_save_alloc_info+0x40/0x58
[   71.659198]  __kasan_kmalloc+0xd4/0xd8
[   71.662931]  __kmalloc_cache_noprof+0x16c/0x3c0
[   71.667445]  kasan_atomics+0xb8/0x2e0
[   71.671091]  kunit_try_run_case+0x170/0x3f0
[   71.675257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.680726]  kthread+0x328/0x630
[   71.683938]  ret_from_fork+0x10/0x20
[   71.687497] 
[   71.688972] The buggy address belongs to the object at ffff000808448180
[   71.688972]  which belongs to the cache kmalloc-64 of size 64
[   71.701299] The buggy address is located 0 bytes to the right of
[   71.701299]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   71.714146] 
[   71.715623] The buggy address belongs to the physical page:
[   71.721178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   71.729163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   71.735673] page_type: f5(slab)
[   71.738806] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   71.746530] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   71.754249] page dumped because: kasan: bad access detected
[   71.759804] 
[   71.761280] Memory state around the buggy address:
[   71.766058]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.773263]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.780468] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   71.787668]                                      ^
[   71.792446]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.799651]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.806852] ==================================================================
[   70.761273] ==================================================================
[   70.768330] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   70.775705] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   70.782996] 
[   70.784479] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   70.784529] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.784544] Hardware name: WinLink E850-96 board (DT)
[   70.784565] Call trace:
[   70.784577]  show_stack+0x20/0x38 (C)
[   70.784608]  dump_stack_lvl+0x8c/0xd0
[   70.784640]  print_report+0x118/0x5d0
[   70.784669]  kasan_report+0xdc/0x128
[   70.784698]  __asan_report_load4_noabort+0x20/0x30
[   70.784731]  kasan_atomics_helper+0x3dd8/0x4858
[   70.784766]  kasan_atomics+0x198/0x2e0
[   70.784798]  kunit_try_run_case+0x170/0x3f0
[   70.784834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.784867]  kthread+0x328/0x630
[   70.784897]  ret_from_fork+0x10/0x20
[   70.784929] 
[   70.852613] Allocated by task 349:
[   70.856000]  kasan_save_stack+0x3c/0x68
[   70.859818]  kasan_save_track+0x20/0x40
[   70.863638]  kasan_save_alloc_info+0x40/0x58
[   70.867891]  __kasan_kmalloc+0xd4/0xd8
[   70.871624]  __kmalloc_cache_noprof+0x16c/0x3c0
[   70.876138]  kasan_atomics+0xb8/0x2e0
[   70.879783]  kunit_try_run_case+0x170/0x3f0
[   70.883949]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.889418]  kthread+0x328/0x630
[   70.892630]  ret_from_fork+0x10/0x20
[   70.896189] 
[   70.897664] The buggy address belongs to the object at ffff000808448180
[   70.897664]  which belongs to the cache kmalloc-64 of size 64
[   70.909991] The buggy address is located 0 bytes to the right of
[   70.909991]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   70.922838] 
[   70.924314] The buggy address belongs to the physical page:
[   70.929870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   70.937856] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   70.944365] page_type: f5(slab)
[   70.947500] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   70.955223] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.962941] page dumped because: kasan: bad access detected
[   70.968497] 
[   70.969972] Memory state around the buggy address:
[   70.974750]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.981955]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.989160] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.996361]                                      ^
[   71.001139]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.008344]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.015545] ==================================================================
[   64.946178] ==================================================================
[   64.953141] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   64.960428] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   64.967806] 
[   64.969289] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   64.969339] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.969356] Hardware name: WinLink E850-96 board (DT)
[   64.969377] Call trace:
[   64.969389]  show_stack+0x20/0x38 (C)
[   64.969421]  dump_stack_lvl+0x8c/0xd0
[   64.969456]  print_report+0x118/0x5d0
[   64.969485]  kasan_report+0xdc/0x128
[   64.969513]  kasan_check_range+0x100/0x1a8
[   64.969544]  __kasan_check_write+0x20/0x30
[   64.969575]  kasan_atomics_helper+0x47c/0x4858
[   64.969608]  kasan_atomics+0x198/0x2e0
[   64.969639]  kunit_try_run_case+0x170/0x3f0
[   64.969672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.969705]  kthread+0x328/0x630
[   64.969736]  ret_from_fork+0x10/0x20
[   64.969767] 
[   65.040721] Allocated by task 349:
[   65.044107]  kasan_save_stack+0x3c/0x68
[   65.047926]  kasan_save_track+0x20/0x40
[   65.051746]  kasan_save_alloc_info+0x40/0x58
[   65.055999]  __kasan_kmalloc+0xd4/0xd8
[   65.059732]  __kmalloc_cache_noprof+0x16c/0x3c0
[   65.064246]  kasan_atomics+0xb8/0x2e0
[   65.067891]  kunit_try_run_case+0x170/0x3f0
[   65.072057]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.077526]  kthread+0x328/0x630
[   65.080738]  ret_from_fork+0x10/0x20
[   65.084297] 
[   65.085772] The buggy address belongs to the object at ffff000808448180
[   65.085772]  which belongs to the cache kmalloc-64 of size 64
[   65.098099] The buggy address is located 0 bytes to the right of
[   65.098099]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   65.110946] 
[   65.112424] The buggy address belongs to the physical page:
[   65.117979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   65.125965] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   65.132474] page_type: f5(slab)
[   65.135608] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   65.143331] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.151050] page dumped because: kasan: bad access detected
[   65.156605] 
[   65.158080] Memory state around the buggy address:
[   65.162859]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.170063]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.177268] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.184469]                                      ^
[   65.189247]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.196452]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.203653] ==================================================================
[   67.595318] ==================================================================
[   67.602405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   67.609780] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   67.617072] 
[   67.618556] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   67.618607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.618623] Hardware name: WinLink E850-96 board (DT)
[   67.618643] Call trace:
[   67.618655]  show_stack+0x20/0x38 (C)
[   67.618688]  dump_stack_lvl+0x8c/0xd0
[   67.618723]  print_report+0x118/0x5d0
[   67.618751]  kasan_report+0xdc/0x128
[   67.618777]  __asan_report_load4_noabort+0x20/0x30
[   67.618812]  kasan_atomics_helper+0x42d8/0x4858
[   67.618848]  kasan_atomics+0x198/0x2e0
[   67.618880]  kunit_try_run_case+0x170/0x3f0
[   67.618918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.618953]  kthread+0x328/0x630
[   67.618983]  ret_from_fork+0x10/0x20
[   67.619013] 
[   67.686689] Allocated by task 349:
[   67.690076]  kasan_save_stack+0x3c/0x68
[   67.693894]  kasan_save_track+0x20/0x40
[   67.697713]  kasan_save_alloc_info+0x40/0x58
[   67.701966]  __kasan_kmalloc+0xd4/0xd8
[   67.705699]  __kmalloc_cache_noprof+0x16c/0x3c0
[   67.710212]  kasan_atomics+0xb8/0x2e0
[   67.713858]  kunit_try_run_case+0x170/0x3f0
[   67.718025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.723494]  kthread+0x328/0x630
[   67.726705]  ret_from_fork+0x10/0x20
[   67.730265] 
[   67.731740] The buggy address belongs to the object at ffff000808448180
[   67.731740]  which belongs to the cache kmalloc-64 of size 64
[   67.744067] The buggy address is located 0 bytes to the right of
[   67.744067]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   67.756913] 
[   67.758389] The buggy address belongs to the physical page:
[   67.763946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   67.771930] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   67.778441] page_type: f5(slab)
[   67.781573] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   67.789298] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.797017] page dumped because: kasan: bad access detected
[   67.802572] 
[   67.804048] Memory state around the buggy address:
[   67.808827]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.816031]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.823235] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.830437]                                      ^
[   67.835214]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.842419]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.849620] ==================================================================
[   71.287829] ==================================================================
[   71.294882] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   71.302259] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   71.309551] 
[   71.311036] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   71.311086] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.311103] Hardware name: WinLink E850-96 board (DT)
[   71.311122] Call trace:
[   71.311136]  show_stack+0x20/0x38 (C)
[   71.311168]  dump_stack_lvl+0x8c/0xd0
[   71.311201]  print_report+0x118/0x5d0
[   71.311230]  kasan_report+0xdc/0x128
[   71.311258]  __asan_report_load4_noabort+0x20/0x30
[   71.311294]  kasan_atomics_helper+0x3e04/0x4858
[   71.311329]  kasan_atomics+0x198/0x2e0
[   71.311362]  kunit_try_run_case+0x170/0x3f0
[   71.311397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.311431]  kthread+0x328/0x630
[   71.311460]  ret_from_fork+0x10/0x20
[   71.311494] 
[   71.379168] Allocated by task 349:
[   71.382555]  kasan_save_stack+0x3c/0x68
[   71.386372]  kasan_save_track+0x20/0x40
[   71.390192]  kasan_save_alloc_info+0x40/0x58
[   71.394445]  __kasan_kmalloc+0xd4/0xd8
[   71.398178]  __kmalloc_cache_noprof+0x16c/0x3c0
[   71.402692]  kasan_atomics+0xb8/0x2e0
[   71.406338]  kunit_try_run_case+0x170/0x3f0
[   71.410504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.415973]  kthread+0x328/0x630
[   71.419185]  ret_from_fork+0x10/0x20
[   71.422744] 
[   71.424219] The buggy address belongs to the object at ffff000808448180
[   71.424219]  which belongs to the cache kmalloc-64 of size 64
[   71.436546] The buggy address is located 0 bytes to the right of
[   71.436546]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   71.449393] 
[   71.450870] The buggy address belongs to the physical page:
[   71.456424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   71.464410] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   71.470920] page_type: f5(slab)
[   71.474055] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   71.481777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   71.489496] page dumped because: kasan: bad access detected
[   71.495051] 
[   71.496527] Memory state around the buggy address:
[   71.501305]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.508510]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.515715] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   71.522916]                                      ^
[   71.527694]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.534898]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.542100] ==================================================================
[   70.496372] ==================================================================
[   70.503403] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   70.510692] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   70.518070] 
[   70.519553] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   70.519604] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.519621] Hardware name: WinLink E850-96 board (DT)
[   70.519644] Call trace:
[   70.519658]  show_stack+0x20/0x38 (C)
[   70.519688]  dump_stack_lvl+0x8c/0xd0
[   70.519718]  print_report+0x118/0x5d0
[   70.519746]  kasan_report+0xdc/0x128
[   70.519774]  kasan_check_range+0x100/0x1a8
[   70.519803]  __kasan_check_write+0x20/0x30
[   70.519837]  kasan_atomics_helper+0xca0/0x4858
[   70.519871]  kasan_atomics+0x198/0x2e0
[   70.519904]  kunit_try_run_case+0x170/0x3f0
[   70.519939]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.519975]  kthread+0x328/0x630
[   70.520003]  ret_from_fork+0x10/0x20
[   70.520034] 
[   70.590985] Allocated by task 349:
[   70.594372]  kasan_save_stack+0x3c/0x68
[   70.598190]  kasan_save_track+0x20/0x40
[   70.602010]  kasan_save_alloc_info+0x40/0x58
[   70.606263]  __kasan_kmalloc+0xd4/0xd8
[   70.609996]  __kmalloc_cache_noprof+0x16c/0x3c0
[   70.614509]  kasan_atomics+0xb8/0x2e0
[   70.618155]  kunit_try_run_case+0x170/0x3f0
[   70.622322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.627792]  kthread+0x328/0x630
[   70.631002]  ret_from_fork+0x10/0x20
[   70.634561] 
[   70.636036] The buggy address belongs to the object at ffff000808448180
[   70.636036]  which belongs to the cache kmalloc-64 of size 64
[   70.648363] The buggy address is located 0 bytes to the right of
[   70.648363]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   70.661210] 
[   70.662686] The buggy address belongs to the physical page:
[   70.668243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   70.676227] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   70.682737] page_type: f5(slab)
[   70.685870] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   70.693595] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.701314] page dumped because: kasan: bad access detected
[   70.706869] 
[   70.708344] Memory state around the buggy address:
[   70.713124]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.720327]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.727532] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.734733]                                      ^
[   70.739511]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.746716]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.753917] ==================================================================
[   73.662304] ==================================================================
[   73.669326] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   73.676703] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   73.684081] 
[   73.685564] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   73.685616] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.685634] Hardware name: WinLink E850-96 board (DT)
[   73.685655] Call trace:
[   73.685667]  show_stack+0x20/0x38 (C)
[   73.685702]  dump_stack_lvl+0x8c/0xd0
[   73.685734]  print_report+0x118/0x5d0
[   73.685761]  kasan_report+0xdc/0x128
[   73.685788]  kasan_check_range+0x100/0x1a8
[   73.685818]  __kasan_check_write+0x20/0x30
[   73.685850]  kasan_atomics_helper+0x1058/0x4858
[   73.685886]  kasan_atomics+0x198/0x2e0
[   73.685918]  kunit_try_run_case+0x170/0x3f0
[   73.685954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.685990]  kthread+0x328/0x630
[   73.686019]  ret_from_fork+0x10/0x20
[   73.686052] 
[   73.757083] Allocated by task 349:
[   73.760469]  kasan_save_stack+0x3c/0x68
[   73.764289]  kasan_save_track+0x20/0x40
[   73.768108]  kasan_save_alloc_info+0x40/0x58
[   73.772361]  __kasan_kmalloc+0xd4/0xd8
[   73.776094]  __kmalloc_cache_noprof+0x16c/0x3c0
[   73.780607]  kasan_atomics+0xb8/0x2e0
[   73.784253]  kunit_try_run_case+0x170/0x3f0
[   73.788420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.793889]  kthread+0x328/0x630
[   73.797100]  ret_from_fork+0x10/0x20
[   73.800659] 
[   73.802136] The buggy address belongs to the object at ffff000808448180
[   73.802136]  which belongs to the cache kmalloc-64 of size 64
[   73.814463] The buggy address is located 0 bytes to the right of
[   73.814463]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   73.827308] 
[   73.828784] The buggy address belongs to the physical page:
[   73.834343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   73.842326] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   73.848836] page_type: f5(slab)
[   73.851970] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   73.859693] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.867412] page dumped because: kasan: bad access detected
[   73.872967] 
[   73.874443] Memory state around the buggy address:
[   73.879221]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.886425]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.893630] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.900831]                                      ^
[   73.905609]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.912814]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.920015] ==================================================================
[   73.132446] ==================================================================
[   73.139475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   73.146763] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   73.154141] 
[   73.155624] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   73.155675] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.155690] Hardware name: WinLink E850-96 board (DT)
[   73.155712] Call trace:
[   73.155724]  show_stack+0x20/0x38 (C)
[   73.155755]  dump_stack_lvl+0x8c/0xd0
[   73.155788]  print_report+0x118/0x5d0
[   73.155816]  kasan_report+0xdc/0x128
[   73.155844]  kasan_check_range+0x100/0x1a8
[   73.155873]  __kasan_check_write+0x20/0x30
[   73.155906]  kasan_atomics_helper+0xf88/0x4858
[   73.155942]  kasan_atomics+0x198/0x2e0
[   73.155975]  kunit_try_run_case+0x170/0x3f0
[   73.156007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.156041]  kthread+0x328/0x630
[   73.156067]  ret_from_fork+0x10/0x20
[   73.156102] 
[   73.227057] Allocated by task 349:
[   73.230442]  kasan_save_stack+0x3c/0x68
[   73.234262]  kasan_save_track+0x20/0x40
[   73.238081]  kasan_save_alloc_info+0x40/0x58
[   73.242335]  __kasan_kmalloc+0xd4/0xd8
[   73.246067]  __kmalloc_cache_noprof+0x16c/0x3c0
[   73.250581]  kasan_atomics+0xb8/0x2e0
[   73.254227]  kunit_try_run_case+0x170/0x3f0
[   73.258393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.263863]  kthread+0x328/0x630
[   73.267074]  ret_from_fork+0x10/0x20
[   73.270633] 
[   73.272108] The buggy address belongs to the object at ffff000808448180
[   73.272108]  which belongs to the cache kmalloc-64 of size 64
[   73.284436] The buggy address is located 0 bytes to the right of
[   73.284436]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   73.297281] 
[   73.298757] The buggy address belongs to the physical page:
[   73.304315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   73.312299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   73.318809] page_type: f5(slab)
[   73.321943] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   73.329666] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.337385] page dumped because: kasan: bad access detected
[   73.342940] 
[   73.344416] Memory state around the buggy address:
[   73.349194]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.356399]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.363604] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.370805]                                      ^
[   73.375582]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.382787]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.389988] ==================================================================
[   69.708164] ==================================================================
[   69.715220] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   69.722596] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   69.729887] 
[   69.731370] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   69.731422] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.731437] Hardware name: WinLink E850-96 board (DT)
[   69.731456] Call trace:
[   69.731471]  show_stack+0x20/0x38 (C)
[   69.731503]  dump_stack_lvl+0x8c/0xd0
[   69.731535]  print_report+0x118/0x5d0
[   69.731563]  kasan_report+0xdc/0x128
[   69.731591]  __asan_report_load4_noabort+0x20/0x30
[   69.731626]  kasan_atomics_helper+0x3dbc/0x4858
[   69.731660]  kasan_atomics+0x198/0x2e0
[   69.731693]  kunit_try_run_case+0x170/0x3f0
[   69.731730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.731765]  kthread+0x328/0x630
[   69.731796]  ret_from_fork+0x10/0x20
[   69.731826] 
[   69.799504] Allocated by task 349:
[   69.802891]  kasan_save_stack+0x3c/0x68
[   69.806709]  kasan_save_track+0x20/0x40
[   69.810528]  kasan_save_alloc_info+0x40/0x58
[   69.814782]  __kasan_kmalloc+0xd4/0xd8
[   69.818514]  __kmalloc_cache_noprof+0x16c/0x3c0
[   69.823028]  kasan_atomics+0xb8/0x2e0
[   69.826674]  kunit_try_run_case+0x170/0x3f0
[   69.830840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.836309]  kthread+0x328/0x630
[   69.839521]  ret_from_fork+0x10/0x20
[   69.843080] 
[   69.844555] The buggy address belongs to the object at ffff000808448180
[   69.844555]  which belongs to the cache kmalloc-64 of size 64
[   69.856882] The buggy address is located 0 bytes to the right of
[   69.856882]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   69.869729] 
[   69.871205] The buggy address belongs to the physical page:
[   69.876762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   69.884746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   69.891256] page_type: f5(slab)
[   69.894391] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   69.902114] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.909832] page dumped because: kasan: bad access detected
[   69.915388] 
[   69.916863] Memory state around the buggy address:
[   69.921643]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.928846]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.936051] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.943252]                                      ^
[   69.948030]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.955234]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.962436] ==================================================================
[   74.192473] ==================================================================
[   74.199527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   74.206904] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   74.214282] 
[   74.215764] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   74.215813] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.215831] Hardware name: WinLink E850-96 board (DT)
[   74.215847] Call trace:
[   74.215857]  show_stack+0x20/0x38 (C)
[   74.215889]  dump_stack_lvl+0x8c/0xd0
[   74.215922]  print_report+0x118/0x5d0
[   74.215952]  kasan_report+0xdc/0x128
[   74.215980]  kasan_check_range+0x100/0x1a8
[   74.216011]  __kasan_check_write+0x20/0x30
[   74.216044]  kasan_atomics_helper+0x1128/0x4858
[   74.216080]  kasan_atomics+0x198/0x2e0
[   74.216111]  kunit_try_run_case+0x170/0x3f0
[   74.216145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.216180]  kthread+0x328/0x630
[   74.216208]  ret_from_fork+0x10/0x20
[   74.216240] 
[   74.287284] Allocated by task 349:
[   74.290670]  kasan_save_stack+0x3c/0x68
[   74.294489]  kasan_save_track+0x20/0x40
[   74.298308]  kasan_save_alloc_info+0x40/0x58
[   74.302562]  __kasan_kmalloc+0xd4/0xd8
[   74.306294]  __kmalloc_cache_noprof+0x16c/0x3c0
[   74.310808]  kasan_atomics+0xb8/0x2e0
[   74.314454]  kunit_try_run_case+0x170/0x3f0
[   74.318620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.324090]  kthread+0x328/0x630
[   74.327301]  ret_from_fork+0x10/0x20
[   74.330860] 
[   74.332335] The buggy address belongs to the object at ffff000808448180
[   74.332335]  which belongs to the cache kmalloc-64 of size 64
[   74.344663] The buggy address is located 0 bytes to the right of
[   74.344663]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   74.357509] 
[   74.358984] The buggy address belongs to the physical page:
[   74.364542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   74.372526] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   74.379036] page_type: f5(slab)
[   74.382169] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   74.389893] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.397612] page dumped because: kasan: bad access detected
[   74.403168] 
[   74.404643] Memory state around the buggy address:
[   74.409423]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.416626]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.423831] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.431031]                                      ^
[   74.435811]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.443014]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.450216] ==================================================================
[   76.309827] ==================================================================
[   76.316857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   76.324233] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   76.331611] 
[   76.333094] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   76.333143] Tainted: [B]=BAD_PAGE, [N]=TEST
[   76.333159] Hardware name: WinLink E850-96 board (DT)
[   76.333179] Call trace:
[   76.333193]  show_stack+0x20/0x38 (C)
[   76.333225]  dump_stack_lvl+0x8c/0xd0
[   76.333257]  print_report+0x118/0x5d0
[   76.333285]  kasan_report+0xdc/0x128
[   76.333313]  kasan_check_range+0x100/0x1a8
[   76.333345]  __kasan_check_write+0x20/0x30
[   76.333377]  kasan_atomics_helper+0x147c/0x4858
[   76.333413]  kasan_atomics+0x198/0x2e0
[   76.333447]  kunit_try_run_case+0x170/0x3f0
[   76.333483]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.333516]  kthread+0x328/0x630
[   76.333545]  ret_from_fork+0x10/0x20
[   76.333579] 
[   76.404613] Allocated by task 349:
[   76.408000]  kasan_save_stack+0x3c/0x68
[   76.411818]  kasan_save_track+0x20/0x40
[   76.415637]  kasan_save_alloc_info+0x40/0x58
[   76.419891]  __kasan_kmalloc+0xd4/0xd8
[   76.423624]  __kmalloc_cache_noprof+0x16c/0x3c0
[   76.428137]  kasan_atomics+0xb8/0x2e0
[   76.431783]  kunit_try_run_case+0x170/0x3f0
[   76.435950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.441418]  kthread+0x328/0x630
[   76.444630]  ret_from_fork+0x10/0x20
[   76.448189] 
[   76.449664] The buggy address belongs to the object at ffff000808448180
[   76.449664]  which belongs to the cache kmalloc-64 of size 64
[   76.461991] The buggy address is located 0 bytes to the right of
[   76.461991]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   76.474838] 
[   76.476313] The buggy address belongs to the physical page:
[   76.481870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   76.489856] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   76.496366] page_type: f5(slab)
[   76.499498] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   76.507222] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   76.514941] page dumped because: kasan: bad access detected
[   76.520497] 
[   76.521972] Memory state around the buggy address:
[   76.526750]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   76.533956]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   76.541160] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   76.548361]                                      ^
[   76.553139]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.560343]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.567545] ==================================================================
[   70.234694] ==================================================================
[   70.241775] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   70.249150] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   70.256442] 
[   70.257925] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   70.257977] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.257993] Hardware name: WinLink E850-96 board (DT)
[   70.258012] Call trace:
[   70.258025]  show_stack+0x20/0x38 (C)
[   70.258057]  dump_stack_lvl+0x8c/0xd0
[   70.258089]  print_report+0x118/0x5d0
[   70.258119]  kasan_report+0xdc/0x128
[   70.258146]  __asan_report_load4_noabort+0x20/0x30
[   70.258182]  kasan_atomics_helper+0x3de4/0x4858
[   70.258221]  kasan_atomics+0x198/0x2e0
[   70.258252]  kunit_try_run_case+0x170/0x3f0
[   70.258288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.258322]  kthread+0x328/0x630
[   70.258350]  ret_from_fork+0x10/0x20
[   70.258381] 
[   70.326058] Allocated by task 349:
[   70.329445]  kasan_save_stack+0x3c/0x68
[   70.333264]  kasan_save_track+0x20/0x40
[   70.337083]  kasan_save_alloc_info+0x40/0x58
[   70.341336]  __kasan_kmalloc+0xd4/0xd8
[   70.345069]  __kmalloc_cache_noprof+0x16c/0x3c0
[   70.349583]  kasan_atomics+0xb8/0x2e0
[   70.353229]  kunit_try_run_case+0x170/0x3f0
[   70.357395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.362865]  kthread+0x328/0x630
[   70.366076]  ret_from_fork+0x10/0x20
[   70.369634] 
[   70.371110] The buggy address belongs to the object at ffff000808448180
[   70.371110]  which belongs to the cache kmalloc-64 of size 64
[   70.383437] The buggy address is located 0 bytes to the right of
[   70.383437]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   70.396283] 
[   70.397759] The buggy address belongs to the physical page:
[   70.403315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   70.411303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   70.417811] page_type: f5(slab)
[   70.420947] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   70.428668] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.436387] page dumped because: kasan: bad access detected
[   70.441942] 
[   70.443418] Memory state around the buggy address:
[   70.448197]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.455401]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.462605] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.469807]                                      ^
[   70.474584]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.481789]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.488990] ==================================================================
[   73.397352] ==================================================================
[   73.404401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   73.411690] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   73.419068] 
[   73.420551] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   73.420601] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.420618] Hardware name: WinLink E850-96 board (DT)
[   73.420638] Call trace:
[   73.420651]  show_stack+0x20/0x38 (C)
[   73.420684]  dump_stack_lvl+0x8c/0xd0
[   73.420717]  print_report+0x118/0x5d0
[   73.420746]  kasan_report+0xdc/0x128
[   73.420773]  kasan_check_range+0x100/0x1a8
[   73.420804]  __kasan_check_write+0x20/0x30
[   73.420836]  kasan_atomics_helper+0xff0/0x4858
[   73.420872]  kasan_atomics+0x198/0x2e0
[   73.420904]  kunit_try_run_case+0x170/0x3f0
[   73.420939]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.420973]  kthread+0x328/0x630
[   73.421004]  ret_from_fork+0x10/0x20
[   73.421035] 
[   73.491983] Allocated by task 349:
[   73.495369]  kasan_save_stack+0x3c/0x68
[   73.499188]  kasan_save_track+0x20/0x40
[   73.503007]  kasan_save_alloc_info+0x40/0x58
[   73.507261]  __kasan_kmalloc+0xd4/0xd8
[   73.510994]  __kmalloc_cache_noprof+0x16c/0x3c0
[   73.515507]  kasan_atomics+0xb8/0x2e0
[   73.519153]  kunit_try_run_case+0x170/0x3f0
[   73.523320]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.528788]  kthread+0x328/0x630
[   73.532000]  ret_from_fork+0x10/0x20
[   73.535559] 
[   73.537034] The buggy address belongs to the object at ffff000808448180
[   73.537034]  which belongs to the cache kmalloc-64 of size 64
[   73.549363] The buggy address is located 0 bytes to the right of
[   73.549363]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   73.562208] 
[   73.563684] The buggy address belongs to the physical page:
[   73.569243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   73.577226] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   73.583735] page_type: f5(slab)
[   73.586868] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   73.594593] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.602312] page dumped because: kasan: bad access detected
[   73.607867] 
[   73.609342] Memory state around the buggy address:
[   73.614121]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.621326]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.628530] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.635731]                                      ^
[   73.640509]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.647714]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.654915] ==================================================================
[   73.927458] ==================================================================
[   73.934429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   73.941803] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   73.949182] 
[   73.950667] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   73.950719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.950737] Hardware name: WinLink E850-96 board (DT)
[   73.950756] Call trace:
[   73.950770]  show_stack+0x20/0x38 (C)
[   73.950805]  dump_stack_lvl+0x8c/0xd0
[   73.950836]  print_report+0x118/0x5d0
[   73.950864]  kasan_report+0xdc/0x128
[   73.950891]  kasan_check_range+0x100/0x1a8
[   73.950920]  __kasan_check_write+0x20/0x30
[   73.950953]  kasan_atomics_helper+0x10c0/0x4858
[   73.950989]  kasan_atomics+0x198/0x2e0
[   73.951021]  kunit_try_run_case+0x170/0x3f0
[   73.951057]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.951092]  kthread+0x328/0x630
[   73.951120]  ret_from_fork+0x10/0x20
[   73.951152] 
[   74.022183] Allocated by task 349:
[   74.025571]  kasan_save_stack+0x3c/0x68
[   74.029389]  kasan_save_track+0x20/0x40
[   74.033208]  kasan_save_alloc_info+0x40/0x58
[   74.037461]  __kasan_kmalloc+0xd4/0xd8
[   74.041194]  __kmalloc_cache_noprof+0x16c/0x3c0
[   74.045708]  kasan_atomics+0xb8/0x2e0
[   74.049353]  kunit_try_run_case+0x170/0x3f0
[   74.053520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.058990]  kthread+0x328/0x630
[   74.062201]  ret_from_fork+0x10/0x20
[   74.065760] 
[   74.067235] The buggy address belongs to the object at ffff000808448180
[   74.067235]  which belongs to the cache kmalloc-64 of size 64
[   74.079563] The buggy address is located 0 bytes to the right of
[   74.079563]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   74.092408] 
[   74.093885] The buggy address belongs to the physical page:
[   74.099443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   74.107427] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   74.113936] page_type: f5(slab)
[   74.117070] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   74.124793] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.132512] page dumped because: kasan: bad access detected
[   74.138067] 
[   74.139543] Memory state around the buggy address:
[   74.144323]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.151526]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.158731] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.165932]                                      ^
[   74.170711]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.177914]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.185115] ==================================================================
[   78.685310] ==================================================================
[   78.692343] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   78.699718] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   78.707096] 
[   78.708579] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   78.708630] Tainted: [B]=BAD_PAGE, [N]=TEST
[   78.708647] Hardware name: WinLink E850-96 board (DT)
[   78.708667] Call trace:
[   78.708681]  show_stack+0x20/0x38 (C)
[   78.708714]  dump_stack_lvl+0x8c/0xd0
[   78.708746]  print_report+0x118/0x5d0
[   78.708774]  kasan_report+0xdc/0x128
[   78.708801]  kasan_check_range+0x100/0x1a8
[   78.708832]  __kasan_check_write+0x20/0x30
[   78.708866]  kasan_atomics_helper+0x175c/0x4858
[   78.708902]  kasan_atomics+0x198/0x2e0
[   78.708933]  kunit_try_run_case+0x170/0x3f0
[   78.708970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.709005]  kthread+0x328/0x630
[   78.709034]  ret_from_fork+0x10/0x20
[   78.709069] 
[   78.780098] Allocated by task 349:
[   78.783485]  kasan_save_stack+0x3c/0x68
[   78.787303]  kasan_save_track+0x20/0x40
[   78.791123]  kasan_save_alloc_info+0x40/0x58
[   78.795376]  __kasan_kmalloc+0xd4/0xd8
[   78.799109]  __kmalloc_cache_noprof+0x16c/0x3c0
[   78.803623]  kasan_atomics+0xb8/0x2e0
[   78.807268]  kunit_try_run_case+0x170/0x3f0
[   78.811435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.816905]  kthread+0x328/0x630
[   78.820115]  ret_from_fork+0x10/0x20
[   78.823674] 
[   78.825149] The buggy address belongs to the object at ffff000808448180
[   78.825149]  which belongs to the cache kmalloc-64 of size 64
[   78.837477] The buggy address is located 0 bytes to the right of
[   78.837477]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   78.850323] 
[   78.851799] The buggy address belongs to the physical page:
[   78.857356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   78.865341] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   78.871851] page_type: f5(slab)
[   78.874983] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   78.882708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   78.890427] page dumped because: kasan: bad access detected
[   78.895982] 
[   78.897458] Memory state around the buggy address:
[   78.902236]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.909441]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.916645] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   78.923846]                                      ^
[   78.928624]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.935829]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.943030] ==================================================================
[   64.154445] ==================================================================
[   64.161484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   64.168860] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   64.176238] 
[   64.177719] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   64.177767] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.177784] Hardware name: WinLink E850-96 board (DT)
[   64.177803] Call trace:
[   64.177816]  show_stack+0x20/0x38 (C)
[   64.177851]  dump_stack_lvl+0x8c/0xd0
[   64.177883]  print_report+0x118/0x5d0
[   64.177912]  kasan_report+0xdc/0x128
[   64.177938]  __asan_report_store4_noabort+0x20/0x30
[   64.177974]  kasan_atomics_helper+0x3f94/0x4858
[   64.178009]  kasan_atomics+0x198/0x2e0
[   64.178040]  kunit_try_run_case+0x170/0x3f0
[   64.178075]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.178111]  kthread+0x328/0x630
[   64.178140]  ret_from_fork+0x10/0x20
[   64.178172] 
[   64.245941] Allocated by task 349:
[   64.249328]  kasan_save_stack+0x3c/0x68
[   64.253147]  kasan_save_track+0x20/0x40
[   64.256965]  kasan_save_alloc_info+0x40/0x58
[   64.261219]  __kasan_kmalloc+0xd4/0xd8
[   64.264952]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.269466]  kasan_atomics+0xb8/0x2e0
[   64.273111]  kunit_try_run_case+0x170/0x3f0
[   64.277278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.282748]  kthread+0x328/0x630
[   64.285958]  ret_from_fork+0x10/0x20
[   64.289518] 
[   64.290993] The buggy address belongs to the object at ffff000808448180
[   64.290993]  which belongs to the cache kmalloc-64 of size 64
[   64.303320] The buggy address is located 0 bytes to the right of
[   64.303320]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   64.316166] 
[   64.317642] The buggy address belongs to the physical page:
[   64.323200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   64.331184] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   64.337694] page_type: f5(slab)
[   64.340827] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   64.348551] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.356270] page dumped because: kasan: bad access detected
[   64.361825] 
[   64.363301] Memory state around the buggy address:
[   64.368079]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.375284]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.382488] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.389690]                                      ^
[   64.394467]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.401672]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.408874] ==================================================================
[   79.212046] ==================================================================
[   79.219071] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   79.226446] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   79.233824] 
[   79.235308] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   79.235357] Tainted: [B]=BAD_PAGE, [N]=TEST
[   79.235376] Hardware name: WinLink E850-96 board (DT)
[   79.235395] Call trace:
[   79.235407]  show_stack+0x20/0x38 (C)
[   79.235438]  dump_stack_lvl+0x8c/0xd0
[   79.235472]  print_report+0x118/0x5d0
[   79.235501]  kasan_report+0xdc/0x128
[   79.235529]  kasan_check_range+0x100/0x1a8
[   79.235561]  __kasan_check_write+0x20/0x30
[   79.235594]  kasan_atomics_helper+0x17ec/0x4858
[   79.235627]  kasan_atomics+0x198/0x2e0
[   79.235662]  kunit_try_run_case+0x170/0x3f0
[   79.235698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.235730]  kthread+0x328/0x630
[   79.235761]  ret_from_fork+0x10/0x20
[   79.235794] 
[   79.306828] Allocated by task 349:
[   79.310214]  kasan_save_stack+0x3c/0x68
[   79.314032]  kasan_save_track+0x20/0x40
[   79.317851]  kasan_save_alloc_info+0x40/0x58
[   79.322104]  __kasan_kmalloc+0xd4/0xd8
[   79.325837]  __kmalloc_cache_noprof+0x16c/0x3c0
[   79.330350]  kasan_atomics+0xb8/0x2e0
[   79.333997]  kunit_try_run_case+0x170/0x3f0
[   79.338163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.343631]  kthread+0x328/0x630
[   79.346843]  ret_from_fork+0x10/0x20
[   79.350403] 
[   79.351878] The buggy address belongs to the object at ffff000808448180
[   79.351878]  which belongs to the cache kmalloc-64 of size 64
[   79.364205] The buggy address is located 0 bytes to the right of
[   79.364205]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   79.377052] 
[   79.378529] The buggy address belongs to the physical page:
[   79.384083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   79.392069] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   79.398579] page_type: f5(slab)
[   79.401712] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   79.409436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   79.417155] page dumped because: kasan: bad access detected
[   79.422710] 
[   79.424186] Memory state around the buggy address:
[   79.428966]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   79.436169]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   79.443373] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   79.450574]                                      ^
[   79.455354]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.462557]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.469758] ==================================================================
[   74.457572] ==================================================================
[   74.464629] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   74.472004] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   74.479382] 
[   74.480864] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   74.480913] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.480929] Hardware name: WinLink E850-96 board (DT)
[   74.480946] Call trace:
[   74.480960]  show_stack+0x20/0x38 (C)
[   74.480991]  dump_stack_lvl+0x8c/0xd0
[   74.481025]  print_report+0x118/0x5d0
[   74.481053]  kasan_report+0xdc/0x128
[   74.481080]  kasan_check_range+0x100/0x1a8
[   74.481109]  __kasan_check_write+0x20/0x30
[   74.481141]  kasan_atomics_helper+0x1190/0x4858
[   74.481175]  kasan_atomics+0x198/0x2e0
[   74.481209]  kunit_try_run_case+0x170/0x3f0
[   74.481245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.481278]  kthread+0x328/0x630
[   74.481307]  ret_from_fork+0x10/0x20
[   74.481338] 
[   74.552384] Allocated by task 349:
[   74.555771]  kasan_save_stack+0x3c/0x68
[   74.559589]  kasan_save_track+0x20/0x40
[   74.563408]  kasan_save_alloc_info+0x40/0x58
[   74.567662]  __kasan_kmalloc+0xd4/0xd8
[   74.571394]  __kmalloc_cache_noprof+0x16c/0x3c0
[   74.575908]  kasan_atomics+0xb8/0x2e0
[   74.579554]  kunit_try_run_case+0x170/0x3f0
[   74.583720]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.589190]  kthread+0x328/0x630
[   74.592401]  ret_from_fork+0x10/0x20
[   74.595960] 
[   74.597437] The buggy address belongs to the object at ffff000808448180
[   74.597437]  which belongs to the cache kmalloc-64 of size 64
[   74.609764] The buggy address is located 0 bytes to the right of
[   74.609764]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   74.622609] 
[   74.624084] The buggy address belongs to the physical page:
[   74.629640] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   74.637626] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   74.644137] page_type: f5(slab)
[   74.647271] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   74.654994] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.662713] page dumped because: kasan: bad access detected
[   74.668268] 
[   74.669743] Memory state around the buggy address:
[   74.674523]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.681726]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.688931] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.696132]                                      ^
[   74.700911]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.708115]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.715315] ==================================================================
[   75.517946] ==================================================================
[   75.525029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   75.532404] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   75.539783] 
[   75.541265] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   75.541317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.541334] Hardware name: WinLink E850-96 board (DT)
[   75.541355] Call trace:
[   75.541369]  show_stack+0x20/0x38 (C)
[   75.541399]  dump_stack_lvl+0x8c/0xd0
[   75.541431]  print_report+0x118/0x5d0
[   75.541461]  kasan_report+0xdc/0x128
[   75.541487]  kasan_check_range+0x100/0x1a8
[   75.541517]  __kasan_check_write+0x20/0x30
[   75.541550]  kasan_atomics_helper+0x1384/0x4858
[   75.541584]  kasan_atomics+0x198/0x2e0
[   75.541616]  kunit_try_run_case+0x170/0x3f0
[   75.541651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.541686]  kthread+0x328/0x630
[   75.541716]  ret_from_fork+0x10/0x20
[   75.541748] 
[   75.612785] Allocated by task 349:
[   75.616170]  kasan_save_stack+0x3c/0x68
[   75.619990]  kasan_save_track+0x20/0x40
[   75.623809]  kasan_save_alloc_info+0x40/0x58
[   75.628062]  __kasan_kmalloc+0xd4/0xd8
[   75.631795]  __kmalloc_cache_noprof+0x16c/0x3c0
[   75.636309]  kasan_atomics+0xb8/0x2e0
[   75.639955]  kunit_try_run_case+0x170/0x3f0
[   75.644121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.649590]  kthread+0x328/0x630
[   75.652802]  ret_from_fork+0x10/0x20
[   75.656361] 
[   75.657836] The buggy address belongs to the object at ffff000808448180
[   75.657836]  which belongs to the cache kmalloc-64 of size 64
[   75.670163] The buggy address is located 0 bytes to the right of
[   75.670163]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   75.683010] 
[   75.684486] The buggy address belongs to the physical page:
[   75.690042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   75.698027] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   75.704537] page_type: f5(slab)
[   75.707672] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   75.715394] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.723113] page dumped because: kasan: bad access detected
[   75.728668] 
[   75.730144] Memory state around the buggy address:
[   75.734924]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.742127]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.749332] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.756533]                                      ^
[   75.761311]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.768515]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.775717] ==================================================================
[   69.443274] ==================================================================
[   69.450292] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   69.457582] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   69.464960] 
[   69.466444] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   69.466495] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.466513] Hardware name: WinLink E850-96 board (DT)
[   69.466532] Call trace:
[   69.466546]  show_stack+0x20/0x38 (C)
[   69.466583]  dump_stack_lvl+0x8c/0xd0
[   69.466615]  print_report+0x118/0x5d0
[   69.466642]  kasan_report+0xdc/0x128
[   69.466669]  kasan_check_range+0x100/0x1a8
[   69.466699]  __kasan_check_write+0x20/0x30
[   69.466733]  kasan_atomics_helper+0xb70/0x4858
[   69.466768]  kasan_atomics+0x198/0x2e0
[   69.466800]  kunit_try_run_case+0x170/0x3f0
[   69.466838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.466871]  kthread+0x328/0x630
[   69.466900]  ret_from_fork+0x10/0x20
[   69.466931] 
[   69.537876] Allocated by task 349:
[   69.541263]  kasan_save_stack+0x3c/0x68
[   69.545081]  kasan_save_track+0x20/0x40
[   69.548900]  kasan_save_alloc_info+0x40/0x58
[   69.553154]  __kasan_kmalloc+0xd4/0xd8
[   69.556886]  __kmalloc_cache_noprof+0x16c/0x3c0
[   69.561400]  kasan_atomics+0xb8/0x2e0
[   69.565046]  kunit_try_run_case+0x170/0x3f0
[   69.569213]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.574683]  kthread+0x328/0x630
[   69.577893]  ret_from_fork+0x10/0x20
[   69.581452] 
[   69.582927] The buggy address belongs to the object at ffff000808448180
[   69.582927]  which belongs to the cache kmalloc-64 of size 64
[   69.595254] The buggy address is located 0 bytes to the right of
[   69.595254]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   69.608101] 
[   69.609578] The buggy address belongs to the physical page:
[   69.615136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   69.623119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   69.629628] page_type: f5(slab)
[   69.632764] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   69.640486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.648204] page dumped because: kasan: bad access detected
[   69.653760] 
[   69.655235] Memory state around the buggy address:
[   69.660015]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.667218]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.674423] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.681624]                                      ^
[   69.686402]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.693606]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.700808] ==================================================================
[   78.950470] ==================================================================
[   78.957443] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   78.964818] Read of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   78.972110] 
[   78.973593] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   78.973642] Tainted: [B]=BAD_PAGE, [N]=TEST
[   78.973659] Hardware name: WinLink E850-96 board (DT)
[   78.973679] Call trace:
[   78.973696]  show_stack+0x20/0x38 (C)
[   78.973730]  dump_stack_lvl+0x8c/0xd0
[   78.973765]  print_report+0x118/0x5d0
[   78.973795]  kasan_report+0xdc/0x128
[   78.973821]  __asan_report_load8_noabort+0x20/0x30
[   78.973856]  kasan_atomics_helper+0x3e20/0x4858
[   78.973892]  kasan_atomics+0x198/0x2e0
[   78.973924]  kunit_try_run_case+0x170/0x3f0
[   78.973959]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.973993]  kthread+0x328/0x630
[   78.974024]  ret_from_fork+0x10/0x20
[   78.974060] 
[   79.041726] Allocated by task 349:
[   79.045114]  kasan_save_stack+0x3c/0x68
[   79.048931]  kasan_save_track+0x20/0x40
[   79.052751]  kasan_save_alloc_info+0x40/0x58
[   79.057004]  __kasan_kmalloc+0xd4/0xd8
[   79.060737]  __kmalloc_cache_noprof+0x16c/0x3c0
[   79.065250]  kasan_atomics+0xb8/0x2e0
[   79.068896]  kunit_try_run_case+0x170/0x3f0
[   79.073063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.078533]  kthread+0x328/0x630
[   79.081743]  ret_from_fork+0x10/0x20
[   79.085302] 
[   79.086778] The buggy address belongs to the object at ffff000808448180
[   79.086778]  which belongs to the cache kmalloc-64 of size 64
[   79.099104] The buggy address is located 0 bytes to the right of
[   79.099104]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   79.111951] 
[   79.113428] The buggy address belongs to the physical page:
[   79.118984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   79.126969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   79.133479] page_type: f5(slab)
[   79.136613] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   79.144336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   79.152055] page dumped because: kasan: bad access detected
[   79.157610] 
[   79.159085] Memory state around the buggy address:
[   79.163865]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   79.171068]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   79.178273] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   79.185474]                                      ^
[   79.190254]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.197457]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.204658] ==================================================================
[   77.631858] ==================================================================
[   77.638887] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   77.646262] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   77.653640] 
[   77.655123] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   77.655172] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.655187] Hardware name: WinLink E850-96 board (DT)
[   77.655207] Call trace:
[   77.655220]  show_stack+0x20/0x38 (C)
[   77.655252]  dump_stack_lvl+0x8c/0xd0
[   77.655285]  print_report+0x118/0x5d0
[   77.655313]  kasan_report+0xdc/0x128
[   77.655341]  kasan_check_range+0x100/0x1a8
[   77.655375]  __kasan_check_write+0x20/0x30
[   77.655407]  kasan_atomics_helper+0x1644/0x4858
[   77.655443]  kasan_atomics+0x198/0x2e0
[   77.655476]  kunit_try_run_case+0x170/0x3f0
[   77.655511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.655545]  kthread+0x328/0x630
[   77.655574]  ret_from_fork+0x10/0x20
[   77.655607] 
[   77.726642] Allocated by task 349:
[   77.730029]  kasan_save_stack+0x3c/0x68
[   77.733847]  kasan_save_track+0x20/0x40
[   77.737666]  kasan_save_alloc_info+0x40/0x58
[   77.741920]  __kasan_kmalloc+0xd4/0xd8
[   77.745652]  __kmalloc_cache_noprof+0x16c/0x3c0
[   77.750166]  kasan_atomics+0xb8/0x2e0
[   77.753812]  kunit_try_run_case+0x170/0x3f0
[   77.757978]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.763447]  kthread+0x328/0x630
[   77.766659]  ret_from_fork+0x10/0x20
[   77.770218] 
[   77.771693] The buggy address belongs to the object at ffff000808448180
[   77.771693]  which belongs to the cache kmalloc-64 of size 64
[   77.784020] The buggy address is located 0 bytes to the right of
[   77.784020]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   77.796867] 
[   77.798343] The buggy address belongs to the physical page:
[   77.803898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   77.811884] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   77.818394] page_type: f5(slab)
[   77.821529] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   77.829251] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   77.836970] page dumped because: kasan: bad access detected
[   77.842526] 
[   77.844001] Memory state around the buggy address:
[   77.848779]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.855984]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.863189] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.870390]                                      ^
[   77.875168]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.882373]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.889573] ==================================================================
[   64.416259] ==================================================================
[   64.423286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   64.430575] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   64.437953] 
[   64.439434] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   64.439486] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.439503] Hardware name: WinLink E850-96 board (DT)
[   64.439521] Call trace:
[   64.439536]  show_stack+0x20/0x38 (C)
[   64.439568]  dump_stack_lvl+0x8c/0xd0
[   64.439601]  print_report+0x118/0x5d0
[   64.439631]  kasan_report+0xdc/0x128
[   64.439658]  kasan_check_range+0x100/0x1a8
[   64.439687]  __kasan_check_write+0x20/0x30
[   64.439719]  kasan_atomics_helper+0x3ac/0x4858
[   64.439754]  kasan_atomics+0x198/0x2e0
[   64.439785]  kunit_try_run_case+0x170/0x3f0
[   64.439820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.439854]  kthread+0x328/0x630
[   64.439882]  ret_from_fork+0x10/0x20
[   64.439914] 
[   64.510868] Allocated by task 349:
[   64.514255]  kasan_save_stack+0x3c/0x68
[   64.518073]  kasan_save_track+0x20/0x40
[   64.521893]  kasan_save_alloc_info+0x40/0x58
[   64.526146]  __kasan_kmalloc+0xd4/0xd8
[   64.529878]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.534392]  kasan_atomics+0xb8/0x2e0
[   64.538038]  kunit_try_run_case+0x170/0x3f0
[   64.542205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.547673]  kthread+0x328/0x630
[   64.550885]  ret_from_fork+0x10/0x20
[   64.554444] 
[   64.555919] The buggy address belongs to the object at ffff000808448180
[   64.555919]  which belongs to the cache kmalloc-64 of size 64
[   64.568246] The buggy address is located 0 bytes to the right of
[   64.568246]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   64.581093] 
[   64.582568] The buggy address belongs to the physical page:
[   64.588126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   64.596110] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   64.602621] page_type: f5(slab)
[   64.605753] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   64.613477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.621197] page dumped because: kasan: bad access detected
[   64.626752] 
[   64.628228] Memory state around the buggy address:
[   64.633006]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.640210]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.647415] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.654616]                                      ^
[   64.659394]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.666599]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.673800] ==================================================================
[   71.023019] ==================================================================
[   71.029958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   71.037246] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   71.044624] 
[   71.046108] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   71.046161] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.046177] Hardware name: WinLink E850-96 board (DT)
[   71.046197] Call trace:
[   71.046212]  show_stack+0x20/0x38 (C)
[   71.046247]  dump_stack_lvl+0x8c/0xd0
[   71.046279]  print_report+0x118/0x5d0
[   71.046307]  kasan_report+0xdc/0x128
[   71.046334]  kasan_check_range+0x100/0x1a8
[   71.046362]  __kasan_check_write+0x20/0x30
[   71.046396]  kasan_atomics_helper+0xd3c/0x4858
[   71.046433]  kasan_atomics+0x198/0x2e0
[   71.046465]  kunit_try_run_case+0x170/0x3f0
[   71.046502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.046537]  kthread+0x328/0x630
[   71.046566]  ret_from_fork+0x10/0x20
[   71.046602] 
[   71.117540] Allocated by task 349:
[   71.120927]  kasan_save_stack+0x3c/0x68
[   71.124745]  kasan_save_track+0x20/0x40
[   71.128564]  kasan_save_alloc_info+0x40/0x58
[   71.132817]  __kasan_kmalloc+0xd4/0xd8
[   71.136550]  __kmalloc_cache_noprof+0x16c/0x3c0
[   71.141064]  kasan_atomics+0xb8/0x2e0
[   71.144710]  kunit_try_run_case+0x170/0x3f0
[   71.148876]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.154345]  kthread+0x328/0x630
[   71.157557]  ret_from_fork+0x10/0x20
[   71.161116] 
[   71.162591] The buggy address belongs to the object at ffff000808448180
[   71.162591]  which belongs to the cache kmalloc-64 of size 64
[   71.174918] The buggy address is located 0 bytes to the right of
[   71.174918]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   71.187764] 
[   71.189240] The buggy address belongs to the physical page:
[   71.194798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   71.202782] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   71.209292] page_type: f5(slab)
[   71.212427] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   71.220149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   71.227868] page dumped because: kasan: bad access detected
