Hay
Date
July 15, 2025, 11:35 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   75.442131] ==================================================================
[   75.449206] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   75.456583] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   75.463961] 
[   75.465442] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   75.465492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.465508] Hardware name: WinLink E850-96 board (DT)
[   75.465525] Call trace:
[   75.465537]  show_stack+0x20/0x38 (C)
[   75.465569]  dump_stack_lvl+0x8c/0xd0
[   75.465600]  print_report+0x118/0x5d0
[   75.465627]  kasan_report+0xdc/0x128
[   75.465655]  kasan_check_range+0x100/0x1a8
[   75.465684]  __kasan_check_write+0x20/0x30
[   75.465713]  kasan_atomics_helper+0x1128/0x4858
[   75.465749]  kasan_atomics+0x198/0x2e0
[   75.465780]  kunit_try_run_case+0x170/0x3f0
[   75.465811]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.465848]  kthread+0x328/0x630
[   75.465874]  ret_from_fork+0x10/0x20
[   75.465904] 
[   75.536964] Allocated by task 346:
[   75.540350]  kasan_save_stack+0x3c/0x68
[   75.544168]  kasan_save_track+0x20/0x40
[   75.547988]  kasan_save_alloc_info+0x40/0x58
[   75.552241]  __kasan_kmalloc+0xd4/0xd8
[   75.555973]  __kmalloc_cache_noprof+0x16c/0x3c0
[   75.560487]  kasan_atomics+0xb8/0x2e0
[   75.564133]  kunit_try_run_case+0x170/0x3f0
[   75.568300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.573768]  kthread+0x328/0x630
[   75.576980]  ret_from_fork+0x10/0x20
[   75.580539] 
[   75.582014] The buggy address belongs to the object at ffff00080851b080
[   75.582014]  which belongs to the cache kmalloc-64 of size 64
[   75.594342] The buggy address is located 0 bytes to the right of
[   75.594342]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   75.607188] 
[   75.608664] The buggy address belongs to the physical page:
[   75.614222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   75.622205] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   75.628716] page_type: f5(slab)
[   75.631848] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   75.639573] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.647291] page dumped because: kasan: bad access detected
[   75.652847] 
[   75.654322] Memory state around the buggy address:
[   75.659101]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   75.666305]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.673511] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.680711]                                      ^
[   75.685489]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.692694]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.699895] ==================================================================
[   67.255472] ==================================================================
[   67.262523] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   67.269815] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   67.277192] 
[   67.278673] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   67.278724] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.278741] Hardware name: WinLink E850-96 board (DT)
[   67.278760] Call trace:
[   67.278773]  show_stack+0x20/0x38 (C)
[   67.278804]  dump_stack_lvl+0x8c/0xd0
[   67.278837]  print_report+0x118/0x5d0
[   67.278864]  kasan_report+0xdc/0x128
[   67.278890]  kasan_check_range+0x100/0x1a8
[   67.278920]  __kasan_check_write+0x20/0x30
[   67.278951]  kasan_atomics_helper+0x61c/0x4858
[   67.278982]  kasan_atomics+0x198/0x2e0
[   67.279015]  kunit_try_run_case+0x170/0x3f0
[   67.279046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.279080]  kthread+0x328/0x630
[   67.279106]  ret_from_fork+0x10/0x20
[   67.279135] 
[   67.350107] Allocated by task 346:
[   67.353494]  kasan_save_stack+0x3c/0x68
[   67.357312]  kasan_save_track+0x20/0x40
[   67.361131]  kasan_save_alloc_info+0x40/0x58
[   67.365385]  __kasan_kmalloc+0xd4/0xd8
[   67.369117]  __kmalloc_cache_noprof+0x16c/0x3c0
[   67.373631]  kasan_atomics+0xb8/0x2e0
[   67.377277]  kunit_try_run_case+0x170/0x3f0
[   67.381443]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.386912]  kthread+0x328/0x630
[   67.390124]  ret_from_fork+0x10/0x20
[   67.393683] 
[   67.395158] The buggy address belongs to the object at ffff00080851b080
[   67.395158]  which belongs to the cache kmalloc-64 of size 64
[   67.407485] The buggy address is located 0 bytes to the right of
[   67.407485]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   67.420332] 
[   67.421809] The buggy address belongs to the physical page:
[   67.427365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   67.435350] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   67.441859] page_type: f5(slab)
[   67.444994] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   67.452716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.460435] page dumped because: kasan: bad access detected
[   67.465991] 
[   67.467466] Memory state around the buggy address:
[   67.472244]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   67.479449]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.486654] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.493855]                                      ^
[   67.498633]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.505838]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.513039] ==================================================================
[   69.106637] ==================================================================
[   69.113711] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   69.121001] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   69.128379] 
[   69.129860] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   69.129910] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.129927] Hardware name: WinLink E850-96 board (DT)
[   69.129944] Call trace:
[   69.129957]  show_stack+0x20/0x38 (C)
[   69.129988]  dump_stack_lvl+0x8c/0xd0
[   69.130021]  print_report+0x118/0x5d0
[   69.130048]  kasan_report+0xdc/0x128
[   69.130077]  kasan_check_range+0x100/0x1a8
[   69.130107]  __kasan_check_write+0x20/0x30
[   69.130137]  kasan_atomics_helper+0x934/0x4858
[   69.130172]  kasan_atomics+0x198/0x2e0
[   69.130204]  kunit_try_run_case+0x170/0x3f0
[   69.130233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.130267]  kthread+0x328/0x630
[   69.130293]  ret_from_fork+0x10/0x20
[   69.130323] 
[   69.201294] Allocated by task 346:
[   69.204682]  kasan_save_stack+0x3c/0x68
[   69.208499]  kasan_save_track+0x20/0x40
[   69.212318]  kasan_save_alloc_info+0x40/0x58
[   69.216572]  __kasan_kmalloc+0xd4/0xd8
[   69.220305]  __kmalloc_cache_noprof+0x16c/0x3c0
[   69.224819]  kasan_atomics+0xb8/0x2e0
[   69.228464]  kunit_try_run_case+0x170/0x3f0
[   69.232631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.238100]  kthread+0x328/0x630
[   69.241311]  ret_from_fork+0x10/0x20
[   69.244870] 
[   69.246346] The buggy address belongs to the object at ffff00080851b080
[   69.246346]  which belongs to the cache kmalloc-64 of size 64
[   69.258672] The buggy address is located 0 bytes to the right of
[   69.258672]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   69.271519] 
[   69.272995] The buggy address belongs to the physical page:
[   69.278551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   69.286538] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   69.293046] page_type: f5(slab)
[   69.296179] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   69.303904] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.311623] page dumped because: kasan: bad access detected
[   69.317178] 
[   69.318654] Memory state around the buggy address:
[   69.323432]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   69.330637]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.337841] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.345042]                                      ^
[   69.349821]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.357025]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.364226] ==================================================================
[   73.063867] ==================================================================
[   73.070943] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   73.078320] Read of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   73.085611] 
[   73.087093] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   73.087141] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.087156] Hardware name: WinLink E850-96 board (DT)
[   73.087175] Call trace:
[   73.087186]  show_stack+0x20/0x38 (C)
[   73.087216]  dump_stack_lvl+0x8c/0xd0
[   73.087249]  print_report+0x118/0x5d0
[   73.087277]  kasan_report+0xdc/0x128
[   73.087304]  __asan_report_load8_noabort+0x20/0x30
[   73.087337]  kasan_atomics_helper+0x3f58/0x4858
[   73.087374]  kasan_atomics+0x198/0x2e0
[   73.087405]  kunit_try_run_case+0x170/0x3f0
[   73.087435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.087468]  kthread+0x328/0x630
[   73.087494]  ret_from_fork+0x10/0x20
[   73.087527] 
[   73.155228] Allocated by task 346:
[   73.158615]  kasan_save_stack+0x3c/0x68
[   73.162433]  kasan_save_track+0x20/0x40
[   73.166253]  kasan_save_alloc_info+0x40/0x58
[   73.170506]  __kasan_kmalloc+0xd4/0xd8
[   73.174238]  __kmalloc_cache_noprof+0x16c/0x3c0
[   73.178752]  kasan_atomics+0xb8/0x2e0
[   73.182398]  kunit_try_run_case+0x170/0x3f0
[   73.186565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.192034]  kthread+0x328/0x630
[   73.195245]  ret_from_fork+0x10/0x20
[   73.198804] 
[   73.200280] The buggy address belongs to the object at ffff00080851b080
[   73.200280]  which belongs to the cache kmalloc-64 of size 64
[   73.212606] The buggy address is located 0 bytes to the right of
[   73.212606]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   73.225453] 
[   73.226929] The buggy address belongs to the physical page:
[   73.232485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   73.240470] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   73.246980] page_type: f5(slab)