[   71.233423] 
[   71.234899] Memory state around the buggy address:
[   71.239679]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.246882]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.254087] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   71.261288]                                      ^
[   71.266065]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.273270]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.280472] ==================================================================
[   72.075946] ==================================================================
[   72.082895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   72.090182] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   72.097560] 
[   72.099044] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   72.099093] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.099111] Hardware name: WinLink E850-96 board (DT)
[   72.099132] Call trace:
[   72.099146]  show_stack+0x20/0x38 (C)
[   72.099179]  dump_stack_lvl+0x8c/0xd0
[   72.099210]  print_report+0x118/0x5d0
[   72.099239]  kasan_report+0xdc/0x128
[   72.099267]  kasan_check_range+0x100/0x1a8
[   72.099298]  __kasan_check_write+0x20/0x30
[   72.099331]  kasan_atomics_helper+0xe44/0x4858
[   72.099365]  kasan_atomics+0x198/0x2e0
[   72.099397]  kunit_try_run_case+0x170/0x3f0
[   72.099432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.099469]  kthread+0x328/0x630
[   72.099498]  ret_from_fork+0x10/0x20
[   72.099532] 
[   72.170475] Allocated by task 349:
[   72.173862]  kasan_save_stack+0x3c/0x68
[   72.177680]  kasan_save_track+0x20/0x40
[   72.181500]  kasan_save_alloc_info+0x40/0x58
[   72.185753]  __kasan_kmalloc+0xd4/0xd8
[   72.189486]  __kmalloc_cache_noprof+0x16c/0x3c0
[   72.194000]  kasan_atomics+0xb8/0x2e0
[   72.197645]  kunit_try_run_case+0x170/0x3f0
[   72.201812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.207280]  kthread+0x328/0x630
[   72.210492]  ret_from_fork+0x10/0x20
[   72.214051] 
[   72.215527] The buggy address belongs to the object at ffff000808448180
[   72.215527]  which belongs to the cache kmalloc-64 of size 64
[   72.227855] The buggy address is located 0 bytes to the right of
[   72.227855]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   72.240700] 
[   72.242177] The buggy address belongs to the physical page:
[   72.247733] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   72.255719] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   72.262228] page_type: f5(slab)
[   72.265364] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   72.273085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.280804] page dumped because: kasan: bad access detected
[   72.286359] 
[   72.287835] Memory state around the buggy address:
[   72.292616]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.299818]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.307022] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.314223]                                      ^
[   72.319001]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.326206]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.333407] ==================================================================
[   68.386858] ==================================================================
[   68.393886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   68.401174] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   68.408552] 
[   68.410036] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   68.410087] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.410104] Hardware name: WinLink E850-96 board (DT)
[   68.410123] Call trace:
[   68.410136]  show_stack+0x20/0x38 (C)
[   68.410169]  dump_stack_lvl+0x8c/0xd0
[   68.410201]  print_report+0x118/0x5d0
[   68.410232]  kasan_report+0xdc/0x128
[   68.410261]  kasan_check_range+0x100/0x1a8
[   68.410290]  __kasan_check_write+0x20/0x30
[   68.410321]  kasan_atomics_helper+0xa04/0x4858
[   68.410354]  kasan_atomics+0x198/0x2e0
[   68.410385]  kunit_try_run_case+0x170/0x3f0
[   68.410424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.410457]  kthread+0x328/0x630
[   68.410488]  ret_from_fork+0x10/0x20
[   68.410519] 
[   68.481468] Allocated by task 349:
[   68.484855]  kasan_save_stack+0x3c/0x68
[   68.488673]  kasan_save_track+0x20/0x40
[   68.492492]  kasan_save_alloc_info+0x40/0x58
[   68.496746]  __kasan_kmalloc+0xd4/0xd8
[   68.500479]  __kmalloc_cache_noprof+0x16c/0x3c0
[   68.504992]  kasan_atomics+0xb8/0x2e0
[   68.508638]  kunit_try_run_case+0x170/0x3f0
[   68.512805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.518274]  kthread+0x328/0x630
[   68.521485]  ret_from_fork+0x10/0x20
[   68.525044] 
[   68.526520] The buggy address belongs to the object at ffff000808448180
[   68.526520]  which belongs to the cache kmalloc-64 of size 64
[   68.538846] The buggy address is located 0 bytes to the right of
[   68.538846]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   68.551693] 
[   68.553170] The buggy address belongs to the physical page:
[   68.558724] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   68.566711] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   68.573221] page_type: f5(slab)
[   68.576353] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   68.584078] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.591797] page dumped because: kasan: bad access detected
[   68.597352] 
[   68.598828] Memory state around the buggy address:
[   68.603606]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.610810]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.618015] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.625216]                                      ^
[   68.629994]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.637199]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.644400] ==================================================================
[   63.889571] ==================================================================
[   63.896558] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   63.903846] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   63.911225] 
[   63.912708] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   63.912760] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.912775] Hardware name: WinLink E850-96 board (DT)
[   63.912796] Call trace:
[   63.912809]  show_stack+0x20/0x38 (C)
[   63.912844]  dump_stack_lvl+0x8c/0xd0
[   63.912877]  print_report+0x118/0x5d0
[   63.912904]  kasan_report+0xdc/0x128
[   63.912931]  kasan_check_range+0x100/0x1a8
[   63.912961]  __kasan_check_write+0x20/0x30
[   63.912993]  kasan_atomics_helper+0x32c/0x4858
[   63.913029]  kasan_atomics+0x198/0x2e0
[   63.913061]  kunit_try_run_case+0x170/0x3f0
[   63.913096]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.913130]  kthread+0x328/0x630
[   63.913158]  ret_from_fork+0x10/0x20
[   63.913190] 
[   63.984140] Allocated by task 349:
[   63.987527]  kasan_save_stack+0x3c/0x68
[   63.991345]  kasan_save_track+0x20/0x40
[   63.995164]  kasan_save_alloc_info+0x40/0x58
[   63.999418]  __kasan_kmalloc+0xd4/0xd8
[   64.003150]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.007664]  kasan_atomics+0xb8/0x2e0
[   64.011310]  kunit_try_run_case+0x170/0x3f0
[   64.015477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.020947]  kthread+0x328/0x630
[   64.024157]  ret_from_fork+0x10/0x20
[   64.027716] 
[   64.029191] The buggy address belongs to the object at ffff000808448180
[   64.029191]  which belongs to the cache kmalloc-64 of size 64
[   64.041518] The buggy address is located 0 bytes to the right of
[   64.041518]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   64.054364] 
[   64.055841] The buggy address belongs to the physical page:
[   64.061398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   64.069382] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   64.075892] page_type: f5(slab)
[   64.079029] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   64.086749] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.094468] page dumped because: kasan: bad access detected
[   64.100024] 
[   64.101499] Memory state around the buggy address:
[   64.106278]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.113482]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.120687] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.127888]                                      ^
[   64.132667]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.139871]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.147072] ==================================================================
[   63.363093] ==================================================================
[   63.370175] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   63.377465] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   63.384757] 
[   63.386239] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   63.386291] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.386309] Hardware name: WinLink E850-96 board (DT)
[   63.386328] Call trace:
[   63.386343]  show_stack+0x20/0x38 (C)
[   63.386379]  dump_stack_lvl+0x8c/0xd0
[   63.386411]  print_report+0x118/0x5d0
[   63.386438]  kasan_report+0xdc/0x128
[   63.386467]  kasan_check_range+0x100/0x1a8
[   63.386496]  __kasan_check_read+0x20/0x30
[   63.386531]  kasan_atomics_helper+0x2b0/0x4858
[   63.386565]  kasan_atomics+0x198/0x2e0
[   63.386598]  kunit_try_run_case+0x170/0x3f0
[   63.386637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.386668]  kthread+0x328/0x630
[   63.386700]  ret_from_fork+0x10/0x20
[   63.386734] 
[   63.457585] Allocated by task 349:
[   63.460973]  kasan_save_stack+0x3c/0x68
[   63.464790]  kasan_save_track+0x20/0x40
[   63.468610]  kasan_save_alloc_info+0x40/0x58
[   63.472863]  __kasan_kmalloc+0xd4/0xd8
[   63.476596]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.481109]  kasan_atomics+0xb8/0x2e0
[   63.484755]  kunit_try_run_case+0x170/0x3f0
[   63.488922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.494390]  kthread+0x328/0x630
[   63.497601]  ret_from_fork+0x10/0x20
[   63.501161] 
[   63.502636] The buggy address belongs to the object at ffff000808448180
[   63.502636]  which belongs to the cache kmalloc-64 of size 64
[   63.514964] The buggy address is located 0 bytes to the right of
[   63.514964]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   63.527810] 
[   63.529287] The buggy address belongs to the physical page:
[   63.534842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   63.542829] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.549338] page_type: f5(slab)
[   63.552472] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.560195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.567913] page dumped because: kasan: bad access detected
[   63.573469] 
[   63.574945] Memory state around the buggy address:
[   63.579723]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.586927]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.594132] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.601333]                                      ^
[   63.606113]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.613316]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.620517] ==================================================================
[   66.535647] ==================================================================
[   66.542701] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   66.549987] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   66.557365] 
[   66.558846] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   66.558895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.558912] Hardware name: WinLink E850-96 board (DT)
[   66.558930] Call trace:
[   66.558945]  show_stack+0x20/0x38 (C)
[   66.558978]  dump_stack_lvl+0x8c/0xd0
[   66.559012]  print_report+0x118/0x5d0
[   66.559040]  kasan_report+0xdc/0x128
[   66.559066]  kasan_check_range+0x100/0x1a8
[   66.559097]  __kasan_check_write+0x20/0x30
[   66.559129]  kasan_atomics_helper+0x6ec/0x4858
[   66.559163]  kasan_atomics+0x198/0x2e0
[   66.559195]  kunit_try_run_case+0x170/0x3f0
[   66.559229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.559265]  kthread+0x328/0x630
[   66.559294]  ret_from_fork+0x10/0x20
[   66.559325] 
[   66.630280] Allocated by task 349:
[   66.633668]  kasan_save_stack+0x3c/0x68
[   66.637486]  kasan_save_track+0x20/0x40
[   66.641305]  kasan_save_alloc_info+0x40/0x58
[   66.645558]  __kasan_kmalloc+0xd4/0xd8
[   66.649291]  __kmalloc_cache_noprof+0x16c/0x3c0
[   66.653805]  kasan_atomics+0xb8/0x2e0
[   66.657451]  kunit_try_run_case+0x170/0x3f0
[   66.661617]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.667086]  kthread+0x328/0x630
[   66.670298]  ret_from_fork+0x10/0x20
[   66.673856] 
[   66.675332] The buggy address belongs to the object at ffff000808448180
[   66.675332]  which belongs to the cache kmalloc-64 of size 64
[   66.687659] The buggy address is located 0 bytes to the right of
[   66.687659]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   66.700505] 
[   66.701981] The buggy address belongs to the physical page:
[   66.707539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   66.715523] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   66.722033] page_type: f5(slab)
[   66.725166] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   66.732890] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.740609] page dumped because: kasan: bad access detected
[   66.746165] 
[   66.747640] Memory state around the buggy address:
[   66.752419]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.759623]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.766828] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.774029]                                      ^
[   66.778806]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.786011]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.793212] ==================================================================
[   65.211018] ==================================================================
[   65.218064] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   65.225354] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   65.232732] 
[   65.234215] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   65.234263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.234281] Hardware name: WinLink E850-96 board (DT)
[   65.234299] Call trace:
[   65.234312]  show_stack+0x20/0x38 (C)
[   65.234344]  dump_stack_lvl+0x8c/0xd0
[   65.234376]  print_report+0x118/0x5d0
[   65.234403]  kasan_report+0xdc/0x128
[   65.234431]  kasan_check_range+0x100/0x1a8
[   65.234460]  __kasan_check_write+0x20/0x30
[   65.234493]  kasan_atomics_helper+0x4e4/0x4858
[   65.234528]  kasan_atomics+0x198/0x2e0
[   65.234561]  kunit_try_run_case+0x170/0x3f0
[   65.234595]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.234632]  kthread+0x328/0x630
[   65.234661]  ret_from_fork+0x10/0x20
[   65.234692] 
[   65.305648] Allocated by task 349:
[   65.309033]  kasan_save_stack+0x3c/0x68
[   65.312853]  kasan_save_track+0x20/0x40
[   65.316672]  kasan_save_alloc_info+0x40/0x58
[   65.320926]  __kasan_kmalloc+0xd4/0xd8
[   65.324658]  __kmalloc_cache_noprof+0x16c/0x3c0
[   65.329172]  kasan_atomics+0xb8/0x2e0
[   65.332818]  kunit_try_run_case+0x170/0x3f0
[   65.336984]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.342453]  kthread+0x328/0x630
[   65.345665]  ret_from_fork+0x10/0x20
[   65.349224] 
[   65.350700] The buggy address belongs to the object at ffff000808448180
[   65.350700]  which belongs to the cache kmalloc-64 of size 64
[   65.363026] The buggy address is located 0 bytes to the right of
[   65.363026]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   65.375873] 
[   65.377348] The buggy address belongs to the physical page:
[   65.382906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   65.390890] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   65.397400] page_type: f5(slab)
[   65.400535] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   65.408257] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.415976] page dumped because: kasan: bad access detected
[   65.421532] 
[   65.423007] Memory state around the buggy address:
[   65.427785]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.434990]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.442195] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.449396]                                      ^
[   65.454174]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.461378]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.468580] ==================================================================
[   74.987859] ==================================================================
[   74.994828] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   75.002204] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   75.009582] 
[   75.011064] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   75.011112] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.011128] Hardware name: WinLink E850-96 board (DT)
[   75.011147] Call trace:
[   75.011161]  show_stack+0x20/0x38 (C)
[   75.011194]  dump_stack_lvl+0x8c/0xd0
[   75.011228]  print_report+0x118/0x5d0
[   75.011258]  kasan_report+0xdc/0x128
[   75.011284]  kasan_check_range+0x100/0x1a8
[   75.011315]  __kasan_check_write+0x20/0x30
[   75.011348]  kasan_atomics_helper+0x126c/0x4858
[   75.011382]  kasan_atomics+0x198/0x2e0
[   75.011416]  kunit_try_run_case+0x170/0x3f0
[   75.011451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.011486]  kthread+0x328/0x630
[   75.011518]  ret_from_fork+0x10/0x20
[   75.011551] 
[   75.082584] Allocated by task 349:
[   75.085972]  kasan_save_stack+0x3c/0x68
[   75.089789]  kasan_save_track+0x20/0x40
[   75.093609]  kasan_save_alloc_info+0x40/0x58
[   75.097862]  __kasan_kmalloc+0xd4/0xd8
[   75.101595]  __kmalloc_cache_noprof+0x16c/0x3c0
[   75.106108]  kasan_atomics+0xb8/0x2e0
[   75.109754]  kunit_try_run_case+0x170/0x3f0
[   75.113921]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.119390]  kthread+0x328/0x630
[   75.122601]  ret_from_fork+0x10/0x20
[   75.126160] 
[   75.127636] The buggy address belongs to the object at ffff000808448180
[   75.127636]  which belongs to the cache kmalloc-64 of size 64
[   75.139964] The buggy address is located 0 bytes to the right of
[   75.139964]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   75.152809] 
[   75.154287] The buggy address belongs to the physical page:
[   75.159844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   75.167828] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   75.174337] page_type: f5(slab)
[   75.177471] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   75.185194] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.192913] page dumped because: kasan: bad access detected
[   75.198468] 
[   75.199944] Memory state around the buggy address:
[   75.204723]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.211927]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.219132] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.226332]                                      ^
[   75.231110]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.238315]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.245516] ==================================================================
[   62.571633] ==================================================================
[   62.578697] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   62.586071] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   62.593451] 
[   62.594933] CPU: 5 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   62.594988] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.595007] Hardware name: WinLink E850-96 board (DT)
[   62.595028] Call trace:
[   62.595043]  show_stack+0x20/0x38 (C)
[   62.595084]  dump_stack_lvl+0x8c/0xd0
[   62.595116]  print_report+0x118/0x5d0
[   62.595144]  kasan_report+0xdc/0x128
[   62.595171]  __asan_report_store4_noabort+0x20/0x30
[   62.595207]  kasan_atomics_helper+0x3f7c/0x4858
[   62.595244]  kasan_atomics+0x198/0x2e0
[   62.595276]  kunit_try_run_case+0x170/0x3f0
[   62.595313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.595348]  kthread+0x328/0x630
[   62.595381]  ret_from_fork+0x10/0x20
[   62.595415] 
[   62.663153] Allocated by task 349:
[   62.666539]  kasan_save_stack+0x3c/0x68
[   62.670359]  kasan_save_track+0x20/0x40
[   62.674177]  kasan_save_alloc_info+0x40/0x58
[   62.678431]  __kasan_kmalloc+0xd4/0xd8
[   62.682163]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.686677]  kasan_atomics+0xb8/0x2e0
[   62.690323]  kunit_try_run_case+0x170/0x3f0
[   62.694489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.699959]  kthread+0x328/0x630
[   62.703170]  ret_from_fork+0x10/0x20
[   62.706729] 
[   62.708206] The buggy address belongs to the object at ffff000808448180
[   62.708206]  which belongs to the cache kmalloc-64 of size 64
[   62.720532] The buggy address is located 0 bytes to the right of
[   62.720532]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   62.733378] 
[   62.734855] The buggy address belongs to the physical page:
[   62.740413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   62.748398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.754905] page_type: f5(slab)
[   62.758042] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.765762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.773481] page dumped because: kasan: bad access detected
[   62.779037] 
[   62.780512] Memory state around the buggy address:
[   62.785293]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.792495]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.799700] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.806901]                                      ^
[   62.811680]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.818885]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.826085] ==================================================================
[   68.121907] ==================================================================
[   68.128959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   68.136248] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   68.143626] 
[   68.145109] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   68.145159] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.145177] Hardware name: WinLink E850-96 board (DT)
[   68.145195] Call trace:
[   68.145209]  show_stack+0x20/0x38 (C)
[   68.145241]  dump_stack_lvl+0x8c/0xd0
[   68.145274]  print_report+0x118/0x5d0
[   68.145300]  kasan_report+0xdc/0x128
[   68.145327]  kasan_check_range+0x100/0x1a8
[   68.145357]  __kasan_check_write+0x20/0x30
[   68.145389]  kasan_atomics_helper+0x99c/0x4858
[   68.145425]  kasan_atomics+0x198/0x2e0
[   68.145456]  kunit_try_run_case+0x170/0x3f0
[   68.145493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.145527]  kthread+0x328/0x630
[   68.145557]  ret_from_fork+0x10/0x20
[   68.145591] 
[   68.216542] Allocated by task 349:
[   68.219929]  kasan_save_stack+0x3c/0x68
[   68.223746]  kasan_save_track+0x20/0x40
[   68.227566]  kasan_save_alloc_info+0x40/0x58
[   68.231819]  __kasan_kmalloc+0xd4/0xd8
[   68.235552]  __kmalloc_cache_noprof+0x16c/0x3c0
[   68.240066]  kasan_atomics+0xb8/0x2e0
[   68.243712]  kunit_try_run_case+0x170/0x3f0
[   68.247878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.253347]  kthread+0x328/0x630
[   68.256559]  ret_from_fork+0x10/0x20
[   68.260118] 
[   68.261593] The buggy address belongs to the object at ffff000808448180
[   68.261593]  which belongs to the cache kmalloc-64 of size 64
[   68.273920] The buggy address is located 0 bytes to the right of
[   68.273920]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   68.286766] 
[   68.288242] The buggy address belongs to the physical page:
[   68.293800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   68.301786] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   68.308294] page_type: f5(slab)
[   68.311428] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   68.319151] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.326870] page dumped because: kasan: bad access detected
[   68.332425] 
[   68.333901] Memory state around the buggy address:
[   68.338679]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.345884]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.353088] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.360289]                                      ^
[   68.365068]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.372272]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.379473] ==================================================================
[   75.783094] ==================================================================
[   75.790129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   75.797505] Read of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   75.804796] 
[   75.806277] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   75.806325] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.806343] Hardware name: WinLink E850-96 board (DT)
[   75.806364] Call trace:
[   75.806377]  show_stack+0x20/0x38 (C)
[   75.806408]  dump_stack_lvl+0x8c/0xd0
[   75.806440]  print_report+0x118/0x5d0
[   75.806467]  kasan_report+0xdc/0x128
[   75.806495]  __asan_report_load8_noabort+0x20/0x30
[   75.806528]  kasan_atomics_helper+0x3f04/0x4858
[   75.806564]  kasan_atomics+0x198/0x2e0
[   75.806598]  kunit_try_run_case+0x170/0x3f0
[   75.806633]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.806668]  kthread+0x328/0x630
[   75.806699]  ret_from_fork+0x10/0x20
[   75.806733] 
[   75.874413] Allocated by task 349:
[   75.877800]  kasan_save_stack+0x3c/0x68
[   75.881618]  kasan_save_track+0x20/0x40
[   75.885437]  kasan_save_alloc_info+0x40/0x58
[   75.889690]  __kasan_kmalloc+0xd4/0xd8
[   75.893423]  __kmalloc_cache_noprof+0x16c/0x3c0
[   75.897937]  kasan_atomics+0xb8/0x2e0
[   75.901583]  kunit_try_run_case+0x170/0x3f0
[   75.905749]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.911218]  kthread+0x328/0x630
[   75.914430]  ret_from_fork+0x10/0x20
[   75.917989] 
[   75.919466] The buggy address belongs to the object at ffff000808448180
[   75.919466]  which belongs to the cache kmalloc-64 of size 64
[   75.931791] The buggy address is located 0 bytes to the right of
[   75.931791]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   75.944638] 
[   75.946114] The buggy address belongs to the physical page:
[   75.951671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   75.959655] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   75.966165] page_type: f5(slab)
[   75.969299] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   75.977022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.984741] page dumped because: kasan: bad access detected
[   75.990297] 
[   75.991772] Memory state around the buggy address:
[   75.996552]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   76.003755]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   76.010959] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   76.018161]                                      ^
[   76.022938]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.030143]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.037345] ==================================================================
[   77.896930] ==================================================================
[   77.903987] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   77.911362] Read of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   77.918653] 
[   77.920135] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   77.920188] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.920204] Hardware name: WinLink E850-96 board (DT)
[   77.920225] Call trace:
[   77.920239]  show_stack+0x20/0x38 (C)
[   77.920271]  dump_stack_lvl+0x8c/0xd0
[   77.920303]  print_report+0x118/0x5d0
[   77.920333]  kasan_report+0xdc/0x128
[   77.920360]  __asan_report_load8_noabort+0x20/0x30
[   77.920396]  kasan_atomics_helper+0x3df4/0x4858
[   77.920432]  kasan_atomics+0x198/0x2e0
[   77.920464]  kunit_try_run_case+0x170/0x3f0
[   77.920501]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.920536]  kthread+0x328/0x630
[   77.920563]  ret_from_fork+0x10/0x20
[   77.920594] 
[   77.988270] Allocated by task 349:
[   77.991657]  kasan_save_stack+0x3c/0x68
[   77.995475]  kasan_save_track+0x20/0x40
[   77.999294]  kasan_save_alloc_info+0x40/0x58
[   78.003548]  __kasan_kmalloc+0xd4/0xd8
[   78.007280]  __kmalloc_cache_noprof+0x16c/0x3c0
[   78.011794]  kasan_atomics+0xb8/0x2e0
[   78.015440]  kunit_try_run_case+0x170/0x3f0
[   78.019607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.025075]  kthread+0x328/0x630
[   78.028287]  ret_from_fork+0x10/0x20
[   78.031846] 
[   78.033321] The buggy address belongs to the object at ffff000808448180
[   78.033321]  which belongs to the cache kmalloc-64 of size 64
[   78.045648] The buggy address is located 0 bytes to the right of
[   78.045648]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   78.058495] 
[   78.059973] The buggy address belongs to the physical page:
[   78.065528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   78.073512] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   78.080022] page_type: f5(slab)
[   78.083157] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   78.090879] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   78.098598] page dumped because: kasan: bad access detected
[   78.104154] 
[   78.105629] Memory state around the buggy address:
[   78.110407]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.117612]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.124817] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   78.132018]                                      ^
[   78.136796]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.144000]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.151202] ==================================================================
[   76.574902] ==================================================================
[   76.581956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   76.589333] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   76.596711] 
[   76.598194] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   76.598243] Tainted: [B]=BAD_PAGE, [N]=TEST
[   76.598259] Hardware name: WinLink E850-96 board (DT)
[   76.598277] Call trace:
[   76.598293]  show_stack+0x20/0x38 (C)
[   76.598325]  dump_stack_lvl+0x8c/0xd0
[   76.598357]  print_report+0x118/0x5d0
[   76.598386]  kasan_report+0xdc/0x128
[   76.598414]  kasan_check_range+0x100/0x1a8
[   76.598446]  __kasan_check_write+0x20/0x30
[   76.598479]  kasan_atomics_helper+0x14e4/0x4858
[   76.598513]  kasan_atomics+0x198/0x2e0
[   76.598545]  kunit_try_run_case+0x170/0x3f0
[   76.598581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.598615]  kthread+0x328/0x630
[   76.598645]  ret_from_fork+0x10/0x20
[   76.598678] 
[   76.669713] Allocated by task 349:
[   76.673101]  kasan_save_stack+0x3c/0x68
[   76.676919]  kasan_save_track+0x20/0x40
[   76.680738]  kasan_save_alloc_info+0x40/0x58
[   76.684991]  __kasan_kmalloc+0xd4/0xd8
[   76.688724]  __kmalloc_cache_noprof+0x16c/0x3c0
[   76.693237]  kasan_atomics+0xb8/0x2e0
[   76.696883]  kunit_try_run_case+0x170/0x3f0
[   76.701050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.706518]  kthread+0x328/0x630
[   76.709730]  ret_from_fork+0x10/0x20
[   76.713289] 
[   76.714764] The buggy address belongs to the object at ffff000808448180
[   76.714764]  which belongs to the cache kmalloc-64 of size 64
[   76.727093] The buggy address is located 0 bytes to the right of
[   76.727093]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   76.739938] 
[   76.741414] The buggy address belongs to the physical page:
[   76.746970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   76.754956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   76.761466] page_type: f5(slab)
[   76.764600] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   76.772323] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   76.780042] page dumped because: kasan: bad access detected
[   76.785597] 
[   76.787073] Memory state around the buggy address:
[   76.791850]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   76.799055]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   76.806260] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   76.813461]                                      ^
[   76.818239]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.825444]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.832645] ==================================================================
[   62.302886] ==================================================================
[   62.317070] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   62.324443] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   62.331736] 
[   62.333223] CPU: 5 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   62.333286] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.333305] Hardware name: WinLink E850-96 board (DT)
[   62.333329] Call trace:
[   62.333343]  show_stack+0x20/0x38 (C)
[   62.333383]  dump_stack_lvl+0x8c/0xd0
[   62.333420]  print_report+0x118/0x5d0
[   62.333451]  kasan_report+0xdc/0x128
[   62.333479]  __asan_report_load4_noabort+0x20/0x30
[   62.333515]  kasan_atomics_helper+0x40a8/0x4858
[   62.333554]  kasan_atomics+0x198/0x2e0
[   62.333588]  kunit_try_run_case+0x170/0x3f0
[   62.333627]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.333662]  kthread+0x328/0x630
[   62.333695]  ret_from_fork+0x10/0x20
[   62.333734] 
[   62.401353] Allocated by task 349:
[   62.404740]  kasan_save_stack+0x3c/0x68
[   62.408556]  kasan_save_track+0x20/0x40
[   62.412376]  kasan_save_alloc_info+0x40/0x58
[   62.416629]  __kasan_kmalloc+0xd4/0xd8
[   62.420362]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.424875]  kasan_atomics+0xb8/0x2e0
[   62.428521]  kunit_try_run_case+0x170/0x3f0
[   62.432688]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.438158]  kthread+0x328/0x630
[   62.441368]  ret_from_fork+0x10/0x20
[   62.444927] 
[   62.446404] The buggy address belongs to the object at ffff000808448180
[   62.446404]  which belongs to the cache kmalloc-64 of size 64
[   62.458733] The buggy address is located 0 bytes to the right of
[   62.458733]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   62.471576] 
[   62.473055] The buggy address belongs to the physical page:
[   62.478612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   62.486596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.493106] page_type: f5(slab)
[   62.496242] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.503960] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.511681] page dumped because: kasan: bad access detected
[   62.517235] 
[   62.518712] Memory state around the buggy address:
[   62.523490]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.530693]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.537900] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.545099]                                      ^
[   62.549878]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.557082]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.564283] ==================================================================
[   65.475968] ==================================================================
[   65.482990] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   65.490281] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   65.497659] 
[   65.499138] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   65.499186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.499203] Hardware name: WinLink E850-96 board (DT)
[   65.499221] Call trace:
[   65.499232]  show_stack+0x20/0x38 (C)
[   65.499265]  dump_stack_lvl+0x8c/0xd0
[   65.499299]  print_report+0x118/0x5d0
[   65.499327]  kasan_report+0xdc/0x128
[   65.499354]  kasan_check_range+0x100/0x1a8
[   65.499385]  __kasan_check_write+0x20/0x30
[   65.499417]  kasan_atomics_helper+0x54c/0x4858
[   65.499451]  kasan_atomics+0x198/0x2e0
[   65.499484]  kunit_try_run_case+0x170/0x3f0
[   65.499517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.499550]  kthread+0x328/0x630
[   65.499579]  ret_from_fork+0x10/0x20
[   65.499610] 
[   65.570575] Allocated by task 349:
[   65.573960]  kasan_save_stack+0x3c/0x68
[   65.577779]  kasan_save_track+0x20/0x40
[   65.581599]  kasan_save_alloc_info+0x40/0x58
[   65.585852]  __kasan_kmalloc+0xd4/0xd8
[   65.589585]  __kmalloc_cache_noprof+0x16c/0x3c0
[   65.594099]  kasan_atomics+0xb8/0x2e0
[   65.597744]  kunit_try_run_case+0x170/0x3f0
[   65.601911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.607380]  kthread+0x328/0x630
[   65.610591]  ret_from_fork+0x10/0x20
[   65.614150] 
[   65.615626] The buggy address belongs to the object at ffff000808448180
[   65.615626]  which belongs to the cache kmalloc-64 of size 64
[   65.627953] The buggy address is located 0 bytes to the right of
[   65.627953]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   65.640799] 
[   65.642275] The buggy address belongs to the physical page:
[   65.647833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   65.655817] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   65.662327] page_type: f5(slab)
[   65.665460] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   65.673184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.680903] page dumped because: kasan: bad access detected
[   65.686458] 
[   65.687934] Memory state around the buggy address:
[   65.692711]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.699916]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.707121] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.714323]                                      ^
[   65.719100]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.726305]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.733506] ==================================================================
[   66.005913] ==================================================================
[   66.012845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   66.020136] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   66.027512] 
[   66.028995] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   66.029044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.029061] Hardware name: WinLink E850-96 board (DT)
[   66.029077] Call trace:
[   66.029091]  show_stack+0x20/0x38 (C)
[   66.029123]  dump_stack_lvl+0x8c/0xd0
[   66.029155]  print_report+0x118/0x5d0
[   66.029183]  kasan_report+0xdc/0x128
[   66.029210]  kasan_check_range+0x100/0x1a8
[   66.029243]  __kasan_check_write+0x20/0x30
[   66.029273]  kasan_atomics_helper+0x61c/0x4858
[   66.029308]  kasan_atomics+0x198/0x2e0
[   66.029340]  kunit_try_run_case+0x170/0x3f0
[   66.029376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.029409]  kthread+0x328/0x630
[   66.029442]  ret_from_fork+0x10/0x20
[   66.029474] 
[   66.100428] Allocated by task 349:
[   66.103815]  kasan_save_stack+0x3c/0x68
[   66.107632]  kasan_save_track+0x20/0x40
[   66.111452]  kasan_save_alloc_info+0x40/0x58
[   66.115705]  __kasan_kmalloc+0xd4/0xd8
[   66.119438]  __kmalloc_cache_noprof+0x16c/0x3c0
[   66.123952]  kasan_atomics+0xb8/0x2e0
[   66.127598]  kunit_try_run_case+0x170/0x3f0
[   66.131764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.137233]  kthread+0x328/0x630
[   66.140444]  ret_from_fork+0x10/0x20
[   66.144004] 
[   66.145479] The buggy address belongs to the object at ffff000808448180
[   66.145479]  which belongs to the cache kmalloc-64 of size 64
[   66.157806] The buggy address is located 0 bytes to the right of
[   66.157806]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   66.170652] 
[   66.172128] The buggy address belongs to the physical page:
[   66.177686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   66.185670] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   66.192180] page_type: f5(slab)
[   66.195313] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   66.203037] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.210756] page dumped because: kasan: bad access detected
[   66.216311] 
[   66.217787] Memory state around the buggy address:
[   66.222565]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.229770]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.236974] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.244176]                                      ^
[   66.248953]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.256158]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.263359] ==================================================================
[   77.105212] ==================================================================
[   77.112158] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   77.119533] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   77.126911] 
[   77.128394] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   77.128443] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.128459] Hardware name: WinLink E850-96 board (DT)
[   77.128479] Call trace:
[   77.128494]  show_stack+0x20/0x38 (C)
[   77.128530]  dump_stack_lvl+0x8c/0xd0
[   77.128563]  print_report+0x118/0x5d0
[   77.128594]  kasan_report+0xdc/0x128
[   77.128622]  kasan_check_range+0x100/0x1a8
[   77.128652]  __kasan_check_write+0x20/0x30
[   77.128685]  kasan_atomics_helper+0x15b4/0x4858
[   77.128720]  kasan_atomics+0x198/0x2e0
[   77.128752]  kunit_try_run_case+0x170/0x3f0
[   77.128787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.128819]  kthread+0x328/0x630
[   77.128849]  ret_from_fork+0x10/0x20
[   77.128885] 
[   77.199913] Allocated by task 349:
[   77.203301]  kasan_save_stack+0x3c/0x68
[   77.207119]  kasan_save_track+0x20/0x40
[   77.210938]  kasan_save_alloc_info+0x40/0x58
[   77.215191]  __kasan_kmalloc+0xd4/0xd8
[   77.218924]  __kmalloc_cache_noprof+0x16c/0x3c0
[   77.223438]  kasan_atomics+0xb8/0x2e0
[   77.227084]  kunit_try_run_case+0x170/0x3f0
[   77.231250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.236719]  kthread+0x328/0x630
[   77.239930]  ret_from_fork+0x10/0x20
[   77.243489] 
[   77.244965] The buggy address belongs to the object at ffff000808448180
[   77.244965]  which belongs to the cache kmalloc-64 of size 64
[   77.257293] The buggy address is located 0 bytes to the right of
[   77.257293]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   77.270139] 
[   77.271615] The buggy address belongs to the physical page:
[   77.277172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   77.285157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   77.291666] page_type: f5(slab)
[   77.294801] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   77.302523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   77.310242] page dumped because: kasan: bad access detected
[   77.315797] 
[   77.317273] Memory state around the buggy address:
[   77.322052]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.329256]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.336461] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.343662]                                      ^
[   77.348439]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.355644]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.362846] ==================================================================
[   67.857097] ==================================================================
[   67.864034] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   67.871322] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   67.878700] 
[   67.880183] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   67.880233] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.880250] Hardware name: WinLink E850-96 board (DT)
[   67.880269] Call trace:
[   67.880284]  show_stack+0x20/0x38 (C)
[   67.880317]  dump_stack_lvl+0x8c/0xd0
[   67.880351]  print_report+0x118/0x5d0
[   67.880379]  kasan_report+0xdc/0x128
[   67.880409]  kasan_check_range+0x100/0x1a8
[   67.880440]  __kasan_check_write+0x20/0x30
[   67.880471]  kasan_atomics_helper+0x934/0x4858
[   67.880506]  kasan_atomics+0x198/0x2e0
[   67.880539]  kunit_try_run_case+0x170/0x3f0
[   67.880575]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.880612]  kthread+0x328/0x630
[   67.880642]  ret_from_fork+0x10/0x20
[   67.880673] 
[   67.951615] Allocated by task 349:
[   67.955003]  kasan_save_stack+0x3c/0x68
[   67.958820]  kasan_save_track+0x20/0x40
[   67.962639]  kasan_save_alloc_info+0x40/0x58
[   67.966893]  __kasan_kmalloc+0xd4/0xd8
[   67.970625]  __kmalloc_cache_noprof+0x16c/0x3c0
[   67.975139]  kasan_atomics+0xb8/0x2e0
[   67.978785]  kunit_try_run_case+0x170/0x3f0
[   67.982952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.988420]  kthread+0x328/0x630
[   67.991632]  ret_from_fork+0x10/0x20
[   67.995191] 
[   67.996666] The buggy address belongs to the object at ffff000808448180
[   67.996666]  which belongs to the cache kmalloc-64 of size 64
[   68.008993] The buggy address is located 0 bytes to the right of
[   68.008993]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   68.021840] 
[   68.023316] The buggy address belongs to the physical page:
[   68.028873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   68.036857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   68.043367] page_type: f5(slab)
[   68.046501] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   68.054225] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.061943] page dumped because: kasan: bad access detected
[   68.067499] 
[   68.068974] Memory state around the buggy address:
[   68.073754]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.080957]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.088162] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.095363]                                      ^
[   68.100141]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.107346]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.114547] ==================================================================
[   69.969908] ==================================================================
[   69.976850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   69.984137] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   69.991515] 
[   69.992999] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   69.993051] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.993067] Hardware name: WinLink E850-96 board (DT)
[   69.993088] Call trace:
[   69.993102]  show_stack+0x20/0x38 (C)
[   69.993135]  dump_stack_lvl+0x8c/0xd0
[   69.993168]  print_report+0x118/0x5d0
[   69.993196]  kasan_report+0xdc/0x128
[   69.993221]  kasan_check_range+0x100/0x1a8
[   69.993253]  __kasan_check_write+0x20/0x30
[   69.993283]  kasan_atomics_helper+0xc08/0x4858
[   69.993318]  kasan_atomics+0x198/0x2e0
[   69.993351]  kunit_try_run_case+0x170/0x3f0
[   69.993385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.993421]  kthread+0x328/0x630
[   69.993449]  ret_from_fork+0x10/0x20
[   69.993481] 
[   70.064430] Allocated by task 349:
[   70.067818]  kasan_save_stack+0x3c/0x68
[   70.071636]  kasan_save_track+0x20/0x40
[   70.075455]  kasan_save_alloc_info+0x40/0x58
[   70.079708]  __kasan_kmalloc+0xd4/0xd8
[   70.083441]  __kmalloc_cache_noprof+0x16c/0x3c0
[   70.087955]  kasan_atomics+0xb8/0x2e0
[   70.091601]  kunit_try_run_case+0x170/0x3f0
[   70.095767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.101237]  kthread+0x328/0x630
[   70.104448]  ret_from_fork+0x10/0x20
[   70.108007] 
[   70.109482] The buggy address belongs to the object at ffff000808448180
[   70.109482]  which belongs to the cache kmalloc-64 of size 64
[   70.121809] The buggy address is located 0 bytes to the right of
[   70.121809]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   70.134655] 
[   70.136132] The buggy address belongs to the physical page:
[   70.141689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   70.149673] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   70.156183] page_type: f5(slab)
[   70.159319] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   70.167040] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.174759] page dumped because: kasan: bad access detected
[   70.180314] 
[   70.181790] Memory state around the buggy address:
[   70.186570]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.193773]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.200977] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.208179]                                      ^
[   70.212956]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.220161]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.227362] ==================================================================
[   62.833469] ==================================================================
[   62.840499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   62.847786] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   62.855077] 
[   62.856562] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   62.856618] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.856636] Hardware name: WinLink E850-96 board (DT)
[   62.856658] Call trace:
[   62.856673]  show_stack+0x20/0x38 (C)
[   62.856711]  dump_stack_lvl+0x8c/0xd0
[   62.856745]  print_report+0x118/0x5d0
[   62.856776]  kasan_report+0xdc/0x128
[   62.856804]  kasan_check_range+0x100/0x1a8
[   62.856834]  __kasan_check_read+0x20/0x30
[   62.856868]  kasan_atomics_helper+0x1ec/0x4858
[   62.856905]  kasan_atomics+0x198/0x2e0
[   62.856936]  kunit_try_run_case+0x170/0x3f0
[   62.856973]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.857008]  kthread+0x328/0x630
[   62.857038]  ret_from_fork+0x10/0x20
[   62.857074] 
[   62.927906] Allocated by task 349:
[   62.931295]  kasan_save_stack+0x3c/0x68
[   62.935111]  kasan_save_track+0x20/0x40
[   62.938930]  kasan_save_alloc_info+0x40/0x58
[   62.943183]  __kasan_kmalloc+0xd4/0xd8
[   62.946916]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.951430]  kasan_atomics+0xb8/0x2e0
[   62.955076]  kunit_try_run_case+0x170/0x3f0
[   62.959243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.964712]  kthread+0x328/0x630
[   62.967923]  ret_from_fork+0x10/0x20
[   62.971483] 
[   62.972959] The buggy address belongs to the object at ffff000808448180
[   62.972959]  which belongs to the cache kmalloc-64 of size 64
[   62.985287] The buggy address is located 0 bytes to the right of
[   62.985287]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   62.998130] 
[   62.999609] The buggy address belongs to the physical page:
[   63.005166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   63.013149] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.019658] page_type: f5(slab)
[   63.022794] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.030515] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.038235] page dumped because: kasan: bad access detected
[   63.043790] 
[   63.045265] Memory state around the buggy address:
[   63.050044]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.057248]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.064453] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.071654]                                      ^
[   63.076433]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.083636]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.090838] ==================================================================
[   72.340770] ==================================================================
[   72.347820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   72.355195] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   72.362573] 
[   72.364056] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   72.364107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.364123] Hardware name: WinLink E850-96 board (DT)
[   72.364143] Call trace:
[   72.364157]  show_stack+0x20/0x38 (C)
[   72.364191]  dump_stack_lvl+0x8c/0xd0
[   72.364223]  print_report+0x118/0x5d0
[   72.364252]  kasan_report+0xdc/0x128
[   72.364281]  __asan_report_store8_noabort+0x20/0x30
[   72.364316]  kasan_atomics_helper+0x3e5c/0x4858
[   72.364351]  kasan_atomics+0x198/0x2e0
[   72.364384]  kunit_try_run_case+0x170/0x3f0
[   72.364417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.364449]  kthread+0x328/0x630
[   72.364478]  ret_from_fork+0x10/0x20
[   72.364510] 
[   72.432277] Allocated by task 349:
[   72.435664]  kasan_save_stack+0x3c/0x68
[   72.439482]  kasan_save_track+0x20/0x40
[   72.443301]  kasan_save_alloc_info+0x40/0x58
[   72.447555]  __kasan_kmalloc+0xd4/0xd8
[   72.451287]  __kmalloc_cache_noprof+0x16c/0x3c0
[   72.455801]  kasan_atomics+0xb8/0x2e0
[   72.459447]  kunit_try_run_case+0x170/0x3f0
[   72.463613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.469082]  kthread+0x328/0x630
[   72.472294]  ret_from_fork+0x10/0x20
[   72.475853] 
[   72.477328] The buggy address belongs to the object at ffff000808448180
[   72.477328]  which belongs to the cache kmalloc-64 of size 64
[   72.489655] The buggy address is located 0 bytes to the right of
[   72.489655]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   72.502502] 
[   72.503979] The buggy address belongs to the physical page:
[   72.509534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   72.517520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   72.524029] page_type: f5(slab)
[   72.527162] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   72.534887] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.542605] page dumped because: kasan: bad access detected
[   72.548160] 
[   72.549636] Memory state around the buggy address:
[   72.554416]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.561619]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.568824] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.576025]                                      ^
[   72.580803]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.588007]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.595209] ==================================================================
[   69.181701] ==================================================================
[   69.188667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   69.196041] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   69.203332] 
[   69.204815] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   69.204863] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.204880] Hardware name: WinLink E850-96 board (DT)
[   69.204903] Call trace:
[   69.204917]  show_stack+0x20/0x38 (C)
[   69.204951]  dump_stack_lvl+0x8c/0xd0
[   69.204982]  print_report+0x118/0x5d0
[   69.205010]  kasan_report+0xdc/0x128
[   69.205037]  __asan_report_load4_noabort+0x20/0x30
[   69.205072]  kasan_atomics_helper+0x3dcc/0x4858
[   69.205106]  kasan_atomics+0x198/0x2e0
[   69.205138]  kunit_try_run_case+0x170/0x3f0
[   69.205174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.205209]  kthread+0x328/0x630
[   69.205239]  ret_from_fork+0x10/0x20
[   69.205273] 
[   69.272949] Allocated by task 349:
[   69.276337]  kasan_save_stack+0x3c/0x68
[   69.280155]  kasan_save_track+0x20/0x40
[   69.283974]  kasan_save_alloc_info+0x40/0x58
[   69.288227]  __kasan_kmalloc+0xd4/0xd8
[   69.291960]  __kmalloc_cache_noprof+0x16c/0x3c0
[   69.296474]  kasan_atomics+0xb8/0x2e0
[   69.300120]  kunit_try_run_case+0x170/0x3f0
[   69.304286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.309756]  kthread+0x328/0x630
[   69.312966]  ret_from_fork+0x10/0x20
[   69.316525] 
[   69.318001] The buggy address belongs to the object at ffff000808448180
[   69.318001]  which belongs to the cache kmalloc-64 of size 64
[   69.330327] The buggy address is located 0 bytes to the right of
[   69.330327]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   69.343174] 
[   69.344652] The buggy address belongs to the physical page:
[   69.350207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   69.358192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   69.364701] page_type: f5(slab)
[   69.367836] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   69.375559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.383277] page dumped because: kasan: bad access detected
[   69.388833] 
[   69.390309] Memory state around the buggy address:
[   69.395088]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.402292]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.409496] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.416697]                                      ^
[   69.421475]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.428680]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.435881] ==================================================================
[   72.602593] ==================================================================
[   72.609624] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   72.616910] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   72.624288] 
[   72.625771] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   72.625822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.625837] Hardware name: WinLink E850-96 board (DT)
[   72.625857] Call trace:
[   72.625871]  show_stack+0x20/0x38 (C)
[   72.625902]  dump_stack_lvl+0x8c/0xd0
[   72.625933]  print_report+0x118/0x5d0
[   72.625961]  kasan_report+0xdc/0x128
[   72.625990]  kasan_check_range+0x100/0x1a8
[   72.626020]  __kasan_check_write+0x20/0x30
[   72.626054]  kasan_atomics_helper+0xeb8/0x4858
[   72.626093]  kasan_atomics+0x198/0x2e0
[   72.626124]  kunit_try_run_case+0x170/0x3f0
[   72.626159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.626194]  kthread+0x328/0x630
[   72.626223]  ret_from_fork+0x10/0x20
[   72.626255] 
[   72.697203] Allocated by task 349:
[   72.700591]  kasan_save_stack+0x3c/0x68
[   72.704408]  kasan_save_track+0x20/0x40
[   72.708228]  kasan_save_alloc_info+0x40/0x58
[   72.712481]  __kasan_kmalloc+0xd4/0xd8
[   72.716214]  __kmalloc_cache_noprof+0x16c/0x3c0
[   72.720728]  kasan_atomics+0xb8/0x2e0
[   72.724373]  kunit_try_run_case+0x170/0x3f0
[   72.728540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.734008]  kthread+0x328/0x630
[   72.737220]  ret_from_fork+0x10/0x20
[   72.740779] 
[   72.742255] The buggy address belongs to the object at ffff000808448180
[   72.742255]  which belongs to the cache kmalloc-64 of size 64
[   72.754582] The buggy address is located 0 bytes to the right of
[   72.754582]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   72.767428] 
[   72.768904] The buggy address belongs to the physical page:
[   72.774460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   72.782446] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   72.788955] page_type: f5(slab)
[   72.792091] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   72.799813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.807532] page dumped because: kasan: bad access detected
[   72.813087] 
[   72.814563] Memory state around the buggy address:
[   72.819343]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.826545]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.833750] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.840952]                                      ^
[   72.845729]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.852934]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.860135] ==================================================================
[   78.158555] ==================================================================
[   78.165615] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   78.172990] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   78.180368] 
[   78.181851] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   78.181900] Tainted: [B]=BAD_PAGE, [N]=TEST
[   78.181918] Hardware name: WinLink E850-96 board (DT)
[   78.181936] Call trace:
[   78.181950]  show_stack+0x20/0x38 (C)
[   78.181983]  dump_stack_lvl+0x8c/0xd0
[   78.182017]  print_report+0x118/0x5d0
[   78.182046]  kasan_report+0xdc/0x128
[   78.182074]  kasan_check_range+0x100/0x1a8
[   78.182105]  __kasan_check_write+0x20/0x30
[   78.182139]  kasan_atomics_helper+0x16d0/0x4858
[   78.182173]  kasan_atomics+0x198/0x2e0
[   78.182204]  kunit_try_run_case+0x170/0x3f0
[   78.182242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.182279]  kthread+0x328/0x630
[   78.182309]  ret_from_fork+0x10/0x20
[   78.182341] 
[   78.253370] Allocated by task 349:
[   78.256757]  kasan_save_stack+0x3c/0x68
[   78.260575]  kasan_save_track+0x20/0x40
[   78.264395]  kasan_save_alloc_info+0x40/0x58
[   78.268648]  __kasan_kmalloc+0xd4/0xd8
[   78.272380]  __kmalloc_cache_noprof+0x16c/0x3c0
[   78.276894]  kasan_atomics+0xb8/0x2e0
[   78.280540]  kunit_try_run_case+0x170/0x3f0
[   78.284707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.290175]  kthread+0x328/0x630
[   78.293387]  ret_from_fork+0x10/0x20
[   78.296946] 
[   78.298421] The buggy address belongs to the object at ffff000808448180
[   78.298421]  which belongs to the cache kmalloc-64 of size 64
[   78.310748] The buggy address is located 0 bytes to the right of
[   78.310748]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   78.323595] 
[   78.325072] The buggy address belongs to the physical page:
[   78.330628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   78.338612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   78.345122] page_type: f5(slab)
[   78.348255] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   78.355980] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   78.363699] page dumped because: kasan: bad access detected
[   78.369254] 
[   78.370729] Memory state around the buggy address:
[   78.375508]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.382712]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.389917] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   78.397118]                                      ^
[   78.401896]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.409101]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.416302] ==================================================================
[   75.252911] ==================================================================
[   75.259927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   75.267304] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   75.274683] 
[   75.276166] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   75.276215] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.276231] Hardware name: WinLink E850-96 board (DT)
[   75.276253] Call trace:
[   75.276266]  show_stack+0x20/0x38 (C)
[   75.276299]  dump_stack_lvl+0x8c/0xd0
[   75.276332]  print_report+0x118/0x5d0
[   75.276359]  kasan_report+0xdc/0x128
[   75.276387]  kasan_check_range+0x100/0x1a8
[   75.276416]  __kasan_check_write+0x20/0x30
[   75.276449]  kasan_atomics_helper+0x12d8/0x4858
[   75.276487]  kasan_atomics+0x198/0x2e0
[   75.276519]  kunit_try_run_case+0x170/0x3f0
[   75.276554]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.276590]  kthread+0x328/0x630
[   75.276619]  ret_from_fork+0x10/0x20
[   75.276651] 
[   75.347685] Allocated by task 349:
[   75.351070]  kasan_save_stack+0x3c/0x68
[   75.354889]  kasan_save_track+0x20/0x40
[   75.358709]  kasan_save_alloc_info+0x40/0x58
[   75.362962]  __kasan_kmalloc+0xd4/0xd8
[   75.366695]  __kmalloc_cache_noprof+0x16c/0x3c0
[   75.371209]  kasan_atomics+0xb8/0x2e0
[   75.374854]  kunit_try_run_case+0x170/0x3f0
[   75.379021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.384490]  kthread+0x328/0x630
[   75.387701]  ret_from_fork+0x10/0x20
[   75.391260] 
[   75.392736] The buggy address belongs to the object at ffff000808448180
[   75.392736]  which belongs to the cache kmalloc-64 of size 64
[   75.405064] The buggy address is located 0 bytes to the right of
[   75.405064]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   75.417909] 
[   75.419387] The buggy address belongs to the physical page:
[   75.424944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   75.432927] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   75.439437] page_type: f5(slab)
[   75.442571] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   75.450294] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.458013] page dumped because: kasan: bad access detected
[   75.463568] 
[   75.465044] Memory state around the buggy address:
[   75.469824]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.477027]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.484232] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.491433]                                      ^
[   75.496210]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.503415]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.510616] ==================================================================
[   67.330452] ==================================================================
[   67.337477] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   67.344767] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   67.352145] 
[   67.353627] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   67.353675] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.353691] Hardware name: WinLink E850-96 board (DT)
[   67.353710] Call trace:
[   67.353722]  show_stack+0x20/0x38 (C)
[   67.353758]  dump_stack_lvl+0x8c/0xd0
[   67.353789]  print_report+0x118/0x5d0
[   67.353815]  kasan_report+0xdc/0x128
[   67.353844]  kasan_check_range+0x100/0x1a8
[   67.353873]  __kasan_check_write+0x20/0x30
[   67.353906]  kasan_atomics_helper+0x894/0x4858
[   67.353943]  kasan_atomics+0x198/0x2e0
[   67.353975]  kunit_try_run_case+0x170/0x3f0
[   67.354012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.354047]  kthread+0x328/0x630
[   67.354079]  ret_from_fork+0x10/0x20
[   67.354109] 
[   67.425060] Allocated by task 349:
[   67.428447]  kasan_save_stack+0x3c/0x68
[   67.432266]  kasan_save_track+0x20/0x40
[   67.436085]  kasan_save_alloc_info+0x40/0x58
[   67.440338]  __kasan_kmalloc+0xd4/0xd8
[   67.444071]  __kmalloc_cache_noprof+0x16c/0x3c0
[   67.448585]  kasan_atomics+0xb8/0x2e0
[   67.452230]  kunit_try_run_case+0x170/0x3f0
[   67.456397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.461867]  kthread+0x328/0x630
[   67.465077]  ret_from_fork+0x10/0x20
[   67.468637] 
[   67.470112] The buggy address belongs to the object at ffff000808448180
[   67.470112]  which belongs to the cache kmalloc-64 of size 64
[   67.482440] The buggy address is located 0 bytes to the right of
[   67.482440]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   67.495285] 
[   67.496763] The buggy address belongs to the physical page:
[   67.502318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   67.510303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   67.516813] page_type: f5(slab)
[   67.519947] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   67.527670] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.535389] page dumped because: kasan: bad access detected
[   67.540944] 
[   67.542420] Memory state around the buggy address:
[   67.547201]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.554403]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.561607] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.568808]                                      ^
[   67.573586]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.580791]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.587992] ==================================================================
[   67.065586] ==================================================================
[   67.072553] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   67.079840] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   67.087218] 
[   67.088701] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   67.088749] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.088765] Hardware name: WinLink E850-96 board (DT)
[   67.088786] Call trace:
[   67.088799]  show_stack+0x20/0x38 (C)
[   67.088835]  dump_stack_lvl+0x8c/0xd0
[   67.088868]  print_report+0x118/0x5d0
[   67.088897]  kasan_report+0xdc/0x128
[   67.088924]  kasan_check_range+0x100/0x1a8
[   67.088955]  __kasan_check_write+0x20/0x30
[   67.088988]  kasan_atomics_helper+0x7cc/0x4858
[   67.089024]  kasan_atomics+0x198/0x2e0
[   67.089057]  kunit_try_run_case+0x170/0x3f0
[   67.089093]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.089127]  kthread+0x328/0x630
[   67.089157]  ret_from_fork+0x10/0x20
[   67.089189] 
[   67.160134] Allocated by task 349:
[   67.163521]  kasan_save_stack+0x3c/0x68
[   67.167339]  kasan_save_track+0x20/0x40
[   67.171158]  kasan_save_alloc_info+0x40/0x58
[   67.175412]  __kasan_kmalloc+0xd4/0xd8
[   67.179144]  __kmalloc_cache_noprof+0x16c/0x3c0
[   67.183658]  kasan_atomics+0xb8/0x2e0
[   67.187304]  kunit_try_run_case+0x170/0x3f0
[   67.191470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.196939]  kthread+0x328/0x630
[   67.200151]  ret_from_fork+0x10/0x20
[   67.203710] 
[   67.205185] The buggy address belongs to the object at ffff000808448180
[   67.205185]  which belongs to the cache kmalloc-64 of size 64
[   67.217512] The buggy address is located 0 bytes to the right of
[   67.217512]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   67.230359] 
[   67.231836] The buggy address belongs to the physical page:
[   67.237392] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   67.245376] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   67.251886] page_type: f5(slab)
[   67.255020] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   67.262743] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.270462] page dumped because: kasan: bad access detected
[   67.276018] 
[   67.277493] Memory state around the buggy address:
[   67.282273]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.289476]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.296681] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.303882]                                      ^
[   67.308660]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.315865]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.323066] ==================================================================
[   78.423658] ==================================================================
[   78.430714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   78.438090] Read of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   78.445381] 
[   78.446865] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   78.446917] Tainted: [B]=BAD_PAGE, [N]=TEST
[   78.446932] Hardware name: WinLink E850-96 board (DT)
[   78.446953] Call trace:
[   78.446967]  show_stack+0x20/0x38 (C)
[   78.447002]  dump_stack_lvl+0x8c/0xd0
[   78.447036]  print_report+0x118/0x5d0
[   78.447062]  kasan_report+0xdc/0x128
[   78.447090]  __asan_report_load8_noabort+0x20/0x30
[   78.447125]  kasan_atomics_helper+0x3e10/0x4858
[   78.447161]  kasan_atomics+0x198/0x2e0
[   78.447194]  kunit_try_run_case+0x170/0x3f0
[   78.447230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.447265]  kthread+0x328/0x630
[   78.447296]  ret_from_fork+0x10/0x20
[   78.447327] 
[   78.514998] Allocated by task 349:
[   78.518385]  kasan_save_stack+0x3c/0x68
[   78.522203]  kasan_save_track+0x20/0x40
[   78.526023]  kasan_save_alloc_info+0x40/0x58
[   78.530276]  __kasan_kmalloc+0xd4/0xd8
[   78.534009]  __kmalloc_cache_noprof+0x16c/0x3c0
[   78.538522]  kasan_atomics+0xb8/0x2e0
[   78.542168]  kunit_try_run_case+0x170/0x3f0
[   78.546335]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.551805]  kthread+0x328/0x630
[   78.555017]  ret_from_fork+0x10/0x20
[   78.558574] 
[   78.560049] The buggy address belongs to the object at ffff000808448180
[   78.560049]  which belongs to the cache kmalloc-64 of size 64
[   78.572376] The buggy address is located 0 bytes to the right of
[   78.572376]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   78.585223] 
[   78.586699] The buggy address belongs to the physical page:
[   78.592256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   78.600241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   78.606751] page_type: f5(slab)
[   78.609885] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   78.617607] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   78.625327] page dumped because: kasan: bad access detected
[   78.630882] 
[   78.632358] Memory state around the buggy address:
[   78.637136]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.644340]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.651545] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   78.658746]                                      ^
[   78.663524]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.670729]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.677930] ==================================================================

[   32.567374] ==================================================================
[   32.567433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   32.567485] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.567556] 
[   32.567591] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.567676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.567705] Hardware name: linux,dummy-virt (DT)
[   32.567742] Call trace:
[   32.567769]  show_stack+0x20/0x38 (C)
[   32.567816]  dump_stack_lvl+0x8c/0xd0
[   32.567863]  print_report+0x118/0x5d0
[   32.567912]  kasan_report+0xdc/0x128
[   32.567957]  kasan_check_range+0x100/0x1a8
[   32.568020]  __kasan_check_write+0x20/0x30
[   32.568083]  kasan_atomics_helper+0x1128/0x4858
[   32.568137]  kasan_atomics+0x198/0x2e0
[   32.568447]  kunit_try_run_case+0x170/0x3f0
[   32.568873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.568928]  kthread+0x328/0x630
[   32.568973]  ret_from_fork+0x10/0x20
[   32.569388] 
[   32.569443] Allocated by task 296:
[   32.570069]  kasan_save_stack+0x3c/0x68
[   32.570342]  kasan_save_track+0x20/0x40
[   32.570426]  kasan_save_alloc_info+0x40/0x58
[   32.570598]  __kasan_kmalloc+0xd4/0xd8
[   32.570765]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.571070]  kasan_atomics+0xb8/0x2e0
[   32.571414]  kunit_try_run_case+0x170/0x3f0
[   32.571580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.571631]  kthread+0x328/0x630
[   32.571813]  ret_from_fork+0x10/0x20
[   32.572027] 
[   32.572100] The buggy address belongs to the object at fff00000c85f0e00
[   32.572100]  which belongs to the cache kmalloc-64 of size 64
[   32.572277] The buggy address is located 0 bytes to the right of
[   32.572277]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.572558] 
[   32.572588] The buggy address belongs to the physical page:
[   32.572794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.572918] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.572997] page_type: f5(slab)
[   32.573318] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.573430] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.573550] page dumped because: kasan: bad access detected
[   32.573628] 
[   32.573912] Memory state around the buggy address:
[   32.574043]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.574145]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.574390] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.574562]                                      ^
[   32.574711]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.574789]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.574917] ==================================================================
[   32.684792] ==================================================================
[   32.684845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   32.684895] Read of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.684946] 
[   32.684976] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.685075] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.685104] Hardware name: linux,dummy-virt (DT)
[   32.685134] Call trace:
[   32.685159]  show_stack+0x20/0x38 (C)
[   32.685207]  dump_stack_lvl+0x8c/0xd0
[   32.685254]  print_report+0x118/0x5d0
[   32.685298]  kasan_report+0xdc/0x128
[   32.685343]  __asan_report_load8_noabort+0x20/0x30
[   32.685395]  kasan_atomics_helper+0x3df4/0x4858
[   32.685445]  kasan_atomics+0x198/0x2e0
[   32.685493]  kunit_try_run_case+0x170/0x3f0
[   32.685542]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.685598]  kthread+0x328/0x630
[   32.685641]  ret_from_fork+0x10/0x20
[   32.685691] 
[   32.685712] Allocated by task 296:
[   32.685741]  kasan_save_stack+0x3c/0x68
[   32.685784]  kasan_save_track+0x20/0x40
[   32.685823]  kasan_save_alloc_info+0x40/0x58
[   32.685862]  __kasan_kmalloc+0xd4/0xd8
[   32.685901]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.686005]  kasan_atomics+0xb8/0x2e0
[   32.686240]  kunit_try_run_case+0x170/0x3f0
[   32.686282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.686325]  kthread+0x328/0x630
[   32.686361]  ret_from_fork+0x10/0x20
[   32.686447] 
[   32.686505] The buggy address belongs to the object at fff00000c85f0e00
[   32.686505]  which belongs to the cache kmalloc-64 of size 64
[   32.686746] The buggy address is located 0 bytes to the right of
[   32.686746]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.686812] 
[   32.687010] The buggy address belongs to the physical page:
[   32.687066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.687400] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.687463] page_type: f5(slab)
[   32.687503] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.687555] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.687595] page dumped because: kasan: bad access detected
[   32.687629] 
[   32.687932] Memory state around the buggy address:
[   32.688057]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.688199]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.688364] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.688469]                                      ^
[   32.688835]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.688884]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.688925] ==================================================================
[   32.697493] ==================================================================
[   32.697615] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   32.697687] Read of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.697740] 
[   32.697789] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.697873] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.697900] Hardware name: linux,dummy-virt (DT)
[   32.697933] Call trace:
[   32.697955]  show_stack+0x20/0x38 (C)
[   32.698023]  dump_stack_lvl+0x8c/0xd0
[   32.698081]  print_report+0x118/0x5d0
[   32.698239]  kasan_report+0xdc/0x128
[   32.698493]  __asan_report_load8_noabort+0x20/0x30
[   32.698566]  kasan_atomics_helper+0x3e10/0x4858
[   32.698928]  kasan_atomics+0x198/0x2e0
[   32.699003]  kunit_try_run_case+0x170/0x3f0
[   32.699068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.699120]  kthread+0x328/0x630
[   32.699197]  ret_from_fork+0x10/0x20
[   32.699293] 
[   32.699322] Allocated by task 296:
[   32.699353]  kasan_save_stack+0x3c/0x68
[   32.699433]  kasan_save_track+0x20/0x40
[   32.699511]  kasan_save_alloc_info+0x40/0x58
[   32.699552]  __kasan_kmalloc+0xd4/0xd8
[   32.699590]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.699658]  kasan_atomics+0xb8/0x2e0
[   32.699698]  kunit_try_run_case+0x170/0x3f0
[   32.699738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.699781]  kthread+0x328/0x630
[   32.699902]  ret_from_fork+0x10/0x20
[   32.700034] 
[   32.700088] The buggy address belongs to the object at fff00000c85f0e00
[   32.700088]  which belongs to the cache kmalloc-64 of size 64
[   32.700151] The buggy address is located 0 bytes to the right of
[   32.700151]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.700246] 
[   32.700434] The buggy address belongs to the physical page:
[   32.700521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.700669] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.700741] page_type: f5(slab)
[   32.700781] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.700855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.700928] page dumped because: kasan: bad access detected
[   32.700962] 
[   32.700983] Memory state around the buggy address:
[   32.701016]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.701170]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.701232] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.701273]                                      ^
[   32.701308]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.701363]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.701404] ==================================================================
[   32.354357] ==================================================================
[   32.354405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   32.354453] Read of size 4 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.354504] 
[   32.354535] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.354618] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.354648] Hardware name: linux,dummy-virt (DT)
[   32.354680] Call trace:
[   32.354704]  show_stack+0x20/0x38 (C)
[   32.354775]  dump_stack_lvl+0x8c/0xd0
[   32.354823]  print_report+0x118/0x5d0
[   32.354867]  kasan_report+0xdc/0x128
[   32.354918]  __asan_report_load4_noabort+0x20/0x30
[   32.354968]  kasan_atomics_helper+0x42d8/0x4858
[   32.355020]  kasan_atomics+0x198/0x2e0
[   32.355684]  kunit_try_run_case+0x170/0x3f0
[   32.355782]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.356544]  kthread+0x328/0x630
[   32.356639]  ret_from_fork+0x10/0x20
[   32.356721] 
[   32.356742] Allocated by task 296:
[   32.356796]  kasan_save_stack+0x3c/0x68
[   32.357275]  __kasan_kmalloc+0xd4/0xd8
[   32.358627] 
[   32.358926] 
[   32.359151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.359280] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.359341] page_type: f5(slab)
[   32.359871] page dumped because: kasan: bad access detected
[   32.360645]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.364657]  kasan_atomics+0x198/0x2e0
[   32.365592] Allocated by task 296:
[   32.365736]  kasan_save_stack+0x3c/0x68
[   32.365968]  kasan_save_track+0x20/0x40
[   32.366139]  kasan_save_alloc_info+0x40/0x58
[   32.366211]  __kasan_kmalloc+0xd4/0xd8
[   32.366540]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.366617]  kasan_atomics+0xb8/0x2e0
[   32.366784]  kunit_try_run_case+0x170/0x3f0
[   32.366856]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.367043]  kthread+0x328/0x630
[   32.367241]  ret_from_fork+0x10/0x20
[   32.367300] 
[   32.367324] The buggy address belongs to the object at fff00000c85f0e00
[   32.367324]  which belongs to the cache kmalloc-64 of size 64
[   32.367650] The buggy address is located 0 bytes to the right of
[   32.367650]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.368072] 
[   32.368126] The buggy address belongs to the physical page:
[   32.368281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.368547] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.368814] page_type: f5(slab)
[   32.369007] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.369129] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.369218] page dumped because: kasan: bad access detected
[   32.369252] 
[   32.369491] Memory state around the buggy address:
[   32.369652]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.370077]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.370163] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.370307]                                      ^
[   32.370364]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.370525]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.370649] ==================================================================
[   32.635883] ==================================================================
[   32.635985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   32.636199] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.636497] 
[   32.636875] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.637127] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.637195] Hardware name: linux,dummy-virt (DT)
[   32.637352] Call trace:
[   32.637379]  show_stack+0x20/0x38 (C)
[   32.637434]  dump_stack_lvl+0x8c/0xd0
[   32.638072]  print_report+0x118/0x5d0
[   32.638144]  kasan_report+0xdc/0x128
[   32.638324]  kasan_check_range+0x100/0x1a8
[   32.638613]  __kasan_check_write+0x20/0x30
[   32.638772]  kasan_atomics_helper+0x147c/0x4858
[   32.638961]  kasan_atomics+0x198/0x2e0
[   32.639153]  kunit_try_run_case+0x170/0x3f0
[   32.639250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.639341]  kthread+0x328/0x630
[   32.639564]  ret_from_fork+0x10/0x20
[   32.639821] 
[   32.639887] Allocated by task 296:
[   32.640200]  kasan_save_stack+0x3c/0x68
[   32.640661]  kasan_save_track+0x20/0x40
[   32.640781]  kasan_save_alloc_info+0x40/0x58
[   32.641175]  __kasan_kmalloc+0xd4/0xd8
[   32.641250]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.641459]  kasan_atomics+0xb8/0x2e0
[   32.641705]  kunit_try_run_case+0x170/0x3f0
[   32.641809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.642145]  kthread+0x328/0x630
[   32.642546]  ret_from_fork+0x10/0x20
[   32.642792] 
[   32.642838] The buggy address belongs to the object at fff00000c85f0e00
[   32.642838]  which belongs to the cache kmalloc-64 of size 64
[   32.642917] The buggy address is located 0 bytes to the right of
[   32.642917]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.643204] 
[   32.643239] The buggy address belongs to the physical page:
[   32.643398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.643807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.644315] page_type: f5(slab)
[   32.644381] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.644795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.644865] page dumped because: kasan: bad access detected
[   32.645024] 
[   32.645144] Memory state around the buggy address:
[   32.645213]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.645620]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.645718] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.645827]                                      ^
[   32.646095]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.646236]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.646484] ==================================================================
[   32.520044] ==================================================================
[   32.520114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   32.520278] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.520430] 
[   32.520498] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.520597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.520895] Hardware name: linux,dummy-virt (DT)
[   32.520948] Call trace:
[   32.521026]  show_stack+0x20/0x38 (C)
[   32.521380]  dump_stack_lvl+0x8c/0xd0
[   32.521506]  print_report+0x118/0x5d0
[   32.521620]  kasan_report+0xdc/0x128
[   32.521665]  kasan_check_range+0x100/0x1a8
[   32.521986]  __kasan_check_write+0x20/0x30
[   32.522392]  kasan_atomics_helper+0xf20/0x4858
[   32.522516]  kasan_atomics+0x198/0x2e0
[   32.522693]  kunit_try_run_case+0x170/0x3f0
[   32.522871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.523363]  kthread+0x328/0x630
[   32.523502]  ret_from_fork+0x10/0x20
[   32.523615] 
[   32.523675] Allocated by task 296:
[   32.523704]  kasan_save_stack+0x3c/0x68
[   32.524122]  kasan_save_track+0x20/0x40
[   32.524259]  kasan_save_alloc_info+0x40/0x58
[   32.524439]  __kasan_kmalloc+0xd4/0xd8
[   32.524618]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.524675]  kasan_atomics+0xb8/0x2e0
[   32.524860]  kunit_try_run_case+0x170/0x3f0
[   32.524984]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.525124]  kthread+0x328/0x630
[   32.525436]  ret_from_fork+0x10/0x20
[   32.525580] 
[   32.525627] The buggy address belongs to the object at fff00000c85f0e00
[   32.525627]  which belongs to the cache kmalloc-64 of size 64
[   32.525844] The buggy address is located 0 bytes to the right of
[   32.525844]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.526102] 
[   32.526147] The buggy address belongs to the physical page:
[   32.526295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.526511] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.526634] page_type: f5(slab)
[   32.526967] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.527233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.527468] page dumped because: kasan: bad access detected
[   32.527597] 
[   32.527693] Memory state around the buggy address:
[   32.527775]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.527934]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.527981] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.528234]                                      ^
[   32.528407]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.528619]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.528817] ==================================================================
[   32.549677] ==================================================================
[   32.549749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   32.549874] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.549936] 
[   32.550160] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.550270] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.550352] Hardware name: linux,dummy-virt (DT)
[   32.550390] Call trace:
[   32.550440]  show_stack+0x20/0x38 (C)
[   32.550492]  dump_stack_lvl+0x8c/0xd0
[   32.550551]  print_report+0x118/0x5d0
[   32.550597]  kasan_report+0xdc/0x128
[   32.550640]  kasan_check_range+0x100/0x1a8
[   32.550688]  __kasan_check_write+0x20/0x30
[   32.551185]  kasan_atomics_helper+0x1058/0x4858
[   32.551265]  kasan_atomics+0x198/0x2e0
[   32.551543]  kunit_try_run_case+0x170/0x3f0
[   32.551694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.551757]  kthread+0x328/0x630
[   32.551802]  ret_from_fork+0x10/0x20
[   32.551852] 
[   32.551872] Allocated by task 296:
[   32.552383]  kasan_save_stack+0x3c/0x68
[   32.552528]  kasan_save_track+0x20/0x40
[   32.552626]  kasan_save_alloc_info+0x40/0x58
[   32.552704]  __kasan_kmalloc+0xd4/0xd8
[   32.552857]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.552914]  kasan_atomics+0xb8/0x2e0
[   32.552961]  kunit_try_run_case+0x170/0x3f0
[   32.553003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.553311]  kthread+0x328/0x630
[   32.553444]  ret_from_fork+0x10/0x20
[   32.553497] 
[   32.553540] The buggy address belongs to the object at fff00000c85f0e00
[   32.553540]  which belongs to the cache kmalloc-64 of size 64
[   32.553605] The buggy address is located 0 bytes to the right of
[   32.553605]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.553672] 
[   32.553703] The buggy address belongs to the physical page:
[   32.553737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.553804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.553854] page_type: f5(slab)
[   32.553908] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.553961] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.554012] page dumped because: kasan: bad access detected
[   32.554045] 
[   32.554092] Memory state around the buggy address:
[   32.554126]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.554170]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.554214] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.554255]                                      ^
[   32.554299]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.554353]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.554394] ==================================================================
[   32.648157] ==================================================================
[   32.648716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   32.649002] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.649221] 
[   32.649291] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.649386] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.649506] Hardware name: linux,dummy-virt (DT)
[   32.649578] Call trace:
[   32.649637]  show_stack+0x20/0x38 (C)
[   32.649692]  dump_stack_lvl+0x8c/0xd0
[   32.649747]  print_report+0x118/0x5d0
[   32.649793]  kasan_report+0xdc/0x128
[   32.649837]  kasan_check_range+0x100/0x1a8
[   32.649883]  __kasan_check_write+0x20/0x30
[   32.649938]  kasan_atomics_helper+0x14e4/0x4858
[   32.649989]  kasan_atomics+0x198/0x2e0
[   32.650037]  kunit_try_run_case+0x170/0x3f0
[   32.650097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.650148]  kthread+0x328/0x630
[   32.650191]  ret_from_fork+0x10/0x20
[   32.650258] 
[   32.650282] Allocated by task 296:
[   32.650328]  kasan_save_stack+0x3c/0x68
[   32.650372]  kasan_save_track+0x20/0x40
[   32.650413]  kasan_save_alloc_info+0x40/0x58
[   32.650453]  __kasan_kmalloc+0xd4/0xd8
[   32.650503]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.650546]  kasan_atomics+0xb8/0x2e0
[   32.650585]  kunit_try_run_case+0x170/0x3f0
[   32.650626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.650680]  kthread+0x328/0x630
[   32.650724]  ret_from_fork+0x10/0x20
[   32.650777] 
[   32.650798] The buggy address belongs to the object at fff00000c85f0e00
[   32.650798]  which belongs to the cache kmalloc-64 of size 64
[   32.650866] The buggy address is located 0 bytes to the right of
[   32.650866]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.650932] 
[   32.650954] The buggy address belongs to the physical page:
[   32.650987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.651054] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.651550] page_type: f5(slab)
[   32.652045] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.652131] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.652225] page dumped because: kasan: bad access detected
[   32.652278] 
[   32.652333] Memory state around the buggy address:
[   32.652773]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.653078]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.653131] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.653169]                                      ^
[   32.653206]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.653600]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.654122] ==================================================================
[   32.712615] ==================================================================
[   32.712664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   32.712716] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.712787] 
[   32.712821] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.713061] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.713126] Hardware name: linux,dummy-virt (DT)
[   32.713161] Call trace:
[   32.713211]  show_stack+0x20/0x38 (C)
[   32.713270]  dump_stack_lvl+0x8c/0xd0
[   32.713471]  print_report+0x118/0x5d0
[   32.713578]  kasan_report+0xdc/0x128
[   32.713663]  kasan_check_range+0x100/0x1a8
[   32.713728]  __kasan_check_write+0x20/0x30
[   32.713814]  kasan_atomics_helper+0x17ec/0x4858
[   32.713895]  kasan_atomics+0x198/0x2e0
[   32.713942]  kunit_try_run_case+0x170/0x3f0
[   32.714010]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.714073]  kthread+0x328/0x630
[   32.714153]  ret_from_fork+0x10/0x20
[   32.714230] 
[   32.714258] Allocated by task 296:
[   32.714290]  kasan_save_stack+0x3c/0x68
[   32.714334]  kasan_save_track+0x20/0x40
[   32.714375]  kasan_save_alloc_info+0x40/0x58
[   32.714645]  __kasan_kmalloc+0xd4/0xd8
[   32.714715]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.714761]  kasan_atomics+0xb8/0x2e0
[   32.714798]  kunit_try_run_case+0x170/0x3f0
[   32.714851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.714895]  kthread+0x328/0x630
[   32.714936]  ret_from_fork+0x10/0x20
[   32.714976] 
[   32.714998] The buggy address belongs to the object at fff00000c85f0e00
[   32.714998]  which belongs to the cache kmalloc-64 of size 64
[   32.715076] The buggy address is located 0 bytes to the right of
[   32.715076]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.715142] 
[   32.715164] The buggy address belongs to the physical page:
[   32.715196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.715247] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.715306] page_type: f5(slab)
[   32.715346] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.715396] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.715445] page dumped because: kasan: bad access detected
[   32.715484] 
[   32.715504] Memory state around the buggy address:
[   32.715548]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.715592]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.715636] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.715676]                                      ^
[   32.715708]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.715751]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.715799] ==================================================================
[   32.488152] ==================================================================
[   32.488370] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   32.488553] Read of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.488611] 
[   32.488643] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.489320] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.489358] Hardware name: linux,dummy-virt (DT)
[   32.489406] Call trace:
[   32.489453]  show_stack+0x20/0x38 (C)
[   32.489882]  dump_stack_lvl+0x8c/0xd0
[   32.490113]  print_report+0x118/0x5d0
[   32.490428]  kasan_report+0xdc/0x128
[   32.490630]  __asan_report_load8_noabort+0x20/0x30
[   32.491011]  kasan_atomics_helper+0x3f58/0x4858
[   32.491141]  kasan_atomics+0x198/0x2e0
[   32.491194]  kunit_try_run_case+0x170/0x3f0
[   32.491405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.491740]  kthread+0x328/0x630
[   32.491937]  ret_from_fork+0x10/0x20
[   32.492017] 
[   32.492038] Allocated by task 296:
[   32.492192]  kasan_save_stack+0x3c/0x68
[   32.492481]  kasan_save_track+0x20/0x40
[   32.492659]  kasan_save_alloc_info+0x40/0x58
[   32.492867]  __kasan_kmalloc+0xd4/0xd8
[   32.492951]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.492995]  kasan_atomics+0xb8/0x2e0
[   32.493042]  kunit_try_run_case+0x170/0x3f0
[   32.493095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.493489]  kthread+0x328/0x630
[   32.493571]  ret_from_fork+0x10/0x20
[   32.493642] 
[   32.493780] The buggy address belongs to the object at fff00000c85f0e00
[   32.493780]  which belongs to the cache kmalloc-64 of size 64
[   32.494012] The buggy address is located 0 bytes to the right of
[   32.494012]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.494161] 
[   32.494222] The buggy address belongs to the physical page:
[   32.494494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.494705] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.494781] page_type: f5(slab)
[   32.494865] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.494951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.495022] page dumped because: kasan: bad access detected
[   32.495065] 
[   32.495086] Memory state around the buggy address:
[   32.495268]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.495575]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.495786] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.495874]                                      ^
[   32.496012]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.496107]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.496228] ==================================================================
[   32.619946] ==================================================================
[   32.619998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   32.620139] Read of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.620387] 
[   32.620421] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.620507] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.620536] Hardware name: linux,dummy-virt (DT)
[   32.620569] Call trace:
[   32.620592]  show_stack+0x20/0x38 (C)
[   32.620644]  dump_stack_lvl+0x8c/0xd0
[   32.620693]  print_report+0x118/0x5d0
[   32.620739]  kasan_report+0xdc/0x128
[   32.620784]  __asan_report_load8_noabort+0x20/0x30
[   32.621401]  kasan_atomics_helper+0x3f04/0x4858
[   32.621529]  kasan_atomics+0x198/0x2e0
[   32.621876]  kunit_try_run_case+0x170/0x3f0
[   32.622005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.622383]  kthread+0x328/0x630
[   32.622479]  ret_from_fork+0x10/0x20
[   32.622793] 
[   32.622917] Allocated by task 296:
[   32.623229]  kasan_save_stack+0x3c/0x68
[   32.623323]  kasan_save_track+0x20/0x40
[   32.623385]  kasan_save_alloc_info+0x40/0x58
[   32.623629]  __kasan_kmalloc+0xd4/0xd8
[   32.623857]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.624070]  kasan_atomics+0xb8/0x2e0
[   32.624177]  kunit_try_run_case+0x170/0x3f0
[   32.624292]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.624462]  kthread+0x328/0x630
[   32.624667]  ret_from_fork+0x10/0x20
[   32.624993] 
[   32.625068] The buggy address belongs to the object at fff00000c85f0e00
[   32.625068]  which belongs to the cache kmalloc-64 of size 64
[   32.625439] The buggy address is located 0 bytes to the right of
[   32.625439]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.625639] 
[   32.625713] The buggy address belongs to the physical page:
[   32.625847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.625932] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.626311] page_type: f5(slab)
[   32.626491] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.626708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.626803] page dumped because: kasan: bad access detected
[   32.627220] 
[   32.627264] Memory state around the buggy address:
[   32.627318]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.627629]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.627750] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.627869]                                      ^
[   32.628068]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.628143]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.628384] ==================================================================
[   32.530539] ==================================================================
[   32.530593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   32.530645] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.530697] 
[   32.530965] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.531212] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.531386] Hardware name: linux,dummy-virt (DT)
[   32.531651] Call trace:
[   32.531688]  show_stack+0x20/0x38 (C)
[   32.531741]  dump_stack_lvl+0x8c/0xd0
[   32.531981]  print_report+0x118/0x5d0
[   32.532043]  kasan_report+0xdc/0x128
[   32.532102]  kasan_check_range+0x100/0x1a8
[   32.532300]  __kasan_check_write+0x20/0x30
[   32.532490]  kasan_atomics_helper+0xf88/0x4858
[   32.532923]  kasan_atomics+0x198/0x2e0
[   32.533407]  kunit_try_run_case+0x170/0x3f0
[   32.533693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.533754]  kthread+0x328/0x630
[   32.533799]  ret_from_fork+0x10/0x20
[   32.534241] 
[   32.534286] Allocated by task 296:
[   32.534364]  kasan_save_stack+0x3c/0x68
[   32.534514]  kasan_save_track+0x20/0x40
[   32.534565]  kasan_save_alloc_info+0x40/0x58
[   32.534607]  __kasan_kmalloc+0xd4/0xd8
[   32.534982]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.535180]  kasan_atomics+0xb8/0x2e0
[   32.535334]  kunit_try_run_case+0x170/0x3f0
[   32.535501]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.535706]  kthread+0x328/0x630
[   32.535769]  ret_from_fork+0x10/0x20
[   32.536059] 
[   32.536149] The buggy address belongs to the object at fff00000c85f0e00
[   32.536149]  which belongs to the cache kmalloc-64 of size 64
[   32.536361] The buggy address is located 0 bytes to the right of
[   32.536361]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.536443] 
[   32.536466] The buggy address belongs to the physical page:
[   32.536686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.536775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.536976] page_type: f5(slab)
[   32.537150] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.537290] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.537417] page dumped because: kasan: bad access detected
[   32.537491] 
[   32.537512] Memory state around the buggy address:
[   32.537595]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.537660]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.537711] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.537757]                                      ^
[   32.537796]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.537846]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.537902] ==================================================================
[   32.690464] ==================================================================
[   32.690527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   32.690716] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.690810] 
[   32.690841] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.690927] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.690954] Hardware name: linux,dummy-virt (DT)
[   32.691379] Call trace:
[   32.691421]  show_stack+0x20/0x38 (C)
[   32.691482]  dump_stack_lvl+0x8c/0xd0
[   32.691565]  print_report+0x118/0x5d0
[   32.691774]  kasan_report+0xdc/0x128
[   32.692096]  kasan_check_range+0x100/0x1a8
[   32.692158]  __kasan_check_write+0x20/0x30
[   32.692594]  kasan_atomics_helper+0x16d0/0x4858
[   32.692742]  kasan_atomics+0x198/0x2e0
[   32.692995]  kunit_try_run_case+0x170/0x3f0
[   32.693056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.693127]  kthread+0x328/0x630
[   32.693170]  ret_from_fork+0x10/0x20
[   32.693219] 
[   32.693842] Allocated by task 296:
[   32.693977]  kasan_save_stack+0x3c/0x68
[   32.694173]  kasan_save_track+0x20/0x40
[   32.694292]  kasan_save_alloc_info+0x40/0x58
[   32.694402]  __kasan_kmalloc+0xd4/0xd8
[   32.694507]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.694550]  kasan_atomics+0xb8/0x2e0
[   32.694590]  kunit_try_run_case+0x170/0x3f0
[   32.694631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.694674]  kthread+0x328/0x630
[   32.694709]  ret_from_fork+0x10/0x20
[   32.694760] 
[   32.694804] The buggy address belongs to the object at fff00000c85f0e00
[   32.694804]  which belongs to the cache kmalloc-64 of size 64
[   32.694864] The buggy address is located 0 bytes to the right of
[   32.694864]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.694936] 
[   32.694959] The buggy address belongs to the physical page:
[   32.695015] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.695078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.695132] page_type: f5(slab)
[   32.695283] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.695338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.695378] page dumped because: kasan: bad access detected
[   32.695656] 
[   32.695744] Memory state around the buggy address:
[   32.695827]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.696178]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.696235] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.696323]                                      ^
[   32.696653]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.696770]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.696889] ==================================================================
[   32.497536] ==================================================================
[   32.497643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   32.497698] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.497766] 
[   32.498074] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.498178] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.498416] Hardware name: linux,dummy-virt (DT)
[   32.498475] Call trace:
[   32.498503]  show_stack+0x20/0x38 (C)
[   32.498686]  dump_stack_lvl+0x8c/0xd0
[   32.498753]  print_report+0x118/0x5d0
[   32.498797]  kasan_report+0xdc/0x128
[   32.499076]  kasan_check_range+0x100/0x1a8
[   32.499138]  __kasan_check_write+0x20/0x30
[   32.499330]  kasan_atomics_helper+0xe44/0x4858
[   32.499575]  kasan_atomics+0x198/0x2e0
[   32.499639]  kunit_try_run_case+0x170/0x3f0
[   32.499693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.499754]  kthread+0x328/0x630
[   32.499828]  ret_from_fork+0x10/0x20
[   32.499883] 
[   32.499923] Allocated by task 296:
[   32.499960]  kasan_save_stack+0x3c/0x68
[   32.500150]  kasan_save_track+0x20/0x40
[   32.500543]  kasan_save_alloc_info+0x40/0x58
[   32.500745]  __kasan_kmalloc+0xd4/0xd8
[   32.500867]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.500911]  kasan_atomics+0xb8/0x2e0
[   32.501250]  kunit_try_run_case+0x170/0x3f0
[   32.501430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.501607]  kthread+0x328/0x630
[   32.501875]  ret_from_fork+0x10/0x20
[   32.501925] 
[   32.502101] The buggy address belongs to the object at fff00000c85f0e00
[   32.502101]  which belongs to the cache kmalloc-64 of size 64
[   32.502313] The buggy address is located 0 bytes to the right of
[   32.502313]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.502628] 
[   32.502679] The buggy address belongs to the physical page:
[   32.502741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.502824] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.502874] page_type: f5(slab)
[   32.502923] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.502975] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.503019] page dumped because: kasan: bad access detected
[   32.503076] 
[   32.503106] Memory state around the buggy address:
[   32.503139]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.503183]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.503227] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.503281]                                      ^
[   32.503314]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.503358]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.503407] ==================================================================
[   32.371942] ==================================================================
[   32.372321] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   32.372515] Write of size 4 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.372634] 
[   32.372842] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.373033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.373078] Hardware name: linux,dummy-virt (DT)
[   32.373111] Call trace:
[   32.373135]  show_stack+0x20/0x38 (C)
[   32.373186]  dump_stack_lvl+0x8c/0xd0
[   32.373236]  print_report+0x118/0x5d0
[   32.373281]  kasan_report+0xdc/0x128
[   32.373388]  kasan_check_range+0x100/0x1a8
[   32.373459]  __kasan_check_write+0x20/0x30
[   32.373513]  kasan_atomics_helper+0x99c/0x4858
[   32.373563]  kasan_atomics+0x198/0x2e0
[   32.373614]  kunit_try_run_case+0x170/0x3f0
[   32.373672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.373723]  kthread+0x328/0x630
[   32.373775]  ret_from_fork+0x10/0x20
[   32.373836] 
[   32.373857] Allocated by task 296:
[   32.373894]  kasan_save_stack+0x3c/0x68
[   32.373940]  kasan_save_track+0x20/0x40
[   32.373987]  kasan_save_alloc_info+0x40/0x58
[   32.374034]  __kasan_kmalloc+0xd4/0xd8
[   32.374624]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.374883]  kasan_atomics+0xb8/0x2e0
[   32.375205]  kunit_try_run_case+0x170/0x3f0
[   32.375258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.375571]  kthread+0x328/0x630
[   32.375700]  ret_from_fork+0x10/0x20
[   32.375799] 
[   32.375928] The buggy address belongs to the object at fff00000c85f0e00
[   32.375928]  which belongs to the cache kmalloc-64 of size 64
[   32.376167] The buggy address is located 0 bytes to the right of
[   32.376167]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.376485] 
[   32.376551] The buggy address belongs to the physical page:
[   32.376608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.376757] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.376810] page_type: f5(slab)
[   32.376857] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.377194] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.377652] page dumped because: kasan: bad access detected
[   32.377756] 
[   32.377817] Memory state around the buggy address:
[   32.378032]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.378300]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.378395] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.378517]                                      ^
[   32.378575]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.378630]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.378759] ==================================================================
[   32.504134] ==================================================================
[   32.504185] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   32.504236] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.504626] 
[   32.504707] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.505174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.505245] Hardware name: linux,dummy-virt (DT)
[   32.505380] Call trace:
[   32.505436]  show_stack+0x20/0x38 (C)
[   32.505649]  dump_stack_lvl+0x8c/0xd0
[   32.506036]  print_report+0x118/0x5d0
[   32.506146]  kasan_report+0xdc/0x128
[   32.506241]  __asan_report_store8_noabort+0x20/0x30
[   32.506585]  kasan_atomics_helper+0x3e5c/0x4858
[   32.506712]  kasan_atomics+0x198/0x2e0
[   32.506764]  kunit_try_run_case+0x170/0x3f0
[   32.507128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.507220]  kthread+0x328/0x630
[   32.507574]  ret_from_fork+0x10/0x20
[   32.507713] 
[   32.507735] Allocated by task 296:
[   32.507795]  kasan_save_stack+0x3c/0x68
[   32.508077]  kasan_save_track+0x20/0x40
[   32.508236]  kasan_save_alloc_info+0x40/0x58
[   32.508461]  __kasan_kmalloc+0xd4/0xd8
[   32.508698]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.508982]  kasan_atomics+0xb8/0x2e0
[   32.509202]  kunit_try_run_case+0x170/0x3f0
[   32.509297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.509350]  kthread+0x328/0x630
[   32.509731]  ret_from_fork+0x10/0x20
[   32.509820] 
[   32.510015] The buggy address belongs to the object at fff00000c85f0e00
[   32.510015]  which belongs to the cache kmalloc-64 of size 64
[   32.510421] The buggy address is located 0 bytes to the right of
[   32.510421]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.510670] 
[   32.510822] The buggy address belongs to the physical page:
[   32.510878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.510968] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.511152] page_type: f5(slab)
[   32.511545] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.511628] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.511798] page dumped because: kasan: bad access detected
[   32.511880] 
[   32.511920] Memory state around the buggy address:
[   32.512005]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.512062]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.512106] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.512553]                                      ^
[   32.512942]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.513030]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.513151] ==================================================================
[   32.464178] ==================================================================
[   32.464564] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   32.464657] Write of size 4 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.464741] 
[   32.464775] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.465179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.465234] Hardware name: linux,dummy-virt (DT)
[   32.465490] Call trace:
[   32.465524]  show_stack+0x20/0x38 (C)
[   32.465578]  dump_stack_lvl+0x8c/0xd0
[   32.465995]  print_report+0x118/0x5d0
[   32.466361]  kasan_report+0xdc/0x128
[   32.466672]  kasan_check_range+0x100/0x1a8
[   32.466811]  __kasan_check_write+0x20/0x30
[   32.466885]  kasan_atomics_helper+0xd3c/0x4858
[   32.467195]  kasan_atomics+0x198/0x2e0
[   32.467398]  kunit_try_run_case+0x170/0x3f0
[   32.467630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.467690]  kthread+0x328/0x630
[   32.467743]  ret_from_fork+0x10/0x20
[   32.468122] 
[   32.468202] Allocated by task 296:
[   32.468253]  kasan_save_stack+0x3c/0x68
[   32.468303]  kasan_save_track+0x20/0x40
[   32.468344]  kasan_save_alloc_info+0x40/0x58
[   32.468812]  __kasan_kmalloc+0xd4/0xd8
[   32.468982]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.469114]  kasan_atomics+0xb8/0x2e0
[   32.469380]  kunit_try_run_case+0x170/0x3f0
[   32.469578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.469658]  kthread+0x328/0x630
[   32.469779]  ret_from_fork+0x10/0x20
[   32.470126] 
[   32.470194] The buggy address belongs to the object at fff00000c85f0e00
[   32.470194]  which belongs to the cache kmalloc-64 of size 64
[   32.470315] The buggy address is located 0 bytes to the right of
[   32.470315]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.470462] 
[   32.470522] The buggy address belongs to the physical page:
[   32.470591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.470650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.470738] page_type: f5(slab)
[   32.470922] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.471314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.471380] page dumped because: kasan: bad access detected
[   32.471520] 
[   32.471542] Memory state around the buggy address:
[   32.471583]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.471906]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.471999] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.472042]                                      ^
[   32.472387]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.472530]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.472629] ==================================================================
[   32.454138] ==================================================================
[   32.454510] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   32.454582] Read of size 4 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.454913] 
[   32.454974] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.455073] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.455284] Hardware name: linux,dummy-virt (DT)
[   32.455412] Call trace:
[   32.455551]  show_stack+0x20/0x38 (C)
[   32.455611]  dump_stack_lvl+0x8c/0xd0
[   32.455659]  print_report+0x118/0x5d0
[   32.455705]  kasan_report+0xdc/0x128
[   32.455749]  __asan_report_load4_noabort+0x20/0x30
[   32.456365]  kasan_atomics_helper+0x3dd8/0x4858
[   32.456448]  kasan_atomics+0x198/0x2e0
[   32.456773]  kunit_try_run_case+0x170/0x3f0
[   32.456943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.457267]  kthread+0x328/0x630
[   32.457427]  ret_from_fork+0x10/0x20
[   32.457499] 
[   32.457626] Allocated by task 296:
[   32.457826]  kasan_save_stack+0x3c/0x68
[   32.458180]  kasan_save_track+0x20/0x40
[   32.458260]  kasan_save_alloc_info+0x40/0x58
[   32.458324]  __kasan_kmalloc+0xd4/0xd8
[   32.458612]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.458785]  kasan_atomics+0xb8/0x2e0
[   32.458975]  kunit_try_run_case+0x170/0x3f0
[   32.459121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.459252]  kthread+0x328/0x630
[   32.459445]  ret_from_fork+0x10/0x20
[   32.459643] 
[   32.459696] The buggy address belongs to the object at fff00000c85f0e00
[   32.459696]  which belongs to the cache kmalloc-64 of size 64
[   32.459784] The buggy address is located 0 bytes to the right of
[   32.459784]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.459927] 
[   32.459988] The buggy address belongs to the physical page:
[   32.460129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.460488] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.460569] page_type: f5(slab)
[   32.460775] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.460852] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.461314] page dumped because: kasan: bad access detected
[   32.461505] 
[   32.461546] Memory state around the buggy address:
[   32.461768]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.462013]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.462085] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.462269]                                      ^
[   32.462468]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.462540]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.462672] ==================================================================
[   32.701950] ==================================================================
[   32.702014] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   32.702116] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.702192] 
[   32.702250] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.702336] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.702365] Hardware name: linux,dummy-virt (DT)
[   32.702395] Call trace:
[   32.702419]  show_stack+0x20/0x38 (C)
[   32.702641]  dump_stack_lvl+0x8c/0xd0
[   32.702699]  print_report+0x118/0x5d0
[   32.702743]  kasan_report+0xdc/0x128
[   32.702788]  kasan_check_range+0x100/0x1a8
[   32.702842]  __kasan_check_write+0x20/0x30
[   32.702975]  kasan_atomics_helper+0x175c/0x4858
[   32.703059]  kasan_atomics+0x198/0x2e0
[   32.703182]  kunit_try_run_case+0x170/0x3f0
[   32.703255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.703372]  kthread+0x328/0x630
[   32.703418]  ret_from_fork+0x10/0x20
[   32.703476] 
[   32.703499] Allocated by task 296:
[   32.703529]  kasan_save_stack+0x3c/0x68
[   32.703582]  kasan_save_track+0x20/0x40
[   32.703624]  kasan_save_alloc_info+0x40/0x58
[   32.703664]  __kasan_kmalloc+0xd4/0xd8
[   32.703712]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.703755]  kasan_atomics+0xb8/0x2e0
[   32.703803]  kunit_try_run_case+0x170/0x3f0
[   32.703844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.703895]  kthread+0x328/0x630
[   32.703940]  ret_from_fork+0x10/0x20
[   32.703985] 
[   32.704007] The buggy address belongs to the object at fff00000c85f0e00
[   32.704007]  which belongs to the cache kmalloc-64 of size 64
[   32.704077] The buggy address is located 0 bytes to the right of
[   32.704077]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.704143] 
[   32.704172] The buggy address belongs to the physical page:
[   32.704204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.704278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.704330] page_type: f5(slab)
[   32.704403] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.704453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.704702] page dumped because: kasan: bad access detected
[   32.704780] 
[   32.704802] Memory state around the buggy address:
[   32.704837]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.705112]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.705185] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.705225]                                      ^
[   32.705266]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.705374]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.705466] ==================================================================
[   32.396516] ==================================================================
[   32.396569] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   32.397068] Write of size 4 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.397179] 
[   32.397603] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.397719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.398249]  kasan_check_range+0x100/0x1a8
[   32.399517] 
[   32.399657]  kasan_save_track+0x20/0x40
[   32.400461]  ret_from_fork+0x10/0x20
[   32.401106] 
[   32.401270] The buggy address belongs to the physical page:
[   32.401482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.401809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.401973] page_type: f5(slab)
[   32.402201] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.402261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.402657] page dumped because: kasan: bad access detected
[   32.402745] 
[   32.403011] Memory state around the buggy address:
[   32.403292]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.403342]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.403516] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.403709]                                      ^
[   32.403781]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.403930]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.404021] ==================================================================