[   73.250113] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   73.257838] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.265557] page dumped because: kasan: bad access detected
[   73.271112] 
[   73.272588] Memory state around the buggy address:
[   73.277366]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.284570]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.291775] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.298976]                                      ^
[   73.303754]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.310959]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.318160] ==================================================================
[   76.237430] ==================================================================
[   76.244506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   76.251884] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   76.259261] 
[   76.260742] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   76.260791] Tainted: [B]=BAD_PAGE, [N]=TEST
[   76.260806] Hardware name: WinLink E850-96 board (DT)
[   76.260825] Call trace:
[   76.260838]  show_stack+0x20/0x38 (C)
[   76.260869]  dump_stack_lvl+0x8c/0xd0
[   76.260901]  print_report+0x118/0x5d0
[   76.260929]  kasan_report+0xdc/0x128
[   76.260957]  kasan_check_range+0x100/0x1a8
[   76.260987]  __kasan_check_write+0x20/0x30
[   76.261019]  kasan_atomics_helper+0x126c/0x4858
[   76.261055]  kasan_atomics+0x198/0x2e0
[   76.261088]  kunit_try_run_case+0x170/0x3f0
[   76.261117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.261150]  kthread+0x328/0x630
[   76.261176]  ret_from_fork+0x10/0x20
[   76.261204] 
[   76.332264] Allocated by task 346:
[   76.335651]  kasan_save_stack+0x3c/0x68
[   76.339469]  kasan_save_track+0x20/0x40
[   76.343288]  kasan_save_alloc_info+0x40/0x58
[   76.347541]  __kasan_kmalloc+0xd4/0xd8
[   76.351274]  __kmalloc_cache_noprof+0x16c/0x3c0
[   76.355788]  kasan_atomics+0xb8/0x2e0
[   76.359434]  kunit_try_run_case+0x170/0x3f0
[   76.363600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.369069]  kthread+0x328/0x630
[   76.372281]  ret_from_fork+0x10/0x20
[   76.375840] 
[   76.377315] The buggy address belongs to the object at ffff00080851b080
[   76.377315]  which belongs to the cache kmalloc-64 of size 64
[   76.389642] The buggy address is located 0 bytes to the right of
[   76.389642]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   76.402488] 
[   76.403964] The buggy address belongs to the physical page:
[   76.409523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   76.417506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   76.424016] page_type: f5(slab)
[   76.427149] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   76.434873] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   76.442592] page dumped because: kasan: bad access detected
[   76.448148] 
[   76.449623] Memory state around the buggy address:
[   76.454401]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   76.461606]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   76.468811] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   76.476012]                                      ^
[   76.480790]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.487995]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.495196] ==================================================================
[   67.785320] ==================================================================
[   67.792376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   67.799667] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   67.807045] 
[   67.808527] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   67.808577] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.808591] Hardware name: WinLink E850-96 board (DT)
[   67.808609] Call trace:
[   67.808622]  show_stack+0x20/0x38 (C)
[   67.808652]  dump_stack_lvl+0x8c/0xd0
[   67.808684]  print_report+0x118/0x5d0
[   67.808712]  kasan_report+0xdc/0x128
[   67.808739]  kasan_check_range+0x100/0x1a8
[   67.808769]  __kasan_check_write+0x20/0x30
[   67.808799]  kasan_atomics_helper+0x6ec/0x4858
[   67.808834]  kasan_atomics+0x198/0x2e0
[   67.808866]  kunit_try_run_case+0x170/0x3f0
[   67.808896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.808929]  kthread+0x328/0x630
[   67.808956]  ret_from_fork+0x10/0x20
[   67.808989] 
[   67.879960] Allocated by task 346:
[   67.883347]  kasan_save_stack+0x3c/0x68
[   67.887165]  kasan_save_track+0x20/0x40
[   67.890985]  kasan_save_alloc_info+0x40/0x58
[   67.895238]  __kasan_kmalloc+0xd4/0xd8
[   67.898971]  __kmalloc_cache_noprof+0x16c/0x3c0
[   67.903484]  kasan_atomics+0xb8/0x2e0
[   67.907130]  kunit_try_run_case+0x170/0x3f0
[   67.911297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.916765]  kthread+0x328/0x630
[   67.919977]  ret_from_fork+0x10/0x20
[   67.923536] 
[   67.925012] The buggy address belongs to the object at ffff00080851b080
[   67.925012]  which belongs to the cache kmalloc-64 of size 64
[   67.937338] The buggy address is located 0 bytes to the right of
[   67.937338]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   67.950185] 