[   32.591654] ==================================================================
[   32.591707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   32.591758] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.592258] 
[   32.592380] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.592651] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.592682] Hardware name: linux,dummy-virt (DT)
[   32.592714] Call trace:
[   32.592885]  show_stack+0x20/0x38 (C)
[   32.593138]  dump_stack_lvl+0x8c/0xd0
[   32.593234]  print_report+0x118/0x5d0
[   32.593635]  kasan_report+0xdc/0x128
[   32.593744]  kasan_check_range+0x100/0x1a8
[   32.593821]  __kasan_check_write+0x20/0x30
[   32.593987]  kasan_atomics_helper+0x126c/0x4858
[   32.594339]  kasan_atomics+0x198/0x2e0
[   32.594477]  kunit_try_run_case+0x170/0x3f0
[   32.594567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.594920]  kthread+0x328/0x630
[   32.595009]  ret_from_fork+0x10/0x20
[   32.595410] 
[   32.595514] Allocated by task 296:
[   32.595584]  kasan_save_stack+0x3c/0x68
[   32.595954]  kasan_save_track+0x20/0x40
[   32.596032]  kasan_save_alloc_info+0x40/0x58
[   32.596088]  __kasan_kmalloc+0xd4/0xd8
[   32.596281]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.596501]  kasan_atomics+0xb8/0x2e0
[   32.596802]  kunit_try_run_case+0x170/0x3f0
[   32.596940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.596989]  kthread+0x328/0x630
[   32.597334]  ret_from_fork+0x10/0x20
[   32.597448] 
[   32.597662] The buggy address belongs to the object at fff00000c85f0e00
[   32.597662]  which belongs to the cache kmalloc-64 of size 64
[   32.597731] The buggy address is located 0 bytes to the right of
[   32.597731]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.598247] 
[   32.598333] The buggy address belongs to the physical page:
[   32.598532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.598761] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.598964] page_type: f5(slab)
[   32.599283] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.599425] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.599483] page dumped because: kasan: bad access detected
[   32.599538] 
[   32.599573] Memory state around the buggy address:
[   32.599606]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.599652]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.599695] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.599743]                                      ^
[   32.599788]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.599842]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.599887] ==================================================================
[   32.601739] ==================================================================
[   32.601922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   32.601982] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.602292] 
[   32.602661] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.602768] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.602862] Hardware name: linux,dummy-virt (DT)
[   32.602897] Call trace:
[   32.602924]  show_stack+0x20/0x38 (C)
[   32.603082]  dump_stack_lvl+0x8c/0xd0
[   32.603139]  print_report+0x118/0x5d0
[   32.603183]  kasan_report+0xdc/0x128
[   32.603227]  kasan_check_range+0x100/0x1a8
[   32.603289]  __kasan_check_write+0x20/0x30
[   32.603505]  kasan_atomics_helper+0x12d8/0x4858
[   32.603841]  kasan_atomics+0x198/0x2e0
[   32.603913]  kunit_try_run_case+0x170/0x3f0
[   32.603965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.604125]  kthread+0x328/0x630
[   32.604212]  ret_from_fork+0x10/0x20
[   32.604421] 
[   32.604488] Allocated by task 296:
[   32.604608]  kasan_save_stack+0x3c/0x68
[   32.604690]  kasan_save_track+0x20/0x40
[   32.604870]  kasan_save_alloc_info+0x40/0x58
[   32.604952]  __kasan_kmalloc+0xd4/0xd8
[   32.605382]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.605560]  kasan_atomics+0xb8/0x2e0
[   32.605666]  kunit_try_run_case+0x170/0x3f0
[   32.605895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.606037]  kthread+0x328/0x630
[   32.606094]  ret_from_fork+0x10/0x20
[   32.606502] 
[   32.606613] The buggy address belongs to the object at fff00000c85f0e00
[   32.606613]  which belongs to the cache kmalloc-64 of size 64
[   32.606681] The buggy address is located 0 bytes to the right of
[   32.606681]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.606882] 
[   32.606999] The buggy address belongs to the physical page:
[   32.607058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.607141] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.607199] page_type: f5(slab)
[   32.607247] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.607307] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.607350] page dumped because: kasan: bad access detected
[   32.607384] 
[   32.607404] Memory state around the buggy address:
[   32.607447]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.607493]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.607538] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.607578]                                      ^
[   32.607623]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.607678]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.607727] ==================================================================
[   32.671978] ==================================================================
[   32.672038] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   32.672100] Read of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.672151] 
[   32.672193] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.672299] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.672341] Hardware name: linux,dummy-virt (DT)
[   32.672401] Call trace:
[   32.672556]  show_stack+0x20/0x38 (C)
[   32.672611]  dump_stack_lvl+0x8c/0xd0
[   32.672660]  print_report+0x118/0x5d0
[   32.672707]  kasan_report+0xdc/0x128
[   32.672761]  __asan_report_load8_noabort+0x20/0x30
[   32.672811]  kasan_atomics_helper+0x3db0/0x4858
[   32.672878]  kasan_atomics+0x198/0x2e0
[   32.672925]  kunit_try_run_case+0x170/0x3f0
[   32.672989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.673042]  kthread+0x328/0x630
[   32.673108]  ret_from_fork+0x10/0x20
[   32.673159] 
[   32.673192] Allocated by task 296:
[   32.673228]  kasan_save_stack+0x3c/0x68
[   32.673281]  kasan_save_track+0x20/0x40
[   32.673321]  kasan_save_alloc_info+0x40/0x58
[   32.673378]  __kasan_kmalloc+0xd4/0xd8
[   32.673419]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.673471]  kasan_atomics+0xb8/0x2e0
[   32.673519]  kunit_try_run_case+0x170/0x3f0
[   32.673560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.673609]  kthread+0x328/0x630
[   32.673646]  ret_from_fork+0x10/0x20
[   32.673693] 
[   32.673713] The buggy address belongs to the object at fff00000c85f0e00
[   32.673713]  which belongs to the cache kmalloc-64 of size 64
[   32.673772] The buggy address is located 0 bytes to the right of
[   32.673772]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.673848] 
[   32.673869] The buggy address belongs to the physical page:
[   32.673902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.673957] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.674013] page_type: f5(slab)
[   32.674069] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.674333] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.674436] page dumped because: kasan: bad access detected
[   32.674788] 
[   32.674906] Memory state around the buggy address:
[   32.675577]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.675709]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.676025] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.676119]                                      ^
[   32.676218]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.676284]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.676498] ==================================================================
[   32.473983] ==================================================================
[   32.474037] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   32.474209] Read of size 4 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.474272] 
[   32.474329] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.474416] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.474445] Hardware name: linux,dummy-virt (DT)
[   32.474479] Call trace:
[   32.474519]  show_stack+0x20/0x38 (C)
[   32.474574]  dump_stack_lvl+0x8c/0xd0
[   32.474621]  print_report+0x118/0x5d0
[   32.474666]  kasan_report+0xdc/0x128
[   32.474726]  __asan_report_load4_noabort+0x20/0x30
[   32.474786]  kasan_atomics_helper+0x3e04/0x4858
[   32.474848]  kasan_atomics+0x198/0x2e0
[   32.474897]  kunit_try_run_case+0x170/0x3f0
[   32.474948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.475001]  kthread+0x328/0x630
[   32.475056]  ret_from_fork+0x10/0x20
[   32.475412] 
[   32.475733] Allocated by task 296:
[   32.475776]  kasan_save_stack+0x3c/0x68
[   32.475823]  kasan_save_track+0x20/0x40
[   32.475866]  kasan_save_alloc_info+0x40/0x58
[   32.476161]  __kasan_kmalloc+0xd4/0xd8
[   32.476390]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.476604]  kasan_atomics+0xb8/0x2e0
[   32.476842]  kunit_try_run_case+0x170/0x3f0
[   32.476918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.476964]  kthread+0x328/0x630
[   32.476998]  ret_from_fork+0x10/0x20
[   32.477035] 
[   32.477069] The buggy address belongs to the object at fff00000c85f0e00
[   32.477069]  which belongs to the cache kmalloc-64 of size 64
[   32.477403] The buggy address is located 0 bytes to the right of
[   32.477403]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.477631] 
[   32.477789] The buggy address belongs to the physical page:
[   32.477900] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.478066] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.478286] page_type: f5(slab)
[   32.478492] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.478585] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.478851] page dumped because: kasan: bad access detected
[   32.479037] 
[   32.479110] Memory state around the buggy address:
[   32.479336]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.479553]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.479701] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.479800]                                      ^
[   32.479855]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.479974]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.480015] ==================================================================
[   32.576178] ==================================================================
[   32.576271] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   32.576661] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.576790] 
[   32.576869] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.577154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.577290] Hardware name: linux,dummy-virt (DT)
[   32.577332] Call trace:
[   32.577407]  show_stack+0x20/0x38 (C)
[   32.577462]  dump_stack_lvl+0x8c/0xd0
[   32.577508]  print_report+0x118/0x5d0
[   32.577574]  kasan_report+0xdc/0x128
[   32.577630]  kasan_check_range+0x100/0x1a8
[   32.577677]  __kasan_check_write+0x20/0x30
[   32.577734]  kasan_atomics_helper+0x1190/0x4858
[   32.577792]  kasan_atomics+0x198/0x2e0
[   32.577847]  kunit_try_run_case+0x170/0x3f0
[   32.577897]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.577948]  kthread+0x328/0x630
[   32.577992]  ret_from_fork+0x10/0x20
[   32.578060] 
[   32.578083] Allocated by task 296:
[   32.578113]  kasan_save_stack+0x3c/0x68
[   32.578157]  kasan_save_track+0x20/0x40
[   32.578197]  kasan_save_alloc_info+0x40/0x58
[   32.578252]  __kasan_kmalloc+0xd4/0xd8
[   32.578293]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.578335]  kasan_atomics+0xb8/0x2e0
[   32.578381]  kunit_try_run_case+0x170/0x3f0
[   32.578422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.578471]  kthread+0x328/0x630
[   32.578507]  ret_from_fork+0x10/0x20
[   32.578545] 
[   32.578565] The buggy address belongs to the object at fff00000c85f0e00
[   32.578565]  which belongs to the cache kmalloc-64 of size 64
[   32.578625] The buggy address is located 0 bytes to the right of
[   32.578625]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.578700] 
[   32.578730] The buggy address belongs to the physical page:
[   32.578781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.578838] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.578900] page_type: f5(slab)
[   32.578962] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.579014] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.579905] page dumped because: kasan: bad access detected
[   32.579973] 
[   32.580018] Memory state around the buggy address:
[   32.580093]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.580179]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.580243] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.580402]                                      ^
[   32.580552]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.580603]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.580644] ==================================================================
[   32.655133] ==================================================================
[   32.655539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   32.655621] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.655675] 
[   32.655713] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.655947] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.655979] Hardware name: linux,dummy-virt (DT)
[   32.656012] Call trace:
[   32.656035]  show_stack+0x20/0x38 (C)
[   32.656196]  dump_stack_lvl+0x8c/0xd0
[   32.656248]  print_report+0x118/0x5d0
[   32.656523]  kasan_report+0xdc/0x128
[   32.656736]  kasan_check_range+0x100/0x1a8
[   32.656875]  __kasan_check_write+0x20/0x30
[   32.657078]  kasan_atomics_helper+0x154c/0x4858
[   32.657174]  kasan_atomics+0x198/0x2e0
[   32.657251]  kunit_try_run_case+0x170/0x3f0
[   32.657324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.657377]  kthread+0x328/0x630
[   32.657663]  ret_from_fork+0x10/0x20
[   32.658317] 
[   32.658840] Allocated by task 296:
[   32.658907]  kasan_save_stack+0x3c/0x68
[   32.658980]  kasan_save_track+0x20/0x40
[   32.659106]  kasan_save_alloc_info+0x40/0x58
[   32.659151]  __kasan_kmalloc+0xd4/0xd8
[   32.659583]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.659666]  kasan_atomics+0xb8/0x2e0
[   32.659912]  kunit_try_run_case+0x170/0x3f0
[   32.660104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.660293]  kthread+0x328/0x630
[   32.660517]  ret_from_fork+0x10/0x20
[   32.660785] 
[   32.661034] The buggy address belongs to the object at fff00000c85f0e00
[   32.661034]  which belongs to the cache kmalloc-64 of size 64
[   32.661135] The buggy address is located 0 bytes to the right of
[   32.661135]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.661529] 
[   32.661567] The buggy address belongs to the physical page:
[   32.661624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.661922] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.662071] page_type: f5(slab)
[   32.662166] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.662599] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.662669] page dumped because: kasan: bad access detected
[   32.662872] 
[   32.663136] Memory state around the buggy address:
[   32.663232]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.663464]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.663550] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.663653]                                      ^
[   32.663691]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.663736]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.664152] ==================================================================
[   32.538906] ==================================================================
[   32.539222] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   32.539639] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.539732] 
[   32.539768] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.539935] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.539984] Hardware name: linux,dummy-virt (DT)
[   32.540311] Call trace:
[   32.540395]  show_stack+0x20/0x38 (C)
[   32.540460]  dump_stack_lvl+0x8c/0xd0
[   32.540700]  print_report+0x118/0x5d0
[   32.540946]  kasan_report+0xdc/0x128
[   32.541090]  kasan_check_range+0x100/0x1a8
[   32.541233]  __kasan_check_write+0x20/0x30
[   32.541322]  kasan_atomics_helper+0xff0/0x4858
[   32.541498]  kasan_atomics+0x198/0x2e0
[   32.541656]  kunit_try_run_case+0x170/0x3f0
[   32.541764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.541826]  kthread+0x328/0x630
[   32.542043]  ret_from_fork+0x10/0x20
[   32.542284] 
[   32.542344] Allocated by task 296:
[   32.542552]  kasan_save_stack+0x3c/0x68
[   32.542768]  kasan_save_track+0x20/0x40
[   32.542839]  kasan_save_alloc_info+0x40/0x58
[   32.542895]  __kasan_kmalloc+0xd4/0xd8
[   32.542938]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.543294]  kasan_atomics+0xb8/0x2e0
[   32.543384]  kunit_try_run_case+0x170/0x3f0
[   32.543786]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.544134]  kthread+0x328/0x630
[   32.544281]  ret_from_fork+0x10/0x20
[   32.544520] 
[   32.544654] The buggy address belongs to the object at fff00000c85f0e00
[   32.544654]  which belongs to the cache kmalloc-64 of size 64
[   32.544827] The buggy address is located 0 bytes to the right of
[   32.544827]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.545124] 
[   32.545298] The buggy address belongs to the physical page:
[   32.545344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.545557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.545855] page_type: f5(slab)
[   32.546121] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.546273] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.546358] page dumped because: kasan: bad access detected
[   32.546530] 
[   32.546709] Memory state around the buggy address:
[   32.546776]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.546879]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.546932] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.546979]                                      ^
[   32.547018]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.547078]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.547134] ==================================================================
[   32.582421] ==================================================================
[   32.582483] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   32.582537] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.582633] 
[   32.582693] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.582820] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.582866] Hardware name: linux,dummy-virt (DT)
[   32.582897] Call trace:
[   32.582923]  show_stack+0x20/0x38 (C)
[   32.583154]  dump_stack_lvl+0x8c/0xd0
[   32.583332]  print_report+0x118/0x5d0
[   32.583701]  kasan_report+0xdc/0x128
[   32.583806]  kasan_check_range+0x100/0x1a8
[   32.583874]  __kasan_check_write+0x20/0x30
[   32.583997]  kasan_atomics_helper+0x11f8/0x4858
[   32.584067]  kasan_atomics+0x198/0x2e0
[   32.584121]  kunit_try_run_case+0x170/0x3f0
[   32.584178]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.584565]  kthread+0x328/0x630
[   32.584857]  ret_from_fork+0x10/0x20
[   32.584917] 
[   32.584941] Allocated by task 296:
[   32.584972]  kasan_save_stack+0x3c/0x68
[   32.585015]  kasan_save_track+0x20/0x40
[   32.585070]  kasan_save_alloc_info+0x40/0x58
[   32.585729]  __kasan_kmalloc+0xd4/0xd8
[   32.585825]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.585951]  kasan_atomics+0xb8/0x2e0
[   32.585994]  kunit_try_run_case+0x170/0x3f0
[   32.586311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.586540]  kthread+0x328/0x630
[   32.586785]  ret_from_fork+0x10/0x20
[   32.586847] 
[   32.587028] The buggy address belongs to the object at fff00000c85f0e00
[   32.587028]  which belongs to the cache kmalloc-64 of size 64
[   32.587488] The buggy address is located 0 bytes to the right of
[   32.587488]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.587651] 
[   32.587686] The buggy address belongs to the physical page:
[   32.587720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.588076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.588317] page_type: f5(slab)
[   32.588519] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.588577] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.588959] page dumped because: kasan: bad access detected
[   32.589060] 
[   32.589138] Memory state around the buggy address:
[   32.589492]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.589568]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.589731] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.589863]                                      ^
[   32.589951]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.590317]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.590433] ==================================================================
[   32.514339] ==================================================================
[   32.514454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   32.514508] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.514559] 
[   32.514592] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.514677] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.514705] Hardware name: linux,dummy-virt (DT)
[   32.514738] Call trace:
[   32.514763]  show_stack+0x20/0x38 (C)
[   32.514834]  dump_stack_lvl+0x8c/0xd0
[   32.514884]  print_report+0x118/0x5d0
[   32.514929]  kasan_report+0xdc/0x128
[   32.514973]  kasan_check_range+0x100/0x1a8
[   32.515021]  __kasan_check_write+0x20/0x30
[   32.515079]  kasan_atomics_helper+0xeb8/0x4858
[   32.515129]  kasan_atomics+0x198/0x2e0
[   32.515175]  kunit_try_run_case+0x170/0x3f0
[   32.515224]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.515276]  kthread+0x328/0x630
[   32.515325]  ret_from_fork+0x10/0x20
[   32.515383] 
[   32.515413] Allocated by task 296:
[   32.515443]  kasan_save_stack+0x3c/0x68
[   32.515487]  kasan_save_track+0x20/0x40
[   32.515534]  kasan_save_alloc_info+0x40/0x58
[   32.515574]  __kasan_kmalloc+0xd4/0xd8
[   32.515622]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.515665]  kasan_atomics+0xb8/0x2e0
[   32.515706]  kunit_try_run_case+0x170/0x3f0
[   32.515748]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.515791]  kthread+0x328/0x630
[   32.515827]  ret_from_fork+0x10/0x20
[   32.515865] 
[   32.515894] The buggy address belongs to the object at fff00000c85f0e00
[   32.515894]  which belongs to the cache kmalloc-64 of size 64
[   32.515963] The buggy address is located 0 bytes to the right of
[   32.515963]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.516031] 
[   32.516845] The buggy address belongs to the physical page:
[   32.516904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.516962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.517542] page_type: f5(slab)
[   32.517602] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.518067] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.518117] page dumped because: kasan: bad access detected
[   32.518150] 
[   32.518200] Memory state around the buggy address:
[   32.518279]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.518373]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.518644] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.518786]                                      ^
[   32.519087]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.519240]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.519284] ==================================================================
[   32.609948] ==================================================================
[   32.610025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   32.610088] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.610139] 
[   32.610172] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.610464] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.610508] Hardware name: linux,dummy-virt (DT)
[   32.610792] Call trace:
[   32.610939]  show_stack+0x20/0x38 (C)
[   32.611001]  dump_stack_lvl+0x8c/0xd0
[   32.611229]  print_report+0x118/0x5d0
[   32.611282]  kasan_report+0xdc/0x128
[   32.611327]  kasan_check_range+0x100/0x1a8
[   32.611374]  __kasan_check_write+0x20/0x30
[   32.611580]  kasan_atomics_helper+0x1384/0x4858
[   32.611633]  kasan_atomics+0x198/0x2e0
[   32.611679]  kunit_try_run_case+0x170/0x3f0
[   32.612104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.612192]  kthread+0x328/0x630
[   32.612423]  ret_from_fork+0x10/0x20
[   32.612704] 
[   32.612747] Allocated by task 296:
[   32.613011]  kasan_save_stack+0x3c/0x68
[   32.613203]  kasan_save_track+0x20/0x40
[   32.613263]  kasan_save_alloc_info+0x40/0x58
[   32.613305]  __kasan_kmalloc+0xd4/0xd8
[   32.613527]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.613853]  kasan_atomics+0xb8/0x2e0
[   32.614090]  kunit_try_run_case+0x170/0x3f0
[   32.614311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.614558]  kthread+0x328/0x630
[   32.614650]  ret_from_fork+0x10/0x20
[   32.614834] 
[   32.614857] The buggy address belongs to the object at fff00000c85f0e00
[   32.614857]  which belongs to the cache kmalloc-64 of size 64
[   32.615089] The buggy address is located 0 bytes to the right of
[   32.615089]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.615585] 
[   32.616028] The buggy address belongs to the physical page:
[   32.616089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.616474] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.616627] page_type: f5(slab)
[   32.616673] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.617161] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.617363] page dumped because: kasan: bad access detected
[   32.617403] 
[   32.617517] Memory state around the buggy address:
[   32.617774]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.617961]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.618031] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.618221]                                      ^
[   32.618399]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.618486]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.618824] ==================================================================
[   32.705742] ==================================================================
[   32.705895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   32.705951] Read of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.706107] 
[   32.706194] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.706280] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.706328] Hardware name: linux,dummy-virt (DT)
[   32.706409] Call trace:
[   32.706435]  show_stack+0x20/0x38 (C)
[   32.706550]  dump_stack_lvl+0x8c/0xd0
[   32.706672]  print_report+0x118/0x5d0
[   32.706832]  kasan_report+0xdc/0x128
[   32.706926]  __asan_report_load8_noabort+0x20/0x30
[   32.707032]  kasan_atomics_helper+0x3e20/0x4858
[   32.707126]  kasan_atomics+0x198/0x2e0
[   32.707184]  kunit_try_run_case+0x170/0x3f0
[   32.707234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.707302]  kthread+0x328/0x630
[   32.707430]  ret_from_fork+0x10/0x20
[   32.707483] 
[   32.707594] Allocated by task 296:
[   32.707673]  kasan_save_stack+0x3c/0x68
[   32.707741]  kasan_save_track+0x20/0x40
[   32.707788]  kasan_save_alloc_info+0x40/0x58
[   32.707834]  __kasan_kmalloc+0xd4/0xd8
[   32.707907]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.708327]  kasan_atomics+0xb8/0x2e0
[   32.708410]  kunit_try_run_case+0x170/0x3f0
[   32.708456]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.708512]  kthread+0x328/0x630
[   32.708546]  ret_from_fork+0x10/0x20
[   32.708584] 
[   32.709134] The buggy address belongs to the object at fff00000c85f0e00
[   32.709134]  which belongs to the cache kmalloc-64 of size 64
[   32.709498] The buggy address is located 0 bytes to the right of
[   32.709498]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.709601] 
[   32.709626] The buggy address belongs to the physical page:
[   32.709756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.709831] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.710144] page_type: f5(slab)
[   32.710221] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.710347] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.710760] page dumped because: kasan: bad access detected
[   32.710866] 
[   32.710929] Memory state around the buggy address:
[   32.710977]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.711022]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.711344] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.711517]                                      ^
[   32.711619]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.711945]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.712068] ==================================================================
[   32.389874] ==================================================================
[   32.390022] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   32.390132] Write of size 4 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.390225] 
[   32.390261] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.390502] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.390530] Hardware name: linux,dummy-virt (DT)
[   32.390900] Call trace:
[   32.390944]  show_stack+0x20/0x38 (C)
[   32.391000]  dump_stack_lvl+0x8c/0xd0
[   32.391651]  print_report+0x118/0x5d0
[   32.391722]  kasan_report+0xdc/0x128
[   32.391780]  kasan_check_range+0x100/0x1a8
[   32.391849]  __kasan_check_write+0x20/0x30
[   32.391902]  kasan_atomics_helper+0xa6c/0x4858
[   32.391997]  kasan_atomics+0x198/0x2e0
[   32.392058]  kunit_try_run_case+0x170/0x3f0
[   32.392109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.392477]  kthread+0x328/0x630
[   32.392774]  ret_from_fork+0x10/0x20
[   32.392836] 
[   32.392857] Allocated by task 296:
[   32.392916]  kasan_save_stack+0x3c/0x68
[   32.392962]  kasan_save_track+0x20/0x40
[   32.393020]  kasan_save_alloc_info+0x40/0x58
[   32.393071]  __kasan_kmalloc+0xd4/0xd8
[   32.393133]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.393182]  kasan_atomics+0xb8/0x2e0
[   32.393222]  kunit_try_run_case+0x170/0x3f0
[   32.393264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.393305]  kthread+0x328/0x630
[   32.393341]  ret_from_fork+0x10/0x20
[   32.393378] 
[   32.393405] The buggy address belongs to the object at fff00000c85f0e00
[   32.393405]  which belongs to the cache kmalloc-64 of size 64
[   32.393464] The buggy address is located 0 bytes to the right of
[   32.393464]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.393529] 
[   32.393560] The buggy address belongs to the physical page:
[   32.393606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.393659] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.393708] page_type: f5(slab)
[   32.393748] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.393817] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.393867] page dumped because: kasan: bad access detected
[   32.393910] 
[   32.393939] Memory state around the buggy address:
[   32.393982]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.394335]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.394519] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.395060]                                      ^
[   32.395143]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.395415]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.395609] ==================================================================
[   32.482188] ==================================================================
[   32.482269] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   32.482332] Read of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.482383] 
[   32.482521] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.482725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.482766] Hardware name: linux,dummy-virt (DT)
[   32.482801] Call trace:
[   32.482858]  show_stack+0x20/0x38 (C)
[   32.482919]  dump_stack_lvl+0x8c/0xd0
[   32.483201]  print_report+0x118/0x5d0
[   32.483273]  kasan_report+0xdc/0x128
[   32.483465]  kasan_check_range+0x100/0x1a8
[   32.483527]  __kasan_check_read+0x20/0x30
[   32.483812]  kasan_atomics_helper+0xdd4/0x4858
[   32.484105]  kasan_atomics+0x198/0x2e0
[   32.484334]  kunit_try_run_case+0x170/0x3f0
[   32.484770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.484849]  kthread+0x328/0x630
[   32.484898]  ret_from_fork+0x10/0x20
[   32.484951] 
[   32.484972] Allocated by task 296:
[   32.485310]  kasan_save_stack+0x3c/0x68
[   32.485532]  kasan_save_track+0x20/0x40
[   32.485629]  kasan_save_alloc_info+0x40/0x58
[   32.485831]  __kasan_kmalloc+0xd4/0xd8
[   32.485891]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.485947]  kasan_atomics+0xb8/0x2e0
[   32.485986]  kunit_try_run_case+0x170/0x3f0
[   32.486033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.486095]  kthread+0x328/0x630
[   32.486135]  ret_from_fork+0x10/0x20
[   32.486172] 
[   32.486194] The buggy address belongs to the object at fff00000c85f0e00
[   32.486194]  which belongs to the cache kmalloc-64 of size 64
[   32.486255] The buggy address is located 0 bytes to the right of
[   32.486255]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.486320] 
[   32.486372] The buggy address belongs to the physical page:
[   32.486429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.486484] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.486535] page_type: f5(slab)
[   32.486587] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.486649] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.486701] page dumped because: kasan: bad access detected
[   32.486735] 
[   32.486764] Memory state around the buggy address:
[   32.486816]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.486871]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.486915] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.486955]                                      ^
[   32.486988]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.487031]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.487415] ==================================================================
[   32.665452] ==================================================================
[   32.665518] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   32.665596] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.665852] 
[   32.666070] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.666181] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.666435] Hardware name: linux,dummy-virt (DT)
[   32.666603] Call trace:
[   32.666637]  show_stack+0x20/0x38 (C)
[   32.666693]  dump_stack_lvl+0x8c/0xd0
[   32.666935]  print_report+0x118/0x5d0
[   32.667070]  kasan_report+0xdc/0x128
[   32.667136]  kasan_check_range+0x100/0x1a8
[   32.667184]  __kasan_check_write+0x20/0x30
[   32.667398]  kasan_atomics_helper+0x15b4/0x4858
[   32.667482]  kasan_atomics+0x198/0x2e0
[   32.667740]  kunit_try_run_case+0x170/0x3f0
[   32.667866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.668044]  kthread+0x328/0x630
[   32.668112]  ret_from_fork+0x10/0x20
[   32.668621] 
[   32.668675] Allocated by task 296:
[   32.668753]  kasan_save_stack+0x3c/0x68
[   32.669115]  kasan_save_track+0x20/0x40
[   32.669201]  kasan_save_alloc_info+0x40/0x58
[   32.669249]  __kasan_kmalloc+0xd4/0xd8
[   32.669608]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.669742]  kasan_atomics+0xb8/0x2e0
[   32.669913]  kunit_try_run_case+0x170/0x3f0
[   32.670200]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.670368]  kthread+0x328/0x630
[   32.670407]  ret_from_fork+0x10/0x20
[   32.670446] 
[   32.670490] The buggy address belongs to the object at fff00000c85f0e00
[   32.670490]  which belongs to the cache kmalloc-64 of size 64
[   32.670557] The buggy address is located 0 bytes to the right of
[   32.670557]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.670629] 
[   32.670657] The buggy address belongs to the physical page:
[   32.670702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.670772] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.670828] page_type: f5(slab)
[   32.670871] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.670921] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.670964] page dumped because: kasan: bad access detected
[   32.670998] 
[   32.671034] Memory state around the buggy address:
[   32.671092]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.671148]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.671193] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.671237]                                      ^
[   32.671272]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.671318]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.671368] ==================================================================
[   32.629755] ==================================================================
[   32.630117] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   32.630185] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.630379] 
[   32.630456] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.630642] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.630673] Hardware name: linux,dummy-virt (DT)
[   32.630704] Call trace:
[   32.630738]  show_stack+0x20/0x38 (C)
[   32.630870]  dump_stack_lvl+0x8c/0xd0
[   32.630919]  print_report+0x118/0x5d0
[   32.630972]  kasan_report+0xdc/0x128
[   32.631025]  kasan_check_range+0x100/0x1a8
[   32.631084]  __kasan_check_write+0x20/0x30
[   32.631129]  kasan_atomics_helper+0x1414/0x4858
[   32.631188]  kasan_atomics+0x198/0x2e0
[   32.631242]  kunit_try_run_case+0x170/0x3f0
[   32.631292]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.631344]  kthread+0x328/0x630
[   32.631387]  ret_from_fork+0x10/0x20
[   32.631435] 
[   32.631466] Allocated by task 296:
[   32.631505]  kasan_save_stack+0x3c/0x68
[   32.631557]  kasan_save_track+0x20/0x40
[   32.631599]  kasan_save_alloc_info+0x40/0x58
[   32.631638]  __kasan_kmalloc+0xd4/0xd8
[   32.631684]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.631726]  kasan_atomics+0xb8/0x2e0
[   32.631765]  kunit_try_run_case+0x170/0x3f0
[   32.631815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.631860]  kthread+0x328/0x630
[   32.631903]  ret_from_fork+0x10/0x20
[   32.631941] 
[   32.631962] The buggy address belongs to the object at fff00000c85f0e00
[   32.631962]  which belongs to the cache kmalloc-64 of size 64
[   32.632021] The buggy address is located 0 bytes to the right of
[   32.632021]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.632097] 
[   32.632200] The buggy address belongs to the physical page:
[   32.632255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.632331] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.632395] page_type: f5(slab)
[   32.632436] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.633321] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.633409] page dumped because: kasan: bad access detected
[   32.633461] 
[   32.633508] Memory state around the buggy address:
[   32.633574]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.633655]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.633728] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.633767]                                      ^
[   32.634269]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.634365]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.634661] ==================================================================
[   32.556119] ==================================================================
[   32.556378] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   32.556484] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.556663] 
[   32.556734] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.556913] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.556975] Hardware name: linux,dummy-virt (DT)
[   32.557006] Call trace:
[   32.557030]  show_stack+0x20/0x38 (C)
[   32.557643]  dump_stack_lvl+0x8c/0xd0
[   32.557860]  print_report+0x118/0x5d0
[   32.557954]  kasan_report+0xdc/0x128
[   32.558076]  kasan_check_range+0x100/0x1a8
[   32.558184]  __kasan_check_write+0x20/0x30
[   32.558348]  kasan_atomics_helper+0x10c0/0x4858
[   32.558414]  kasan_atomics+0x198/0x2e0
[   32.558963]  kunit_try_run_case+0x170/0x3f0
[   32.559150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.559432]  kthread+0x328/0x630
[   32.559603]  ret_from_fork+0x10/0x20
[   32.560043] 
[   32.560373] Allocated by task 296:
[   32.560426]  kasan_save_stack+0x3c/0x68
[   32.560651]  kasan_save_track+0x20/0x40
[   32.560899]  kasan_save_alloc_info+0x40/0x58
[   32.560976]  __kasan_kmalloc+0xd4/0xd8
[   32.561156]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.561215]  kasan_atomics+0xb8/0x2e0
[   32.561277]  kunit_try_run_case+0x170/0x3f0
[   32.561326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.561749]  kthread+0x328/0x630
[   32.561998]  ret_from_fork+0x10/0x20
[   32.562166] 
[   32.562523] The buggy address belongs to the object at fff00000c85f0e00
[   32.562523]  which belongs to the cache kmalloc-64 of size 64
[   32.562635] The buggy address is located 0 bytes to the right of
[   32.562635]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.562835] 
[   32.562993] The buggy address belongs to the physical page:
[   32.563446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.563792] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.563960] page_type: f5(slab)
[   32.564059] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.564214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.564289] page dumped because: kasan: bad access detected
[   32.564530] 
[   32.564627] Memory state around the buggy address:
[   32.564766]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.564826]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.565067] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.565139]                                      ^
[   32.565482]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.565656]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.565877] ==================================================================
[   32.676901] ==================================================================
[   32.677043] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   32.677373] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.677440] 
[   32.677475] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.677594] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.677626] Hardware name: linux,dummy-virt (DT)
[   32.677657] Call trace:
[   32.677903]  show_stack+0x20/0x38 (C)
[   32.677975]  dump_stack_lvl+0x8c/0xd0
[   32.678034]  print_report+0x118/0x5d0
[   32.678406]  kasan_report+0xdc/0x128
[   32.678502]  kasan_check_range+0x100/0x1a8
[   32.678553]  __kasan_check_write+0x20/0x30
[   32.678612]  kasan_atomics_helper+0x1644/0x4858
[   32.678676]  kasan_atomics+0x198/0x2e0
[   32.678723]  kunit_try_run_case+0x170/0x3f0
[   32.679024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.679106]  kthread+0x328/0x630
[   32.679229]  ret_from_fork+0x10/0x20
[   32.679309] 
[   32.679537] Allocated by task 296:
[   32.679621]  kasan_save_stack+0x3c/0x68
[   32.679675]  kasan_save_track+0x20/0x40
[   32.679717]  kasan_save_alloc_info+0x40/0x58
[   32.679969]  __kasan_kmalloc+0xd4/0xd8
[   32.680059]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.680188]  kasan_atomics+0xb8/0x2e0
[   32.680425]  kunit_try_run_case+0x170/0x3f0
[   32.680836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.681134]  kthread+0x328/0x630
[   32.681802]  ret_from_fork+0x10/0x20
[   32.681859] 
[   32.681881] The buggy address belongs to the object at fff00000c85f0e00
[   32.681881]  which belongs to the cache kmalloc-64 of size 64
[   32.682121] The buggy address is located 0 bytes to the right of
[   32.682121]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.682211] 
[   32.682333] The buggy address belongs to the physical page:
[   32.682410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.682551] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.682621] page_type: f5(slab)
[   32.682911] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.682988] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.683032] page dumped because: kasan: bad access detected
[   32.683076] 
[   32.683097] Memory state around the buggy address:
[   32.683129]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.683411]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.683618] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.683682]                                      ^
[   32.684104]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.684227]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.684459] ==================================================================
[   32.380193] ==================================================================
[   32.380404] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   32.380461] Write of size 4 at addr fff00000c85f0e30 by task kunit_try_catch/296
[   32.380520] 
[   32.380698] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   32.381024] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.381223] Hardware name: linux,dummy-virt (DT)
[   32.381274] Call trace:
[   32.381462]  show_stack+0x20/0x38 (C)
[   32.381988]  print_report+0x118/0x5d0
[   32.383522]  ret_from_fork+0x10/0x20
[   32.385199]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.385930] The buggy address is located 0 bytes to the right of
[   32.385930]  allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30)
[   32.386009] 
[   32.386043] The buggy address belongs to the physical page:
[   32.386382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0
[   32.386485] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.386639] page_type: f5(slab)
[   32.386724] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.386835] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.387362] page dumped because: kasan: bad access detected
[   32.387519] 
[   32.387608] Memory state around the buggy address:
[   32.387706]  fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.387995]  fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.388243] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.388361]                                      ^
[   32.388508]  fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.388582]  fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.388623] ==================================================================

[   27.787822] ==================================================================
[   27.788078] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   27.788750] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.789476] 
[   27.789647] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.789813] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.790034] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.790072] Call Trace:
[   27.790094]  <TASK>
[   27.790116]  dump_stack_lvl+0x73/0xb0
[   27.790155]  print_report+0xd1/0x610
[   27.790181]  ? __virt_addr_valid+0x1db/0x2d0
[   27.790207]  ? kasan_atomics_helper+0x1818/0x5450
[   27.790230]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.790257]  ? kasan_atomics_helper+0x1818/0x5450
[   27.790279]  kasan_report+0x141/0x180
[   27.790302]  ? kasan_atomics_helper+0x1818/0x5450
[   27.790328]  kasan_check_range+0x10c/0x1c0
[   27.790352]  __kasan_check_write+0x18/0x20
[   27.790376]  kasan_atomics_helper+0x1818/0x5450
[   27.790399]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.790422]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.790446]  ? pick_task_fair+0xce/0x340
[   27.790472]  ? kasan_atomics+0x152/0x310
[   27.790499]  kasan_atomics+0x1dc/0x310
[   27.790522]  ? __pfx_kasan_atomics+0x10/0x10
[   27.790547]  ? __pfx_read_tsc+0x10/0x10
[   27.790570]  ? ktime_get_ts64+0x86/0x230
[   27.790594]  kunit_try_run_case+0x1a5/0x480
[   27.790619]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.790640]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.790677]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.790702]  ? __kthread_parkme+0x82/0x180
[   27.790725]  ? preempt_count_sub+0x50/0x80
[   27.790761]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.790783]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.790810]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.790837]  kthread+0x337/0x6f0
[   27.790857]  ? trace_preempt_on+0x20/0xc0
[   27.790882]  ? __pfx_kthread+0x10/0x10
[   27.790903]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.790926]  ? calculate_sigpending+0x7b/0xa0
[   27.790952]  ? __pfx_kthread+0x10/0x10
[   27.790974]  ret_from_fork+0x116/0x1d0
[   27.790994]  ? __pfx_kthread+0x10/0x10
[   27.791015]  ret_from_fork_asm+0x1a/0x30
[   27.791048]  </TASK>
[   27.791060] 
[   27.802425] Allocated by task 314:
[   27.802907]  kasan_save_stack+0x45/0x70
[   27.803215]  kasan_save_track+0x18/0x40
[   27.803514]  kasan_save_alloc_info+0x3b/0x50
[   27.803807]  __kasan_kmalloc+0xb7/0xc0
[   27.803976]  __kmalloc_cache_noprof+0x189/0x420
[   27.804342]  kasan_atomics+0x95/0x310
[   27.804577]  kunit_try_run_case+0x1a5/0x480
[   27.804786]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.805197]  kthread+0x337/0x6f0
[   27.805465]  ret_from_fork+0x116/0x1d0
[   27.805668]  ret_from_fork_asm+0x1a/0x30
[   27.806060] 
[   27.806283] The buggy address belongs to the object at ffff888103eb9580
[   27.806283]  which belongs to the cache kmalloc-64 of size 64
[   27.806878] The buggy address is located 0 bytes to the right of
[   27.806878]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.807369] 
[   27.807466] The buggy address belongs to the physical page:
[   27.807880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.808414] flags: 0x200000000000000(node=0|zone=2)
[   27.808927] page_type: f5(slab)
[   27.809222] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.809597] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.810170] page dumped because: kasan: bad access detected
[   27.810545] 
[   27.810620] Memory state around the buggy address:
[   27.810931]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.811420]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.811879] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.812291]                                      ^
[   27.812626]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.813162]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.813566] ==================================================================
[   27.561002] ==================================================================
[   27.561578] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   27.562001] Read of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.562264] 
[   27.562376] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.562446] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.562461] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.562487] Call Trace:
[   27.562508]  <TASK>
[   27.562538]  dump_stack_lvl+0x73/0xb0
[   27.562574]  print_report+0xd1/0x610
[   27.562599]  ? __virt_addr_valid+0x1db/0x2d0
[   27.562637]  ? kasan_atomics_helper+0x13b5/0x5450
[   27.562669]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.562696]  ? kasan_atomics_helper+0x13b5/0x5450
[   27.562727]  kasan_report+0x141/0x180
[   27.562750]  ? kasan_atomics_helper+0x13b5/0x5450
[   27.562777]  kasan_check_range+0x10c/0x1c0
[   27.562825]  __kasan_check_read+0x15/0x20
[   27.562849]  kasan_atomics_helper+0x13b5/0x5450
[   27.562883]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.562914]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.562940]  ? pick_task_fair+0xce/0x340
[   27.562966]  ? kasan_atomics+0x152/0x310
[   27.563003]  kasan_atomics+0x1dc/0x310
[   27.563027]  ? __pfx_kasan_atomics+0x10/0x10
[   27.563051]  ? __pfx_read_tsc+0x10/0x10
[   27.563083]  ? ktime_get_ts64+0x86/0x230
[   27.563110]  kunit_try_run_case+0x1a5/0x480
[   27.563135]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.563166]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.563192]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.563216]  ? __kthread_parkme+0x82/0x180
[   27.563248]  ? preempt_count_sub+0x50/0x80
[   27.563273]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.563295]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.563332]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.563359]  kthread+0x337/0x6f0
[   27.563380]  ? trace_preempt_on+0x20/0xc0
[   27.563423]  ? __pfx_kthread+0x10/0x10
[   27.563446]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.563468]  ? calculate_sigpending+0x7b/0xa0
[   27.563504]  ? __pfx_kthread+0x10/0x10
[   27.563527]  ret_from_fork+0x116/0x1d0
[   27.563547]  ? __pfx_kthread+0x10/0x10
[   27.563568]  ret_from_fork_asm+0x1a/0x30
[   27.563607]  </TASK>
[   27.563620] 
[   27.575514] Allocated by task 314:
[   27.575731]  kasan_save_stack+0x45/0x70
[   27.576221]  kasan_save_track+0x18/0x40
[   27.576392]  kasan_save_alloc_info+0x3b/0x50
[   27.576582]  __kasan_kmalloc+0xb7/0xc0
[   27.576969]  __kmalloc_cache_noprof+0x189/0x420
[   27.577327]  kasan_atomics+0x95/0x310
[   27.577517]  kunit_try_run_case+0x1a5/0x480
[   27.577713]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.577944]  kthread+0x337/0x6f0
[   27.578103]  ret_from_fork+0x116/0x1d0
[   27.578270]  ret_from_fork_asm+0x1a/0x30
[   27.578450] 
[   27.578537] The buggy address belongs to the object at ffff888103eb9580
[   27.578537]  which belongs to the cache kmalloc-64 of size 64
[   27.578921] The buggy address is located 0 bytes to the right of
[   27.578921]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.579707] 
[   27.579882] The buggy address belongs to the physical page:
[   27.580133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.580402] flags: 0x200000000000000(node=0|zone=2)
[   27.580586] page_type: f5(slab)
[   27.580753] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.581199] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.581420] page dumped because: kasan: bad access detected
[   27.581583] 
[   27.581855] Memory state around the buggy address:
[   27.582390]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.582925]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.583238] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.583522]                                      ^
[   27.583736]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.584378]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.584670] ==================================================================
[   28.110216] ==================================================================
[   28.110568] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   28.110924] Read of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   28.111265] 
[   28.111378] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   28.111432] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   28.111446] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.111472] Call Trace:
[   28.111492]  <TASK>
[   28.111512]  dump_stack_lvl+0x73/0xb0
[   28.111542]  print_report+0xd1/0x610
[   28.111565]  ? __virt_addr_valid+0x1db/0x2d0
[   28.111591]  ? kasan_atomics_helper+0x4f98/0x5450
[   28.111612]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.111639]  ? kasan_atomics_helper+0x4f98/0x5450
[   28.111675]  kasan_report+0x141/0x180
[   28.111698]  ? kasan_atomics_helper+0x4f98/0x5450
[   28.111724]  __asan_report_load8_noabort+0x18/0x20
[   28.111759]  kasan_atomics_helper+0x4f98/0x5450
[   28.111782]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.111804]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.111828]  ? pick_task_fair+0xce/0x340
[   28.111854]  ? kasan_atomics+0x152/0x310
[   28.111881]  kasan_atomics+0x1dc/0x310
[   28.111905]  ? __pfx_kasan_atomics+0x10/0x10
[   28.111930]  ? __pfx_read_tsc+0x10/0x10
[   28.111953]  ? ktime_get_ts64+0x86/0x230
[   28.111979]  kunit_try_run_case+0x1a5/0x480
[   28.112003]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.112024]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.112050]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.112074]  ? __kthread_parkme+0x82/0x180
[   28.112097]  ? preempt_count_sub+0x50/0x80
[   28.112121]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.112144]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.112170]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.112197]  kthread+0x337/0x6f0
[   28.112218]  ? trace_preempt_on+0x20/0xc0
[   28.112242]  ? __pfx_kthread+0x10/0x10
[   28.112264]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.112287]  ? calculate_sigpending+0x7b/0xa0
[   28.112313]  ? __pfx_kthread+0x10/0x10
[   28.112335]  ret_from_fork+0x116/0x1d0
[   28.112356]  ? __pfx_kthread+0x10/0x10
[   28.112377]  ret_from_fork_asm+0x1a/0x30
[   28.112409]  </TASK>
[   28.112422] 
[   28.119600] Allocated by task 314:
[   28.119859]  kasan_save_stack+0x45/0x70
[   28.120071]  kasan_save_track+0x18/0x40
[   28.120258]  kasan_save_alloc_info+0x3b/0x50
[   28.120462]  __kasan_kmalloc+0xb7/0xc0
[   28.120645]  __kmalloc_cache_noprof+0x189/0x420
[   28.120870]  kasan_atomics+0x95/0x310
[   28.121056]  kunit_try_run_case+0x1a5/0x480
[   28.121207]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.121378]  kthread+0x337/0x6f0
[   28.121495]  ret_from_fork+0x116/0x1d0
[   28.121622]  ret_from_fork_asm+0x1a/0x30
[   28.121882] 
[   28.121983] The buggy address belongs to the object at ffff888103eb9580
[   28.121983]  which belongs to the cache kmalloc-64 of size 64
[   28.122507] The buggy address is located 0 bytes to the right of
[   28.122507]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   28.123053] 
[   28.123146] The buggy address belongs to the physical page:
[   28.123314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   28.123549] flags: 0x200000000000000(node=0|zone=2)
[   28.123855] page_type: f5(slab)
[   28.124023] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.124370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.124717] page dumped because: kasan: bad access detected
[   28.124951] 
[   28.125024] Memory state around the buggy address:
[   28.125228]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.125467]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.125754] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.126059]                                      ^
[   28.126273]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.126546]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.126870] ==================================================================
[   27.840611] ==================================================================
[   27.841081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   27.841433] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.841787] 
[   27.841907] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.841993] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.842008] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.842051] Call Trace:
[   27.842072]  <TASK>
[   27.842096]  dump_stack_lvl+0x73/0xb0
[   27.842130]  print_report+0xd1/0x610
[   27.842154]  ? __virt_addr_valid+0x1db/0x2d0
[   27.842179]  ? kasan_atomics_helper+0x194a/0x5450
[   27.842201]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.842227]  ? kasan_atomics_helper+0x194a/0x5450
[   27.842250]  kasan_report+0x141/0x180
[   27.842273]  ? kasan_atomics_helper+0x194a/0x5450
[   27.842299]  kasan_check_range+0x10c/0x1c0
[   27.842324]  __kasan_check_write+0x18/0x20
[   27.842348]  kasan_atomics_helper+0x194a/0x5450
[   27.842371]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.842393]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.842418]  ? pick_task_fair+0xce/0x340
[   27.842444]  ? kasan_atomics+0x152/0x310
[   27.842471]  kasan_atomics+0x1dc/0x310
[   27.842495]  ? __pfx_kasan_atomics+0x10/0x10
[   27.842520]  ? __pfx_read_tsc+0x10/0x10
[   27.842543]  ? ktime_get_ts64+0x86/0x230
[   27.842569]  kunit_try_run_case+0x1a5/0x480
[   27.842593]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.842616]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.842641]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.842676]  ? __kthread_parkme+0x82/0x180
[   27.842699]  ? preempt_count_sub+0x50/0x80
[   27.842723]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.842777]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.842805]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.842830]  kthread+0x337/0x6f0
[   27.842862]  ? trace_preempt_on+0x20/0xc0
[   27.842887]  ? __pfx_kthread+0x10/0x10
[   27.842909]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.842932]  ? calculate_sigpending+0x7b/0xa0
[   27.842957]  ? __pfx_kthread+0x10/0x10
[   27.842979]  ret_from_fork+0x116/0x1d0
[   27.842999]  ? __pfx_kthread+0x10/0x10
[   27.843021]  ret_from_fork_asm+0x1a/0x30
[   27.843054]  </TASK>
[   27.843066] 
[   27.851140] Allocated by task 314:
[   27.851335]  kasan_save_stack+0x45/0x70
[   27.851542]  kasan_save_track+0x18/0x40
[   27.851737]  kasan_save_alloc_info+0x3b/0x50
[   27.852078]  __kasan_kmalloc+0xb7/0xc0
[   27.852214]  __kmalloc_cache_noprof+0x189/0x420
[   27.852360]  kasan_atomics+0x95/0x310
[   27.852483]  kunit_try_run_case+0x1a5/0x480
[   27.852628]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.853079]  kthread+0x337/0x6f0
[   27.853309]  ret_from_fork+0x116/0x1d0
[   27.853544]  ret_from_fork_asm+0x1a/0x30
[   27.854029] 
[   27.854142] The buggy address belongs to the object at ffff888103eb9580
[   27.854142]  which belongs to the cache kmalloc-64 of size 64
[   27.854815] The buggy address is located 0 bytes to the right of
[   27.854815]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.855166] 
[   27.855235] The buggy address belongs to the physical page:
[   27.855484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.856162] flags: 0x200000000000000(node=0|zone=2)
[   27.856479] page_type: f5(slab)
[   27.856661] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.857165] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.857420] page dumped because: kasan: bad access detected
[   27.857648] 
[   27.857821] Memory state around the buggy address:
[   27.858089]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.858372]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.858690] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.859049]                                      ^
[   27.859274]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.859600]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.859988] ==================================================================
[   28.089357] ==================================================================
[   28.089593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   28.091650] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   28.092578] 
[   28.092936] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   28.092998] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   28.093013] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.093039] Call Trace:
[   28.093061]  <TASK>
[   28.093082]  dump_stack_lvl+0x73/0xb0
[   28.093123]  print_report+0xd1/0x610
[   28.093147]  ? __virt_addr_valid+0x1db/0x2d0
[   28.093173]  ? kasan_atomics_helper+0x2006/0x5450
[   28.093196]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.093222]  ? kasan_atomics_helper+0x2006/0x5450
[   28.093244]  kasan_report+0x141/0x180
[   28.093267]  ? kasan_atomics_helper+0x2006/0x5450
[   28.093292]  kasan_check_range+0x10c/0x1c0
[   28.093316]  __kasan_check_write+0x18/0x20
[   28.093340]  kasan_atomics_helper+0x2006/0x5450
[   28.093363]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.093385]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.093410]  ? pick_task_fair+0xce/0x340
[   28.093435]  ? kasan_atomics+0x152/0x310
[   28.093461]  kasan_atomics+0x1dc/0x310
[   28.093484]  ? __pfx_kasan_atomics+0x10/0x10
[   28.093508]  ? __pfx_read_tsc+0x10/0x10
[   28.093530]  ? ktime_get_ts64+0x86/0x230
[   28.093556]  kunit_try_run_case+0x1a5/0x480
[   28.093580]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.093602]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.093628]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.093679]  ? __kthread_parkme+0x82/0x180
[   28.093705]  ? preempt_count_sub+0x50/0x80
[   28.093730]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.093762]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.093788]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.093815]  kthread+0x337/0x6f0
[   28.093836]  ? trace_preempt_on+0x20/0xc0
[   28.093861]  ? __pfx_kthread+0x10/0x10
[   28.093882]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.093905]  ? calculate_sigpending+0x7b/0xa0
[   28.093930]  ? __pfx_kthread+0x10/0x10
[   28.093952]  ret_from_fork+0x116/0x1d0
[   28.093973]  ? __pfx_kthread+0x10/0x10
[   28.093994]  ret_from_fork_asm+0x1a/0x30
[   28.094027]  </TASK>
[   28.094045] 
[   28.102375] Allocated by task 314:
[   28.102521]  kasan_save_stack+0x45/0x70
[   28.102692]  kasan_save_track+0x18/0x40
[   28.102879]  kasan_save_alloc_info+0x3b/0x50
[   28.103089]  __kasan_kmalloc+0xb7/0xc0
[   28.103272]  __kmalloc_cache_noprof+0x189/0x420
[   28.103547]  kasan_atomics+0x95/0x310
[   28.103762]  kunit_try_run_case+0x1a5/0x480
[   28.103941]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.104146]  kthread+0x337/0x6f0
[   28.104309]  ret_from_fork+0x116/0x1d0
[   28.104489]  ret_from_fork_asm+0x1a/0x30
[   28.104622] 
[   28.104697] The buggy address belongs to the object at ffff888103eb9580
[   28.104697]  which belongs to the cache kmalloc-64 of size 64
[   28.105179] The buggy address is located 0 bytes to the right of
[   28.105179]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   28.105730] 
[   28.105801] The buggy address belongs to the physical page:
[   28.105967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   28.106206] flags: 0x200000000000000(node=0|zone=2)
[   28.106413] page_type: f5(slab)
[   28.106596] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.107218] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.107549] page dumped because: kasan: bad access detected
[   28.107844] 
[   28.107913] Memory state around the buggy address:
[   28.108107]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.108316]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.108526] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.108746]                                      ^
[   28.108895]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.109166]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.109484] ==================================================================
[   28.169964] ==================================================================
[   28.170331] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   28.170648] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   28.170980] 
[   28.171096] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   28.171150] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   28.171165] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.171191] Call Trace:
[   28.171212]  <TASK>
[   28.171234]  dump_stack_lvl+0x73/0xb0
[   28.171266]  print_report+0xd1/0x610
[   28.171289]  ? __virt_addr_valid+0x1db/0x2d0
[   28.171315]  ? kasan_atomics_helper+0x218a/0x5450
[   28.171336]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.171362]  ? kasan_atomics_helper+0x218a/0x5450
[   28.171385]  kasan_report+0x141/0x180
[   28.171407]  ? kasan_atomics_helper+0x218a/0x5450
[   28.171433]  kasan_check_range+0x10c/0x1c0
[   28.171457]  __kasan_check_write+0x18/0x20
[   28.171480]  kasan_atomics_helper+0x218a/0x5450
[   28.171503]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.171525]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.171549]  ? pick_task_fair+0xce/0x340
[   28.171575]  ? kasan_atomics+0x152/0x310
[   28.171602]  kasan_atomics+0x1dc/0x310
[   28.171625]  ? __pfx_kasan_atomics+0x10/0x10
[   28.171650]  ? __pfx_read_tsc+0x10/0x10
[   28.171693]  ? ktime_get_ts64+0x86/0x230
[   28.171718]  kunit_try_run_case+0x1a5/0x480
[   28.171742]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.171763]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.171789]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.171814]  ? __kthread_parkme+0x82/0x180
[   28.171836]  ? preempt_count_sub+0x50/0x80
[   28.171861]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.171889]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.171918]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.171946]  kthread+0x337/0x6f0
[   28.171968]  ? trace_preempt_on+0x20/0xc0
[   28.171994]  ? __pfx_kthread+0x10/0x10
[   28.172016]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.172039]  ? calculate_sigpending+0x7b/0xa0
[   28.172064]  ? __pfx_kthread+0x10/0x10
[   28.172088]  ret_from_fork+0x116/0x1d0
[   28.172109]  ? __pfx_kthread+0x10/0x10
[   28.172132]  ret_from_fork_asm+0x1a/0x30
[   28.172163]  </TASK>
[   28.172176] 
[   28.182598] Allocated by task 314:
[   28.182852]  kasan_save_stack+0x45/0x70
[   28.183297]  kasan_save_track+0x18/0x40
[   28.183486]  kasan_save_alloc_info+0x3b/0x50
[   28.183661]  __kasan_kmalloc+0xb7/0xc0
[   28.184024]  __kmalloc_cache_noprof+0x189/0x420
[   28.184246]  kasan_atomics+0x95/0x310
[   28.184557]  kunit_try_run_case+0x1a5/0x480
[   28.184807]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.185198]  kthread+0x337/0x6f0
[   28.185439]  ret_from_fork+0x116/0x1d0
[   28.185642]  ret_from_fork_asm+0x1a/0x30
[   28.186018] 
[   28.186105] The buggy address belongs to the object at ffff888103eb9580
[   28.186105]  which belongs to the cache kmalloc-64 of size 64
[   28.186784] The buggy address is located 0 bytes to the right of
[   28.186784]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   28.187464] 
[   28.187715] The buggy address belongs to the physical page:
[   28.187971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   28.188317] flags: 0x200000000000000(node=0|zone=2)
[   28.188708] page_type: f5(slab)
[   28.189019] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.189413] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.189766] page dumped because: kasan: bad access detected
[   28.190197] 
[   28.190284] Memory state around the buggy address:
[   28.190669]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.191108]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.191413] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.191722]                                      ^
[   28.192118]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.192511]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.192988] ==================================================================
[   27.182822] ==================================================================
[   27.183358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   27.183674] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.183891] 
[   27.184160] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.184219] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.184234] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.184261] Call Trace:
[   27.184282]  <TASK>
[   27.184303]  dump_stack_lvl+0x73/0xb0
[   27.184335]  print_report+0xd1/0x610
[   27.184359]  ? __virt_addr_valid+0x1db/0x2d0
[   27.184384]  ? kasan_atomics_helper+0xac7/0x5450
[   27.184406]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.184434]  ? kasan_atomics_helper+0xac7/0x5450
[   27.184456]  kasan_report+0x141/0x180
[   27.184510]  ? kasan_atomics_helper+0xac7/0x5450
[   27.184537]  kasan_check_range+0x10c/0x1c0
[   27.184561]  __kasan_check_write+0x18/0x20
[   27.184584]  kasan_atomics_helper+0xac7/0x5450
[   27.184607]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.184630]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.184671]  ? pick_task_fair+0xce/0x340
[   27.184697]  ? kasan_atomics+0x152/0x310
[   27.184724]  kasan_atomics+0x1dc/0x310
[   27.184759]  ? __pfx_kasan_atomics+0x10/0x10
[   27.184784]  ? __pfx_read_tsc+0x10/0x10
[   27.184807]  ? ktime_get_ts64+0x86/0x230
[   27.184833]  kunit_try_run_case+0x1a5/0x480
[   27.184877]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.184898]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.184924]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.184949]  ? __kthread_parkme+0x82/0x180
[   27.184972]  ? preempt_count_sub+0x50/0x80
[   27.184997]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.185019]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.185046]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.185072]  kthread+0x337/0x6f0
[   27.185093]  ? trace_preempt_on+0x20/0xc0
[   27.185133]  ? __pfx_kthread+0x10/0x10
[   27.185155]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.185177]  ? calculate_sigpending+0x7b/0xa0
[   27.185203]  ? __pfx_kthread+0x10/0x10
[   27.185225]  ret_from_fork+0x116/0x1d0
[   27.185245]  ? __pfx_kthread+0x10/0x10
[   27.185267]  ret_from_fork_asm+0x1a/0x30
[   27.185316]  </TASK>
[   27.185329] 
[   27.192933] Allocated by task 314:
[   27.193338]  kasan_save_stack+0x45/0x70
[   27.193549]  kasan_save_track+0x18/0x40
[   27.193737]  kasan_save_alloc_info+0x3b/0x50
[   27.193953]  __kasan_kmalloc+0xb7/0xc0
[   27.194179]  __kmalloc_cache_noprof+0x189/0x420
[   27.194328]  kasan_atomics+0x95/0x310
[   27.194725]  kunit_try_run_case+0x1a5/0x480
[   27.194902]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.195068]  kthread+0x337/0x6f0
[   27.195183]  ret_from_fork+0x116/0x1d0
[   27.195309]  ret_from_fork_asm+0x1a/0x30
[   27.195440] 
[   27.195503] The buggy address belongs to the object at ffff888103eb9580
[   27.195503]  which belongs to the cache kmalloc-64 of size 64
[   27.195961] The buggy address is located 0 bytes to the right of
[   27.195961]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.196480] 
[   27.196630] The buggy address belongs to the physical page:
[   27.197096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.197332] flags: 0x200000000000000(node=0|zone=2)
[   27.197490] page_type: f5(slab)
[   27.197608] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.198140] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.198592] page dumped because: kasan: bad access detected
[   27.199227] 
[   27.199362] Memory state around the buggy address:
[   27.199678]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.200011]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.201219] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.201455]                                      ^
[   27.201613]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.202613]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.202961] ==================================================================
[   26.889104] ==================================================================
[   26.889805] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   26.891217] Read of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   26.892267] 
[   26.892380] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   26.892441] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.892458] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.892485] Call Trace:
[   26.892505]  <TASK>
[   26.892527]  dump_stack_lvl+0x73/0xb0
[   26.892572]  print_report+0xd1/0x610
[   26.892597]  ? __virt_addr_valid+0x1db/0x2d0
[   26.892622]  ? kasan_atomics_helper+0x4b54/0x5450
[   26.892645]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.892909]  ? kasan_atomics_helper+0x4b54/0x5450
[   26.892987]  kasan_report+0x141/0x180
[   26.893014]  ? kasan_atomics_helper+0x4b54/0x5450
[   26.893104]  __asan_report_load4_noabort+0x18/0x20
[   26.893129]  kasan_atomics_helper+0x4b54/0x5450
[   26.893153]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.893177]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.893202]  ? pick_task_fair+0xce/0x340
[   26.893231]  ? kasan_atomics+0x152/0x310
[   26.893259]  kasan_atomics+0x1dc/0x310
[   26.893283]  ? __pfx_kasan_atomics+0x10/0x10
[   26.893308]  ? __pfx_read_tsc+0x10/0x10
[   26.893331]  ? ktime_get_ts64+0x86/0x230
[   26.893357]  kunit_try_run_case+0x1a5/0x480
[   26.893382]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.893403]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.893429]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.893455]  ? __kthread_parkme+0x82/0x180
[   26.893477]  ? preempt_count_sub+0x50/0x80
[   26.893503]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.893526]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.893552]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.893579]  kthread+0x337/0x6f0
[   26.893600]  ? trace_preempt_on+0x20/0xc0
[   26.893624]  ? __pfx_kthread+0x10/0x10
[   26.893647]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.893682]  ? calculate_sigpending+0x7b/0xa0
[   26.893708]  ? __pfx_kthread+0x10/0x10
[   26.893730]  ret_from_fork+0x116/0x1d0
[   26.893765]  ? __pfx_kthread+0x10/0x10
[   26.893788]  ret_from_fork_asm+0x1a/0x30
[   26.893855]  </TASK>
[   26.893868] 
[   26.908583] Allocated by task 314:
[   26.908946]  kasan_save_stack+0x45/0x70
[   26.909540]  kasan_save_track+0x18/0x40
[   26.909732]  kasan_save_alloc_info+0x3b/0x50
[   26.910076]  __kasan_kmalloc+0xb7/0xc0
[   26.910462]  __kmalloc_cache_noprof+0x189/0x420
[   26.910851]  kasan_atomics+0x95/0x310
[   26.911264]  kunit_try_run_case+0x1a5/0x480
[   26.911444]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.911999]  kthread+0x337/0x6f0
[   26.912335]  ret_from_fork+0x116/0x1d0
[   26.912603]  ret_from_fork_asm+0x1a/0x30
[   26.912821] 
[   26.912932] The buggy address belongs to the object at ffff888103eb9580
[   26.912932]  which belongs to the cache kmalloc-64 of size 64
[   26.913422] The buggy address is located 0 bytes to the right of
[   26.913422]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   26.914382] 
[   26.914522] The buggy address belongs to the physical page:
[   26.914786] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   26.915172] flags: 0x200000000000000(node=0|zone=2)
[   26.915457] page_type: f5(slab)
[   26.915668] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.916007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.916398] page dumped because: kasan: bad access detected
[   26.916615] 
[   26.916739] Memory state around the buggy address:
[   26.916961]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.917601]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.917936] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.918211]                                      ^
[   26.918561]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.919065]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.919318] ==================================================================
[   28.054516] ==================================================================
[   28.054917] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   28.055367] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   28.055674] 
[   28.055767] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   28.055823] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   28.055838] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.055867] Call Trace:
[   28.055888]  <TASK>
[   28.055909]  dump_stack_lvl+0x73/0xb0
[   28.055941]  print_report+0xd1/0x610
[   28.055965]  ? __virt_addr_valid+0x1db/0x2d0
[   28.055989]  ? kasan_atomics_helper+0x1f43/0x5450
[   28.056011]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.056038]  ? kasan_atomics_helper+0x1f43/0x5450
[   28.056060]  kasan_report+0x141/0x180
[   28.056082]  ? kasan_atomics_helper+0x1f43/0x5450
[   28.056108]  kasan_check_range+0x10c/0x1c0
[   28.056132]  __kasan_check_write+0x18/0x20
[   28.056156]  kasan_atomics_helper+0x1f43/0x5450
[   28.056179]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.056203]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.056228]  ? pick_task_fair+0xce/0x340
[   28.056254]  ? kasan_atomics+0x152/0x310
[   28.056280]  kasan_atomics+0x1dc/0x310
[   28.056303]  ? __pfx_kasan_atomics+0x10/0x10
[   28.056328]  ? __pfx_read_tsc+0x10/0x10
[   28.056350]  ? ktime_get_ts64+0x86/0x230
[   28.056376]  kunit_try_run_case+0x1a5/0x480
[   28.056403]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.056425]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.056454]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.056479]  ? __kthread_parkme+0x82/0x180
[   28.056502]  ? preempt_count_sub+0x50/0x80
[   28.056527]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.056553]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.056581]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.056607]  kthread+0x337/0x6f0
[   28.056628]  ? trace_preempt_on+0x20/0xc0
[   28.056664]  ? __pfx_kthread+0x10/0x10
[   28.056687]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.056710]  ? calculate_sigpending+0x7b/0xa0
[   28.056736]  ? __pfx_kthread+0x10/0x10
[   28.056774]  ret_from_fork+0x116/0x1d0
[   28.056794]  ? __pfx_kthread+0x10/0x10
[   28.056817]  ret_from_fork_asm+0x1a/0x30
[   28.056849]  </TASK>
[   28.056862] 
[   28.064086] Allocated by task 314:
[   28.064294]  kasan_save_stack+0x45/0x70
[   28.064503]  kasan_save_track+0x18/0x40
[   28.064701]  kasan_save_alloc_info+0x3b/0x50
[   28.064945]  __kasan_kmalloc+0xb7/0xc0
[   28.065137]  __kmalloc_cache_noprof+0x189/0x420
[   28.065313]  kasan_atomics+0x95/0x310
[   28.065441]  kunit_try_run_case+0x1a5/0x480
[   28.065581]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.065825]  kthread+0x337/0x6f0
[   28.066000]  ret_from_fork+0x116/0x1d0
[   28.066191]  ret_from_fork_asm+0x1a/0x30
[   28.066387] 
[   28.066473] The buggy address belongs to the object at ffff888103eb9580
[   28.066473]  which belongs to the cache kmalloc-64 of size 64
[   28.066888] The buggy address is located 0 bytes to the right of
[   28.066888]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   28.067356] 
[   28.067461] The buggy address belongs to the physical page:
[   28.067723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   28.068080] flags: 0x200000000000000(node=0|zone=2)
[   28.068391] page_type: f5(slab)
[   28.068532] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.068911] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.069208] page dumped because: kasan: bad access detected
[   28.069372] 
[   28.069435] Memory state around the buggy address:
[   28.069747]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.070170]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.070379] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.070585]                                      ^
[   28.070858]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.071185]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.071492] ==================================================================
[   27.880171] ==================================================================
[   27.880526] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   27.881193] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.881526] 
[   27.881647] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.881712] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.881727] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.881752] Call Trace:
[   27.881773]  <TASK>
[   27.881815]  dump_stack_lvl+0x73/0xb0
[   27.881864]  print_report+0xd1/0x610
[   27.881901]  ? __virt_addr_valid+0x1db/0x2d0
[   27.881940]  ? kasan_atomics_helper+0x1a7f/0x5450
[   27.881988]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.882028]  ? kasan_atomics_helper+0x1a7f/0x5450
[   27.882070]  kasan_report+0x141/0x180
[   27.882106]  ? kasan_atomics_helper+0x1a7f/0x5450
[   27.882159]  kasan_check_range+0x10c/0x1c0
[   27.882208]  __kasan_check_write+0x18/0x20
[   27.882232]  kasan_atomics_helper+0x1a7f/0x5450
[   27.882255]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.882278]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.882304]  ? pick_task_fair+0xce/0x340
[   27.882330]  ? kasan_atomics+0x152/0x310
[   27.882357]  kasan_atomics+0x1dc/0x310
[   27.882380]  ? __pfx_kasan_atomics+0x10/0x10
[   27.882405]  ? __pfx_read_tsc+0x10/0x10
[   27.882428]  ? ktime_get_ts64+0x86/0x230
[   27.882454]  kunit_try_run_case+0x1a5/0x480
[   27.882479]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.882501]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.882528]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.882563]  ? __kthread_parkme+0x82/0x180
[   27.882586]  ? preempt_count_sub+0x50/0x80
[   27.882611]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.882633]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.882669]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.882696]  kthread+0x337/0x6f0
[   27.882718]  ? trace_preempt_on+0x20/0xc0
[   27.882743]  ? __pfx_kthread+0x10/0x10
[   27.882776]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.882798]  ? calculate_sigpending+0x7b/0xa0
[   27.882824]  ? __pfx_kthread+0x10/0x10
[   27.882858]  ret_from_fork+0x116/0x1d0
[   27.882878]  ? __pfx_kthread+0x10/0x10
[   27.882899]  ret_from_fork_asm+0x1a/0x30
[   27.882931]  </TASK>
[   27.882943] 
[   27.890969] Allocated by task 314:
[   27.891116]  kasan_save_stack+0x45/0x70
[   27.891951]  kasan_save_track+0x18/0x40
[   27.893525]  kasan_save_alloc_info+0x3b/0x50
[   27.893725]  __kasan_kmalloc+0xb7/0xc0
[   27.893937]  __kmalloc_cache_noprof+0x189/0x420
[   27.894215]  kasan_atomics+0x95/0x310
[   27.894453]  kunit_try_run_case+0x1a5/0x480
[   27.894606]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.894871]  kthread+0x337/0x6f0
[   27.895026]  ret_from_fork+0x116/0x1d0
[   27.895233]  ret_from_fork_asm+0x1a/0x30
[   27.895462] 
[   27.895554] The buggy address belongs to the object at ffff888103eb9580
[   27.895554]  which belongs to the cache kmalloc-64 of size 64
[   27.896096] The buggy address is located 0 bytes to the right of
[   27.896096]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.896448] 
[   27.896533] The buggy address belongs to the physical page:
[   27.896795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.897382] flags: 0x200000000000000(node=0|zone=2)
[   27.897553] page_type: f5(slab)
[   27.897706] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.898135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.898510] page dumped because: kasan: bad access detected
[   27.898765] 
[   27.898831] Memory state around the buggy address:
[   27.900243]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.900508]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.901541] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.901850]                                      ^
[   27.902007]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.902582]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.903125] ==================================================================
[   27.963106] ==================================================================
[   27.963479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   27.963874] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.964208] 
[   27.964323] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.964378] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.964393] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.964418] Call Trace:
[   27.964438]  <TASK>
[   27.964459]  dump_stack_lvl+0x73/0xb0
[   27.964490]  print_report+0xd1/0x610
[   27.964514]  ? __virt_addr_valid+0x1db/0x2d0
[   27.964539]  ? kasan_atomics_helper+0x1ce1/0x5450
[   27.964561]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.964588]  ? kasan_atomics_helper+0x1ce1/0x5450
[   27.964610]  kasan_report+0x141/0x180
[   27.964634]  ? kasan_atomics_helper+0x1ce1/0x5450
[   27.964671]  kasan_check_range+0x10c/0x1c0
[   27.964695]  __kasan_check_write+0x18/0x20
[   27.964719]  kasan_atomics_helper+0x1ce1/0x5450
[   27.964763]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.964785]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.964811]  ? pick_task_fair+0xce/0x340
[   27.964837]  ? kasan_atomics+0x152/0x310
[   27.964864]  kasan_atomics+0x1dc/0x310
[   27.964888]  ? __pfx_kasan_atomics+0x10/0x10
[   27.964912]  ? __pfx_read_tsc+0x10/0x10
[   27.964935]  ? ktime_get_ts64+0x86/0x230
[   27.964961]  kunit_try_run_case+0x1a5/0x480
[   27.964985]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.965008]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.965033]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.965059]  ? __kthread_parkme+0x82/0x180
[   27.965081]  ? preempt_count_sub+0x50/0x80
[   27.965106]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.965129]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.965155]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.965182]  kthread+0x337/0x6f0
[   27.965203]  ? trace_preempt_on+0x20/0xc0
[   27.965228]  ? __pfx_kthread+0x10/0x10
[   27.965249]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.965274]  ? calculate_sigpending+0x7b/0xa0
[   27.965299]  ? __pfx_kthread+0x10/0x10
[   27.965322]  ret_from_fork+0x116/0x1d0
[   27.965343]  ? __pfx_kthread+0x10/0x10
[   27.965364]  ret_from_fork_asm+0x1a/0x30
[   27.965396]  </TASK>
[   27.965409] 
[   27.972748] Allocated by task 314:
[   27.972900]  kasan_save_stack+0x45/0x70
[   27.973104]  kasan_save_track+0x18/0x40
[   27.973298]  kasan_save_alloc_info+0x3b/0x50
[   27.973471]  __kasan_kmalloc+0xb7/0xc0
[   27.973631]  __kmalloc_cache_noprof+0x189/0x420
[   27.973866]  kasan_atomics+0x95/0x310
[   27.974029]  kunit_try_run_case+0x1a5/0x480
[   27.974203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.974406]  kthread+0x337/0x6f0
[   27.974575]  ret_from_fork+0x116/0x1d0
[   27.974757]  ret_from_fork_asm+0x1a/0x30
[   27.974951] 
[   27.975027] The buggy address belongs to the object at ffff888103eb9580
[   27.975027]  which belongs to the cache kmalloc-64 of size 64
[   27.975494] The buggy address is located 0 bytes to the right of
[   27.975494]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.976013] 
[   27.976092] The buggy address belongs to the physical page:
[   27.976316] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.976551] flags: 0x200000000000000(node=0|zone=2)
[   27.976719] page_type: f5(slab)
[   27.976855] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.977083] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.977322] page dumped because: kasan: bad access detected
[   27.977564] 
[   27.977660] Memory state around the buggy address:
[   27.977897]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.978219]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.978545] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.978899]                                      ^
[   27.979119]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.979427]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.979683] ==================================================================
[   28.127538] ==================================================================
[   28.127864] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   28.128205] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   28.128516] 
[   28.128625] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   28.128689] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   28.128703] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.128729] Call Trace:
[   28.128749]  <TASK>
[   28.128768]  dump_stack_lvl+0x73/0xb0
[   28.128801]  print_report+0xd1/0x610
[   28.128826]  ? __virt_addr_valid+0x1db/0x2d0
[   28.128851]  ? kasan_atomics_helper+0x20c8/0x5450
[   28.128872]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.128898]  ? kasan_atomics_helper+0x20c8/0x5450
[   28.128921]  kasan_report+0x141/0x180
[   28.128944]  ? kasan_atomics_helper+0x20c8/0x5450
[   28.128970]  kasan_check_range+0x10c/0x1c0
[   28.128995]  __kasan_check_write+0x18/0x20
[   28.129019]  kasan_atomics_helper+0x20c8/0x5450
[   28.129042]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.129065]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.129089]  ? pick_task_fair+0xce/0x340
[   28.129115]  ? kasan_atomics+0x152/0x310
[   28.129142]  kasan_atomics+0x1dc/0x310
[   28.129165]  ? __pfx_kasan_atomics+0x10/0x10
[   28.129190]  ? __pfx_read_tsc+0x10/0x10
[   28.129213]  ? ktime_get_ts64+0x86/0x230
[   28.129237]  kunit_try_run_case+0x1a5/0x480
[   28.129261]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.129283]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.129307]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.129332]  ? __kthread_parkme+0x82/0x180
[   28.129354]  ? preempt_count_sub+0x50/0x80
[   28.129379]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.129402]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.129428]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.129455]  kthread+0x337/0x6f0
[   28.129476]  ? trace_preempt_on+0x20/0xc0
[   28.129500]  ? __pfx_kthread+0x10/0x10
[   28.129522]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.129545]  ? calculate_sigpending+0x7b/0xa0
[   28.129570]  ? __pfx_kthread+0x10/0x10
[   28.129592]  ret_from_fork+0x116/0x1d0
[   28.129612]  ? __pfx_kthread+0x10/0x10
[   28.129634]  ret_from_fork_asm+0x1a/0x30
[   28.129678]  </TASK>
[   28.129689] 
[   28.136611] Allocated by task 314:
[   28.136895]  kasan_save_stack+0x45/0x70
[   28.137101]  kasan_save_track+0x18/0x40
[   28.137285]  kasan_save_alloc_info+0x3b/0x50
[   28.137494]  __kasan_kmalloc+0xb7/0xc0
[   28.137685]  __kmalloc_cache_noprof+0x189/0x420
[   28.138101]  kasan_atomics+0x95/0x310
[   28.138288]  kunit_try_run_case+0x1a5/0x480
[   28.138489]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.138698]  kthread+0x337/0x6f0
[   28.138955]  ret_from_fork+0x116/0x1d0
[   28.139119]  ret_from_fork_asm+0x1a/0x30
[   28.139285] 
[   28.139365] The buggy address belongs to the object at ffff888103eb9580
[   28.139365]  which belongs to the cache kmalloc-64 of size 64
[   28.139894] The buggy address is located 0 bytes to the right of
[   28.139894]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   28.140384] 
[   28.140480] The buggy address belongs to the physical page:
[   28.140669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   28.141082] flags: 0x200000000000000(node=0|zone=2)
[   28.141292] page_type: f5(slab)
[   28.141434] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.141768] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.142053] page dumped because: kasan: bad access detected
[   28.142266] 
[   28.142330] Memory state around the buggy address:
[   28.142532]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.142864]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.143130] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.143386]                                      ^
[   28.143594]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.143888]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.144164] ==================================================================
[   27.707931] ==================================================================
[   27.708217] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   27.708574] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.708977] 
[   27.709085] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.709152] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.709167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.709204] Call Trace:
[   27.709225]  <TASK>
[   27.709247]  dump_stack_lvl+0x73/0xb0
[   27.709282]  print_report+0xd1/0x610
[   27.709315]  ? __virt_addr_valid+0x1db/0x2d0
[   27.709340]  ? kasan_atomics_helper+0x164f/0x5450
[   27.709374]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.709401]  ? kasan_atomics_helper+0x164f/0x5450
[   27.709424]  kasan_report+0x141/0x180
[   27.709456]  ? kasan_atomics_helper+0x164f/0x5450
[   27.709482]  kasan_check_range+0x10c/0x1c0
[   27.709507]  __kasan_check_write+0x18/0x20
[   27.709541]  kasan_atomics_helper+0x164f/0x5450
[   27.709565]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.709587]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.709612]  ? pick_task_fair+0xce/0x340
[   27.709637]  ? kasan_atomics+0x152/0x310
[   27.709672]  kasan_atomics+0x1dc/0x310
[   27.709696]  ? __pfx_kasan_atomics+0x10/0x10
[   27.709731]  ? __pfx_read_tsc+0x10/0x10
[   27.709754]  ? ktime_get_ts64+0x86/0x230
[   27.709780]  kunit_try_run_case+0x1a5/0x480
[   27.709815]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.709852]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.709877]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.709903]  ? __kthread_parkme+0x82/0x180
[   27.709926]  ? preempt_count_sub+0x50/0x80
[   27.709960]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.709982]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.710018]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.710051]  kthread+0x337/0x6f0
[   27.710072]  ? trace_preempt_on+0x20/0xc0
[   27.710097]  ? __pfx_kthread+0x10/0x10
[   27.710120]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.710142]  ? calculate_sigpending+0x7b/0xa0
[   27.710177]  ? __pfx_kthread+0x10/0x10
[   27.710200]  ret_from_fork+0x116/0x1d0
[   27.710219]  ? __pfx_kthread+0x10/0x10
[   27.710252]  ret_from_fork_asm+0x1a/0x30
[   27.710285]  </TASK>
[   27.710298] 
[   27.721519] Allocated by task 314:
[   27.722109]  kasan_save_stack+0x45/0x70
[   27.722318]  kasan_save_track+0x18/0x40
[   27.722456]  kasan_save_alloc_info+0x3b/0x50
[   27.722602]  __kasan_kmalloc+0xb7/0xc0
[   27.723012]  __kmalloc_cache_noprof+0x189/0x420
[   27.723436]  kasan_atomics+0x95/0x310
[   27.723818]  kunit_try_run_case+0x1a5/0x480
[   27.724214]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.724668]  kthread+0x337/0x6f0
[   27.724996]  ret_from_fork+0x116/0x1d0
[   27.725292]  ret_from_fork_asm+0x1a/0x30
[   27.725431] 
[   27.725498] The buggy address belongs to the object at ffff888103eb9580
[   27.725498]  which belongs to the cache kmalloc-64 of size 64
[   27.726241] The buggy address is located 0 bytes to the right of
[   27.726241]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.727355] 
[   27.727521] The buggy address belongs to the physical page:
[   27.727938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.728241] flags: 0x200000000000000(node=0|zone=2)
[   27.728405] page_type: f5(slab)
[   27.728525] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.728795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.729435] page dumped because: kasan: bad access detected
[   27.729944] 
[   27.730122] Memory state around the buggy address:
[   27.730549]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.730992]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.731205] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.731412]                                      ^
[   27.731562]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.731860]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.732210] ==================================================================
[   26.919921] ==================================================================
[   26.920257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   26.920665] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   26.921000] 
[   26.921418] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   26.921497] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.921513] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.921553] Call Trace:
[   26.921588]  <TASK>
[   26.921611]  dump_stack_lvl+0x73/0xb0
[   26.921644]  print_report+0xd1/0x610
[   26.921681]  ? __virt_addr_valid+0x1db/0x2d0
[   26.921707]  ? kasan_atomics_helper+0x4a0/0x5450
[   26.921729]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.921755]  ? kasan_atomics_helper+0x4a0/0x5450
[   26.921777]  kasan_report+0x141/0x180
[   26.921800]  ? kasan_atomics_helper+0x4a0/0x5450
[   26.921826]  kasan_check_range+0x10c/0x1c0
[   26.921865]  __kasan_check_write+0x18/0x20
[   26.921889]  kasan_atomics_helper+0x4a0/0x5450
[   26.921913]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.921936]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.922020]  ? pick_task_fair+0xce/0x340
[   26.922053]  ? kasan_atomics+0x152/0x310
[   26.922081]  kasan_atomics+0x1dc/0x310
[   26.922104]  ? __pfx_kasan_atomics+0x10/0x10
[   26.922130]  ? __pfx_read_tsc+0x10/0x10
[   26.922152]  ? ktime_get_ts64+0x86/0x230
[   26.922178]  kunit_try_run_case+0x1a5/0x480
[   26.922202]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.922224]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.922249]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.922275]  ? __kthread_parkme+0x82/0x180
[   26.922297]  ? preempt_count_sub+0x50/0x80
[   26.922323]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.922346]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.922376]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.922402]  kthread+0x337/0x6f0
[   26.922424]  ? trace_preempt_on+0x20/0xc0
[   26.922448]  ? __pfx_kthread+0x10/0x10
[   26.922470]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.922494]  ? calculate_sigpending+0x7b/0xa0
[   26.922520]  ? __pfx_kthread+0x10/0x10
[   26.922543]  ret_from_fork+0x116/0x1d0
[   26.922564]  ? __pfx_kthread+0x10/0x10
[   26.922586]  ret_from_fork_asm+0x1a/0x30
[   26.922619]  </TASK>
[   26.922632] 
[   26.933795] Allocated by task 314:
[   26.934049]  kasan_save_stack+0x45/0x70
[   26.934335]  kasan_save_track+0x18/0x40
[   26.934521]  kasan_save_alloc_info+0x3b/0x50
[   26.934771]  __kasan_kmalloc+0xb7/0xc0
[   26.934906]  __kmalloc_cache_noprof+0x189/0x420
[   26.935257]  kasan_atomics+0x95/0x310
[   26.935461]  kunit_try_run_case+0x1a5/0x480
[   26.935624]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.935801]  kthread+0x337/0x6f0
[   26.936042]  ret_from_fork+0x116/0x1d0
[   26.936281]  ret_from_fork_asm+0x1a/0x30
[   26.936428] 
[   26.936539] The buggy address belongs to the object at ffff888103eb9580
[   26.936539]  which belongs to the cache kmalloc-64 of size 64
[   26.937109] The buggy address is located 0 bytes to the right of
[   26.937109]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   26.937556] 
[   26.937651] The buggy address belongs to the physical page:
[   26.938298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   26.938692] flags: 0x200000000000000(node=0|zone=2)
[   26.938854] page_type: f5(slab)
[   26.939144] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.939507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.939875] page dumped because: kasan: bad access detected
[   26.940219] 
[   26.940318] Memory state around the buggy address:
[   26.940480]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.940742]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.941079] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.941432]                                      ^
[   26.941626]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.942113]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.942685] ==================================================================
[   27.163681] ==================================================================
[   27.164178] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   27.164436] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.164859] 
[   27.164951] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.165008] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.165023] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.165049] Call Trace:
[   27.165070]  <TASK>
[   27.165092]  dump_stack_lvl+0x73/0xb0
[   27.165123]  print_report+0xd1/0x610
[   27.165148]  ? __virt_addr_valid+0x1db/0x2d0
[   27.165173]  ? kasan_atomics_helper+0xa2b/0x5450
[   27.165194]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.165221]  ? kasan_atomics_helper+0xa2b/0x5450
[   27.165248]  kasan_report+0x141/0x180
[   27.165273]  ? kasan_atomics_helper+0xa2b/0x5450
[   27.165300]  kasan_check_range+0x10c/0x1c0
[   27.165326]  __kasan_check_write+0x18/0x20
[   27.165362]  kasan_atomics_helper+0xa2b/0x5450
[   27.165386]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.165408]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.165458]  ? pick_task_fair+0xce/0x340
[   27.165487]  ? kasan_atomics+0x152/0x310
[   27.165515]  kasan_atomics+0x1dc/0x310
[   27.165540]  ? __pfx_kasan_atomics+0x10/0x10
[   27.165565]  ? __pfx_read_tsc+0x10/0x10
[   27.165587]  ? ktime_get_ts64+0x86/0x230
[   27.165613]  kunit_try_run_case+0x1a5/0x480
[   27.165638]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.165671]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.165697]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.165722]  ? __kthread_parkme+0x82/0x180
[   27.165754]  ? preempt_count_sub+0x50/0x80
[   27.165799]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.165823]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.165849]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.165876]  kthread+0x337/0x6f0
[   27.165897]  ? trace_preempt_on+0x20/0xc0
[   27.165922]  ? __pfx_kthread+0x10/0x10
[   27.165963]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.165986]  ? calculate_sigpending+0x7b/0xa0
[   27.166010]  ? __pfx_kthread+0x10/0x10
[   27.166033]  ret_from_fork+0x116/0x1d0
[   27.166079]  ? __pfx_kthread+0x10/0x10
[   27.166100]  ret_from_fork_asm+0x1a/0x30
[   27.166132]  </TASK>
[   27.166145] 
[   27.174231] Allocated by task 314:
[   27.174381]  kasan_save_stack+0x45/0x70
[   27.174613]  kasan_save_track+0x18/0x40
[   27.174908]  kasan_save_alloc_info+0x3b/0x50
[   27.175149]  __kasan_kmalloc+0xb7/0xc0
[   27.175335]  __kmalloc_cache_noprof+0x189/0x420
[   27.175497]  kasan_atomics+0x95/0x310
[   27.175619]  kunit_try_run_case+0x1a5/0x480
[   27.175921]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.176203]  kthread+0x337/0x6f0
[   27.176345]  ret_from_fork+0x116/0x1d0
[   27.176474]  ret_from_fork_asm+0x1a/0x30
[   27.176604] 
[   27.176689] The buggy address belongs to the object at ffff888103eb9580
[   27.176689]  which belongs to the cache kmalloc-64 of size 64
[   27.177643] The buggy address is located 0 bytes to the right of
[   27.177643]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.178160] 
[   27.178297] The buggy address belongs to the physical page:
[   27.178458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.178751] flags: 0x200000000000000(node=0|zone=2)
[   27.179109] page_type: f5(slab)
[   27.179457] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.179711] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.179947] page dumped because: kasan: bad access detected
[   27.180282] 
[   27.180453] Memory state around the buggy address:
[   27.180740]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.180950]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.181164] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.181366]                                      ^
[   27.181511]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.181816]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.182284] ==================================================================
[   27.309065] ==================================================================
[   27.309595] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   27.310063] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.310617] 
[   27.310765] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.310834] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.310848] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.310875] Call Trace:
[   27.310900]  <TASK>
[   27.310919]  dump_stack_lvl+0x73/0xb0
[   27.310956]  print_report+0xd1/0x610
[   27.310979]  ? __virt_addr_valid+0x1db/0x2d0
[   27.311014]  ? kasan_atomics_helper+0xde0/0x5450
[   27.311035]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.311073]  ? kasan_atomics_helper+0xde0/0x5450
[   27.311096]  kasan_report+0x141/0x180
[   27.311118]  ? kasan_atomics_helper+0xde0/0x5450
[   27.311144]  kasan_check_range+0x10c/0x1c0
[   27.311168]  __kasan_check_write+0x18/0x20
[   27.311192]  kasan_atomics_helper+0xde0/0x5450
[   27.311216]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.311238]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.311263]  ? pick_task_fair+0xce/0x340
[   27.311289]  ? kasan_atomics+0x152/0x310
[   27.311315]  kasan_atomics+0x1dc/0x310
[   27.311338]  ? __pfx_kasan_atomics+0x10/0x10
[   27.311363]  ? __pfx_read_tsc+0x10/0x10
[   27.311385]  ? ktime_get_ts64+0x86/0x230
[   27.311410]  kunit_try_run_case+0x1a5/0x480
[   27.311434]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.311455]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.311481]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.311505]  ? __kthread_parkme+0x82/0x180
[   27.311527]  ? preempt_count_sub+0x50/0x80
[   27.311552]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.311575]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.311600]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.311626]  kthread+0x337/0x6f0
[   27.311647]  ? trace_preempt_on+0x20/0xc0
[   27.311680]  ? __pfx_kthread+0x10/0x10
[   27.311702]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.311734]  ? calculate_sigpending+0x7b/0xa0
[   27.311771]  ? __pfx_kthread+0x10/0x10
[   27.311794]  ret_from_fork+0x116/0x1d0
[   27.311824]  ? __pfx_kthread+0x10/0x10
[   27.311846]  ret_from_fork_asm+0x1a/0x30
[   27.311877]  </TASK>
[   27.311889] 
[   27.322365] Allocated by task 314:
[   27.322695]  kasan_save_stack+0x45/0x70
[   27.322904]  kasan_save_track+0x18/0x40
[   27.323210]  kasan_save_alloc_info+0x3b/0x50
[   27.323421]  __kasan_kmalloc+0xb7/0xc0
[   27.323710]  __kmalloc_cache_noprof+0x189/0x420
[   27.323945]  kasan_atomics+0x95/0x310
[   27.324244]  kunit_try_run_case+0x1a5/0x480
[   27.324532]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.324739]  kthread+0x337/0x6f0
[   27.325141]  ret_from_fork+0x116/0x1d0
[   27.325331]  ret_from_fork_asm+0x1a/0x30
[   27.325680] 
[   27.325808] The buggy address belongs to the object at ffff888103eb9580
[   27.325808]  which belongs to the cache kmalloc-64 of size 64
[   27.326469] The buggy address is located 0 bytes to the right of
[   27.326469]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.326971] 
[   27.327263] The buggy address belongs to the physical page:
[   27.327563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.327938] flags: 0x200000000000000(node=0|zone=2)
[   27.328310] page_type: f5(slab)
[   27.328661] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.329029] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.329398] page dumped because: kasan: bad access detected
[   27.329646] 
[   27.329891] Memory state around the buggy address:
[   27.330170]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.330482]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.330889] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.331293]                                      ^
[   27.331461]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.331947]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.332246] ==================================================================
[   27.437416] ==================================================================
[   27.437823] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   27.438214] Read of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.438529] 
[   27.438661] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.438717] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.438756] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.438782] Call Trace:
[   27.438803]  <TASK>
[   27.438837]  dump_stack_lvl+0x73/0xb0
[   27.438869]  print_report+0xd1/0x610
[   27.438903]  ? __virt_addr_valid+0x1db/0x2d0
[   27.438937]  ? kasan_atomics_helper+0x4a1c/0x5450
[   27.438959]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.438996]  ? kasan_atomics_helper+0x4a1c/0x5450
[   27.439019]  kasan_report+0x141/0x180
[   27.439041]  ? kasan_atomics_helper+0x4a1c/0x5450
[   27.439068]  __asan_report_load4_noabort+0x18/0x20
[   27.439093]  kasan_atomics_helper+0x4a1c/0x5450
[   27.439116]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.439139]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.439164]  ? pick_task_fair+0xce/0x340
[   27.439191]  ? kasan_atomics+0x152/0x310
[   27.439226]  kasan_atomics+0x1dc/0x310
[   27.439249]  ? __pfx_kasan_atomics+0x10/0x10
[   27.439285]  ? __pfx_read_tsc+0x10/0x10
[   27.439308]  ? ktime_get_ts64+0x86/0x230
[   27.439334]  kunit_try_run_case+0x1a5/0x480
[   27.439359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.439390]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.439417]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.439452]  ? __kthread_parkme+0x82/0x180
[   27.439475]  ? preempt_count_sub+0x50/0x80
[   27.439500]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.439523]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.439550]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.439578]  kthread+0x337/0x6f0
[   27.439599]  ? trace_preempt_on+0x20/0xc0
[   27.439623]  ? __pfx_kthread+0x10/0x10
[   27.439645]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.439675]  ? calculate_sigpending+0x7b/0xa0
[   27.439701]  ? __pfx_kthread+0x10/0x10
[   27.439741]  ret_from_fork+0x116/0x1d0
[   27.439762]  ? __pfx_kthread+0x10/0x10
[   27.439784]  ret_from_fork_asm+0x1a/0x30
[   27.439825]  </TASK>
[   27.439838] 
[   27.447242] Allocated by task 314:
[   27.447437]  kasan_save_stack+0x45/0x70
[   27.447591]  kasan_save_track+0x18/0x40
[   27.447745]  kasan_save_alloc_info+0x3b/0x50
[   27.447890]  __kasan_kmalloc+0xb7/0xc0
[   27.448104]  __kmalloc_cache_noprof+0x189/0x420
[   27.448324]  kasan_atomics+0x95/0x310
[   27.448504]  kunit_try_run_case+0x1a5/0x480
[   27.448713]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.448979]  kthread+0x337/0x6f0
[   27.449144]  ret_from_fork+0x116/0x1d0
[   27.449290]  ret_from_fork_asm+0x1a/0x30
[   27.449424] 
[   27.449490] The buggy address belongs to the object at ffff888103eb9580
[   27.449490]  which belongs to the cache kmalloc-64 of size 64
[   27.450050] The buggy address is located 0 bytes to the right of
[   27.450050]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.450510] 
[   27.450580] The buggy address belongs to the physical page:
[   27.450781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.451033] flags: 0x200000000000000(node=0|zone=2)
[   27.451262] page_type: f5(slab)
[   27.451450] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.451824] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.452127] page dumped because: kasan: bad access detected
[   27.452291] 
[   27.452353] Memory state around the buggy address:
[   27.452502]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.452777]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.453093] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.453432]                                      ^
[   27.453691]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.454062]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.454373] ==================================================================
[   27.586199] ==================================================================
[   27.586484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   27.586901] Read of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.587244] 
[   27.587377] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.587434] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.587451] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.587477] Call Trace:
[   27.587499]  <TASK>
[   27.587522]  dump_stack_lvl+0x73/0xb0
[   27.587556]  print_report+0xd1/0x610
[   27.587580]  ? __virt_addr_valid+0x1db/0x2d0
[   27.587606]  ? kasan_atomics_helper+0x4eae/0x5450
[   27.587639]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.587682]  ? kasan_atomics_helper+0x4eae/0x5450
[   27.587705]  kasan_report+0x141/0x180
[   27.587728]  ? kasan_atomics_helper+0x4eae/0x5450
[   27.587755]  __asan_report_load8_noabort+0x18/0x20
[   27.587781]  kasan_atomics_helper+0x4eae/0x5450
[   27.587804]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.587827]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.587861]  ? pick_task_fair+0xce/0x340
[   27.587906]  ? kasan_atomics+0x152/0x310
[   27.587943]  kasan_atomics+0x1dc/0x310
[   27.587968]  ? __pfx_kasan_atomics+0x10/0x10
[   27.587992]  ? __pfx_read_tsc+0x10/0x10
[   27.588015]  ? ktime_get_ts64+0x86/0x230
[   27.588040]  kunit_try_run_case+0x1a5/0x480
[   27.588065]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.588086]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.588121]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.588146]  ? __kthread_parkme+0x82/0x180
[   27.588179]  ? preempt_count_sub+0x50/0x80
[   27.588204]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.588228]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.588254]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.588280]  kthread+0x337/0x6f0
[   27.588301]  ? trace_preempt_on+0x20/0xc0
[   27.588335]  ? __pfx_kthread+0x10/0x10
[   27.588357]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.588380]  ? calculate_sigpending+0x7b/0xa0
[   27.588416]  ? __pfx_kthread+0x10/0x10
[   27.588438]  ret_from_fork+0x116/0x1d0
[   27.588458]  ? __pfx_kthread+0x10/0x10
[   27.588480]  ret_from_fork_asm+0x1a/0x30
[   27.588512]  </TASK>
[   27.588526] 
[   27.597705] Allocated by task 314:
[   27.597896]  kasan_save_stack+0x45/0x70
[   27.598104]  kasan_save_track+0x18/0x40
[   27.598286]  kasan_save_alloc_info+0x3b/0x50
[   27.598476]  __kasan_kmalloc+0xb7/0xc0
[   27.598645]  __kmalloc_cache_noprof+0x189/0x420
[   27.598809]  kasan_atomics+0x95/0x310
[   27.598939]  kunit_try_run_case+0x1a5/0x480
[   27.599121]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.599412]  kthread+0x337/0x6f0
[   27.599586]  ret_from_fork+0x116/0x1d0
[   27.599868]  ret_from_fork_asm+0x1a/0x30
[   27.600042] 
[   27.600107] The buggy address belongs to the object at ffff888103eb9580
[   27.600107]  which belongs to the cache kmalloc-64 of size 64
[   27.600450] The buggy address is located 0 bytes to the right of
[   27.600450]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.601054] 
[   27.601156] The buggy address belongs to the physical page:
[   27.601557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.602050] flags: 0x200000000000000(node=0|zone=2)
[   27.602850] page_type: f5(slab)
[   27.603038] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.603549] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.603995] page dumped because: kasan: bad access detected
[   27.604340] 
[   27.604439] Memory state around the buggy address:
[   27.604995]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.605364]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.605771] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.606344]                                      ^
[   27.606695]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.607222]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.607627] ==================================================================
[   28.028197] ==================================================================
[   28.028522] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   28.029144] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   28.029461] 
[   28.029570] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   28.029626] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   28.029641] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.029678] Call Trace:
[   28.029700]  <TASK>
[   28.029722]  dump_stack_lvl+0x73/0xb0
[   28.029972]  print_report+0xd1/0x610
[   28.030000]  ? __virt_addr_valid+0x1db/0x2d0
[   28.030026]  ? kasan_atomics_helper+0x1eaa/0x5450
[   28.030054]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.030249]  ? kasan_atomics_helper+0x1eaa/0x5450
[   28.030284]  kasan_report+0x141/0x180
[   28.030309]  ? kasan_atomics_helper+0x1eaa/0x5450
[   28.030336]  kasan_check_range+0x10c/0x1c0
[   28.030360]  __kasan_check_write+0x18/0x20
[   28.030384]  kasan_atomics_helper+0x1eaa/0x5450
[   28.030407]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.030430]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.030454]  ? pick_task_fair+0xce/0x340
[   28.030481]  ? kasan_atomics+0x152/0x310
[   28.030508]  kasan_atomics+0x1dc/0x310
[   28.030531]  ? __pfx_kasan_atomics+0x10/0x10
[   28.030556]  ? __pfx_read_tsc+0x10/0x10
[   28.030578]  ? ktime_get_ts64+0x86/0x230
[   28.030604]  kunit_try_run_case+0x1a5/0x480
[   28.030628]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.030649]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.030688]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.030713]  ? __kthread_parkme+0x82/0x180
[   28.030735]  ? preempt_count_sub+0x50/0x80
[   28.030772]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.030795]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.030822]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.030849]  kthread+0x337/0x6f0
[   28.030870]  ? trace_preempt_on+0x20/0xc0
[   28.030895]  ? __pfx_kthread+0x10/0x10
[   28.030917]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.030941]  ? calculate_sigpending+0x7b/0xa0
[   28.030966]  ? __pfx_kthread+0x10/0x10
[   28.030989]  ret_from_fork+0x116/0x1d0
[   28.031009]  ? __pfx_kthread+0x10/0x10
[   28.031031]  ret_from_fork_asm+0x1a/0x30
[   28.031063]  </TASK>
[   28.031077] 
[   28.042153] Allocated by task 314:
[   28.042445]  kasan_save_stack+0x45/0x70
[   28.042824]  kasan_save_track+0x18/0x40
[   28.043013]  kasan_save_alloc_info+0x3b/0x50
[   28.043206]  __kasan_kmalloc+0xb7/0xc0
[   28.043374]  __kmalloc_cache_noprof+0x189/0x420
[   28.043570]  kasan_atomics+0x95/0x310
[   28.043747]  kunit_try_run_case+0x1a5/0x480
[   28.043934]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.044164]  kthread+0x337/0x6f0
[   28.044314]  ret_from_fork+0x116/0x1d0
[   28.044483]  ret_from_fork_asm+0x1a/0x30
[   28.044650] 
[   28.045186] The buggy address belongs to the object at ffff888103eb9580
[   28.045186]  which belongs to the cache kmalloc-64 of size 64
[   28.045966] The buggy address is located 0 bytes to the right of
[   28.045966]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   28.046931] 
[   28.047036] The buggy address belongs to the physical page:
[   28.047440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   28.048108] flags: 0x200000000000000(node=0|zone=2)
[   28.048461] page_type: f5(slab)
[   28.048752] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.049235] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.049544] page dumped because: kasan: bad access detected
[   28.049958] 
[   28.050222] Memory state around the buggy address:
[   28.050485]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.051198]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.051568] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.052017]                                      ^
[   28.052225]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.052507]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.053149] ==================================================================
[   28.072119] ==================================================================
[   28.072428] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   28.072824] Read of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   28.073172] 
[   28.073277] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   28.073332] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   28.073347] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.073373] Call Trace:
[   28.073392]  <TASK>
[   28.073414]  dump_stack_lvl+0x73/0xb0
[   28.073445]  print_report+0xd1/0x610
[   28.073469]  ? __virt_addr_valid+0x1db/0x2d0
[   28.073493]  ? kasan_atomics_helper+0x4f71/0x5450
[   28.073515]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.073541]  ? kasan_atomics_helper+0x4f71/0x5450
[   28.073563]  kasan_report+0x141/0x180
[   28.073586]  ? kasan_atomics_helper+0x4f71/0x5450
[   28.073613]  __asan_report_load8_noabort+0x18/0x20
[   28.073637]  kasan_atomics_helper+0x4f71/0x5450
[   28.073672]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.073695]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.073719]  ? pick_task_fair+0xce/0x340
[   28.073745]  ? kasan_atomics+0x152/0x310
[   28.073772]  kasan_atomics+0x1dc/0x310
[   28.073795]  ? __pfx_kasan_atomics+0x10/0x10
[   28.073819]  ? __pfx_read_tsc+0x10/0x10
[   28.073842]  ? ktime_get_ts64+0x86/0x230
[   28.073868]  kunit_try_run_case+0x1a5/0x480
[   28.073892]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.073914]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.073939]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.073964]  ? __kthread_parkme+0x82/0x180