[   67.951661] The buggy address belongs to the physical page:
[   67.957218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   67.965202] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   67.971712] page_type: f5(slab)
[   67.974845] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   67.982570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.990288] page dumped because: kasan: bad access detected
[   67.995844] 
[   67.997319] Memory state around the buggy address:
[   68.002099]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   68.009302]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.016507] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.023708]                                      ^
[   68.028486]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.035691]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.042892] ==================================================================
[   77.032856] ==================================================================
[   77.039809] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   77.047186] Read of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   77.054475] 
[   77.055959] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   77.056008] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.056025] Hardware name: WinLink E850-96 board (DT)
[   77.056044] Call trace:
[   77.056058]  show_stack+0x20/0x38 (C)
[   77.056093]  dump_stack_lvl+0x8c/0xd0
[   77.056127]  print_report+0x118/0x5d0
[   77.056157]  kasan_report+0xdc/0x128
[   77.056185]  __asan_report_load8_noabort+0x20/0x30
[   77.056216]  kasan_atomics_helper+0x3f04/0x4858
[   77.056251]  kasan_atomics+0x198/0x2e0
[   77.056283]  kunit_try_run_case+0x170/0x3f0
[   77.056313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.056346]  kthread+0x328/0x630
[   77.056372]  ret_from_fork+0x10/0x20
[   77.056404] 
[   77.124093] Allocated by task 346:
[   77.127479]  kasan_save_stack+0x3c/0x68
[   77.131297]  kasan_save_track+0x20/0x40
[   77.135117]  kasan_save_alloc_info+0x40/0x58
[   77.139370]  __kasan_kmalloc+0xd4/0xd8
[   77.143103]  __kmalloc_cache_noprof+0x16c/0x3c0
[   77.147616]  kasan_atomics+0xb8/0x2e0
[   77.151262]  kunit_try_run_case+0x170/0x3f0
[   77.155429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.160898]  kthread+0x328/0x630
[   77.164109]  ret_from_fork+0x10/0x20
[   77.167668] 
[   77.169144] The buggy address belongs to the object at ffff00080851b080
[   77.169144]  which belongs to the cache kmalloc-64 of size 64
[   77.181470] The buggy address is located 0 bytes to the right of
[   77.181470]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   77.194317] 
[   77.195795] The buggy address belongs to the physical page:
[   77.201351] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   77.209334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   77.215844] page_type: f5(slab)
[   77.218979] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   77.226702] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   77.234420] page dumped because: kasan: bad access detected
[   77.239976] 
[   77.241451] Memory state around the buggy address:
[   77.246230]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   77.253434]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.260639] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.267840]                                      ^
[   77.272618]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.279823]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.287024] ==================================================================
[   79.408197] ==================================================================
[   79.415292] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   79.422671] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   79.430047] 
[   79.431527] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   79.431575] Tainted: [B]=BAD_PAGE, [N]=TEST
[   79.431592] Hardware name: WinLink E850-96 board (DT)
[   79.431610] Call trace:
[   79.431623]  show_stack+0x20/0x38 (C)
[   79.431654]  dump_stack_lvl+0x8c/0xd0
[   79.431688]  print_report+0x118/0x5d0
[   79.431716]  kasan_report+0xdc/0x128
[   79.431743]  kasan_check_range+0x100/0x1a8
[   79.431772]  __kasan_check_write+0x20/0x30
[   79.431803]  kasan_atomics_helper+0x16d0/0x4858
[   79.431838]  kasan_atomics+0x198/0x2e0
[   79.431869]  kunit_try_run_case+0x170/0x3f0
[   79.431897]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.431933]  kthread+0x328/0x630
[   79.431959]  ret_from_fork+0x10/0x20
[   79.431988] 
[   79.503050] Allocated by task 346:
[   79.506437]  kasan_save_stack+0x3c/0x68
[   79.510255]  kasan_save_track+0x20/0x40
[   79.514074]  kasan_save_alloc_info+0x40/0x58
[   79.518327]  __kasan_kmalloc+0xd4/0xd8
[   79.522060]  __kmalloc_cache_noprof+0x16c/0x3c0
[   79.526574]  kasan_atomics+0xb8/0x2e0
[   79.530220]  kunit_try_run_case+0x170/0x3f0
[   79.534386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.539855]  kthread+0x328/0x630
[   79.543067]  ret_from_fork+0x10/0x20
[   79.546625] 
[   79.548101] The buggy address belongs to the object at ffff00080851b080