[   28.073987]  ? preempt_count_sub+0x50/0x80
[   28.074025]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.074053]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.074079]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.074106]  kthread+0x337/0x6f0
[   28.074126]  ? trace_preempt_on+0x20/0xc0
[   28.074151]  ? __pfx_kthread+0x10/0x10
[   28.074173]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.074195]  ? calculate_sigpending+0x7b/0xa0
[   28.074221]  ? __pfx_kthread+0x10/0x10
[   28.074244]  ret_from_fork+0x116/0x1d0
[   28.074264]  ? __pfx_kthread+0x10/0x10
[   28.074286]  ret_from_fork_asm+0x1a/0x30
[   28.074318]  </TASK>
[   28.074329] 
[   28.081546] Allocated by task 314:
[   28.081702]  kasan_save_stack+0x45/0x70
[   28.081910]  kasan_save_track+0x18/0x40
[   28.082103]  kasan_save_alloc_info+0x3b/0x50
[   28.082311]  __kasan_kmalloc+0xb7/0xc0
[   28.082496]  __kmalloc_cache_noprof+0x189/0x420
[   28.082724]  kasan_atomics+0x95/0x310
[   28.082918]  kunit_try_run_case+0x1a5/0x480
[   28.083121]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.083375]  kthread+0x337/0x6f0
[   28.083542]  ret_from_fork+0x116/0x1d0
[   28.083733]  ret_from_fork_asm+0x1a/0x30
[   28.083921] 
[   28.084001] The buggy address belongs to the object at ffff888103eb9580
[   28.084001]  which belongs to the cache kmalloc-64 of size 64
[   28.084385] The buggy address is located 0 bytes to the right of
[   28.084385]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   28.084770] 
[   28.084877] The buggy address belongs to the physical page:
[   28.085120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   28.085465] flags: 0x200000000000000(node=0|zone=2)
[   28.085706] page_type: f5(slab)
[   28.085891] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.086205] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.086452] page dumped because: kasan: bad access detected
[   28.086617] 
[   28.086705] Memory state around the buggy address:
[   28.087101]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.087418]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.087696] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.088014]                                      ^
[   28.088212]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.088494]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.088804] ==================================================================
[   27.333173] ==================================================================
[   27.333745] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   27.334192] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.334425] 
[   27.334513] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.334567] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.334582] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.334607] Call Trace:
[   27.334628]  <TASK>
[   27.334648]  dump_stack_lvl+0x73/0xb0
[   27.334694]  print_report+0xd1/0x610
[   27.334718]  ? __virt_addr_valid+0x1db/0x2d0
[   27.334743]  ? kasan_atomics_helper+0xe78/0x5450
[   27.334765]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.334791]  ? kasan_atomics_helper+0xe78/0x5450
[   27.334812]  kasan_report+0x141/0x180
[   27.334835]  ? kasan_atomics_helper+0xe78/0x5450
[   27.335059]  kasan_check_range+0x10c/0x1c0
[   27.335095]  __kasan_check_write+0x18/0x20
[   27.335120]  kasan_atomics_helper+0xe78/0x5450
[   27.335143]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.335278]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.335306]  ? pick_task_fair+0xce/0x340
[   27.335333]  ? kasan_atomics+0x152/0x310
[   27.335359]  kasan_atomics+0x1dc/0x310
[   27.335382]  ? __pfx_kasan_atomics+0x10/0x10
[   27.335407]  ? __pfx_read_tsc+0x10/0x10
[   27.335429]  ? ktime_get_ts64+0x86/0x230
[   27.335455]  kunit_try_run_case+0x1a5/0x480
[   27.335478]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.335500]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.335525]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.335549]  ? __kthread_parkme+0x82/0x180
[   27.335571]  ? preempt_count_sub+0x50/0x80
[   27.335596]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.335618]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.335644]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.335679]  kthread+0x337/0x6f0
[   27.335701]  ? trace_preempt_on+0x20/0xc0
[   27.335725]  ? __pfx_kthread+0x10/0x10
[   27.335755]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.335777]  ? calculate_sigpending+0x7b/0xa0
[   27.335803]  ? __pfx_kthread+0x10/0x10
[   27.335825]  ret_from_fork+0x116/0x1d0
[   27.335845]  ? __pfx_kthread+0x10/0x10
[   27.335866]  ret_from_fork_asm+0x1a/0x30
[   27.335898]  </TASK>
[   27.335910] 
[   27.346577] Allocated by task 314:
[   27.347045]  kasan_save_stack+0x45/0x70
[   27.347259]  kasan_save_track+0x18/0x40
[   27.347434]  kasan_save_alloc_info+0x3b/0x50
[   27.347624]  __kasan_kmalloc+0xb7/0xc0
[   27.347806]  __kmalloc_cache_noprof+0x189/0x420
[   27.348260]  kasan_atomics+0x95/0x310
[   27.348399]  kunit_try_run_case+0x1a5/0x480
[   27.348721]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.349143]  kthread+0x337/0x6f0
[   27.349276]  ret_from_fork+0x116/0x1d0
[   27.349608]  ret_from_fork_asm+0x1a/0x30
[   27.349820] 
[   27.350073] The buggy address belongs to the object at ffff888103eb9580
[   27.350073]  which belongs to the cache kmalloc-64 of size 64
[   27.350613] The buggy address is located 0 bytes to the right of
[   27.350613]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.351439] 
[   27.351535] The buggy address belongs to the physical page:
[   27.351769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.352333] flags: 0x200000000000000(node=0|zone=2)
[   27.352648] page_type: f5(slab)
[   27.352848] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.353261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.353650] page dumped because: kasan: bad access detected
[   27.354050] 
[   27.354132] Memory state around the buggy address:
[   27.354333]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.354642]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.355165] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.355467]                                      ^
[   27.355818]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.356218]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.356514] ==================================================================
[   27.814779] ==================================================================
[   27.815217] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   27.815600] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.816307] 
[   27.816437] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.816724] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.816755] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.816783] Call Trace:
[   27.816815]  <TASK>
[   27.816837]  dump_stack_lvl+0x73/0xb0
[   27.816872]  print_report+0xd1/0x610
[   27.816896]  ? __virt_addr_valid+0x1db/0x2d0
[   27.816922]  ? kasan_atomics_helper+0x18b1/0x5450
[   27.816946]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.816973]  ? kasan_atomics_helper+0x18b1/0x5450
[   27.816996]  kasan_report+0x141/0x180
[   27.817019]  ? kasan_atomics_helper+0x18b1/0x5450
[   27.817046]  kasan_check_range+0x10c/0x1c0
[   27.817070]  __kasan_check_write+0x18/0x20
[   27.817093]  kasan_atomics_helper+0x18b1/0x5450
[   27.817116]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.817139]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.817164]  ? pick_task_fair+0xce/0x340
[   27.817190]  ? kasan_atomics+0x152/0x310
[   27.817216]  kasan_atomics+0x1dc/0x310
[   27.817239]  ? __pfx_kasan_atomics+0x10/0x10
[   27.817264]  ? __pfx_read_tsc+0x10/0x10
[   27.817287]  ? ktime_get_ts64+0x86/0x230
[   27.817313]  kunit_try_run_case+0x1a5/0x480
[   27.817336]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.817357]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.817382]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.817406]  ? __kthread_parkme+0x82/0x180
[   27.817429]  ? preempt_count_sub+0x50/0x80
[   27.817454]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.817476]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.817503]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.817529]  kthread+0x337/0x6f0
[   27.817550]  ? trace_preempt_on+0x20/0xc0
[   27.817574]  ? __pfx_kthread+0x10/0x10
[   27.817597]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.817619]  ? calculate_sigpending+0x7b/0xa0
[   27.817644]  ? __pfx_kthread+0x10/0x10
[   27.817680]  ret_from_fork+0x116/0x1d0
[   27.817700]  ? __pfx_kthread+0x10/0x10
[   27.817722]  ret_from_fork_asm+0x1a/0x30
[   27.817762]  </TASK>
[   27.817775] 
[   27.829408] Allocated by task 314:
[   27.829626]  kasan_save_stack+0x45/0x70
[   27.830158]  kasan_save_track+0x18/0x40
[   27.830320]  kasan_save_alloc_info+0x3b/0x50
[   27.830739]  __kasan_kmalloc+0xb7/0xc0
[   27.831124]  __kmalloc_cache_noprof+0x189/0x420
[   27.831419]  kasan_atomics+0x95/0x310
[   27.831581]  kunit_try_run_case+0x1a5/0x480
[   27.832006]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.832349]  kthread+0x337/0x6f0
[   27.832615]  ret_from_fork+0x116/0x1d0
[   27.832980]  ret_from_fork_asm+0x1a/0x30
[   27.833265] 
[   27.833368] The buggy address belongs to the object at ffff888103eb9580
[   27.833368]  which belongs to the cache kmalloc-64 of size 64
[   27.834136] The buggy address is located 0 bytes to the right of
[   27.834136]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.834812] 
[   27.835077] The buggy address belongs to the physical page:
[   27.835413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.835875] flags: 0x200000000000000(node=0|zone=2)
[   27.836195] page_type: f5(slab)
[   27.836378] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.836910] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.837342] page dumped because: kasan: bad access detected
[   27.837589] 
[   27.837675] Memory state around the buggy address:
[   27.837930]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.838190]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.838511] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.838829]                                      ^
[   27.839099]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.839402]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.839752] ==================================================================
[   28.241197] ==================================================================
[   28.241470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   28.241789] Read of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   28.242945] 
[   28.243155] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   28.243215] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   28.243230] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.243348] Call Trace:
[   28.243369]  <TASK>
[   28.243390]  dump_stack_lvl+0x73/0xb0
[   28.243428]  print_report+0xd1/0x610
[   28.243452]  ? __virt_addr_valid+0x1db/0x2d0
[   28.243477]  ? kasan_atomics_helper+0x5115/0x5450
[   28.243498]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.243525]  ? kasan_atomics_helper+0x5115/0x5450
[   28.243548]  kasan_report+0x141/0x180
[   28.243570]  ? kasan_atomics_helper+0x5115/0x5450
[   28.243595]  __asan_report_load8_noabort+0x18/0x20
[   28.243620]  kasan_atomics_helper+0x5115/0x5450
[   28.243644]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.243681]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.243705]  ? pick_task_fair+0xce/0x340
[   28.243733]  ? kasan_atomics+0x152/0x310
[   28.243771]  kasan_atomics+0x1dc/0x310
[   28.243795]  ? __pfx_kasan_atomics+0x10/0x10
[   28.243819]  ? __pfx_read_tsc+0x10/0x10
[   28.243842]  ? ktime_get_ts64+0x86/0x230
[   28.243867]  kunit_try_run_case+0x1a5/0x480
[   28.243891]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.243913]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.243939]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.243964]  ? __kthread_parkme+0x82/0x180
[   28.243987]  ? preempt_count_sub+0x50/0x80
[   28.244012]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.244034]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.244060]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.244086]  kthread+0x337/0x6f0
[   28.244108]  ? trace_preempt_on+0x20/0xc0
[   28.244132]  ? __pfx_kthread+0x10/0x10
[   28.244154]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.244177]  ? calculate_sigpending+0x7b/0xa0
[   28.244202]  ? __pfx_kthread+0x10/0x10
[   28.244226]  ret_from_fork+0x116/0x1d0
[   28.244246]  ? __pfx_kthread+0x10/0x10
[   28.244267]  ret_from_fork_asm+0x1a/0x30
[   28.244300]  </TASK>
[   28.244312] 
[   28.254649] Allocated by task 314:
[   28.254827]  kasan_save_stack+0x45/0x70
[   28.255041]  kasan_save_track+0x18/0x40
[   28.255214]  kasan_save_alloc_info+0x3b/0x50
[   28.255399]  __kasan_kmalloc+0xb7/0xc0
[   28.255562]  __kmalloc_cache_noprof+0x189/0x420
[   28.256166]  kasan_atomics+0x95/0x310
[   28.256346]  kunit_try_run_case+0x1a5/0x480
[   28.256681]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.256993]  kthread+0x337/0x6f0
[   28.257300]  ret_from_fork+0x116/0x1d0
[   28.257560]  ret_from_fork_asm+0x1a/0x30
[   28.257742] 
[   28.258026] The buggy address belongs to the object at ffff888103eb9580
[   28.258026]  which belongs to the cache kmalloc-64 of size 64
[   28.258570] The buggy address is located 0 bytes to the right of
[   28.258570]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   28.259390] 
[   28.259497] The buggy address belongs to the physical page:
[   28.259940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   28.260374] flags: 0x200000000000000(node=0|zone=2)
[   28.260606] page_type: f5(slab)
[   28.260771] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.261328] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.261734] page dumped because: kasan: bad access detected
[   28.261992] 
[   28.262232] Memory state around the buggy address:
[   28.262433]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.262950]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.263303] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.263620]                                      ^
[   28.264027]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.264404]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.264818] ==================================================================
[   27.636480] ==================================================================
[   27.637295] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   27.639018] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.640020] 
[   27.640848] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.640918] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.640934] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.640960] Call Trace:
[   27.640983]  <TASK>
[   27.641005]  dump_stack_lvl+0x73/0xb0
[   27.641048]  print_report+0xd1/0x610
[   27.641073]  ? __virt_addr_valid+0x1db/0x2d0
[   27.641098]  ? kasan_atomics_helper+0x50d4/0x5450
[   27.641119]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.641146]  ? kasan_atomics_helper+0x50d4/0x5450
[   27.641168]  kasan_report+0x141/0x180
[   27.641191]  ? kasan_atomics_helper+0x50d4/0x5450
[   27.641217]  __asan_report_store8_noabort+0x1b/0x30
[   27.641241]  kasan_atomics_helper+0x50d4/0x5450
[   27.641265]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.641287]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.641311]  ? pick_task_fair+0xce/0x340
[   27.641337]  ? kasan_atomics+0x152/0x310
[   27.641364]  kasan_atomics+0x1dc/0x310
[   27.641386]  ? __pfx_kasan_atomics+0x10/0x10
[   27.641410]  ? __pfx_read_tsc+0x10/0x10
[   27.641433]  ? ktime_get_ts64+0x86/0x230
[   27.641459]  kunit_try_run_case+0x1a5/0x480
[   27.641483]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.641505]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.641531]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.641556]  ? __kthread_parkme+0x82/0x180
[   27.641579]  ? preempt_count_sub+0x50/0x80
[   27.641604]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.641626]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.641666]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.641692]  kthread+0x337/0x6f0
[   27.641714]  ? trace_preempt_on+0x20/0xc0
[   27.641755]  ? __pfx_kthread+0x10/0x10
[   27.641777]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.641800]  ? calculate_sigpending+0x7b/0xa0
[   27.641825]  ? __pfx_kthread+0x10/0x10
[   27.641848]  ret_from_fork+0x116/0x1d0
[   27.641868]  ? __pfx_kthread+0x10/0x10
[   27.641890]  ret_from_fork_asm+0x1a/0x30
[   27.641923]  </TASK>
[   27.641936] 
[   27.652280] Allocated by task 314:
[   27.652664]  kasan_save_stack+0x45/0x70
[   27.652886]  kasan_save_track+0x18/0x40
[   27.653069]  kasan_save_alloc_info+0x3b/0x50
[   27.653274]  __kasan_kmalloc+0xb7/0xc0
[   27.653459]  __kmalloc_cache_noprof+0x189/0x420
[   27.653648]  kasan_atomics+0x95/0x310
[   27.653877]  kunit_try_run_case+0x1a5/0x480
[   27.654489]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.654806]  kthread+0x337/0x6f0
[   27.655005]  ret_from_fork+0x116/0x1d0
[   27.655307]  ret_from_fork_asm+0x1a/0x30
[   27.655600] 
[   27.655696] The buggy address belongs to the object at ffff888103eb9580
[   27.655696]  which belongs to the cache kmalloc-64 of size 64
[   27.656530] The buggy address is located 0 bytes to the right of
[   27.656530]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.657254] 
[   27.657372] The buggy address belongs to the physical page:
[   27.657788] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.658221] flags: 0x200000000000000(node=0|zone=2)
[   27.658512] page_type: f5(slab)
[   27.658720] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.659110] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.659520] page dumped because: kasan: bad access detected
[   27.659734] 
[   27.659884] Memory state around the buggy address:
[   27.660099]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.660574]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.661006] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.661383]                                      ^
[   27.661568]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.661964]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.662301] ==================================================================
[   27.102539] ==================================================================
[   27.103290] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   27.103692] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.104350] 
[   27.104552] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.104610] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.104626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.104663] Call Trace:
[   27.104695]  <TASK>
[   27.104716]  dump_stack_lvl+0x73/0xb0
[   27.104750]  print_report+0xd1/0x610
[   27.104786]  ? __virt_addr_valid+0x1db/0x2d0
[   27.104821]  ? kasan_atomics_helper+0x8f9/0x5450
[   27.104842]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.104868]  ? kasan_atomics_helper+0x8f9/0x5450
[   27.104899]  kasan_report+0x141/0x180
[   27.104922]  ? kasan_atomics_helper+0x8f9/0x5450
[   27.104948]  kasan_check_range+0x10c/0x1c0
[   27.104982]  __kasan_check_write+0x18/0x20
[   27.105257]  kasan_atomics_helper+0x8f9/0x5450
[   27.105282]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.105307]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.105332]  ? pick_task_fair+0xce/0x340
[   27.105360]  ? kasan_atomics+0x152/0x310
[   27.105387]  kasan_atomics+0x1dc/0x310
[   27.105410]  ? __pfx_kasan_atomics+0x10/0x10
[   27.105435]  ? __pfx_read_tsc+0x10/0x10
[   27.105457]  ? ktime_get_ts64+0x86/0x230
[   27.105483]  kunit_try_run_case+0x1a5/0x480
[   27.105507]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.105529]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.105554]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.105579]  ? __kthread_parkme+0x82/0x180
[   27.105602]  ? preempt_count_sub+0x50/0x80
[   27.105627]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.105650]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.105693]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.105720]  kthread+0x337/0x6f0
[   27.105741]  ? trace_preempt_on+0x20/0xc0
[   27.105766]  ? __pfx_kthread+0x10/0x10
[   27.105788]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.105811]  ? calculate_sigpending+0x7b/0xa0
[   27.105837]  ? __pfx_kthread+0x10/0x10
[   27.105860]  ret_from_fork+0x116/0x1d0
[   27.105881]  ? __pfx_kthread+0x10/0x10
[   27.105902]  ret_from_fork_asm+0x1a/0x30
[   27.105936]  </TASK>
[   27.105948] 
[   27.117031] Allocated by task 314:
[   27.118580]  kasan_save_stack+0x45/0x70
[   27.119287]  kasan_save_track+0x18/0x40
[   27.119905]  kasan_save_alloc_info+0x3b/0x50
[   27.120481]  __kasan_kmalloc+0xb7/0xc0
[   27.120628]  __kmalloc_cache_noprof+0x189/0x420
[   27.121535]  kasan_atomics+0x95/0x310
[   27.122411]  kunit_try_run_case+0x1a5/0x480
[   27.123033]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.123404]  kthread+0x337/0x6f0
[   27.123691]  ret_from_fork+0x116/0x1d0
[   27.124151]  ret_from_fork_asm+0x1a/0x30
[   27.124595] 
[   27.124713] The buggy address belongs to the object at ffff888103eb9580
[   27.124713]  which belongs to the cache kmalloc-64 of size 64
[   27.125098] The buggy address is located 0 bytes to the right of
[   27.125098]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.125469] 
[   27.125538] The buggy address belongs to the physical page:
[   27.125818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.126982] flags: 0x200000000000000(node=0|zone=2)
[   27.127424] page_type: f5(slab)
[   27.127731] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.128438] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.129306] page dumped because: kasan: bad access detected
[   27.129862] 
[   27.130023] Memory state around the buggy address:
[   27.130500]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.131220]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.131866] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.132495]                                      ^
[   27.132946]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.133607]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.134152] ==================================================================
[   26.835906] ==================================================================
[   26.836229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   26.836910] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   26.837382] 
[   26.837640] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   26.837713] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.837729] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.837757] Call Trace:
[   26.837778]  <TASK>
[   26.837801]  dump_stack_lvl+0x73/0xb0
[   26.837834]  print_report+0xd1/0x610
[   26.837858]  ? __virt_addr_valid+0x1db/0x2d0
[   26.837885]  ? kasan_atomics_helper+0x4b6e/0x5450
[   26.837907]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.837933]  ? kasan_atomics_helper+0x4b6e/0x5450
[   26.838080]  kasan_report+0x141/0x180
[   26.838104]  ? kasan_atomics_helper+0x4b6e/0x5450
[   26.838131]  __asan_report_store4_noabort+0x1b/0x30
[   26.838157]  kasan_atomics_helper+0x4b6e/0x5450
[   26.838180]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.838203]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.838227]  ? pick_task_fair+0xce/0x340
[   26.838254]  ? kasan_atomics+0x152/0x310
[   26.838281]  kasan_atomics+0x1dc/0x310
[   26.838305]  ? __pfx_kasan_atomics+0x10/0x10
[   26.838329]  ? __pfx_read_tsc+0x10/0x10
[   26.838352]  ? ktime_get_ts64+0x86/0x230
[   26.838378]  kunit_try_run_case+0x1a5/0x480
[   26.838402]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.838424]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.838451]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.838476]  ? __kthread_parkme+0x82/0x180
[   26.838499]  ? preempt_count_sub+0x50/0x80
[   26.838524]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.838547]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.838574]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.838602]  kthread+0x337/0x6f0
[   26.838624]  ? trace_preempt_on+0x20/0xc0
[   26.838648]  ? __pfx_kthread+0x10/0x10
[   26.838681]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.838704]  ? calculate_sigpending+0x7b/0xa0
[   26.838729]  ? __pfx_kthread+0x10/0x10
[   26.838761]  ret_from_fork+0x116/0x1d0
[   26.838782]  ? __pfx_kthread+0x10/0x10
[   26.838804]  ret_from_fork_asm+0x1a/0x30
[   26.838837]  </TASK>
[   26.838849] 
[   26.849946] Allocated by task 314:
[   26.850181]  kasan_save_stack+0x45/0x70
[   26.850379]  kasan_save_track+0x18/0x40
[   26.850567]  kasan_save_alloc_info+0x3b/0x50
[   26.851478]  __kasan_kmalloc+0xb7/0xc0
[   26.851642]  __kmalloc_cache_noprof+0x189/0x420
[   26.852366]  kasan_atomics+0x95/0x310
[   26.852720]  kunit_try_run_case+0x1a5/0x480
[   26.853718]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.854217]  kthread+0x337/0x6f0
[   26.854356]  ret_from_fork+0x116/0x1d0
[   26.854488]  ret_from_fork_asm+0x1a/0x30
[   26.854625] 
[   26.855228] The buggy address belongs to the object at ffff888103eb9580
[   26.855228]  which belongs to the cache kmalloc-64 of size 64
[   26.857080] The buggy address is located 0 bytes to the right of
[   26.857080]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   26.858093] 
[   26.858215] The buggy address belongs to the physical page:
[   26.858451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   26.859410] flags: 0x200000000000000(node=0|zone=2)
[   26.859609] page_type: f5(slab)
[   26.860040] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.860475] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.860874] page dumped because: kasan: bad access detected
[   26.861133] 
[   26.861428] Memory state around the buggy address:
[   26.861648]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.862237]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.862514] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.863104]                                      ^
[   26.863323]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.863606]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.863941] ==================================================================
[   26.810678] ==================================================================
[   26.811276] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   26.811613] Read of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   26.812089] 
[   26.812190] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   26.812247] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.812262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.812289] Call Trace:
[   26.812310]  <TASK>
[   26.812332]  dump_stack_lvl+0x73/0xb0
[   26.812547]  print_report+0xd1/0x610
[   26.812577]  ? __virt_addr_valid+0x1db/0x2d0
[   26.812603]  ? kasan_atomics_helper+0x4b88/0x5450
[   26.812625]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.812652]  ? kasan_atomics_helper+0x4b88/0x5450
[   26.812686]  kasan_report+0x141/0x180
[   26.812708]  ? kasan_atomics_helper+0x4b88/0x5450
[   26.812735]  __asan_report_load4_noabort+0x18/0x20
[   26.812772]  kasan_atomics_helper+0x4b88/0x5450
[   26.812794]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.812817]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.812842]  ? pick_task_fair+0xce/0x340
[   26.812868]  ? kasan_atomics+0x152/0x310
[   26.812895]  kasan_atomics+0x1dc/0x310
[   26.812918]  ? __pfx_kasan_atomics+0x10/0x10
[   26.812943]  ? __pfx_read_tsc+0x10/0x10
[   26.812974]  ? ktime_get_ts64+0x86/0x230
[   26.813000]  kunit_try_run_case+0x1a5/0x480
[   26.813024]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.813046]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.813073]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.813098]  ? __kthread_parkme+0x82/0x180
[   26.813120]  ? preempt_count_sub+0x50/0x80
[   26.813145]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.813169]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.813195]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.813221]  kthread+0x337/0x6f0
[   26.813242]  ? trace_preempt_on+0x20/0xc0
[   26.813267]  ? __pfx_kthread+0x10/0x10
[   26.813289]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.813312]  ? calculate_sigpending+0x7b/0xa0
[   26.813338]  ? __pfx_kthread+0x10/0x10
[   26.813360]  ret_from_fork+0x116/0x1d0
[   26.813380]  ? __pfx_kthread+0x10/0x10
[   26.813402]  ret_from_fork_asm+0x1a/0x30
[   26.813434]  </TASK>
[   26.813446] 
[   26.824206] Allocated by task 314:
[   26.824386]  kasan_save_stack+0x45/0x70
[   26.824599]  kasan_save_track+0x18/0x40
[   26.825120]  kasan_save_alloc_info+0x3b/0x50
[   26.825390]  __kasan_kmalloc+0xb7/0xc0
[   26.825571]  __kmalloc_cache_noprof+0x189/0x420
[   26.825928]  kasan_atomics+0x95/0x310
[   26.826309]  kunit_try_run_case+0x1a5/0x480
[   26.826521]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.826792]  kthread+0x337/0x6f0
[   26.826946]  ret_from_fork+0x116/0x1d0
[   26.827517]  ret_from_fork_asm+0x1a/0x30
[   26.827692] 
[   26.827879] The buggy address belongs to the object at ffff888103eb9580
[   26.827879]  which belongs to the cache kmalloc-64 of size 64
[   26.828630] The buggy address is located 0 bytes to the right of
[   26.828630]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   26.829468] 
[   26.829579] The buggy address belongs to the physical page:
[   26.830091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   26.830403] flags: 0x200000000000000(node=0|zone=2)
[   26.830748] page_type: f5(slab)
[   26.830908] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.831716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.831983] page dumped because: kasan: bad access detected
[   26.832318] 
[   26.832394] Memory state around the buggy address:
[   26.832616]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.832963]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.833262] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.833550]                                      ^
[   26.834317]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.834578]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.835175] ==================================================================
[   27.946273] ==================================================================
[   27.946586] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   27.946972] Read of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.947236] 
[   27.947323] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.947377] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.947392] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.947418] Call Trace:
[   27.947439]  <TASK>
[   27.947461]  dump_stack_lvl+0x73/0xb0
[   27.947492]  print_report+0xd1/0x610
[   27.947516]  ? __virt_addr_valid+0x1db/0x2d0
[   27.947541]  ? kasan_atomics_helper+0x4f30/0x5450
[   27.947563]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.947589]  ? kasan_atomics_helper+0x4f30/0x5450
[   27.947611]  kasan_report+0x141/0x180
[   27.947634]  ? kasan_atomics_helper+0x4f30/0x5450
[   27.947670]  __asan_report_load8_noabort+0x18/0x20
[   27.947695]  kasan_atomics_helper+0x4f30/0x5450
[   27.947717]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.947762]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.947786]  ? pick_task_fair+0xce/0x340
[   27.947812]  ? kasan_atomics+0x152/0x310
[   27.947839]  kasan_atomics+0x1dc/0x310
[   27.947862]  ? __pfx_kasan_atomics+0x10/0x10
[   27.947887]  ? __pfx_read_tsc+0x10/0x10
[   27.947909]  ? ktime_get_ts64+0x86/0x230
[   27.947935]  kunit_try_run_case+0x1a5/0x480
[   27.947960]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.947982]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.948008]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.948032]  ? __kthread_parkme+0x82/0x180
[   27.948055]  ? preempt_count_sub+0x50/0x80
[   27.948079]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.948102]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.948129]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.948155]  kthread+0x337/0x6f0
[   27.948176]  ? trace_preempt_on+0x20/0xc0
[   27.948201]  ? __pfx_kthread+0x10/0x10
[   27.948223]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.948246]  ? calculate_sigpending+0x7b/0xa0
[   27.948270]  ? __pfx_kthread+0x10/0x10
[   27.948293]  ret_from_fork+0x116/0x1d0
[   27.948312]  ? __pfx_kthread+0x10/0x10
[   27.948333]  ret_from_fork_asm+0x1a/0x30
[   27.948366]  </TASK>
[   27.948378] 
[   27.955349] Allocated by task 314:
[   27.955540]  kasan_save_stack+0x45/0x70
[   27.955785]  kasan_save_track+0x18/0x40
[   27.955947]  kasan_save_alloc_info+0x3b/0x50
[   27.956154]  __kasan_kmalloc+0xb7/0xc0
[   27.956322]  __kmalloc_cache_noprof+0x189/0x420
[   27.956517]  kasan_atomics+0x95/0x310
[   27.956683]  kunit_try_run_case+0x1a5/0x480
[   27.956882]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.957123]  kthread+0x337/0x6f0
[   27.957261]  ret_from_fork+0x116/0x1d0
[   27.957439]  ret_from_fork_asm+0x1a/0x30
[   27.957599] 
[   27.957701] The buggy address belongs to the object at ffff888103eb9580
[   27.957701]  which belongs to the cache kmalloc-64 of size 64
[   27.958188] The buggy address is located 0 bytes to the right of
[   27.958188]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.958552] 
[   27.958619] The buggy address belongs to the physical page:
[   27.958818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.959055] flags: 0x200000000000000(node=0|zone=2)
[   27.959215] page_type: f5(slab)
[   27.959334] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.959559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.959897] page dumped because: kasan: bad access detected
[   27.960142] 
[   27.960229] Memory state around the buggy address:
[   27.960445]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.960788]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.961104] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.961409]                                      ^
[   27.961630]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.961973]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.962230] ==================================================================
[   27.400744] ==================================================================
[   27.401157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   27.401574] Read of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.401893] 
[   27.402017] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.402079] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.402094] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.402131] Call Trace:
[   27.402153]  <TASK>
[   27.402176]  dump_stack_lvl+0x73/0xb0
[   27.402222]  print_report+0xd1/0x610
[   27.402246]  ? __virt_addr_valid+0x1db/0x2d0
[   27.402271]  ? kasan_atomics_helper+0x4a36/0x5450
[   27.402292]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.402319]  ? kasan_atomics_helper+0x4a36/0x5450
[   27.402342]  kasan_report+0x141/0x180
[   27.402365]  ? kasan_atomics_helper+0x4a36/0x5450
[   27.402392]  __asan_report_load4_noabort+0x18/0x20
[   27.402417]  kasan_atomics_helper+0x4a36/0x5450
[   27.402440]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.402463]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.402488]  ? pick_task_fair+0xce/0x340
[   27.402514]  ? kasan_atomics+0x152/0x310
[   27.402550]  kasan_atomics+0x1dc/0x310
[   27.402573]  ? __pfx_kasan_atomics+0x10/0x10
[   27.402598]  ? __pfx_read_tsc+0x10/0x10
[   27.402631]  ? ktime_get_ts64+0x86/0x230
[   27.402666]  kunit_try_run_case+0x1a5/0x480
[   27.402691]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.402711]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.402757]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.402782]  ? __kthread_parkme+0x82/0x180
[   27.402805]  ? preempt_count_sub+0x50/0x80
[   27.402830]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.402853]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.402879]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.402906]  kthread+0x337/0x6f0
[   27.402927]  ? trace_preempt_on+0x20/0xc0
[   27.402951]  ? __pfx_kthread+0x10/0x10
[   27.402973]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.402995]  ? calculate_sigpending+0x7b/0xa0
[   27.403021]  ? __pfx_kthread+0x10/0x10
[   27.403043]  ret_from_fork+0x116/0x1d0
[   27.403064]  ? __pfx_kthread+0x10/0x10
[   27.403088]  ret_from_fork_asm+0x1a/0x30
[   27.403120]  </TASK>
[   27.403132] 
[   27.410452] Allocated by task 314:
[   27.410613]  kasan_save_stack+0x45/0x70
[   27.410884]  kasan_save_track+0x18/0x40
[   27.411077]  kasan_save_alloc_info+0x3b/0x50
[   27.411327]  __kasan_kmalloc+0xb7/0xc0
[   27.411548]  __kmalloc_cache_noprof+0x189/0x420
[   27.411814]  kasan_atomics+0x95/0x310
[   27.412012]  kunit_try_run_case+0x1a5/0x480
[   27.412238]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.412489]  kthread+0x337/0x6f0
[   27.412672]  ret_from_fork+0x116/0x1d0
[   27.412826]  ret_from_fork_asm+0x1a/0x30
[   27.412982] 
[   27.413073] The buggy address belongs to the object at ffff888103eb9580
[   27.413073]  which belongs to the cache kmalloc-64 of size 64
[   27.413619] The buggy address is located 0 bytes to the right of
[   27.413619]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.414150] 
[   27.414223] The buggy address belongs to the physical page:
[   27.414487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.414847] flags: 0x200000000000000(node=0|zone=2)
[   27.415080] page_type: f5(slab)
[   27.415268] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.415592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.415919] page dumped because: kasan: bad access detected
[   27.416168] 
[   27.416232] Memory state around the buggy address:
[   27.416384]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.416689]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.417060] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.417299]                                      ^
[   27.417544]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.417880]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.418153] ==================================================================
[   27.053636] ==================================================================
[   27.054253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   27.054605] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.054983] 
[   27.055187] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.055258] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.055272] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.055298] Call Trace:
[   27.055319]  <TASK>
[   27.055352]  dump_stack_lvl+0x73/0xb0
[   27.055385]  print_report+0xd1/0x610
[   27.055409]  ? __virt_addr_valid+0x1db/0x2d0
[   27.055444]  ? kasan_atomics_helper+0x7c7/0x5450
[   27.055465]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.055495]  ? kasan_atomics_helper+0x7c7/0x5450
[   27.055529]  kasan_report+0x141/0x180
[   27.055552]  ? kasan_atomics_helper+0x7c7/0x5450
[   27.055579]  kasan_check_range+0x10c/0x1c0
[   27.055603]  __kasan_check_write+0x18/0x20
[   27.055628]  kasan_atomics_helper+0x7c7/0x5450
[   27.055651]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.055685]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.055709]  ? pick_task_fair+0xce/0x340
[   27.055739]  ? kasan_atomics+0x152/0x310
[   27.055767]  kasan_atomics+0x1dc/0x310
[   27.055792]  ? __pfx_kasan_atomics+0x10/0x10
[   27.055817]  ? __pfx_read_tsc+0x10/0x10
[   27.055840]  ? ktime_get_ts64+0x86/0x230
[   27.055868]  kunit_try_run_case+0x1a5/0x480
[   27.055894]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.055915]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.055942]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.055967]  ? __kthread_parkme+0x82/0x180
[   27.055990]  ? preempt_count_sub+0x50/0x80
[   27.056016]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.056049]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.056076]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.056103]  kthread+0x337/0x6f0
[   27.056135]  ? trace_preempt_on+0x20/0xc0
[   27.056160]  ? __pfx_kthread+0x10/0x10
[   27.056182]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.056205]  ? calculate_sigpending+0x7b/0xa0
[   27.056230]  ? __pfx_kthread+0x10/0x10
[   27.056253]  ret_from_fork+0x116/0x1d0
[   27.056273]  ? __pfx_kthread+0x10/0x10
[   27.056295]  ret_from_fork_asm+0x1a/0x30
[   27.056327]  </TASK>
[   27.056524] 
[   27.064897] Allocated by task 314:
[   27.065115]  kasan_save_stack+0x45/0x70
[   27.065332]  kasan_save_track+0x18/0x40
[   27.065520]  kasan_save_alloc_info+0x3b/0x50
[   27.066096]  __kasan_kmalloc+0xb7/0xc0
[   27.066319]  __kmalloc_cache_noprof+0x189/0x420
[   27.066481]  kasan_atomics+0x95/0x310
[   27.066693]  kunit_try_run_case+0x1a5/0x480
[   27.066897]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.067115]  kthread+0x337/0x6f0
[   27.067336]  ret_from_fork+0x116/0x1d0
[   27.067570]  ret_from_fork_asm+0x1a/0x30
[   27.067719] 
[   27.067906] The buggy address belongs to the object at ffff888103eb9580
[   27.067906]  which belongs to the cache kmalloc-64 of size 64
[   27.068413] The buggy address is located 0 bytes to the right of
[   27.068413]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.068882] 
[   27.068979] The buggy address belongs to the physical page:
[   27.069257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.070044] flags: 0x200000000000000(node=0|zone=2)
[   27.070347] page_type: f5(slab)
[   27.070523] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.070771] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.071305] page dumped because: kasan: bad access detected
[   27.071635] 
[   27.071736] Memory state around the buggy address:
[   27.071936]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.072162]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.072544] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.072928]                                      ^
[   27.073337]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.073688]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.074201] ==================================================================
[   26.865756] ==================================================================
[   26.866261] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   26.866510] Read of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   26.866992] 
[   26.867265] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   26.867322] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.867337] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.867363] Call Trace:
[   26.867384]  <TASK>
[   26.867408]  dump_stack_lvl+0x73/0xb0
[   26.867443]  print_report+0xd1/0x610
[   26.867467]  ? __virt_addr_valid+0x1db/0x2d0
[   26.867505]  ? kasan_atomics_helper+0x3df/0x5450
[   26.867528]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.867554]  ? kasan_atomics_helper+0x3df/0x5450
[   26.867588]  kasan_report+0x141/0x180
[   26.867610]  ? kasan_atomics_helper+0x3df/0x5450
[   26.867637]  kasan_check_range+0x10c/0x1c0
[   26.867671]  __kasan_check_read+0x15/0x20
[   26.867695]  kasan_atomics_helper+0x3df/0x5450
[   26.867717]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.867759]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.867783]  ? pick_task_fair+0xce/0x340
[   26.867809]  ? kasan_atomics+0x152/0x310
[   26.867836]  kasan_atomics+0x1dc/0x310
[   26.867860]  ? __pfx_kasan_atomics+0x10/0x10
[   26.867885]  ? __pfx_read_tsc+0x10/0x10
[   26.867908]  ? ktime_get_ts64+0x86/0x230
[   26.867959]  kunit_try_run_case+0x1a5/0x480
[   26.867985]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.868008]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.868035]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.868061]  ? __kthread_parkme+0x82/0x180
[   26.868084]  ? preempt_count_sub+0x50/0x80
[   26.868110]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.868133]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.868160]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.868186]  kthread+0x337/0x6f0
[   26.868207]  ? trace_preempt_on+0x20/0xc0
[   26.868232]  ? __pfx_kthread+0x10/0x10
[   26.868254]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.868277]  ? calculate_sigpending+0x7b/0xa0
[   26.868302]  ? __pfx_kthread+0x10/0x10
[   26.868326]  ret_from_fork+0x116/0x1d0
[   26.868347]  ? __pfx_kthread+0x10/0x10
[   26.868369]  ret_from_fork_asm+0x1a/0x30
[   26.868401]  </TASK>
[   26.868414] 
[   26.877992] Allocated by task 314:
[   26.878221]  kasan_save_stack+0x45/0x70
[   26.878440]  kasan_save_track+0x18/0x40
[   26.878626]  kasan_save_alloc_info+0x3b/0x50
[   26.878867]  __kasan_kmalloc+0xb7/0xc0
[   26.879125]  __kmalloc_cache_noprof+0x189/0x420
[   26.879299]  kasan_atomics+0x95/0x310
[   26.879477]  kunit_try_run_case+0x1a5/0x480
[   26.879689]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.879913]  kthread+0x337/0x6f0
[   26.880051]  ret_from_fork+0x116/0x1d0
[   26.880227]  ret_from_fork_asm+0x1a/0x30
[   26.880400] 
[   26.880477] The buggy address belongs to the object at ffff888103eb9580
[   26.880477]  which belongs to the cache kmalloc-64 of size 64
[   26.880970] The buggy address is located 0 bytes to the right of
[   26.880970]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   26.881777] 
[   26.881881] The buggy address belongs to the physical page:
[   26.882175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   26.882521] flags: 0x200000000000000(node=0|zone=2)
[   26.882798] page_type: f5(slab)
[   26.882923] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.883307] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.883594] page dumped because: kasan: bad access detected
[   26.883861] 
[   26.884021] Memory state around the buggy address:
[   26.884228]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.884513]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.884733] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.885192]                                      ^
[   26.885427]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.885759]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.886172] ==================================================================
[   27.266172] ==================================================================
[   27.267090] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   27.267416] Read of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.267743] 
[   27.267868] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.267933] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.267959] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.267986] Call Trace:
[   27.268006]  <TASK>
[   27.268027]  dump_stack_lvl+0x73/0xb0
[   27.268061]  print_report+0xd1/0x610
[   27.268085]  ? __virt_addr_valid+0x1db/0x2d0
[   27.268131]  ? kasan_atomics_helper+0x4a84/0x5450
[   27.268232]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.268268]  ? kasan_atomics_helper+0x4a84/0x5450
[   27.268290]  kasan_report+0x141/0x180
[   27.268315]  ? kasan_atomics_helper+0x4a84/0x5450
[   27.268352]  __asan_report_load4_noabort+0x18/0x20
[   27.268386]  kasan_atomics_helper+0x4a84/0x5450
[   27.268409]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.268432]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.268466]  ? pick_task_fair+0xce/0x340
[   27.268493]  ? kasan_atomics+0x152/0x310
[   27.268520]  kasan_atomics+0x1dc/0x310
[   27.268543]  ? __pfx_kasan_atomics+0x10/0x10
[   27.268567]  ? __pfx_read_tsc+0x10/0x10
[   27.268590]  ? ktime_get_ts64+0x86/0x230
[   27.268616]  kunit_try_run_case+0x1a5/0x480
[   27.268640]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.268671]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.268698]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.268722]  ? __kthread_parkme+0x82/0x180
[   27.268745]  ? preempt_count_sub+0x50/0x80
[   27.268780]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.268803]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.268830]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.268856]  kthread+0x337/0x6f0
[   27.268879]  ? trace_preempt_on+0x20/0xc0
[   27.268905]  ? __pfx_kthread+0x10/0x10
[   27.268927]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.268962]  ? calculate_sigpending+0x7b/0xa0
[   27.268987]  ? __pfx_kthread+0x10/0x10
[   27.269010]  ret_from_fork+0x116/0x1d0
[   27.269030]  ? __pfx_kthread+0x10/0x10
[   27.269052]  ret_from_fork_asm+0x1a/0x30
[   27.269084]  </TASK>
[   27.269098] 
[   27.278364] Allocated by task 314:
[   27.278602]  kasan_save_stack+0x45/0x70
[   27.278853]  kasan_save_track+0x18/0x40
[   27.278983]  kasan_save_alloc_info+0x3b/0x50
[   27.279126]  __kasan_kmalloc+0xb7/0xc0
[   27.279280]  __kmalloc_cache_noprof+0x189/0x420
[   27.279496]  kasan_atomics+0x95/0x310
[   27.279769]  kunit_try_run_case+0x1a5/0x480
[   27.279990]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.280165]  kthread+0x337/0x6f0
[   27.280283]  ret_from_fork+0x116/0x1d0
[   27.280468]  ret_from_fork_asm+0x1a/0x30
[   27.280671] 
[   27.281197] The buggy address belongs to the object at ffff888103eb9580
[   27.281197]  which belongs to the cache kmalloc-64 of size 64
[   27.281760] The buggy address is located 0 bytes to the right of
[   27.281760]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.282382] 
[   27.282493] The buggy address belongs to the physical page:
[   27.282722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.283133] flags: 0x200000000000000(node=0|zone=2)
[   27.283367] page_type: f5(slab)
[   27.283557] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.283905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.284512] page dumped because: kasan: bad access detected
[   27.284867] 
[   27.284945] Memory state around the buggy address:
[   27.285214]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.285540]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.285868] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.286210]                                      ^
[   27.286359]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.286676]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.286993] ==================================================================
[   27.287499] ==================================================================
[   27.287936] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   27.288630] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.289005] 
[   27.289193] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.289252] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.289278] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.289304] Call Trace:
[   27.289325]  <TASK>
[   27.289358]  dump_stack_lvl+0x73/0xb0
[   27.289394]  print_report+0xd1/0x610
[   27.289419]  ? __virt_addr_valid+0x1db/0x2d0
[   27.289444]  ? kasan_atomics_helper+0xd47/0x5450
[   27.289466]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.289492]  ? kasan_atomics_helper+0xd47/0x5450
[   27.289513]  kasan_report+0x141/0x180
[   27.289537]  ? kasan_atomics_helper+0xd47/0x5450
[   27.289563]  kasan_check_range+0x10c/0x1c0
[   27.289587]  __kasan_check_write+0x18/0x20
[   27.289619]  kasan_atomics_helper+0xd47/0x5450
[   27.289642]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.289680]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.289705]  ? pick_task_fair+0xce/0x340
[   27.289732]  ? kasan_atomics+0x152/0x310
[   27.289759]  kasan_atomics+0x1dc/0x310
[   27.289782]  ? __pfx_kasan_atomics+0x10/0x10
[   27.289806]  ? __pfx_read_tsc+0x10/0x10
[   27.289828]  ? ktime_get_ts64+0x86/0x230
[   27.289854]  kunit_try_run_case+0x1a5/0x480
[   27.289890]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.289911]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.289937]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.290015]  ? __kthread_parkme+0x82/0x180
[   27.290045]  ? preempt_count_sub+0x50/0x80
[   27.290070]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.290094]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.290132]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.290158]  kthread+0x337/0x6f0
[   27.290191]  ? trace_preempt_on+0x20/0xc0
[   27.290225]  ? __pfx_kthread+0x10/0x10
[   27.290247]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.290281]  ? calculate_sigpending+0x7b/0xa0
[   27.290307]  ? __pfx_kthread+0x10/0x10
[   27.290330]  ret_from_fork+0x116/0x1d0
[   27.290350]  ? __pfx_kthread+0x10/0x10
[   27.290372]  ret_from_fork_asm+0x1a/0x30
[   27.290403]  </TASK>
[   27.290416] 
[   27.299140] Allocated by task 314:
[   27.299346]  kasan_save_stack+0x45/0x70
[   27.299558]  kasan_save_track+0x18/0x40
[   27.299850]  kasan_save_alloc_info+0x3b/0x50
[   27.300280]  __kasan_kmalloc+0xb7/0xc0
[   27.300509]  __kmalloc_cache_noprof+0x189/0x420
[   27.300715]  kasan_atomics+0x95/0x310
[   27.300888]  kunit_try_run_case+0x1a5/0x480
[   27.301291]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.301524]  kthread+0x337/0x6f0
[   27.301726]  ret_from_fork+0x116/0x1d0
[   27.301879]  ret_from_fork_asm+0x1a/0x30
[   27.302177] 
[   27.302247] The buggy address belongs to the object at ffff888103eb9580
[   27.302247]  which belongs to the cache kmalloc-64 of size 64
[   27.302583] The buggy address is located 0 bytes to the right of
[   27.302583]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.303276] 
[   27.303369] The buggy address belongs to the physical page:
[   27.303828] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.304389] flags: 0x200000000000000(node=0|zone=2)
[   27.304559] page_type: f5(slab)
[   27.304745] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.305351] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.305573] page dumped because: kasan: bad access detected
[   27.305797] 
[   27.305886] Memory state around the buggy address:
[   27.306141]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.306552]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.306991] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.307241]                                      ^
[   27.307389]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.307707]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.308428] ==================================================================
[   27.473113] ==================================================================
[   27.473662] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   27.474013] Read of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.474335] 
[   27.474454] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.474521] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.474536] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.474562] Call Trace:
[   27.474582]  <TASK>
[   27.474603]  dump_stack_lvl+0x73/0xb0
[   27.474635]  print_report+0xd1/0x610
[   27.474668]  ? __virt_addr_valid+0x1db/0x2d0
[   27.474693]  ? kasan_atomics_helper+0x4a02/0x5450
[   27.474715]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.474763]  ? kasan_atomics_helper+0x4a02/0x5450
[   27.474785]  kasan_report+0x141/0x180
[   27.474808]  ? kasan_atomics_helper+0x4a02/0x5450
[   27.474844]  __asan_report_load4_noabort+0x18/0x20
[   27.474870]  kasan_atomics_helper+0x4a02/0x5450
[   27.474894]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.474928]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.474953]  ? pick_task_fair+0xce/0x340
[   27.474980]  ? kasan_atomics+0x152/0x310
[   27.475016]  kasan_atomics+0x1dc/0x310
[   27.475040]  ? __pfx_kasan_atomics+0x10/0x10
[   27.475065]  ? __pfx_read_tsc+0x10/0x10
[   27.475098]  ? ktime_get_ts64+0x86/0x230
[   27.475124]  kunit_try_run_case+0x1a5/0x480
[   27.475150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.475184]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.475212]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.475237]  ? __kthread_parkme+0x82/0x180
[   27.475271]  ? preempt_count_sub+0x50/0x80
[   27.475298]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.475330]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.475356]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.475383]  kthread+0x337/0x6f0
[   27.475415]  ? trace_preempt_on+0x20/0xc0
[   27.475440]  ? __pfx_kthread+0x10/0x10
[   27.475462]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.475494]  ? calculate_sigpending+0x7b/0xa0
[   27.475520]  ? __pfx_kthread+0x10/0x10
[   27.475542]  ret_from_fork+0x116/0x1d0
[   27.475574]  ? __pfx_kthread+0x10/0x10
[   27.475596]  ret_from_fork_asm+0x1a/0x30
[   27.475628]  </TASK>
[   27.475640] 
[   27.484864] Allocated by task 314:
[   27.485068]  kasan_save_stack+0x45/0x70
[   27.485290]  kasan_save_track+0x18/0x40
[   27.485464]  kasan_save_alloc_info+0x3b/0x50
[   27.485636]  __kasan_kmalloc+0xb7/0xc0
[   27.485858]  __kmalloc_cache_noprof+0x189/0x420
[   27.486030]  kasan_atomics+0x95/0x310
[   27.486213]  kunit_try_run_case+0x1a5/0x480
[   27.486419]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.486601]  kthread+0x337/0x6f0
[   27.486746]  ret_from_fork+0x116/0x1d0
[   27.486877]  ret_from_fork_asm+0x1a/0x30
[   27.487011] 
[   27.487076] The buggy address belongs to the object at ffff888103eb9580
[   27.487076]  which belongs to the cache kmalloc-64 of size 64
[   27.487595] The buggy address is located 0 bytes to the right of
[   27.487595]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.488169] 
[   27.488269] The buggy address belongs to the physical page:
[   27.488457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.488703] flags: 0x200000000000000(node=0|zone=2)
[   27.488884] page_type: f5(slab)
[   27.489056] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.489406] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.489767] page dumped because: kasan: bad access detected
[   27.490015] 
[   27.490113] Memory state around the buggy address:
[   27.490306]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.490571]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.490879] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.491169]                                      ^
[   27.491355]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.491564]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.491908] ==================================================================
[   27.234463] ==================================================================
[   27.234773] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   27.235068] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.236228] 
[   27.236577] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.236650] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.236674] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.236700] Call Trace:
[   27.236722]  <TASK>
[   27.236744]  dump_stack_lvl+0x73/0xb0
[   27.236779]  print_report+0xd1/0x610
[   27.236804]  ? __virt_addr_valid+0x1db/0x2d0
[   27.236829]  ? kasan_atomics_helper+0xc70/0x5450
[   27.236851]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.236877]  ? kasan_atomics_helper+0xc70/0x5450
[   27.236899]  kasan_report+0x141/0x180
[   27.236922]  ? kasan_atomics_helper+0xc70/0x5450
[   27.236958]  kasan_check_range+0x10c/0x1c0
[   27.236982]  __kasan_check_write+0x18/0x20
[   27.237006]  kasan_atomics_helper+0xc70/0x5450
[   27.237029]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.237052]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.237077]  ? pick_task_fair+0xce/0x340
[   27.237103]  ? kasan_atomics+0x152/0x310
[   27.237130]  kasan_atomics+0x1dc/0x310
[   27.237153]  ? __pfx_kasan_atomics+0x10/0x10
[   27.237178]  ? __pfx_read_tsc+0x10/0x10
[   27.237201]  ? ktime_get_ts64+0x86/0x230
[   27.237227]  kunit_try_run_case+0x1a5/0x480
[   27.237251]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.237272]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.237298]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.237323]  ? __kthread_parkme+0x82/0x180
[   27.237345]  ? preempt_count_sub+0x50/0x80
[   27.237370]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.237393]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.237420]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.237446]  kthread+0x337/0x6f0
[   27.237467]  ? trace_preempt_on+0x20/0xc0
[   27.237492]  ? __pfx_kthread+0x10/0x10
[   27.237514]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.237537]  ? calculate_sigpending+0x7b/0xa0
[   27.237562]  ? __pfx_kthread+0x10/0x10
[   27.237585]  ret_from_fork+0x116/0x1d0
[   27.237606]  ? __pfx_kthread+0x10/0x10
[   27.237627]  ret_from_fork_asm+0x1a/0x30
[   27.237669]  </TASK>
[   27.237682] 
[   27.253480] Allocated by task 314:
[   27.253853]  kasan_save_stack+0x45/0x70
[   27.254249]  kasan_save_track+0x18/0x40
[   27.254399]  kasan_save_alloc_info+0x3b/0x50
[   27.254853]  __kasan_kmalloc+0xb7/0xc0
[   27.255435]  __kmalloc_cache_noprof+0x189/0x420
[   27.255683]  kasan_atomics+0x95/0x310
[   27.255856]  kunit_try_run_case+0x1a5/0x480
[   27.256211]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.256460]  kthread+0x337/0x6f0
[   27.256868]  ret_from_fork+0x116/0x1d0
[   27.257250]  ret_from_fork_asm+0x1a/0x30
[   27.257433] 
[   27.257523] The buggy address belongs to the object at ffff888103eb9580
[   27.257523]  which belongs to the cache kmalloc-64 of size 64
[   27.258389] The buggy address is located 0 bytes to the right of
[   27.258389]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.259137] 
[   27.259389] The buggy address belongs to the physical page:
[   27.259557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.260037] flags: 0x200000000000000(node=0|zone=2)
[   27.260290] page_type: f5(slab)
[   27.260419] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.261176] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.261589] page dumped because: kasan: bad access detected
[   27.262023] 
[   27.262101] Memory state around the buggy address:
[   27.262539]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.263024]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.263680] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.264102]                                      ^
[   27.264556]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.265036]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.265352] ==================================================================
[   27.609022] ==================================================================
[   27.609343] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   27.609864] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.610445] 
[   27.610694] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.610755] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.610770] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.610796] Call Trace:
[   27.610914]  <TASK>
[   27.610956]  dump_stack_lvl+0x73/0xb0
[   27.610993]  print_report+0xd1/0x610
[   27.611018]  ? __virt_addr_valid+0x1db/0x2d0
[   27.611042]  ? kasan_atomics_helper+0x1467/0x5450
[   27.611065]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.611092]  ? kasan_atomics_helper+0x1467/0x5450
[   27.611114]  kasan_report+0x141/0x180
[   27.611136]  ? kasan_atomics_helper+0x1467/0x5450
[   27.611162]  kasan_check_range+0x10c/0x1c0
[   27.611186]  __kasan_check_write+0x18/0x20
[   27.611209]  kasan_atomics_helper+0x1467/0x5450
[   27.611232]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.611255]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.611279]  ? pick_task_fair+0xce/0x340
[   27.611305]  ? kasan_atomics+0x152/0x310
[   27.611330]  kasan_atomics+0x1dc/0x310
[   27.611354]  ? __pfx_kasan_atomics+0x10/0x10
[   27.611378]  ? __pfx_read_tsc+0x10/0x10
[   27.611400]  ? ktime_get_ts64+0x86/0x230
[   27.611426]  kunit_try_run_case+0x1a5/0x480
[   27.611449]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.611471]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.611497]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.611521]  ? __kthread_parkme+0x82/0x180
[   27.611543]  ? preempt_count_sub+0x50/0x80
[   27.611568]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.611591]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.611616]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.611643]  kthread+0x337/0x6f0
[   27.611674]  ? trace_preempt_on+0x20/0xc0
[   27.611698]  ? __pfx_kthread+0x10/0x10
[   27.611719]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.611751]  ? calculate_sigpending+0x7b/0xa0
[   27.611776]  ? __pfx_kthread+0x10/0x10
[   27.611799]  ret_from_fork+0x116/0x1d0
[   27.611819]  ? __pfx_kthread+0x10/0x10
[   27.611841]  ret_from_fork_asm+0x1a/0x30
[   27.611873]  </TASK>
[   27.611886] 
[   27.623521] Allocated by task 314:
[   27.623744]  kasan_save_stack+0x45/0x70
[   27.624161]  kasan_save_track+0x18/0x40
[   27.624489]  kasan_save_alloc_info+0x3b/0x50
[   27.624710]  __kasan_kmalloc+0xb7/0xc0
[   27.624995]  __kmalloc_cache_noprof+0x189/0x420
[   27.625364]  kasan_atomics+0x95/0x310
[   27.625681]  kunit_try_run_case+0x1a5/0x480
[   27.626033]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.626366]  kthread+0x337/0x6f0
[   27.626502]  ret_from_fork+0x116/0x1d0
[   27.626882]  ret_from_fork_asm+0x1a/0x30
[   27.627195] 
[   27.627416] The buggy address belongs to the object at ffff888103eb9580
[   27.627416]  which belongs to the cache kmalloc-64 of size 64
[   27.628013] The buggy address is located 0 bytes to the right of
[   27.628013]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.628768] 
[   27.628910] The buggy address belongs to the physical page:
[   27.629144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.629534] flags: 0x200000000000000(node=0|zone=2)
[   27.629750] page_type: f5(slab)
[   27.629902] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.630138] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.631074] page dumped because: kasan: bad access detected
[   27.631568] 
[   27.631646] Memory state around the buggy address:
[   27.632905]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.633290]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.633514] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.633742]                                      ^
[   27.633896]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.634118]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.634325] ==================================================================
[   28.193772] ==================================================================
[   28.194552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   28.194954] Read of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   28.195404] 
[   28.195559] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   28.195630] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   28.195672] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.195698] Call Trace:
[   28.195718]  <TASK>
[   28.195742]  dump_stack_lvl+0x73/0xb0
[   28.195775]  print_report+0xd1/0x610
[   28.195801]  ? __virt_addr_valid+0x1db/0x2d0
[   28.195826]  ? kasan_atomics_helper+0x4fa5/0x5450
[   28.195848]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.195875]  ? kasan_atomics_helper+0x4fa5/0x5450
[   28.195896]  kasan_report+0x141/0x180
[   28.195920]  ? kasan_atomics_helper+0x4fa5/0x5450
[   28.195945]  __asan_report_load8_noabort+0x18/0x20
[   28.195969]  kasan_atomics_helper+0x4fa5/0x5450
[   28.195992]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.196015]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.196038]  ? pick_task_fair+0xce/0x340
[   28.196065]  ? kasan_atomics+0x152/0x310
[   28.196091]  kasan_atomics+0x1dc/0x310
[   28.196115]  ? __pfx_kasan_atomics+0x10/0x10
[   28.196139]  ? __pfx_read_tsc+0x10/0x10
[   28.196162]  ? ktime_get_ts64+0x86/0x230
[   28.196188]  kunit_try_run_case+0x1a5/0x480
[   28.196211]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.196232]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.196258]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.196282]  ? __kthread_parkme+0x82/0x180
[   28.196304]  ? preempt_count_sub+0x50/0x80
[   28.196329]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.196352]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.196379]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.196405]  kthread+0x337/0x6f0
[   28.196426]  ? trace_preempt_on+0x20/0xc0
[   28.196451]  ? __pfx_kthread+0x10/0x10
[   28.196474]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.196497]  ? calculate_sigpending+0x7b/0xa0
[   28.196522]  ? __pfx_kthread+0x10/0x10
[   28.196545]  ret_from_fork+0x116/0x1d0
[   28.196565]  ? __pfx_kthread+0x10/0x10
[   28.196587]  ret_from_fork_asm+0x1a/0x30
[   28.196619]  </TASK>
[   28.196632] 
[   28.206352] Allocated by task 314:
[   28.206697]  kasan_save_stack+0x45/0x70
[   28.206942]  kasan_save_track+0x18/0x40
[   28.207223]  kasan_save_alloc_info+0x3b/0x50
[   28.207412]  __kasan_kmalloc+0xb7/0xc0
[   28.207737]  __kmalloc_cache_noprof+0x189/0x420
[   28.208068]  kasan_atomics+0x95/0x310
[   28.208325]  kunit_try_run_case+0x1a5/0x480
[   28.208489]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.208891]  kthread+0x337/0x6f0
[   28.209068]  ret_from_fork+0x116/0x1d0
[   28.209244]  ret_from_fork_asm+0x1a/0x30
[   28.209427] 
[   28.209504] The buggy address belongs to the object at ffff888103eb9580
[   28.209504]  which belongs to the cache kmalloc-64 of size 64
[   28.210350] The buggy address is located 0 bytes to the right of
[   28.210350]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   28.211091] 
[   28.211339] The buggy address belongs to the physical page:
[   28.211637] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   28.212115] flags: 0x200000000000000(node=0|zone=2)
[   28.212415] page_type: f5(slab)
[   28.212547] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.213251] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.213630] page dumped because: kasan: bad access detected
[   28.214004] 
[   28.214102] Memory state around the buggy address:
[   28.214274]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.214607]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.215199] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.215550]                                      ^
[   28.215743]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.216327]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.216705] ==================================================================
[   27.031929] ==================================================================
[   27.032395] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   27.032781] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.033203] 
[   27.033323] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.033380] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.033396] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.033422] Call Trace:
[   27.033444]  <TASK>
[   27.033467]  dump_stack_lvl+0x73/0xb0
[   27.033501]  print_report+0xd1/0x610
[   27.033525]  ? __virt_addr_valid+0x1db/0x2d0
[   27.033563]  ? kasan_atomics_helper+0x72f/0x5450
[   27.033584]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.033611]  ? kasan_atomics_helper+0x72f/0x5450
[   27.033644]  kasan_report+0x141/0x180
[   27.033680]  ? kasan_atomics_helper+0x72f/0x5450
[   27.033708]  kasan_check_range+0x10c/0x1c0
[   27.033731]  __kasan_check_write+0x18/0x20
[   27.033755]  kasan_atomics_helper+0x72f/0x5450
[   27.033778]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.033801]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.033825]  ? pick_task_fair+0xce/0x340
[   27.033861]  ? kasan_atomics+0x152/0x310
[   27.033888]  kasan_atomics+0x1dc/0x310
[   27.033911]  ? __pfx_kasan_atomics+0x10/0x10
[   27.033936]  ? __pfx_read_tsc+0x10/0x10
[   27.033976]  ? ktime_get_ts64+0x86/0x230
[   27.034002]  kunit_try_run_case+0x1a5/0x480
[   27.034027]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.034146]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.034175]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.034200]  ? __kthread_parkme+0x82/0x180
[   27.034256]  ? preempt_count_sub+0x50/0x80
[   27.034282]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.034317]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.034344]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.034371]  kthread+0x337/0x6f0
[   27.034401]  ? trace_preempt_on+0x20/0xc0
[   27.034426]  ? __pfx_kthread+0x10/0x10
[   27.034449]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.034482]  ? calculate_sigpending+0x7b/0xa0
[   27.034508]  ? __pfx_kthread+0x10/0x10
[   27.034531]  ret_from_fork+0x116/0x1d0
[   27.034560]  ? __pfx_kthread+0x10/0x10
[   27.034582]  ret_from_fork_asm+0x1a/0x30
[   27.034614]  </TASK>
[   27.034637] 
[   27.043829] Allocated by task 314:
[   27.044091]  kasan_save_stack+0x45/0x70
[   27.044336]  kasan_save_track+0x18/0x40
[   27.044496]  kasan_save_alloc_info+0x3b/0x50
[   27.044727]  __kasan_kmalloc+0xb7/0xc0
[   27.044917]  __kmalloc_cache_noprof+0x189/0x420
[   27.045132]  kasan_atomics+0x95/0x310
[   27.045409]  kunit_try_run_case+0x1a5/0x480
[   27.045629]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.045913]  kthread+0x337/0x6f0
[   27.046152]  ret_from_fork+0x116/0x1d0
[   27.046301]  ret_from_fork_asm+0x1a/0x30
[   27.046440] 
[   27.046508] The buggy address belongs to the object at ffff888103eb9580
[   27.046508]  which belongs to the cache kmalloc-64 of size 64
[   27.047044] The buggy address is located 0 bytes to the right of
[   27.047044]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.047614] 
[   27.047696] The buggy address belongs to the physical page:
[   27.048092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.048847] flags: 0x200000000000000(node=0|zone=2)
[   27.049095] page_type: f5(slab)
[   27.049219] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.049869] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.050232] page dumped because: kasan: bad access detected
[   27.050499] 
[   27.050605] Memory state around the buggy address:
[   27.050859]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.051249]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.051548] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.051923]                                      ^
[   27.052158]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.052687]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.053136] ==================================================================
[   26.767636] ==================================================================
[   26.768392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   26.768733] Read of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   26.769027] 
[   26.769152] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   26.769208] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.769222] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.769248] Call Trace:
[   26.769261]  <TASK>
[   26.769282]  dump_stack_lvl+0x73/0xb0
[   26.769317]  print_report+0xd1/0x610
[   26.769340]  ? __virt_addr_valid+0x1db/0x2d0
[   26.769365]  ? kasan_atomics_helper+0x4bbc/0x5450
[   26.769386]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.769411]  ? kasan_atomics_helper+0x4bbc/0x5450
[   26.769433]  kasan_report+0x141/0x180
[   26.769454]  ? kasan_atomics_helper+0x4bbc/0x5450
[   26.769479]  __asan_report_load4_noabort+0x18/0x20
[   26.769503]  kasan_atomics_helper+0x4bbc/0x5450
[   26.769524]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.769546]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.769570]  ? pick_task_fair+0xce/0x340
[   26.769596]  ? kasan_atomics+0x152/0x310
[   26.769621]  kasan_atomics+0x1dc/0x310
[   26.769643]  ? __pfx_kasan_atomics+0x10/0x10
[   26.769677]  ? __pfx_read_tsc+0x10/0x10
[   26.769700]  ? ktime_get_ts64+0x86/0x230
[   26.769727]  kunit_try_run_case+0x1a5/0x480
[   26.769845]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.769867]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.769892]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.769916]  ? __kthread_parkme+0x82/0x180
[   26.769938]  ? preempt_count_sub+0x50/0x80
[   26.769962]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.769984]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.770009]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.770034]  kthread+0x337/0x6f0
[   26.770061]  ? trace_preempt_on+0x20/0xc0
[   26.770085]  ? __pfx_kthread+0x10/0x10
[   26.770106]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.770127]  ? calculate_sigpending+0x7b/0xa0
[   26.770152]  ? __pfx_kthread+0x10/0x10
[   26.770174]  ret_from_fork+0x116/0x1d0
[   26.770193]  ? __pfx_kthread+0x10/0x10
[   26.770213]  ret_from_fork_asm+0x1a/0x30
[   26.770244]  </TASK>
[   26.770256] 
[   26.778272] Allocated by task 314:
[   26.778460]  kasan_save_stack+0x45/0x70
[   26.778645]  kasan_save_track+0x18/0x40
[   26.778844]  kasan_save_alloc_info+0x3b/0x50
[   26.779129]  __kasan_kmalloc+0xb7/0xc0
[   26.779294]  __kmalloc_cache_noprof+0x189/0x420
[   26.779482]  kasan_atomics+0x95/0x310
[   26.779649]  kunit_try_run_case+0x1a5/0x480
[   26.779947]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.780244]  kthread+0x337/0x6f0
[   26.780388]  ret_from_fork+0x116/0x1d0
[   26.780571]  ret_from_fork_asm+0x1a/0x30
[   26.780753] 
[   26.780830] The buggy address belongs to the object at ffff888103eb9580
[   26.780830]  which belongs to the cache kmalloc-64 of size 64
[   26.781405] The buggy address is located 0 bytes to the right of
[   26.781405]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   26.782004] 
[   26.782168] The buggy address belongs to the physical page:
[   26.782436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   26.782790] flags: 0x200000000000000(node=0|zone=2)
[   26.783076] page_type: f5(slab)
[   26.783209] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.783436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.783813] page dumped because: kasan: bad access detected
[   26.784172] 
[   26.784262] Memory state around the buggy address:
[   26.784460]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.784844]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.785301] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.785620]                                      ^
[   26.785911]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.786223]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.786507] ==================================================================
[   27.134940] ==================================================================
[   27.135188] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   27.135428] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.135649] 
[   27.135764] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.135822] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.135837] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.135863] Call Trace:
[   27.135884]  <TASK>
[   27.135907]  dump_stack_lvl+0x73/0xb0
[   27.135939]  print_report+0xd1/0x610
[   27.135963]  ? __virt_addr_valid+0x1db/0x2d0
[   27.135988]  ? kasan_atomics_helper+0x992/0x5450
[   27.136009]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.136036]  ? kasan_atomics_helper+0x992/0x5450
[   27.136058]  kasan_report+0x141/0x180
[   27.136095]  ? kasan_atomics_helper+0x992/0x5450
[   27.136121]  kasan_check_range+0x10c/0x1c0
[   27.136146]  __kasan_check_write+0x18/0x20
[   27.136170]  kasan_atomics_helper+0x992/0x5450
[   27.136192]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.136215]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.136239]  ? pick_task_fair+0xce/0x340
[   27.136266]  ? kasan_atomics+0x152/0x310
[   27.136293]  kasan_atomics+0x1dc/0x310
[   27.136316]  ? __pfx_kasan_atomics+0x10/0x10
[   27.136340]  ? __pfx_read_tsc+0x10/0x10
[   27.136363]  ? ktime_get_ts64+0x86/0x230
[   27.136388]  kunit_try_run_case+0x1a5/0x480
[   27.136412]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.136433]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.136459]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.136483]  ? __kthread_parkme+0x82/0x180
[   27.136506]  ? preempt_count_sub+0x50/0x80
[   27.136531]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.136555]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.136582]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.136608]  kthread+0x337/0x6f0
[   27.136629]  ? trace_preempt_on+0x20/0xc0
[   27.136663]  ? __pfx_kthread+0x10/0x10
[   27.136685]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.136708]  ? calculate_sigpending+0x7b/0xa0
[   27.136733]  ? __pfx_kthread+0x10/0x10
[   27.136755]  ret_from_fork+0x116/0x1d0
[   27.136776]  ? __pfx_kthread+0x10/0x10
[   27.136796]  ret_from_fork_asm+0x1a/0x30
[   27.136830]  </TASK>
[   27.136843] 
[   27.154669] Allocated by task 314:
[   27.155099]  kasan_save_stack+0x45/0x70
[   27.155539]  kasan_save_track+0x18/0x40
[   27.155959]  kasan_save_alloc_info+0x3b/0x50
[   27.156159]  __kasan_kmalloc+0xb7/0xc0
[   27.156282]  __kmalloc_cache_noprof+0x189/0x420
[   27.156429]  kasan_atomics+0x95/0x310
[   27.156551]  kunit_try_run_case+0x1a5/0x480
[   27.156712]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.156878]  kthread+0x337/0x6f0
[   27.157217]  ret_from_fork+0x116/0x1d0
[   27.157399]  ret_from_fork_asm+0x1a/0x30
[   27.157535] 
[   27.157625] The buggy address belongs to the object at ffff888103eb9580
[   27.157625]  which belongs to the cache kmalloc-64 of size 64
[   27.158266] The buggy address is located 0 bytes to the right of
[   27.158266]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.158914] 
[   27.158985] The buggy address belongs to the physical page:
[   27.159145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.159804] flags: 0x200000000000000(node=0|zone=2)
[   27.159979] page_type: f5(slab)
[   27.160098] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.160419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.160695] page dumped because: kasan: bad access detected
[   27.160952] 
[   27.161043] Memory state around the buggy address:
[   27.161268]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.161585]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.161801] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.162300]                                      ^
[   27.162614]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.162883]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.163089] ==================================================================
[   27.492592] ==================================================================
[   27.493188] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   27.493521] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.493835] 
[   27.493948] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.494004] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.494018] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.494049] Call Trace:
[   27.494069]  <TASK>
[   27.494091]  dump_stack_lvl+0x73/0xb0
[   27.494122]  print_report+0xd1/0x610
[   27.494147]  ? __virt_addr_valid+0x1db/0x2d0
[   27.494173]  ? kasan_atomics_helper+0x1217/0x5450
[   27.494195]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.494222]  ? kasan_atomics_helper+0x1217/0x5450
[   27.494244]  kasan_report+0x141/0x180
[   27.494267]  ? kasan_atomics_helper+0x1217/0x5450
[   27.494293]  kasan_check_range+0x10c/0x1c0
[   27.494317]  __kasan_check_write+0x18/0x20
[   27.494341]  kasan_atomics_helper+0x1217/0x5450
[   27.494365]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.494388]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.494412]  ? pick_task_fair+0xce/0x340
[   27.494439]  ? kasan_atomics+0x152/0x310
[   27.494465]  kasan_atomics+0x1dc/0x310
[   27.494490]  ? __pfx_kasan_atomics+0x10/0x10
[   27.494514]  ? __pfx_read_tsc+0x10/0x10
[   27.494538]  ? ktime_get_ts64+0x86/0x230
[   27.494563]  kunit_try_run_case+0x1a5/0x480
[   27.494588]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.494609]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.494635]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.494670]  ? __kthread_parkme+0x82/0x180
[   27.494693]  ? preempt_count_sub+0x50/0x80
[   27.494718]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.494762]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.494789]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.494816]  kthread+0x337/0x6f0
[   27.494838]  ? trace_preempt_on+0x20/0xc0
[   27.494863]  ? __pfx_kthread+0x10/0x10
[   27.494884]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.494907]  ? calculate_sigpending+0x7b/0xa0
[   27.494932]  ? __pfx_kthread+0x10/0x10
[   27.494955]  ret_from_fork+0x116/0x1d0
[   27.494975]  ? __pfx_kthread+0x10/0x10
[   27.494997]  ret_from_fork_asm+0x1a/0x30
[   27.495030]  </TASK>
[   27.495042] 
[   27.502077] Allocated by task 314:
[   27.502277]  kasan_save_stack+0x45/0x70
[   27.502486]  kasan_save_track+0x18/0x40
[   27.502679]  kasan_save_alloc_info+0x3b/0x50
[   27.502910]  __kasan_kmalloc+0xb7/0xc0
[   27.503097]  __kmalloc_cache_noprof+0x189/0x420
[   27.503289]  kasan_atomics+0x95/0x310
[   27.503416]  kunit_try_run_case+0x1a5/0x480
[   27.503555]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.503766]  kthread+0x337/0x6f0
[   27.503937]  ret_from_fork+0x116/0x1d0
[   27.504121]  ret_from_fork_asm+0x1a/0x30
[   27.504314] 
[   27.504407] The buggy address belongs to the object at ffff888103eb9580
[   27.504407]  which belongs to the cache kmalloc-64 of size 64
[   27.504936] The buggy address is located 0 bytes to the right of
[   27.504936]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.505392] 
[   27.505462] The buggy address belongs to the physical page:
[   27.505628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.505976] flags: 0x200000000000000(node=0|zone=2)
[   27.506200] page_type: f5(slab)
[   27.506360] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.506667] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.506976] page dumped because: kasan: bad access detected
[   27.507158] 
[   27.507222] Memory state around the buggy address:
[   27.507371]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.507579]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.507894] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.508206]                                      ^
[   27.508426]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.509182]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.509511] ==================================================================
[   27.928215] ==================================================================
[   27.928451] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   27.928990] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.929320] 
[   27.929434] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.929490] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.929505] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.929532] Call Trace:
[   27.929553]  <TASK>
[   27.929574]  dump_stack_lvl+0x73/0xb0
[   27.929608]  print_report+0xd1/0x610
[   27.929631]  ? __virt_addr_valid+0x1db/0x2d0
[   27.929666]  ? kasan_atomics_helper+0x1c18/0x5450
[   27.929690]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.929716]  ? kasan_atomics_helper+0x1c18/0x5450
[   27.929761]  kasan_report+0x141/0x180
[   27.929785]  ? kasan_atomics_helper+0x1c18/0x5450
[   27.929811]  kasan_check_range+0x10c/0x1c0
[   27.929836]  __kasan_check_write+0x18/0x20
[   27.929859]  kasan_atomics_helper+0x1c18/0x5450
[   27.929883]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.929905]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.929930]  ? pick_task_fair+0xce/0x340
[   27.929957]  ? kasan_atomics+0x152/0x310
[   27.929983]  kasan_atomics+0x1dc/0x310
[   27.930006]  ? __pfx_kasan_atomics+0x10/0x10
[   27.930031]  ? __pfx_read_tsc+0x10/0x10
[   27.930059]  ? ktime_get_ts64+0x86/0x230
[   27.930085]  kunit_try_run_case+0x1a5/0x480
[   27.930108]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.930130]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.930156]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.930181]  ? __kthread_parkme+0x82/0x180
[   27.930204]  ? preempt_count_sub+0x50/0x80
[   27.930229]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.930251]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.930278]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.930305]  kthread+0x337/0x6f0
[   27.930325]  ? trace_preempt_on+0x20/0xc0
[   27.930349]  ? __pfx_kthread+0x10/0x10
[   27.930371]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.930393]  ? calculate_sigpending+0x7b/0xa0
[   27.930418]  ? __pfx_kthread+0x10/0x10
[   27.930441]  ret_from_fork+0x116/0x1d0
[   27.930460]  ? __pfx_kthread+0x10/0x10
[   27.930482]  ret_from_fork_asm+0x1a/0x30
[   27.930514]  </TASK>
[   27.930526] 
[   27.938307] Allocated by task 314:
[   27.938475]  kasan_save_stack+0x45/0x70
[   27.938695]  kasan_save_track+0x18/0x40
[   27.938878]  kasan_save_alloc_info+0x3b/0x50
[   27.939087]  __kasan_kmalloc+0xb7/0xc0
[   27.939255]  __kmalloc_cache_noprof+0x189/0x420
[   27.939431]  kasan_atomics+0x95/0x310
[   27.939608]  kunit_try_run_case+0x1a5/0x480
[   27.939834]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.940032]  kthread+0x337/0x6f0
[   27.940196]  ret_from_fork+0x116/0x1d0
[   27.940357]  ret_from_fork_asm+0x1a/0x30
[   27.940544] 
[   27.940635] The buggy address belongs to the object at ffff888103eb9580
[   27.940635]  which belongs to the cache kmalloc-64 of size 64
[   27.941016] The buggy address is located 0 bytes to the right of
[   27.941016]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.941549] 
[   27.941646] The buggy address belongs to the physical page:
[   27.941923] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.942253] flags: 0x200000000000000(node=0|zone=2)
[   27.942413] page_type: f5(slab)
[   27.942532] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.942869] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.943204] page dumped because: kasan: bad access detected
[   27.943450] 
[   27.943538] Memory state around the buggy address:
[   27.943788]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.944111]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.944400] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.944691]                                      ^
[   27.944898]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.945128]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.945438] ==================================================================
[   26.787184] ==================================================================
[   26.787798] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   26.788536] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   26.788954] 
[   26.789067] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   26.789120] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.789135] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.789161] Call Trace:
[   26.789176]  <TASK>
[   26.789196]  dump_stack_lvl+0x73/0xb0
[   26.789229]  print_report+0xd1/0x610
[   26.789253]  ? __virt_addr_valid+0x1db/0x2d0
[   26.789279]  ? kasan_atomics_helper+0x4ba2/0x5450
[   26.789302]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.789329]  ? kasan_atomics_helper+0x4ba2/0x5450
[   26.789351]  kasan_report+0x141/0x180
[   26.789374]  ? kasan_atomics_helper+0x4ba2/0x5450
[   26.789400]  __asan_report_store4_noabort+0x1b/0x30
[   26.789425]  kasan_atomics_helper+0x4ba2/0x5450
[   26.789448]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.789471]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.789496]  ? pick_task_fair+0xce/0x340
[   26.789521]  ? kasan_atomics+0x152/0x310
[   26.789548]  kasan_atomics+0x1dc/0x310
[   26.789572]  ? __pfx_kasan_atomics+0x10/0x10
[   26.789597]  ? __pfx_read_tsc+0x10/0x10
[   26.789619]  ? ktime_get_ts64+0x86/0x230
[   26.789645]  kunit_try_run_case+0x1a5/0x480
[   26.789679]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.789701]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.789727]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.789752]  ? __kthread_parkme+0x82/0x180
[   26.789775]  ? preempt_count_sub+0x50/0x80
[   26.789800]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.789824]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.789850]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.789876]  kthread+0x337/0x6f0
[   26.789897]  ? trace_preempt_on+0x20/0xc0
[   26.789922]  ? __pfx_kthread+0x10/0x10
[   26.789965]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.789988]  ? calculate_sigpending+0x7b/0xa0
[   26.790014]  ? __pfx_kthread+0x10/0x10
[   26.790036]  ret_from_fork+0x116/0x1d0
[   26.790065]  ? __pfx_kthread+0x10/0x10
[   26.790086]  ret_from_fork_asm+0x1a/0x30
[   26.790118]  </TASK>
[   26.790131] 
[   26.798465] Allocated by task 314:
[   26.798621]  kasan_save_stack+0x45/0x70
[   26.798791]  kasan_save_track+0x18/0x40
[   26.798924]  kasan_save_alloc_info+0x3b/0x50
[   26.799068]  __kasan_kmalloc+0xb7/0xc0
[   26.799252]  __kmalloc_cache_noprof+0x189/0x420
[   26.799543]  kasan_atomics+0x95/0x310
[   26.799743]  kunit_try_run_case+0x1a5/0x480
[   26.799945]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.800193]  kthread+0x337/0x6f0
[   26.800357]  ret_from_fork+0x116/0x1d0
[   26.800505]  ret_from_fork_asm+0x1a/0x30
[   26.800641] 
[   26.800717] The buggy address belongs to the object at ffff888103eb9580
[   26.800717]  which belongs to the cache kmalloc-64 of size 64
[   26.801065] The buggy address is located 0 bytes to the right of
[   26.801065]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   26.802148] 
[   26.802258] The buggy address belongs to the physical page:
[   26.802795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   26.804568] flags: 0x200000000000000(node=0|zone=2)
[   26.804894] page_type: f5(slab)
[   26.805394] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.805756] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.806163] page dumped because: kasan: bad access detected
[   26.806345] 
[   26.806437] Memory state around the buggy address:
[   26.806672]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.807599]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.807924] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.808472]                                      ^
[   26.808726]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.809507]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.809818] ==================================================================
[   27.760759] ==================================================================
[   27.761120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   27.762092] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.762747] 
[   27.762875] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.762933] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.762948] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.762975] Call Trace:
[   27.762997]  <TASK>
[   27.763019]  dump_stack_lvl+0x73/0xb0
[   27.763057]  print_report+0xd1/0x610
[   27.763093]  ? __virt_addr_valid+0x1db/0x2d0
[   27.763120]  ? kasan_atomics_helper+0x177f/0x5450
[   27.763142]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.763327]  ? kasan_atomics_helper+0x177f/0x5450
[   27.763358]  kasan_report+0x141/0x180
[   27.763506]  ? kasan_atomics_helper+0x177f/0x5450
[   27.763535]  kasan_check_range+0x10c/0x1c0
[   27.763563]  __kasan_check_write+0x18/0x20
[   27.763589]  kasan_atomics_helper+0x177f/0x5450
[   27.763612]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.763635]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.763673]  ? pick_task_fair+0xce/0x340
[   27.763700]  ? kasan_atomics+0x152/0x310
[   27.763726]  kasan_atomics+0x1dc/0x310
[   27.763757]  ? __pfx_kasan_atomics+0x10/0x10
[   27.763782]  ? __pfx_read_tsc+0x10/0x10
[   27.763804]  ? ktime_get_ts64+0x86/0x230
[   27.763829]  kunit_try_run_case+0x1a5/0x480
[   27.763854]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.763875]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.763900]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.763925]  ? __kthread_parkme+0x82/0x180
[   27.763948]  ? preempt_count_sub+0x50/0x80
[   27.763972]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.763994]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.764020]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.764046]  kthread+0x337/0x6f0
[   27.764067]  ? trace_preempt_on+0x20/0xc0
[   27.764092]  ? __pfx_kthread+0x10/0x10
[   27.764113]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.764136]  ? calculate_sigpending+0x7b/0xa0
[   27.764161]  ? __pfx_kthread+0x10/0x10
[   27.764183]  ret_from_fork+0x116/0x1d0
[   27.764203]  ? __pfx_kthread+0x10/0x10
[   27.764224]  ret_from_fork_asm+0x1a/0x30
[   27.764257]  </TASK>
[   27.764271] 
[   27.775578] Allocated by task 314:
[   27.776000]  kasan_save_stack+0x45/0x70
[   27.776226]  kasan_save_track+0x18/0x40
[   27.776380]  kasan_save_alloc_info+0x3b/0x50
[   27.776837]  __kasan_kmalloc+0xb7/0xc0
[   27.777185]  __kmalloc_cache_noprof+0x189/0x420
[   27.777510]  kasan_atomics+0x95/0x310
[   27.777854]  kunit_try_run_case+0x1a5/0x480
[   27.778027]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.778434]  kthread+0x337/0x6f0
[   27.778709]  ret_from_fork+0x116/0x1d0
[   27.779140]  ret_from_fork_asm+0x1a/0x30
[   27.779445] 
[   27.779544] The buggy address belongs to the object at ffff888103eb9580
[   27.779544]  which belongs to the cache kmalloc-64 of size 64
[   27.780455] The buggy address is located 0 bytes to the right of
[   27.780455]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.781263] 
[   27.781365] The buggy address belongs to the physical page:
[   27.781705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.782314] flags: 0x200000000000000(node=0|zone=2)
[   27.782638] page_type: f5(slab)
[   27.782941] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.783390] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.783878] page dumped because: kasan: bad access detected
[   27.784246] 
[   27.784348] Memory state around the buggy address:
[   27.784742]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.785092]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.785515] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.785888]                                      ^
[   27.786264]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.786687]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.787094] ==================================================================
[   26.987504] ==================================================================
[   26.988091] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   26.988435] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   26.988754] 
[   26.988942] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   26.989000] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.989015] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.989095] Call Trace:
[   26.989129]  <TASK>
[   26.989151]  dump_stack_lvl+0x73/0xb0
[   26.989186]  print_report+0xd1/0x610
[   26.989210]  ? __virt_addr_valid+0x1db/0x2d0
[   26.989245]  ? kasan_atomics_helper+0x5fe/0x5450
[   26.989267]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.989305]  ? kasan_atomics_helper+0x5fe/0x5450
[   26.989327]  kasan_report+0x141/0x180
[   26.989349]  ? kasan_atomics_helper+0x5fe/0x5450
[   26.989375]  kasan_check_range+0x10c/0x1c0
[   26.989408]  __kasan_check_write+0x18/0x20
[   26.989431]  kasan_atomics_helper+0x5fe/0x5450
[   26.989464]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.989487]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.989512]  ? pick_task_fair+0xce/0x340
[   26.989538]  ? kasan_atomics+0x152/0x310
[   26.989565]  kasan_atomics+0x1dc/0x310
[   26.989589]  ? __pfx_kasan_atomics+0x10/0x10
[   26.989613]  ? __pfx_read_tsc+0x10/0x10
[   26.989637]  ? ktime_get_ts64+0x86/0x230
[   26.989673]  kunit_try_run_case+0x1a5/0x480
[   26.989697]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.989720]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.989757]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.989782]  ? __kthread_parkme+0x82/0x180
[   26.989806]  ? preempt_count_sub+0x50/0x80
[   26.989840]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.989863]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.989890]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.989927]  kthread+0x337/0x6f0
[   26.990080]  ? trace_preempt_on+0x20/0xc0
[   26.990107]  ? __pfx_kthread+0x10/0x10
[   26.990143]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.990166]  ? calculate_sigpending+0x7b/0xa0
[   26.990192]  ? __pfx_kthread+0x10/0x10
[   26.990214]  ret_from_fork+0x116/0x1d0
[   26.990328]  ? __pfx_kthread+0x10/0x10
[   26.990351]  ret_from_fork_asm+0x1a/0x30
[   26.990472]  </TASK>
[   26.990487] 
[   26.999673] Allocated by task 314:
[   26.999931]  kasan_save_stack+0x45/0x70
[   27.000298]  kasan_save_track+0x18/0x40
[   27.000494]  kasan_save_alloc_info+0x3b/0x50
[   27.000644]  __kasan_kmalloc+0xb7/0xc0
[   27.000944]  __kmalloc_cache_noprof+0x189/0x420
[   27.001338]  kasan_atomics+0x95/0x310
[   27.001519]  kunit_try_run_case+0x1a5/0x480
[   27.001672]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.001844]  kthread+0x337/0x6f0
[   27.002014]  ret_from_fork+0x116/0x1d0
[   27.002200]  ret_from_fork_asm+0x1a/0x30
[   27.002484] 
[   27.002581] The buggy address belongs to the object at ffff888103eb9580
[   27.002581]  which belongs to the cache kmalloc-64 of size 64
[   27.003525] The buggy address is located 0 bytes to the right of
[   27.003525]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.004217] 
[   27.004323] The buggy address belongs to the physical page:
[   27.004567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.005035] flags: 0x200000000000000(node=0|zone=2)
[   27.005209] page_type: f5(slab)
[   27.005333] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.005711] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.006125] page dumped because: kasan: bad access detected
[   27.006339] 
[   27.006594] Memory state around the buggy address:
[   27.006772]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.007076]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.007786] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.008149]                                      ^
[   27.008356]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.008800]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.009160] ==================================================================
[   27.455339] ==================================================================
[   27.455770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   27.456164] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.456466] 
[   27.456582] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.456637] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.456668] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.456701] Call Trace:
[   27.456722]  <TASK>
[   27.456769]  dump_stack_lvl+0x73/0xb0
[   27.456801]  print_report+0xd1/0x610
[   27.456825]  ? __virt_addr_valid+0x1db/0x2d0
[   27.456850]  ? kasan_atomics_helper+0x1148/0x5450
[   27.456872]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.456898]  ? kasan_atomics_helper+0x1148/0x5450
[   27.456920]  kasan_report+0x141/0x180
[   27.456944]  ? kasan_atomics_helper+0x1148/0x5450
[   27.456970]  kasan_check_range+0x10c/0x1c0
[   27.456995]  __kasan_check_write+0x18/0x20
[   27.457019]  kasan_atomics_helper+0x1148/0x5450
[   27.457043]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.457066]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.457101]  ? pick_task_fair+0xce/0x340
[   27.457128]  ? kasan_atomics+0x152/0x310
[   27.457154]  kasan_atomics+0x1dc/0x310
[   27.457188]  ? __pfx_kasan_atomics+0x10/0x10
[   27.457213]  ? __pfx_read_tsc+0x10/0x10
[   27.457236]  ? ktime_get_ts64+0x86/0x230
[   27.457262]  kunit_try_run_case+0x1a5/0x480
[   27.457286]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.457308]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.457333]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.457358]  ? __kthread_parkme+0x82/0x180
[   27.457383]  ? preempt_count_sub+0x50/0x80
[   27.457407]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.457430]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.457456]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.457483]  kthread+0x337/0x6f0
[   27.457504]  ? trace_preempt_on+0x20/0xc0
[   27.457538]  ? __pfx_kthread+0x10/0x10
[   27.457560]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.457583]  ? calculate_sigpending+0x7b/0xa0
[   27.457621]  ? __pfx_kthread+0x10/0x10
[   27.457643]  ret_from_fork+0x116/0x1d0
[   27.457673]  ? __pfx_kthread+0x10/0x10
[   27.457695]  ret_from_fork_asm+0x1a/0x30
[   27.457743]  </TASK>
[   27.457756] 
[   27.465092] Allocated by task 314:
[   27.465234]  kasan_save_stack+0x45/0x70
[   27.465386]  kasan_save_track+0x18/0x40
[   27.465515]  kasan_save_alloc_info+0x3b/0x50
[   27.465764]  __kasan_kmalloc+0xb7/0xc0
[   27.465975]  __kmalloc_cache_noprof+0x189/0x420
[   27.466201]  kasan_atomics+0x95/0x310
[   27.466386]  kunit_try_run_case+0x1a5/0x480
[   27.466599]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.466869]  kthread+0x337/0x6f0
[   27.467054]  ret_from_fork+0x116/0x1d0
[   27.467227]  ret_from_fork_asm+0x1a/0x30
[   27.467413] 
[   27.467507] The buggy address belongs to the object at ffff888103eb9580
[   27.467507]  which belongs to the cache kmalloc-64 of size 64
[   27.467908] The buggy address is located 0 bytes to the right of
[   27.467908]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.468270] 
[   27.468340] The buggy address belongs to the physical page:
[   27.468611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.468992] flags: 0x200000000000000(node=0|zone=2)
[   27.469228] page_type: f5(slab)
[   27.469404] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.469775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.470063] page dumped because: kasan: bad access detected
[   27.470318] 
[   27.470386] Memory state around the buggy address:
[   27.470538]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.470782]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.471098] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.471439]                                      ^
[   27.471687]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.472035]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.472342] ==================================================================
[   27.684850] ==================================================================
[   27.685223] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   27.685500] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.685833] 
[   27.685927] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.685982] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.685997] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.686023] Call Trace:
[   27.686073]  <TASK>
[   27.686095]  dump_stack_lvl+0x73/0xb0
[   27.686129]  print_report+0xd1/0x610
[   27.686153]  ? __virt_addr_valid+0x1db/0x2d0
[   27.686179]  ? kasan_atomics_helper+0x15b6/0x5450
[   27.686211]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.686238]  ? kasan_atomics_helper+0x15b6/0x5450
[   27.686260]  kasan_report+0x141/0x180
[   27.686283]  ? kasan_atomics_helper+0x15b6/0x5450
[   27.686328]  kasan_check_range+0x10c/0x1c0
[   27.686353]  __kasan_check_write+0x18/0x20
[   27.686378]  kasan_atomics_helper+0x15b6/0x5450
[   27.686401]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.686424]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.686449]  ? pick_task_fair+0xce/0x340
[   27.686493]  ? kasan_atomics+0x152/0x310
[   27.686520]  kasan_atomics+0x1dc/0x310
[   27.686544]  ? __pfx_kasan_atomics+0x10/0x10
[   27.686569]  ? __pfx_read_tsc+0x10/0x10
[   27.686592]  ? ktime_get_ts64+0x86/0x230
[   27.686618]  kunit_try_run_case+0x1a5/0x480
[   27.686669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.686692]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.686718]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.686742]  ? __kthread_parkme+0x82/0x180
[   27.686773]  ? preempt_count_sub+0x50/0x80
[   27.686799]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.686839]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.686866]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.686892]  kthread+0x337/0x6f0
[   27.686914]  ? trace_preempt_on+0x20/0xc0
[   27.686939]  ? __pfx_kthread+0x10/0x10
[   27.686961]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.686984]  ? calculate_sigpending+0x7b/0xa0
[   27.687010]  ? __pfx_kthread+0x10/0x10
[   27.687034]  ret_from_fork+0x116/0x1d0
[   27.687054]  ? __pfx_kthread+0x10/0x10
[   27.687077]  ret_from_fork_asm+0x1a/0x30
[   27.687109]  </TASK>
[   27.687140] 
[   27.698505] Allocated by task 314:
[   27.698932]  kasan_save_stack+0x45/0x70
[   27.699329]  kasan_save_track+0x18/0x40
[   27.699697]  kasan_save_alloc_info+0x3b/0x50
[   27.700173]  __kasan_kmalloc+0xb7/0xc0
[   27.700520]  __kmalloc_cache_noprof+0x189/0x420
[   27.700874]  kasan_atomics+0x95/0x310
[   27.701008]  kunit_try_run_case+0x1a5/0x480
[   27.701150]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.701321]  kthread+0x337/0x6f0
[   27.701444]  ret_from_fork+0x116/0x1d0
[   27.701576]  ret_from_fork_asm+0x1a/0x30
[   27.701729] 
[   27.701798] The buggy address belongs to the object at ffff888103eb9580
[   27.701798]  which belongs to the cache kmalloc-64 of size 64
[   27.702334] The buggy address is located 0 bytes to the right of
[   27.702334]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.702844] 
[   27.702941] The buggy address belongs to the physical page:
[   27.703222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.703562] flags: 0x200000000000000(node=0|zone=2)
[   27.703801] page_type: f5(slab)
[   27.703960] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.704263] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.704555] page dumped because: kasan: bad access detected
[   27.704835] 
[   27.704915] Memory state around the buggy address:
[   27.705139]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.705371]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.705598] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.705935]                                      ^
[   27.706162]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.706453]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.706670] ==================================================================
[   27.980422] ==================================================================
[   27.980823] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   27.981206] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.981538] 
[   27.981649] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.981712] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.981748] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.981777] Call Trace:
[   27.981797]  <TASK>
[   27.981819]  dump_stack_lvl+0x73/0xb0
[   27.981852]  print_report+0xd1/0x610
[   27.981876]  ? __virt_addr_valid+0x1db/0x2d0
[   27.981902]  ? kasan_atomics_helper+0x1d7a/0x5450
[   27.981925]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.981952]  ? kasan_atomics_helper+0x1d7a/0x5450
[   27.981974]  kasan_report+0x141/0x180
[   27.981998]  ? kasan_atomics_helper+0x1d7a/0x5450
[   27.982025]  kasan_check_range+0x10c/0x1c0
[   27.982059]  __kasan_check_write+0x18/0x20
[   27.982084]  kasan_atomics_helper+0x1d7a/0x5450
[   27.982108]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.982131]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.982156]  ? pick_task_fair+0xce/0x340
[   27.982182]  ? kasan_atomics+0x152/0x310
[   27.982209]  kasan_atomics+0x1dc/0x310
[   27.982232]  ? __pfx_kasan_atomics+0x10/0x10
[   27.982257]  ? __pfx_read_tsc+0x10/0x10
[   27.982280]  ? ktime_get_ts64+0x86/0x230
[   27.982306]  kunit_try_run_case+0x1a5/0x480
[   27.982330]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.982352]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.982378]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.982403]  ? __kthread_parkme+0x82/0x180
[   27.982426]  ? preempt_count_sub+0x50/0x80
[   27.982451]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.982474]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.982501]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.982527]  kthread+0x337/0x6f0
[   27.982547]  ? trace_preempt_on+0x20/0xc0
[   27.982572]  ? __pfx_kthread+0x10/0x10
[   27.982594]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.982617]  ? calculate_sigpending+0x7b/0xa0
[   27.982642]  ? __pfx_kthread+0x10/0x10
[   27.982674]  ret_from_fork+0x116/0x1d0
[   27.982694]  ? __pfx_kthread+0x10/0x10
[   27.982716]  ret_from_fork_asm+0x1a/0x30
[   27.982769]  </TASK>
[   27.982782] 
[   27.989947] Allocated by task 314:
[   27.990148]  kasan_save_stack+0x45/0x70
[   27.990359]  kasan_save_track+0x18/0x40
[   27.990545]  kasan_save_alloc_info+0x3b/0x50
[   27.990790]  __kasan_kmalloc+0xb7/0xc0
[   27.990948]  __kmalloc_cache_noprof+0x189/0x420
[   27.991100]  kasan_atomics+0x95/0x310
[   27.991227]  kunit_try_run_case+0x1a5/0x480
[   27.991370]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.991600]  kthread+0x337/0x6f0
[   27.991802]  ret_from_fork+0x116/0x1d0
[   27.991991]  ret_from_fork_asm+0x1a/0x30
[   27.992186] 
[   27.992278] The buggy address belongs to the object at ffff888103eb9580
[   27.992278]  which belongs to the cache kmalloc-64 of size 64
[   27.992826] The buggy address is located 0 bytes to the right of
[   27.992826]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.993186] 
[   27.993254] The buggy address belongs to the physical page:
[   27.993420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.993665] flags: 0x200000000000000(node=0|zone=2)
[   27.993918] page_type: f5(slab)
[   27.994097] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.994441] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.994830] page dumped because: kasan: bad access detected
[   27.995079] 
[   27.995165] Memory state around the buggy address:
[   27.995376]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.995701]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.996045] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.996248]                                      ^
[   27.996393]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.996595]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.997912] ==================================================================
[   28.217636] ==================================================================
[   28.217960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   28.218241] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   28.219010] 
[   28.219144] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   28.219306] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   28.219325] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.219351] Call Trace:
[   28.219373]  <TASK>
[   28.219396]  dump_stack_lvl+0x73/0xb0
[   28.219430]  print_report+0xd1/0x610
[   28.219455]  ? __virt_addr_valid+0x1db/0x2d0
[   28.219481]  ? kasan_atomics_helper+0x224c/0x5450
[   28.219503]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.219530]  ? kasan_atomics_helper+0x224c/0x5450
[   28.219552]  kasan_report+0x141/0x180
[   28.219575]  ? kasan_atomics_helper+0x224c/0x5450
[   28.219600]  kasan_check_range+0x10c/0x1c0
[   28.219624]  __kasan_check_write+0x18/0x20
[   28.219648]  kasan_atomics_helper+0x224c/0x5450
[   28.219687]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.219709]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.219735]  ? pick_task_fair+0xce/0x340
[   28.219834]  ? kasan_atomics+0x152/0x310
[   28.219861]  kasan_atomics+0x1dc/0x310
[   28.219885]  ? __pfx_kasan_atomics+0x10/0x10
[   28.219909]  ? __pfx_read_tsc+0x10/0x10
[   28.219932]  ? ktime_get_ts64+0x86/0x230
[   28.219957]  kunit_try_run_case+0x1a5/0x480
[   28.219982]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.220003]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.220029]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.220053]  ? __kthread_parkme+0x82/0x180
[   28.220076]  ? preempt_count_sub+0x50/0x80
[   28.220101]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.220124]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.220151]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.220177]  kthread+0x337/0x6f0
[   28.220198]  ? trace_preempt_on+0x20/0xc0
[   28.220223]  ? __pfx_kthread+0x10/0x10
[   28.220245]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.220268]  ? calculate_sigpending+0x7b/0xa0
[   28.220293]  ? __pfx_kthread+0x10/0x10
[   28.220316]  ret_from_fork+0x116/0x1d0
[   28.220336]  ? __pfx_kthread+0x10/0x10
[   28.220357]  ret_from_fork_asm+0x1a/0x30
[   28.220389]  </TASK>
[   28.220402] 
[   28.230186] Allocated by task 314:
[   28.230530]  kasan_save_stack+0x45/0x70
[   28.230903]  kasan_save_track+0x18/0x40
[   28.231179]  kasan_save_alloc_info+0x3b/0x50
[   28.231349]  __kasan_kmalloc+0xb7/0xc0
[   28.231662]  __kmalloc_cache_noprof+0x189/0x420
[   28.232074]  kasan_atomics+0x95/0x310
[   28.232393]  kunit_try_run_case+0x1a5/0x480
[   28.232552]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.232741]  kthread+0x337/0x6f0
[   28.232869]  ret_from_fork+0x116/0x1d0
[   28.232999]  ret_from_fork_asm+0x1a/0x30
[   28.233189] 
[   28.233290] The buggy address belongs to the object at ffff888103eb9580
[   28.233290]  which belongs to the cache kmalloc-64 of size 64
[   28.234303] The buggy address is located 0 bytes to the right of
[   28.234303]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   28.235074] 
[   28.235264] The buggy address belongs to the physical page:
[   28.235618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   28.236100] flags: 0x200000000000000(node=0|zone=2)
[   28.236409] page_type: f5(slab)
[   28.236581] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.237125] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.237491] page dumped because: kasan: bad access detected
[   28.237815] 
[   28.237913] Memory state around the buggy address:
[   28.238131]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.238671]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.239075] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.239469]                                      ^
[   28.239682]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.240111]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.240484] ==================================================================
[   27.203498] ==================================================================
[   27.203884] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   27.205282] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.205540] 
[   27.205628] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.205697] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.205712] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.205737] Call Trace:
[   27.206244]  <TASK>
[   27.206269]  dump_stack_lvl+0x73/0xb0
[   27.206311]  print_report+0xd1/0x610
[   27.206337]  ? __virt_addr_valid+0x1db/0x2d0
[   27.206372]  ? kasan_atomics_helper+0xb6a/0x5450
[   27.206395]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.206421]  ? kasan_atomics_helper+0xb6a/0x5450
[   27.206443]  kasan_report+0x141/0x180
[   27.206466]  ? kasan_atomics_helper+0xb6a/0x5450
[   27.206491]  kasan_check_range+0x10c/0x1c0
[   27.206516]  __kasan_check_write+0x18/0x20
[   27.206539]  kasan_atomics_helper+0xb6a/0x5450
[   27.206561]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.206585]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.206609]  ? pick_task_fair+0xce/0x340
[   27.206635]  ? kasan_atomics+0x152/0x310
[   27.206671]  kasan_atomics+0x1dc/0x310
[   27.206694]  ? __pfx_kasan_atomics+0x10/0x10
[   27.206719]  ? __pfx_read_tsc+0x10/0x10
[   27.206742]  ? ktime_get_ts64+0x86/0x230
[   27.206767]  kunit_try_run_case+0x1a5/0x480
[   27.206803]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.206824]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.206850]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.206874]  ? __kthread_parkme+0x82/0x180
[   27.206897]  ? preempt_count_sub+0x50/0x80
[   27.206922]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.206944]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.206973]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.207000]  kthread+0x337/0x6f0
[   27.207021]  ? trace_preempt_on+0x20/0xc0
[   27.207045]  ? __pfx_kthread+0x10/0x10
[   27.207068]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.207090]  ? calculate_sigpending+0x7b/0xa0
[   27.207115]  ? __pfx_kthread+0x10/0x10
[   27.207138]  ret_from_fork+0x116/0x1d0
[   27.207158]  ? __pfx_kthread+0x10/0x10
[   27.207180]  ret_from_fork_asm+0x1a/0x30
[   27.207212]  </TASK>
[   27.207225] 
[   27.218938] Allocated by task 314:
[   27.219111]  kasan_save_stack+0x45/0x70
[   27.219272]  kasan_save_track+0x18/0x40
[   27.219404]  kasan_save_alloc_info+0x3b/0x50
[   27.219547]  __kasan_kmalloc+0xb7/0xc0
[   27.220057]  __kmalloc_cache_noprof+0x189/0x420
[   27.220603]  kasan_atomics+0x95/0x310
[   27.221214]  kunit_try_run_case+0x1a5/0x480
[   27.221569]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.221775]  kthread+0x337/0x6f0
[   27.221898]  ret_from_fork+0x116/0x1d0
[   27.222035]  ret_from_fork_asm+0x1a/0x30
[   27.222699] 
[   27.222903] The buggy address belongs to the object at ffff888103eb9580
[   27.222903]  which belongs to the cache kmalloc-64 of size 64
[   27.224081] The buggy address is located 0 bytes to the right of
[   27.224081]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.225406] 
[   27.225582] The buggy address belongs to the physical page:
[   27.226337] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.226590] flags: 0x200000000000000(node=0|zone=2)
[   27.226778] page_type: f5(slab)
[   27.226911] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.227682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.228455] page dumped because: kasan: bad access detected
[   27.229157] 
[   27.229346] Memory state around the buggy address:
[   27.229983]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.230729]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.231444] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.231936]                                      ^
[   27.232393]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.232975]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.233550] ==================================================================
[   27.009650] ==================================================================
[   27.010006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   27.010402] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.010905] 
[   27.011288] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.011351] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.011366] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.011392] Call Trace:
[   27.011412]  <TASK>
[   27.011434]  dump_stack_lvl+0x73/0xb0
[   27.011472]  print_report+0xd1/0x610
[   27.011508]  ? __virt_addr_valid+0x1db/0x2d0
[   27.011534]  ? kasan_atomics_helper+0x697/0x5450
[   27.011567]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.011593]  ? kasan_atomics_helper+0x697/0x5450
[   27.011616]  kasan_report+0x141/0x180
[   27.011640]  ? kasan_atomics_helper+0x697/0x5450
[   27.011685]  kasan_check_range+0x10c/0x1c0
[   27.011710]  __kasan_check_write+0x18/0x20
[   27.011733]  kasan_atomics_helper+0x697/0x5450
[   27.011768]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.011792]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.011816]  ? pick_task_fair+0xce/0x340
[   27.011842]  ? kasan_atomics+0x152/0x310
[   27.011879]  kasan_atomics+0x1dc/0x310
[   27.011901]  ? __pfx_kasan_atomics+0x10/0x10
[   27.011926]  ? __pfx_read_tsc+0x10/0x10
[   27.012066]  ? ktime_get_ts64+0x86/0x230
[   27.012095]  kunit_try_run_case+0x1a5/0x480
[   27.012122]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.012144]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.012170]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.012194]  ? __kthread_parkme+0x82/0x180
[   27.012217]  ? preempt_count_sub+0x50/0x80
[   27.012242]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.012265]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.012360]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.012392]  kthread+0x337/0x6f0
[   27.012427]  ? trace_preempt_on+0x20/0xc0
[   27.012453]  ? __pfx_kthread+0x10/0x10