[   79.548101]  which belongs to the cache kmalloc-64 of size 64
[   79.560427] The buggy address is located 0 bytes to the right of
[   79.560427]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   79.573274] 
[   79.574750] The buggy address belongs to the physical page:
[   79.580307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   79.588293] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   79.594802] page_type: f5(slab)
[   79.597934] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   79.605659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   79.613378] page dumped because: kasan: bad access detected
[   79.618933] 
[   79.620409] Memory state around the buggy address:
[   79.625187]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   79.632392]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   79.639596] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   79.646797]                                      ^
[   79.651576]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.658780]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.665981] ==================================================================
[   73.325521] ==================================================================
[   73.332571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   73.339861] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   73.347239] 
[   73.348722] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   73.348769] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.348784] Hardware name: WinLink E850-96 board (DT)
[   73.348801] Call trace:
[   73.348813]  show_stack+0x20/0x38 (C)
[   73.348843]  dump_stack_lvl+0x8c/0xd0
[   73.348876]  print_report+0x118/0x5d0
[   73.348906]  kasan_report+0xdc/0x128
[   73.348932]  kasan_check_range+0x100/0x1a8
[   73.348961]  __kasan_check_write+0x20/0x30
[   73.348991]  kasan_atomics_helper+0xe44/0x4858
[   73.349025]  kasan_atomics+0x198/0x2e0
[   73.349058]  kunit_try_run_case+0x170/0x3f0
[   73.349088]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.349124]  kthread+0x328/0x630
[   73.349150]  ret_from_fork+0x10/0x20
[   73.349179] 
[   73.420155] Allocated by task 346:
[   73.423542]  kasan_save_stack+0x3c/0x68
[   73.427360]  kasan_save_track+0x20/0x40
[   73.431179]  kasan_save_alloc_info+0x40/0x58
[   73.435433]  __kasan_kmalloc+0xd4/0xd8
[   73.439165]  __kmalloc_cache_noprof+0x16c/0x3c0
[   73.443679]  kasan_atomics+0xb8/0x2e0
[   73.447325]  kunit_try_run_case+0x170/0x3f0
[   73.451491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.456960]  kthread+0x328/0x630
[   73.460172]  ret_from_fork+0x10/0x20
[   73.463731] 
[   73.465206] The buggy address belongs to the object at ffff00080851b080
[   73.465206]  which belongs to the cache kmalloc-64 of size 64
[   73.477533] The buggy address is located 0 bytes to the right of
[   73.477533]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   73.490379] 
[   73.491855] The buggy address belongs to the physical page:
[   73.497413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   73.505397] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   73.511907] page_type: f5(slab)
[   73.515040] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   73.522764] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.530483] page dumped because: kasan: bad access detected
[   73.536038] 
[   73.537514] Memory state around the buggy address:
[   73.542292]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.549497]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.556702] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.563903]                                      ^
[   73.568681]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.575885]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.583087] ==================================================================
[   64.347843] ==================================================================
[   64.354928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   64.362220] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   64.369596] 
[   64.371079] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   64.371132] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.371148] Hardware name: WinLink E850-96 board (DT)
[   64.371168] Call trace:
[   64.371182]  show_stack+0x20/0x38 (C)
[   64.371216]  dump_stack_lvl+0x8c/0xd0
[   64.371252]  print_report+0x118/0x5d0
[   64.371279]  kasan_report+0xdc/0x128
[   64.371306]  kasan_check_range+0x100/0x1a8
[   64.371337]  __kasan_check_write+0x20/0x30
[   64.371367]  kasan_atomics_helper+0x24c/0x4858
[   64.371400]  kasan_atomics+0x198/0x2e0
[   64.371431]  kunit_try_run_case+0x170/0x3f0
[   64.371464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.371498]  kthread+0x328/0x630
[   64.371524]  ret_from_fork+0x10/0x20
[   64.371553] 
[   64.442512] Allocated by task 346:
[   64.445901]  kasan_save_stack+0x3c/0x68
[   64.449717]  kasan_save_track+0x20/0x40
[   64.453536]  kasan_save_alloc_info+0x40/0x58
[   64.457789]  __kasan_kmalloc+0xd4/0xd8