[   27.012475]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.012498]  ? calculate_sigpending+0x7b/0xa0
[   27.012524]  ? __pfx_kthread+0x10/0x10
[   27.012548]  ret_from_fork+0x116/0x1d0
[   27.012569]  ? __pfx_kthread+0x10/0x10
[   27.012590]  ret_from_fork_asm+0x1a/0x30
[   27.012623]  </TASK>
[   27.012637] 
[   27.021739] Allocated by task 314:
[   27.022069]  kasan_save_stack+0x45/0x70
[   27.022237]  kasan_save_track+0x18/0x40
[   27.022414]  kasan_save_alloc_info+0x3b/0x50
[   27.022621]  __kasan_kmalloc+0xb7/0xc0
[   27.022875]  __kmalloc_cache_noprof+0x189/0x420
[   27.023320]  kasan_atomics+0x95/0x310
[   27.023511]  kunit_try_run_case+0x1a5/0x480
[   27.023849]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.024283]  kthread+0x337/0x6f0
[   27.024467]  ret_from_fork+0x116/0x1d0
[   27.024678]  ret_from_fork_asm+0x1a/0x30
[   27.024927] 
[   27.025040] The buggy address belongs to the object at ffff888103eb9580
[   27.025040]  which belongs to the cache kmalloc-64 of size 64
[   27.025576] The buggy address is located 0 bytes to the right of
[   27.025576]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.026331] 
[   27.026464] The buggy address belongs to the physical page:
[   27.026687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.027277] flags: 0x200000000000000(node=0|zone=2)
[   27.027563] page_type: f5(slab)
[   27.027719] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.028213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.028573] page dumped because: kasan: bad access detected
[   27.028861] 
[   27.028950] Memory state around the buggy address:
[   27.029208]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.029513]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.029746] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.029997]                                      ^
[   27.030222]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.030650]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.031279] ==================================================================
[   27.382703] ==================================================================
[   27.383046] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   27.383387] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.383707] 
[   27.383828] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.383885] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.383900] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.383926] Call Trace:
[   27.383947]  <TASK>
[   27.383982]  dump_stack_lvl+0x73/0xb0
[   27.384016]  print_report+0xd1/0x610
[   27.384040]  ? __virt_addr_valid+0x1db/0x2d0
[   27.384080]  ? kasan_atomics_helper+0xfa9/0x5450
[   27.384101]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.384138]  ? kasan_atomics_helper+0xfa9/0x5450
[   27.384161]  kasan_report+0x141/0x180
[   27.384183]  ? kasan_atomics_helper+0xfa9/0x5450
[   27.384221]  kasan_check_range+0x10c/0x1c0
[   27.384246]  __kasan_check_write+0x18/0x20
[   27.384269]  kasan_atomics_helper+0xfa9/0x5450
[   27.384314]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.384337]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.384372]  ? pick_task_fair+0xce/0x340
[   27.384399]  ? kasan_atomics+0x152/0x310
[   27.384426]  kasan_atomics+0x1dc/0x310
[   27.384449]  ? __pfx_kasan_atomics+0x10/0x10
[   27.384474]  ? __pfx_read_tsc+0x10/0x10
[   27.384498]  ? ktime_get_ts64+0x86/0x230
[   27.384523]  kunit_try_run_case+0x1a5/0x480
[   27.384548]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.384569]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.384594]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.384619]  ? __kthread_parkme+0x82/0x180
[   27.384641]  ? preempt_count_sub+0x50/0x80
[   27.384675]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.384697]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.384742]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.384772]  kthread+0x337/0x6f0
[   27.384794]  ? trace_preempt_on+0x20/0xc0
[   27.384819]  ? __pfx_kthread+0x10/0x10
[   27.384841]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.384863]  ? calculate_sigpending+0x7b/0xa0
[   27.384889]  ? __pfx_kthread+0x10/0x10
[   27.384911]  ret_from_fork+0x116/0x1d0
[   27.384932]  ? __pfx_kthread+0x10/0x10
[   27.384953]  ret_from_fork_asm+0x1a/0x30
[   27.384984]  </TASK>
[   27.384996] 
[   27.392533] Allocated by task 314:
[   27.392788]  kasan_save_stack+0x45/0x70
[   27.393001]  kasan_save_track+0x18/0x40
[   27.393191]  kasan_save_alloc_info+0x3b/0x50
[   27.393396]  __kasan_kmalloc+0xb7/0xc0
[   27.393578]  __kmalloc_cache_noprof+0x189/0x420
[   27.393788]  kasan_atomics+0x95/0x310
[   27.393922]  kunit_try_run_case+0x1a5/0x480
[   27.394135]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.394416]  kthread+0x337/0x6f0
[   27.394582]  ret_from_fork+0x116/0x1d0
[   27.394785]  ret_from_fork_asm+0x1a/0x30
[   27.394928] 
[   27.394995] The buggy address belongs to the object at ffff888103eb9580
[   27.394995]  which belongs to the cache kmalloc-64 of size 64
[   27.395404] The buggy address is located 0 bytes to the right of
[   27.395404]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.395995] 
[   27.396092] The buggy address belongs to the physical page:
[   27.396330] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.396567] flags: 0x200000000000000(node=0|zone=2)
[   27.396818] page_type: f5(slab)
[   27.396988] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.397347] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.397671] page dumped because: kasan: bad access detected
[   27.397893] 
[   27.397961] Memory state around the buggy address:
[   27.398187]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.398508]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.398851] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.399126]                                      ^
[   27.399351]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.399640]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.399947] ==================================================================
[   27.527403] ==================================================================
[   27.527801] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   27.528079] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.528302] 
[   27.528389] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.528445] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.528460] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.528485] Call Trace:
[   27.528507]  <TASK>
[   27.528527]  dump_stack_lvl+0x73/0xb0
[   27.528559]  print_report+0xd1/0x610
[   27.528583]  ? __virt_addr_valid+0x1db/0x2d0
[   27.528608]  ? kasan_atomics_helper+0x12e6/0x5450
[   27.528630]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.528677]  ? kasan_atomics_helper+0x12e6/0x5450
[   27.528700]  kasan_report+0x141/0x180
[   27.528745]  ? kasan_atomics_helper+0x12e6/0x5450
[   27.528773]  kasan_check_range+0x10c/0x1c0
[   27.528797]  __kasan_check_write+0x18/0x20
[   27.528821]  kasan_atomics_helper+0x12e6/0x5450
[   27.528845]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.528867]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.528892]  ? pick_task_fair+0xce/0x340
[   27.528919]  ? kasan_atomics+0x152/0x310
[   27.528946]  kasan_atomics+0x1dc/0x310
[   27.528969]  ? __pfx_kasan_atomics+0x10/0x10
[   27.528994]  ? __pfx_read_tsc+0x10/0x10
[   27.529017]  ? ktime_get_ts64+0x86/0x230
[   27.529044]  kunit_try_run_case+0x1a5/0x480
[   27.529069]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.529090]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.529116]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.529141]  ? __kthread_parkme+0x82/0x180
[   27.529164]  ? preempt_count_sub+0x50/0x80
[   27.529188]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.529211]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.529237]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.529263]  kthread+0x337/0x6f0
[   27.529285]  ? trace_preempt_on+0x20/0xc0
[   27.529311]  ? __pfx_kthread+0x10/0x10
[   27.529333]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.529356]  ? calculate_sigpending+0x7b/0xa0
[   27.529380]  ? __pfx_kthread+0x10/0x10
[   27.529402]  ret_from_fork+0x116/0x1d0
[   27.529423]  ? __pfx_kthread+0x10/0x10
[   27.529444]  ret_from_fork_asm+0x1a/0x30
[   27.529477]  </TASK>
[   27.529490] 
[   27.536646] Allocated by task 314:
[   27.536876]  kasan_save_stack+0x45/0x70
[   27.537087]  kasan_save_track+0x18/0x40
[   27.537275]  kasan_save_alloc_info+0x3b/0x50
[   27.537484]  __kasan_kmalloc+0xb7/0xc0
[   27.537651]  __kmalloc_cache_noprof+0x189/0x420
[   27.537883]  kasan_atomics+0x95/0x310
[   27.538063]  kunit_try_run_case+0x1a5/0x480
[   27.538258]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.538463]  kthread+0x337/0x6f0
[   27.538635]  ret_from_fork+0x116/0x1d0
[   27.538819]  ret_from_fork_asm+0x1a/0x30
[   27.539018] 
[   27.539092] The buggy address belongs to the object at ffff888103eb9580
[   27.539092]  which belongs to the cache kmalloc-64 of size 64
[   27.539473] The buggy address is located 0 bytes to the right of
[   27.539473]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.540027] 
[   27.540125] The buggy address belongs to the physical page:
[   27.540381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.540624] flags: 0x200000000000000(node=0|zone=2)
[   27.540892] page_type: f5(slab)
[   27.541063] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.541379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.541679] page dumped because: kasan: bad access detected
[   27.541869] 
[   27.541935] Memory state around the buggy address:
[   27.542095]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.542306]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.542515] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.542838]                                      ^
[   27.543067]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.543382]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.543707] ==================================================================
[   27.663712] ==================================================================
[   27.664071] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   27.664589] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.665495] 
[   27.665719] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.665788] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.665803] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.665830] Call Trace:
[   27.665852]  <TASK>
[   27.665874]  dump_stack_lvl+0x73/0xb0
[   27.665908]  print_report+0xd1/0x610
[   27.665934]  ? __virt_addr_valid+0x1db/0x2d0
[   27.665982]  ? kasan_atomics_helper+0x151d/0x5450
[   27.666006]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.666032]  ? kasan_atomics_helper+0x151d/0x5450
[   27.666062]  kasan_report+0x141/0x180
[   27.666085]  ? kasan_atomics_helper+0x151d/0x5450
[   27.666111]  kasan_check_range+0x10c/0x1c0
[   27.666135]  __kasan_check_write+0x18/0x20
[   27.666159]  kasan_atomics_helper+0x151d/0x5450
[   27.666182]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.666205]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.666229]  ? pick_task_fair+0xce/0x340
[   27.666255]  ? kasan_atomics+0x152/0x310
[   27.666282]  kasan_atomics+0x1dc/0x310
[   27.666305]  ? __pfx_kasan_atomics+0x10/0x10
[   27.666330]  ? __pfx_read_tsc+0x10/0x10
[   27.666353]  ? ktime_get_ts64+0x86/0x230
[   27.666379]  kunit_try_run_case+0x1a5/0x480
[   27.666404]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.666425]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.666450]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.666475]  ? __kthread_parkme+0x82/0x180
[   27.666499]  ? preempt_count_sub+0x50/0x80
[   27.666524]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.666547]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.666577]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.666608]  kthread+0x337/0x6f0
[   27.666631]  ? trace_preempt_on+0x20/0xc0
[   27.666667]  ? __pfx_kthread+0x10/0x10
[   27.666690]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.666714]  ? calculate_sigpending+0x7b/0xa0
[   27.666740]  ? __pfx_kthread+0x10/0x10
[   27.666775]  ret_from_fork+0x116/0x1d0
[   27.666796]  ? __pfx_kthread+0x10/0x10
[   27.666820]  ret_from_fork_asm+0x1a/0x30
[   27.666853]  </TASK>
[   27.666866] 
[   27.675977] Allocated by task 314:
[   27.676135]  kasan_save_stack+0x45/0x70
[   27.676309]  kasan_save_track+0x18/0x40
[   27.676517]  kasan_save_alloc_info+0x3b/0x50
[   27.676740]  __kasan_kmalloc+0xb7/0xc0
[   27.676920]  __kmalloc_cache_noprof+0x189/0x420
[   27.677157]  kasan_atomics+0x95/0x310
[   27.677365]  kunit_try_run_case+0x1a5/0x480
[   27.677605]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.677856]  kthread+0x337/0x6f0
[   27.678199]  ret_from_fork+0x116/0x1d0
[   27.678382]  ret_from_fork_asm+0x1a/0x30
[   27.678570] 
[   27.678668] The buggy address belongs to the object at ffff888103eb9580
[   27.678668]  which belongs to the cache kmalloc-64 of size 64
[   27.679150] The buggy address is located 0 bytes to the right of
[   27.679150]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.679988] 
[   27.680095] The buggy address belongs to the physical page:
[   27.680325] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.680629] flags: 0x200000000000000(node=0|zone=2)
[   27.680926] page_type: f5(slab)
[   27.681094] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.681421] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.681698] page dumped because: kasan: bad access detected
[   27.681994] 
[   27.682097] Memory state around the buggy address:
[   27.682320]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.682617]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.682934] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.683244]                                      ^
[   27.683457]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.683740]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.684107] ==================================================================
[   27.860597] ==================================================================
[   27.860953] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   27.861551] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.861923] 
[   27.862049] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.862105] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.862120] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.862146] Call Trace:
[   27.862166]  <TASK>
[   27.862209]  dump_stack_lvl+0x73/0xb0
[   27.862256]  print_report+0xd1/0x610
[   27.862294]  ? __virt_addr_valid+0x1db/0x2d0
[   27.862331]  ? kasan_atomics_helper+0x19e3/0x5450
[   27.862367]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.862407]  ? kasan_atomics_helper+0x19e3/0x5450
[   27.862456]  kasan_report+0x141/0x180
[   27.862493]  ? kasan_atomics_helper+0x19e3/0x5450
[   27.862533]  kasan_check_range+0x10c/0x1c0
[   27.862571]  __kasan_check_write+0x18/0x20
[   27.862594]  kasan_atomics_helper+0x19e3/0x5450
[   27.862618]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.862641]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.862677]  ? pick_task_fair+0xce/0x340
[   27.862703]  ? kasan_atomics+0x152/0x310
[   27.862730]  kasan_atomics+0x1dc/0x310
[   27.862753]  ? __pfx_kasan_atomics+0x10/0x10
[   27.862778]  ? __pfx_read_tsc+0x10/0x10
[   27.862800]  ? ktime_get_ts64+0x86/0x230
[   27.862826]  kunit_try_run_case+0x1a5/0x480
[   27.862849]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.862882]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.862917]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.862953]  ? __kthread_parkme+0x82/0x180
[   27.862975]  ? preempt_count_sub+0x50/0x80
[   27.862999]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.863022]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.863048]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.863074]  kthread+0x337/0x6f0
[   27.863095]  ? trace_preempt_on+0x20/0xc0
[   27.863119]  ? __pfx_kthread+0x10/0x10
[   27.863141]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.863164]  ? calculate_sigpending+0x7b/0xa0
[   27.863189]  ? __pfx_kthread+0x10/0x10
[   27.863211]  ret_from_fork+0x116/0x1d0
[   27.863232]  ? __pfx_kthread+0x10/0x10
[   27.863254]  ret_from_fork_asm+0x1a/0x30
[   27.863287]  </TASK>
[   27.863299] 
[   27.871280] Allocated by task 314:
[   27.871495]  kasan_save_stack+0x45/0x70
[   27.871737]  kasan_save_track+0x18/0x40
[   27.871944]  kasan_save_alloc_info+0x3b/0x50
[   27.872170]  __kasan_kmalloc+0xb7/0xc0
[   27.872349]  __kmalloc_cache_noprof+0x189/0x420
[   27.872574]  kasan_atomics+0x95/0x310
[   27.872820]  kunit_try_run_case+0x1a5/0x480
[   27.873026]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.873333]  kthread+0x337/0x6f0
[   27.873543]  ret_from_fork+0x116/0x1d0
[   27.873735]  ret_from_fork_asm+0x1a/0x30
[   27.874010] 
[   27.874095] The buggy address belongs to the object at ffff888103eb9580
[   27.874095]  which belongs to the cache kmalloc-64 of size 64
[   27.874574] The buggy address is located 0 bytes to the right of
[   27.874574]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.875158] 
[   27.875262] The buggy address belongs to the physical page:
[   27.875507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.875936] flags: 0x200000000000000(node=0|zone=2)
[   27.876194] page_type: f5(slab)
[   27.876351] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.876715] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.877048] page dumped because: kasan: bad access detected
[   27.877318] 
[   27.877405] Memory state around the buggy address:
[   27.877630]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.878058]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.878397] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.878760]                                      ^
[   27.879060]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.879268]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.879467] ==================================================================
[   27.999586] ==================================================================
[   28.000808] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   28.001886] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   28.002294] 
[   28.002403] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   28.002463] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   28.002478] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.002504] Call Trace:
[   28.002526]  <TASK>
[   28.002548]  dump_stack_lvl+0x73/0xb0
[   28.002586]  print_report+0xd1/0x610
[   28.002610]  ? __virt_addr_valid+0x1db/0x2d0
[   28.002635]  ? kasan_atomics_helper+0x1e12/0x5450
[   28.002672]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.002699]  ? kasan_atomics_helper+0x1e12/0x5450
[   28.002722]  kasan_report+0x141/0x180
[   28.002899]  ? kasan_atomics_helper+0x1e12/0x5450
[   28.002930]  kasan_check_range+0x10c/0x1c0
[   28.002956]  __kasan_check_write+0x18/0x20
[   28.002980]  kasan_atomics_helper+0x1e12/0x5450
[   28.003003]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.003071]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.003098]  ? pick_task_fair+0xce/0x340
[   28.003126]  ? kasan_atomics+0x152/0x310
[   28.003153]  kasan_atomics+0x1dc/0x310
[   28.003176]  ? __pfx_kasan_atomics+0x10/0x10
[   28.003200]  ? __pfx_read_tsc+0x10/0x10
[   28.003223]  ? ktime_get_ts64+0x86/0x230
[   28.003248]  kunit_try_run_case+0x1a5/0x480
[   28.003273]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.003294]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.003320]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.003344]  ? __kthread_parkme+0x82/0x180
[   28.003367]  ? preempt_count_sub+0x50/0x80
[   28.003393]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.003415]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.003442]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.003469]  kthread+0x337/0x6f0
[   28.003490]  ? trace_preempt_on+0x20/0xc0
[   28.003515]  ? __pfx_kthread+0x10/0x10
[   28.003537]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.003560]  ? calculate_sigpending+0x7b/0xa0
[   28.003585]  ? __pfx_kthread+0x10/0x10
[   28.003608]  ret_from_fork+0x116/0x1d0
[   28.003629]  ? __pfx_kthread+0x10/0x10
[   28.003661]  ret_from_fork_asm+0x1a/0x30
[   28.003693]  </TASK>
[   28.003706] 
[   28.015456] Allocated by task 314:
[   28.015663]  kasan_save_stack+0x45/0x70
[   28.016018]  kasan_save_track+0x18/0x40
[   28.016500]  kasan_save_alloc_info+0x3b/0x50
[   28.016827]  __kasan_kmalloc+0xb7/0xc0
[   28.017135]  __kmalloc_cache_noprof+0x189/0x420
[   28.017536]  kasan_atomics+0x95/0x310
[   28.017734]  kunit_try_run_case+0x1a5/0x480
[   28.018103]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.018337]  kthread+0x337/0x6f0
[   28.018491]  ret_from_fork+0x116/0x1d0
[   28.018670]  ret_from_fork_asm+0x1a/0x30
[   28.019073] 
[   28.019299] The buggy address belongs to the object at ffff888103eb9580
[   28.019299]  which belongs to the cache kmalloc-64 of size 64
[   28.020176] The buggy address is located 0 bytes to the right of
[   28.020176]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   28.020942] 
[   28.021041] The buggy address belongs to the physical page:
[   28.021273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   28.021593] flags: 0x200000000000000(node=0|zone=2)
[   28.022184] page_type: f5(slab)
[   28.022499] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.023007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.023510] page dumped because: kasan: bad access detected
[   28.023971] 
[   28.024197] Memory state around the buggy address:
[   28.024421]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.024720]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.025005] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.025280]                                      ^
[   28.025480]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.026194]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.026535] ==================================================================
[   26.965116] ==================================================================
[   26.965466] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   26.965861] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   26.966208] 
[   26.966352] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   26.966408] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.966423] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.966449] Call Trace:
[   26.966472]  <TASK>
[   26.966493]  dump_stack_lvl+0x73/0xb0
[   26.966526]  print_report+0xd1/0x610
[   26.966549]  ? __virt_addr_valid+0x1db/0x2d0
[   26.966704]  ? kasan_atomics_helper+0x565/0x5450
[   26.966725]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.966775]  ? kasan_atomics_helper+0x565/0x5450
[   26.966806]  kasan_report+0x141/0x180
[   26.966830]  ? kasan_atomics_helper+0x565/0x5450
[   26.966857]  kasan_check_range+0x10c/0x1c0
[   26.966891]  __kasan_check_write+0x18/0x20
[   26.966915]  kasan_atomics_helper+0x565/0x5450
[   26.966938]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.967002]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.967026]  ? pick_task_fair+0xce/0x340
[   26.967077]  ? kasan_atomics+0x152/0x310
[   26.967104]  kasan_atomics+0x1dc/0x310
[   26.967129]  ? __pfx_kasan_atomics+0x10/0x10
[   26.967154]  ? __pfx_read_tsc+0x10/0x10
[   26.967177]  ? ktime_get_ts64+0x86/0x230
[   26.967203]  kunit_try_run_case+0x1a5/0x480
[   26.967228]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.967249]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.967285]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.967310]  ? __kthread_parkme+0x82/0x180
[   26.967332]  ? preempt_count_sub+0x50/0x80
[   26.967368]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.967392]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.967418]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.967453]  kthread+0x337/0x6f0
[   26.967475]  ? trace_preempt_on+0x20/0xc0
[   26.967499]  ? __pfx_kthread+0x10/0x10
[   26.967531]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.967555]  ? calculate_sigpending+0x7b/0xa0
[   26.967579]  ? __pfx_kthread+0x10/0x10
[   26.967602]  ret_from_fork+0x116/0x1d0
[   26.967630]  ? __pfx_kthread+0x10/0x10
[   26.967652]  ret_from_fork_asm+0x1a/0x30
[   26.967701]  </TASK>
[   26.967714] 
[   26.976940] Allocated by task 314:
[   26.977159]  kasan_save_stack+0x45/0x70
[   26.977540]  kasan_save_track+0x18/0x40
[   26.977715]  kasan_save_alloc_info+0x3b/0x50
[   26.977936]  __kasan_kmalloc+0xb7/0xc0
[   26.978124]  __kmalloc_cache_noprof+0x189/0x420
[   26.978676]  kasan_atomics+0x95/0x310
[   26.978905]  kunit_try_run_case+0x1a5/0x480
[   26.979189]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.979451]  kthread+0x337/0x6f0
[   26.979631]  ret_from_fork+0x116/0x1d0
[   26.979868]  ret_from_fork_asm+0x1a/0x30
[   26.980189] 
[   26.980299] The buggy address belongs to the object at ffff888103eb9580
[   26.980299]  which belongs to the cache kmalloc-64 of size 64
[   26.980699] The buggy address is located 0 bytes to the right of
[   26.980699]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   26.981358] 
[   26.981459] The buggy address belongs to the physical page:
[   26.981687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   26.982483] flags: 0x200000000000000(node=0|zone=2)
[   26.982736] page_type: f5(slab)
[   26.982886] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.983474] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.983915] page dumped because: kasan: bad access detected
[   26.984227] 
[   26.984442] Memory state around the buggy address:
[   26.984619]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.984904]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.985250] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.985695]                                      ^
[   26.986060]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.986485]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.986914] ==================================================================
[   27.510096] ==================================================================
[   27.510402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   27.510736] Read of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.511014] 
[   27.511101] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.511154] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.511168] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.511193] Call Trace:
[   27.511214]  <TASK>
[   27.511235]  dump_stack_lvl+0x73/0xb0
[   27.511265]  print_report+0xd1/0x610
[   27.511288]  ? __virt_addr_valid+0x1db/0x2d0
[   27.511313]  ? kasan_atomics_helper+0x49e8/0x5450
[   27.511334]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.511361]  ? kasan_atomics_helper+0x49e8/0x5450
[   27.511383]  kasan_report+0x141/0x180
[   27.511406]  ? kasan_atomics_helper+0x49e8/0x5450
[   27.511432]  __asan_report_load4_noabort+0x18/0x20
[   27.511456]  kasan_atomics_helper+0x49e8/0x5450
[   27.511479]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.511502]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.511527]  ? pick_task_fair+0xce/0x340
[   27.511554]  ? kasan_atomics+0x152/0x310
[   27.511581]  kasan_atomics+0x1dc/0x310
[   27.511604]  ? __pfx_kasan_atomics+0x10/0x10
[   27.511632]  ? __pfx_read_tsc+0x10/0x10
[   27.511867]  ? ktime_get_ts64+0x86/0x230
[   27.511903]  kunit_try_run_case+0x1a5/0x480
[   27.511930]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.511952]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.511979]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.512004]  ? __kthread_parkme+0x82/0x180
[   27.512027]  ? preempt_count_sub+0x50/0x80
[   27.512053]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.512076]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.512103]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.512130]  kthread+0x337/0x6f0
[   27.512150]  ? trace_preempt_on+0x20/0xc0
[   27.512175]  ? __pfx_kthread+0x10/0x10
[   27.512197]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.512220]  ? calculate_sigpending+0x7b/0xa0
[   27.512246]  ? __pfx_kthread+0x10/0x10
[   27.512269]  ret_from_fork+0x116/0x1d0
[   27.512290]  ? __pfx_kthread+0x10/0x10
[   27.512311]  ret_from_fork_asm+0x1a/0x30
[   27.512345]  </TASK>
[   27.512357] 
[   27.519424] Allocated by task 314:
[   27.519575]  kasan_save_stack+0x45/0x70
[   27.519780]  kasan_save_track+0x18/0x40
[   27.519947]  kasan_save_alloc_info+0x3b/0x50
[   27.520093]  __kasan_kmalloc+0xb7/0xc0
[   27.520269]  __kmalloc_cache_noprof+0x189/0x420
[   27.520487]  kasan_atomics+0x95/0x310
[   27.520680]  kunit_try_run_case+0x1a5/0x480
[   27.520887]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.521078]  kthread+0x337/0x6f0
[   27.521198]  ret_from_fork+0x116/0x1d0
[   27.521380]  ret_from_fork_asm+0x1a/0x30
[   27.521558] 
[   27.521644] The buggy address belongs to the object at ffff888103eb9580
[   27.521644]  which belongs to the cache kmalloc-64 of size 64
[   27.522025] The buggy address is located 0 bytes to the right of
[   27.522025]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.522391] 
[   27.522460] The buggy address belongs to the physical page:
[   27.522627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.522924] flags: 0x200000000000000(node=0|zone=2)
[   27.523157] page_type: f5(slab)
[   27.523324] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.523670] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.524014] page dumped because: kasan: bad access detected
[   27.524243] 
[   27.524330] Memory state around the buggy address:
[   27.524548]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.524893]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.525160] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.525365]                                      ^
[   27.525516]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.525795]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.526121] ==================================================================
[   27.357359] ==================================================================
[   27.357705] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   27.358392] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.358847] 
[   27.358946] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.359002] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.359017] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.359308] Call Trace:
[   27.359332]  <TASK>
[   27.359353]  dump_stack_lvl+0x73/0xb0
[   27.359390]  print_report+0xd1/0x610
[   27.359414]  ? __virt_addr_valid+0x1db/0x2d0
[   27.359439]  ? kasan_atomics_helper+0xf10/0x5450
[   27.359461]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.359487]  ? kasan_atomics_helper+0xf10/0x5450
[   27.359510]  kasan_report+0x141/0x180
[   27.359533]  ? kasan_atomics_helper+0xf10/0x5450
[   27.359560]  kasan_check_range+0x10c/0x1c0
[   27.359583]  __kasan_check_write+0x18/0x20
[   27.359607]  kasan_atomics_helper+0xf10/0x5450
[   27.359630]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.359666]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.359691]  ? pick_task_fair+0xce/0x340
[   27.359717]  ? kasan_atomics+0x152/0x310
[   27.359743]  kasan_atomics+0x1dc/0x310
[   27.359766]  ? __pfx_kasan_atomics+0x10/0x10
[   27.359790]  ? __pfx_read_tsc+0x10/0x10
[   27.359813]  ? ktime_get_ts64+0x86/0x230
[   27.359838]  kunit_try_run_case+0x1a5/0x480
[   27.359862]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.359884]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.359910]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.359934]  ? __kthread_parkme+0x82/0x180
[   27.359957]  ? preempt_count_sub+0x50/0x80
[   27.359981]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.360004]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.360029]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.360055]  kthread+0x337/0x6f0
[   27.360076]  ? trace_preempt_on+0x20/0xc0
[   27.360101]  ? __pfx_kthread+0x10/0x10
[   27.360122]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.360145]  ? calculate_sigpending+0x7b/0xa0
[   27.360170]  ? __pfx_kthread+0x10/0x10
[   27.360193]  ret_from_fork+0x116/0x1d0
[   27.360213]  ? __pfx_kthread+0x10/0x10
[   27.360234]  ret_from_fork_asm+0x1a/0x30
[   27.360266]  </TASK>
[   27.360279] 
[   27.369649] Allocated by task 314:
[   27.370017]  kasan_save_stack+0x45/0x70
[   27.370291]  kasan_save_track+0x18/0x40
[   27.370421]  kasan_save_alloc_info+0x3b/0x50
[   27.370563]  __kasan_kmalloc+0xb7/0xc0
[   27.370698]  __kmalloc_cache_noprof+0x189/0x420
[   27.371210]  kasan_atomics+0x95/0x310
[   27.371401]  kunit_try_run_case+0x1a5/0x480
[   27.371603]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.371817]  kthread+0x337/0x6f0
[   27.373395]  ret_from_fork+0x116/0x1d0
[   27.373549]  ret_from_fork_asm+0x1a/0x30
[   27.373705] 
[   27.373782] The buggy address belongs to the object at ffff888103eb9580
[   27.373782]  which belongs to the cache kmalloc-64 of size 64
[   27.374141] The buggy address is located 0 bytes to the right of
[   27.374141]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.374504] 
[   27.374574] The buggy address belongs to the physical page:
[   27.374762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.375001] flags: 0x200000000000000(node=0|zone=2)
[   27.375164] page_type: f5(slab)
[   27.375289] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.375523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.377931] page dumped because: kasan: bad access detected
[   27.378615] 
[   27.379110] Memory state around the buggy address:
[   27.379770]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.380328]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.380574] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.380934]                                      ^
[   27.381176]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.381463]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.381796] ==================================================================
[   28.144755] ==================================================================
[   28.145083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   28.145387] Read of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   28.145706] 
[   28.145869] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   28.145923] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   28.145937] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.145962] Call Trace:
[   28.145982]  <TASK>
[   28.146001]  dump_stack_lvl+0x73/0xb0
[   28.146031]  print_report+0xd1/0x610
[   28.146060]  ? __virt_addr_valid+0x1db/0x2d0
[   28.146084]  ? kasan_atomics_helper+0x4fb2/0x5450
[   28.146105]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.146132]  ? kasan_atomics_helper+0x4fb2/0x5450
[   28.146154]  kasan_report+0x141/0x180
[   28.146177]  ? kasan_atomics_helper+0x4fb2/0x5450
[   28.146203]  __asan_report_load8_noabort+0x18/0x20
[   28.146227]  kasan_atomics_helper+0x4fb2/0x5450
[   28.146252]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.146277]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.146302]  ? pick_task_fair+0xce/0x340
[   28.146327]  ? kasan_atomics+0x152/0x310
[   28.146355]  kasan_atomics+0x1dc/0x310
[   28.146380]  ? __pfx_kasan_atomics+0x10/0x10
[   28.146404]  ? __pfx_read_tsc+0x10/0x10
[   28.146427]  ? ktime_get_ts64+0x86/0x230
[   28.146453]  kunit_try_run_case+0x1a5/0x480
[   28.146477]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.146498]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.146524]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.146549]  ? __kthread_parkme+0x82/0x180
[   28.146571]  ? preempt_count_sub+0x50/0x80
[   28.146596]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.146618]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.146644]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.146681]  kthread+0x337/0x6f0
[   28.146702]  ? trace_preempt_on+0x20/0xc0
[   28.146726]  ? __pfx_kthread+0x10/0x10
[   28.146758]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.146781]  ? calculate_sigpending+0x7b/0xa0
[   28.146806]  ? __pfx_kthread+0x10/0x10
[   28.146828]  ret_from_fork+0x116/0x1d0
[   28.146849]  ? __pfx_kthread+0x10/0x10
[   28.146871]  ret_from_fork_asm+0x1a/0x30
[   28.146903]  </TASK>
[   28.146915] 
[   28.154119] Allocated by task 314:
[   28.154261]  kasan_save_stack+0x45/0x70
[   28.154408]  kasan_save_track+0x18/0x40
[   28.154557]  kasan_save_alloc_info+0x3b/0x50
[   28.154780]  __kasan_kmalloc+0xb7/0xc0
[   28.154971]  __kmalloc_cache_noprof+0x189/0x420
[   28.155185]  kasan_atomics+0x95/0x310
[   28.155818]  kunit_try_run_case+0x1a5/0x480
[   28.156057]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.156470]  kthread+0x337/0x6f0
[   28.156645]  ret_from_fork+0x116/0x1d0
[   28.161818]  ret_from_fork_asm+0x1a/0x30
[   28.162081] 
[   28.162182] The buggy address belongs to the object at ffff888103eb9580
[   28.162182]  which belongs to the cache kmalloc-64 of size 64
[   28.162648] The buggy address is located 0 bytes to the right of
[   28.162648]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   28.164752] 
[   28.165335] The buggy address belongs to the physical page:
[   28.165904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   28.166153] flags: 0x200000000000000(node=0|zone=2)
[   28.166315] page_type: f5(slab)
[   28.166433] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.166690] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.167069] page dumped because: kasan: bad access detected
[   28.167329] 
[   28.167419] Memory state around the buggy address:
[   28.167645]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.167983]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.168275] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.168538]                                      ^
[   28.168753]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.169041]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.169322] ==================================================================
[   27.419351] ==================================================================
[   27.419623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   27.420069] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.420409] 
[   27.420521] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.420630] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.420646] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.420680] Call Trace:
[   27.420701]  <TASK>
[   27.420741]  dump_stack_lvl+0x73/0xb0
[   27.420776]  print_report+0xd1/0x610
[   27.420800]  ? __virt_addr_valid+0x1db/0x2d0
[   27.420827]  ? kasan_atomics_helper+0x1079/0x5450
[   27.420849]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.420877]  ? kasan_atomics_helper+0x1079/0x5450
[   27.420899]  kasan_report+0x141/0x180
[   27.420922]  ? kasan_atomics_helper+0x1079/0x5450
[   27.420948]  kasan_check_range+0x10c/0x1c0
[   27.420973]  __kasan_check_write+0x18/0x20
[   27.420998]  kasan_atomics_helper+0x1079/0x5450
[   27.421020]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.421043]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.421079]  ? pick_task_fair+0xce/0x340
[   27.421104]  ? kasan_atomics+0x152/0x310
[   27.421143]  kasan_atomics+0x1dc/0x310
[   27.421166]  ? __pfx_kasan_atomics+0x10/0x10
[   27.421191]  ? __pfx_read_tsc+0x10/0x10
[   27.421213]  ? ktime_get_ts64+0x86/0x230
[   27.421238]  kunit_try_run_case+0x1a5/0x480
[   27.421263]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.421284]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.421310]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.421334]  ? __kthread_parkme+0x82/0x180
[   27.421356]  ? preempt_count_sub+0x50/0x80
[   27.421381]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.421405]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.421431]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.421457]  kthread+0x337/0x6f0
[   27.421479]  ? trace_preempt_on+0x20/0xc0
[   27.421503]  ? __pfx_kthread+0x10/0x10
[   27.421525]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.421549]  ? calculate_sigpending+0x7b/0xa0
[   27.421574]  ? __pfx_kthread+0x10/0x10
[   27.421597]  ret_from_fork+0x116/0x1d0
[   27.421617]  ? __pfx_kthread+0x10/0x10
[   27.421639]  ret_from_fork_asm+0x1a/0x30
[   27.421691]  </TASK>
[   27.421703] 
[   27.429093] Allocated by task 314:
[   27.429293]  kasan_save_stack+0x45/0x70
[   27.429536]  kasan_save_track+0x18/0x40
[   27.429780]  kasan_save_alloc_info+0x3b/0x50
[   27.429991]  __kasan_kmalloc+0xb7/0xc0
[   27.430196]  __kmalloc_cache_noprof+0x189/0x420
[   27.430449]  kasan_atomics+0x95/0x310
[   27.430643]  kunit_try_run_case+0x1a5/0x480
[   27.430875]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.431074]  kthread+0x337/0x6f0
[   27.431244]  ret_from_fork+0x116/0x1d0
[   27.431454]  ret_from_fork_asm+0x1a/0x30
[   27.431620] 
[   27.431703] The buggy address belongs to the object at ffff888103eb9580
[   27.431703]  which belongs to the cache kmalloc-64 of size 64
[   27.432213] The buggy address is located 0 bytes to the right of
[   27.432213]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.432668] 
[   27.432767] The buggy address belongs to the physical page:
[   27.432937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.433179] flags: 0x200000000000000(node=0|zone=2)
[   27.433432] page_type: f5(slab)
[   27.433599] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.433970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.434311] page dumped because: kasan: bad access detected
[   27.434557] 
[   27.434650] Memory state around the buggy address:
[   27.434913]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.435153]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.435362] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.435617]                                      ^
[   27.435888]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.436215]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.436552] ==================================================================
[   27.904398] ==================================================================
[   27.905130] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   27.905481] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.905854] 
[   27.905959] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.906016] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.906030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.906066] Call Trace:
[   27.906087]  <TASK>
[   27.906109]  dump_stack_lvl+0x73/0xb0
[   27.906141]  print_report+0xd1/0x610
[   27.906164]  ? __virt_addr_valid+0x1db/0x2d0
[   27.906189]  ? kasan_atomics_helper+0x1b22/0x5450
[   27.906211]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.906238]  ? kasan_atomics_helper+0x1b22/0x5450
[   27.906260]  kasan_report+0x141/0x180
[   27.906283]  ? kasan_atomics_helper+0x1b22/0x5450
[   27.906309]  kasan_check_range+0x10c/0x1c0
[   27.906333]  __kasan_check_write+0x18/0x20
[   27.906357]  kasan_atomics_helper+0x1b22/0x5450
[   27.906381]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.906405]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.906430]  ? pick_task_fair+0xce/0x340
[   27.906456]  ? kasan_atomics+0x152/0x310
[   27.906484]  kasan_atomics+0x1dc/0x310
[   27.906507]  ? __pfx_kasan_atomics+0x10/0x10
[   27.906532]  ? __pfx_read_tsc+0x10/0x10
[   27.906555]  ? ktime_get_ts64+0x86/0x230
[   27.906580]  kunit_try_run_case+0x1a5/0x480
[   27.906605]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.906626]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.906666]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.906691]  ? __kthread_parkme+0x82/0x180
[   27.906715]  ? preempt_count_sub+0x50/0x80
[   27.906740]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.906763]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.906792]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.906818]  kthread+0x337/0x6f0
[   27.906840]  ? trace_preempt_on+0x20/0xc0
[   27.906864]  ? __pfx_kthread+0x10/0x10
[   27.906885]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.906908]  ? calculate_sigpending+0x7b/0xa0
[   27.906934]  ? __pfx_kthread+0x10/0x10
[   27.906955]  ret_from_fork+0x116/0x1d0
[   27.906976]  ? __pfx_kthread+0x10/0x10
[   27.906996]  ret_from_fork_asm+0x1a/0x30
[   27.907029]  </TASK>
[   27.907042] 
[   27.916122] Allocated by task 314:
[   27.916289]  kasan_save_stack+0x45/0x70
[   27.916453]  kasan_save_track+0x18/0x40
[   27.916581]  kasan_save_alloc_info+0x3b/0x50
[   27.916955]  __kasan_kmalloc+0xb7/0xc0
[   27.917327]  __kmalloc_cache_noprof+0x189/0x420
[   27.917826]  kasan_atomics+0x95/0x310
[   27.918212]  kunit_try_run_case+0x1a5/0x480
[   27.918628]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.919163]  kthread+0x337/0x6f0
[   27.919497]  ret_from_fork+0x116/0x1d0
[   27.919890]  ret_from_fork_asm+0x1a/0x30
[   27.920287] 
[   27.920451] The buggy address belongs to the object at ffff888103eb9580
[   27.920451]  which belongs to the cache kmalloc-64 of size 64
[   27.921118] The buggy address is located 0 bytes to the right of
[   27.921118]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.921473] 
[   27.921542] The buggy address belongs to the physical page:
[   27.921878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.922575] flags: 0x200000000000000(node=0|zone=2)
[   27.923052] page_type: f5(slab)
[   27.923376] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.924071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.924719] page dumped because: kasan: bad access detected
[   27.925236] 
[   27.925385] Memory state around the buggy address:
[   27.925791]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.926146]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.926721] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.927062]                                      ^
[   27.927213]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.927415]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.927615] ==================================================================
[   26.943314] ==================================================================
[   26.943623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   26.944238] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   26.944560] 
[   26.944682] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   26.944747] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.944762] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.944798] Call Trace:
[   26.944820]  <TASK>
[   26.944842]  dump_stack_lvl+0x73/0xb0
[   26.944875]  print_report+0xd1/0x610
[   26.944899]  ? __virt_addr_valid+0x1db/0x2d0
[   26.944925]  ? kasan_atomics_helper+0x4b3a/0x5450
[   26.944947]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.944973]  ? kasan_atomics_helper+0x4b3a/0x5450
[   26.945043]  kasan_report+0x141/0x180
[   26.945069]  ? kasan_atomics_helper+0x4b3a/0x5450
[   26.945095]  __asan_report_store4_noabort+0x1b/0x30
[   26.945144]  kasan_atomics_helper+0x4b3a/0x5450
[   26.945168]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.945190]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.945215]  ? pick_task_fair+0xce/0x340
[   26.945242]  ? kasan_atomics+0x152/0x310
[   26.945269]  kasan_atomics+0x1dc/0x310
[   26.945293]  ? __pfx_kasan_atomics+0x10/0x10
[   26.945318]  ? __pfx_read_tsc+0x10/0x10
[   26.945350]  ? ktime_get_ts64+0x86/0x230
[   26.945376]  kunit_try_run_case+0x1a5/0x480
[   26.945400]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.945433]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.945459]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.945484]  ? __kthread_parkme+0x82/0x180
[   26.945510]  ? preempt_count_sub+0x50/0x80
[   26.945535]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.945558]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.945585]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.945611]  kthread+0x337/0x6f0
[   26.945632]  ? trace_preempt_on+0x20/0xc0
[   26.945667]  ? __pfx_kthread+0x10/0x10
[   26.945689]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.945712]  ? calculate_sigpending+0x7b/0xa0
[   26.945737]  ? __pfx_kthread+0x10/0x10
[   26.945760]  ret_from_fork+0x116/0x1d0
[   26.945790]  ? __pfx_kthread+0x10/0x10
[   26.945812]  ret_from_fork_asm+0x1a/0x30
[   26.945845]  </TASK>
[   26.945867] 
[   26.954868] Allocated by task 314:
[   26.955036]  kasan_save_stack+0x45/0x70
[   26.955401]  kasan_save_track+0x18/0x40
[   26.955753]  kasan_save_alloc_info+0x3b/0x50
[   26.956012]  __kasan_kmalloc+0xb7/0xc0
[   26.956213]  __kmalloc_cache_noprof+0x189/0x420
[   26.956762]  kasan_atomics+0x95/0x310
[   26.956948]  kunit_try_run_case+0x1a5/0x480
[   26.957220]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.957450]  kthread+0x337/0x6f0
[   26.957643]  ret_from_fork+0x116/0x1d0
[   26.957840]  ret_from_fork_asm+0x1a/0x30
[   26.958071] 
[   26.958141] The buggy address belongs to the object at ffff888103eb9580
[   26.958141]  which belongs to the cache kmalloc-64 of size 64
[   26.958724] The buggy address is located 0 bytes to the right of
[   26.958724]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   26.959479] 
[   26.959581] The buggy address belongs to the physical page:
[   26.959835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   26.960394] flags: 0x200000000000000(node=0|zone=2)
[   26.960576] page_type: f5(slab)
[   26.960781] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.961206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.961636] page dumped because: kasan: bad access detected
[   26.961934] 
[   26.962102] Memory state around the buggy address:
[   26.962317]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.962565]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.962970] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.963326]                                      ^
[   26.963472]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.964023]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.964587] ==================================================================
[   27.544536] ==================================================================
[   27.544947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   27.545299] Read of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.545622] 
[   27.545754] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.545810] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.545824] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.545851] Call Trace:
[   27.545872]  <TASK>
[   27.545894]  dump_stack_lvl+0x73/0xb0
[   27.545926]  print_report+0xd1/0x610
[   27.545950]  ? __virt_addr_valid+0x1db/0x2d0
[   27.545976]  ? kasan_atomics_helper+0x49ce/0x5450
[   27.545997]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.546025]  ? kasan_atomics_helper+0x49ce/0x5450
[   27.546054]  kasan_report+0x141/0x180
[   27.546077]  ? kasan_atomics_helper+0x49ce/0x5450
[   27.546103]  __asan_report_load4_noabort+0x18/0x20
[   27.546128]  kasan_atomics_helper+0x49ce/0x5450
[   27.546152]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.546176]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.546201]  ? pick_task_fair+0xce/0x340
[   27.546227]  ? kasan_atomics+0x152/0x310
[   27.546253]  kasan_atomics+0x1dc/0x310
[   27.546277]  ? __pfx_kasan_atomics+0x10/0x10
[   27.546301]  ? __pfx_read_tsc+0x10/0x10
[   27.546325]  ? ktime_get_ts64+0x86/0x230
[   27.546351]  kunit_try_run_case+0x1a5/0x480
[   27.546376]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.546397]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.546423]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.546448]  ? __kthread_parkme+0x82/0x180
[   27.546471]  ? preempt_count_sub+0x50/0x80
[   27.546496]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.546519]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.546547]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.546573]  kthread+0x337/0x6f0
[   27.546594]  ? trace_preempt_on+0x20/0xc0
[   27.546620]  ? __pfx_kthread+0x10/0x10
[   27.546641]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.546674]  ? calculate_sigpending+0x7b/0xa0
[   27.546699]  ? __pfx_kthread+0x10/0x10
[   27.546722]  ret_from_fork+0x116/0x1d0
[   27.546762]  ? __pfx_kthread+0x10/0x10
[   27.546783]  ret_from_fork_asm+0x1a/0x30
[   27.546816]  </TASK>
[   27.546828] 
[   27.553906] Allocated by task 314:
[   27.554101]  kasan_save_stack+0x45/0x70
[   27.554287]  kasan_save_track+0x18/0x40
[   27.554453]  kasan_save_alloc_info+0x3b/0x50
[   27.554627]  __kasan_kmalloc+0xb7/0xc0
[   27.554843]  __kmalloc_cache_noprof+0x189/0x420
[   27.555037]  kasan_atomics+0x95/0x310
[   27.555218]  kunit_try_run_case+0x1a5/0x480
[   27.555393]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.555608]  kthread+0x337/0x6f0
[   27.555789]  ret_from_fork+0x116/0x1d0
[   27.555951]  ret_from_fork_asm+0x1a/0x30
[   27.556136] 
[   27.556209] The buggy address belongs to the object at ffff888103eb9580
[   27.556209]  which belongs to the cache kmalloc-64 of size 64
[   27.556665] The buggy address is located 0 bytes to the right of
[   27.556665]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.557045] 
[   27.557115] The buggy address belongs to the physical page:
[   27.557282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.557516] flags: 0x200000000000000(node=0|zone=2)
[   27.557684] page_type: f5(slab)
[   27.557827] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.558122] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.558453] page dumped because: kasan: bad access detected
[   27.558703] 
[   27.558814] Memory state around the buggy address:
[   27.559035]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.559348]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.559687] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.559897]                                      ^
[   27.560044]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.560246]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.560445] ==================================================================
[   27.074581] ==================================================================
[   27.075251] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   27.075598] Write of size 4 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.075973] 
[   27.076087] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.076142] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.076157] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.076183] Call Trace:
[   27.076257]  <TASK>
[   27.076293]  dump_stack_lvl+0x73/0xb0
[   27.076328]  print_report+0xd1/0x610
[   27.076351]  ? __virt_addr_valid+0x1db/0x2d0
[   27.076386]  ? kasan_atomics_helper+0x860/0x5450
[   27.076408]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.076446]  ? kasan_atomics_helper+0x860/0x5450
[   27.076467]  kasan_report+0x141/0x180
[   27.076491]  ? kasan_atomics_helper+0x860/0x5450
[   27.076516]  kasan_check_range+0x10c/0x1c0
[   27.076549]  __kasan_check_write+0x18/0x20
[   27.076574]  kasan_atomics_helper+0x860/0x5450
[   27.076606]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.076629]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.076665]  ? pick_task_fair+0xce/0x340
[   27.076691]  ? kasan_atomics+0x152/0x310
[   27.076726]  kasan_atomics+0x1dc/0x310
[   27.076759]  ? __pfx_kasan_atomics+0x10/0x10
[   27.076794]  ? __pfx_read_tsc+0x10/0x10
[   27.076817]  ? ktime_get_ts64+0x86/0x230
[   27.076842]  kunit_try_run_case+0x1a5/0x480
[   27.076867]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.076889]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.076915]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.076939]  ? __kthread_parkme+0x82/0x180
[   27.077250]  ? preempt_count_sub+0x50/0x80
[   27.077275]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.077299]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.077328]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.077354]  kthread+0x337/0x6f0
[   27.077376]  ? trace_preempt_on+0x20/0xc0
[   27.077415]  ? __pfx_kthread+0x10/0x10
[   27.077438]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.077461]  ? calculate_sigpending+0x7b/0xa0
[   27.077500]  ? __pfx_kthread+0x10/0x10
[   27.077523]  ret_from_fork+0x116/0x1d0
[   27.077544]  ? __pfx_kthread+0x10/0x10
[   27.077566]  ret_from_fork_asm+0x1a/0x30
[   27.077598]  </TASK>
[   27.077612] 
[   27.086864] Allocated by task 314:
[   27.087076]  kasan_save_stack+0x45/0x70
[   27.087331]  kasan_save_track+0x18/0x40
[   27.087474]  kasan_save_alloc_info+0x3b/0x50
[   27.087694]  __kasan_kmalloc+0xb7/0xc0
[   27.088076]  __kmalloc_cache_noprof+0x189/0x420
[   27.088303]  kasan_atomics+0x95/0x310
[   27.088494]  kunit_try_run_case+0x1a5/0x480
[   27.088770]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.089451]  kthread+0x337/0x6f0
[   27.089757]  ret_from_fork+0x116/0x1d0
[   27.089951]  ret_from_fork_asm+0x1a/0x30
[   27.090093] 
[   27.090160] The buggy address belongs to the object at ffff888103eb9580
[   27.090160]  which belongs to the cache kmalloc-64 of size 64
[   27.091360] The buggy address is located 0 bytes to the right of
[   27.091360]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.092487] 
[   27.092575] The buggy address belongs to the physical page:
[   27.092761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.093095] flags: 0x200000000000000(node=0|zone=2)
[   27.093871] page_type: f5(slab)
[   27.094224] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.094922] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.095627] page dumped because: kasan: bad access detected
[   27.096200] 
[   27.096400] Memory state around the buggy address:
[   27.096929]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.097806]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.098504] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.099198]                                      ^
[   27.099630]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.100340]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.101414] ==================================================================
[   27.733063] ==================================================================
[   27.733438] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   27.733786] Write of size 8 at addr ffff888103eb95b0 by task kunit_try_catch/314
[   27.734276] 
[   27.734381] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   27.734437] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.734473] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.734499] Call Trace:
[   27.734535]  <TASK>
[   27.734569]  dump_stack_lvl+0x73/0xb0
[   27.734617]  print_report+0xd1/0x610
[   27.734641]  ? __virt_addr_valid+0x1db/0x2d0
[   27.734678]  ? kasan_atomics_helper+0x16e7/0x5450
[   27.734701]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.734741]  ? kasan_atomics_helper+0x16e7/0x5450
[   27.734778]  kasan_report+0x141/0x180
[   27.734801]  ? kasan_atomics_helper+0x16e7/0x5450
[   27.734945]  kasan_check_range+0x10c/0x1c0
[   27.734972]  __kasan_check_write+0x18/0x20
[   27.734996]  kasan_atomics_helper+0x16e7/0x5450
[   27.735019]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.735041]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.735067]  ? pick_task_fair+0xce/0x340
[   27.735093]  ? kasan_atomics+0x152/0x310
[   27.735119]  kasan_atomics+0x1dc/0x310
[   27.735143]  ? __pfx_kasan_atomics+0x10/0x10
[   27.735167]  ? __pfx_read_tsc+0x10/0x10
[   27.735191]  ? ktime_get_ts64+0x86/0x230
[   27.735216]  kunit_try_run_case+0x1a5/0x480
[   27.735240]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.735261]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.735286]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.735311]  ? __kthread_parkme+0x82/0x180
[   27.735334]  ? preempt_count_sub+0x50/0x80
[   27.735358]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.735381]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.735407]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.735433]  kthread+0x337/0x6f0
[   27.735454]  ? trace_preempt_on+0x20/0xc0
[   27.735479]  ? __pfx_kthread+0x10/0x10
[   27.735500]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.735523]  ? calculate_sigpending+0x7b/0xa0
[   27.735548]  ? __pfx_kthread+0x10/0x10
[   27.735570]  ret_from_fork+0x116/0x1d0
[   27.735591]  ? __pfx_kthread+0x10/0x10
[   27.735612]  ret_from_fork_asm+0x1a/0x30
[   27.735644]  </TASK>
[   27.735668] 
[   27.748549] Allocated by task 314:
[   27.748938]  kasan_save_stack+0x45/0x70
[   27.749266]  kasan_save_track+0x18/0x40
[   27.749450]  kasan_save_alloc_info+0x3b/0x50
[   27.749642]  __kasan_kmalloc+0xb7/0xc0
[   27.749804]  __kmalloc_cache_noprof+0x189/0x420
[   27.750139]  kasan_atomics+0x95/0x310
[   27.750710]  kunit_try_run_case+0x1a5/0x480
[   27.750952]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.751213]  kthread+0x337/0x6f0
[   27.751588]  ret_from_fork+0x116/0x1d0
[   27.751904]  ret_from_fork_asm+0x1a/0x30
[   27.752314] 
[   27.752523] The buggy address belongs to the object at ffff888103eb9580
[   27.752523]  which belongs to the cache kmalloc-64 of size 64
[   27.753152] The buggy address is located 0 bytes to the right of
[   27.753152]  allocated 48-byte region [ffff888103eb9580, ffff888103eb95b0)
[   27.753833] 
[   27.754101] The buggy address belongs to the physical page:
[   27.754445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   27.754795] flags: 0x200000000000000(node=0|zone=2)
[   27.755231] page_type: f5(slab)
[   27.755502] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.755977] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.756410] page dumped because: kasan: bad access detected
[   27.756756] 
[   27.756857] Memory state around the buggy address:
[   27.757222]  ffff888103eb9480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.757624]  ffff888103eb9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.758181] >ffff888103eb9580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.758587]                                      ^
[   27.758937]  ffff888103eb9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.759352]  ffff888103eb9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.759683] ==================================================================