[   64.461522]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.466036]  kasan_atomics+0xb8/0x2e0
[   64.469681]  kunit_try_run_case+0x170/0x3f0
[   64.473848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.479317]  kthread+0x328/0x630
[   64.482529]  ret_from_fork+0x10/0x20
[   64.486088] 
[   64.487565] The buggy address belongs to the object at ffff00080851b080
[   64.487565]  which belongs to the cache kmalloc-64 of size 64
[   64.499890] The buggy address is located 0 bytes to the right of
[   64.499890]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   64.512737] 
[   64.514214] The buggy address belongs to the physical page:
[   64.519771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   64.527754] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   64.534264] page_type: f5(slab)
[   64.537397] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   64.545121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.552840] page dumped because: kasan: bad access detected
[   64.558395] 
[   64.559872] Memory state around the buggy address:
[   64.564654]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.571854]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.579059] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.586260]                                      ^
[   64.591037]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.598242]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.605443] ==================================================================
[   77.824557] ==================================================================
[   77.831636] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   77.839013] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   77.846391] 
[   77.847873] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   77.847920] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.847937] Hardware name: WinLink E850-96 board (DT)
[   77.847954] Call trace:
[   77.847969]  show_stack+0x20/0x38 (C)
[   77.848000]  dump_stack_lvl+0x8c/0xd0
[   77.848031]  print_report+0x118/0x5d0
[   77.848060]  kasan_report+0xdc/0x128
[   77.848089]  kasan_check_range+0x100/0x1a8
[   77.848120]  __kasan_check_write+0x20/0x30
[   77.848151]  kasan_atomics_helper+0x14e4/0x4858
[   77.848186]  kasan_atomics+0x198/0x2e0
[   77.848218]  kunit_try_run_case+0x170/0x3f0
[   77.848248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.848282]  kthread+0x328/0x630
[   77.848309]  ret_from_fork+0x10/0x20
[   77.848339] 
[   77.919393] Allocated by task 346:
[   77.922781]  kasan_save_stack+0x3c/0x68
[   77.926598]  kasan_save_track+0x20/0x40
[   77.930417]  kasan_save_alloc_info+0x40/0x58
[   77.934670]  __kasan_kmalloc+0xd4/0xd8
[   77.938403]  __kmalloc_cache_noprof+0x16c/0x3c0
[   77.942917]  kasan_atomics+0xb8/0x2e0
[   77.946563]  kunit_try_run_case+0x170/0x3f0
[   77.950729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.956198]  kthread+0x328/0x630
[   77.959410]  ret_from_fork+0x10/0x20
[   77.962969] 
[   77.964444] The buggy address belongs to the object at ffff00080851b080
[   77.964444]  which belongs to the cache kmalloc-64 of size 64
[   77.976771] The buggy address is located 0 bytes to the right of
[   77.976771]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   77.989617] 
[   77.991093] The buggy address belongs to the physical page:
[   77.996649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   78.004635] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   78.011145] page_type: f5(slab)
[   78.014278] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   78.022002] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   78.029721] page dumped because: kasan: bad access detected
[   78.035277] 
[   78.036752] Memory state around the buggy address:
[   78.041530]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   78.048735]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.055940] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   78.063141]                                      ^
[   78.067919]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.075124]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.082324] ==================================================================
[   68.050234] ==================================================================
[   68.057303] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   68.064593] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   68.071971] 
[   68.073451] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   68.073500] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.073516] Hardware name: WinLink E850-96 board (DT)
[   68.073534] Call trace:
[   68.073545]  show_stack+0x20/0x38 (C)
[   68.073576]  dump_stack_lvl+0x8c/0xd0
[   68.073608]  print_report+0x118/0x5d0
[   68.073636]  kasan_report+0xdc/0x128
[   68.073664]  kasan_check_range+0x100/0x1a8
[   68.073692]  __kasan_check_write+0x20/0x30
[   68.073723]  kasan_atomics_helper+0x760/0x4858
[   68.073756]  kasan_atomics+0x198/0x2e0
[   68.073791]  kunit_try_run_case+0x170/0x3f0
[   68.073820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.073852]  kthread+0x328/0x630
[   68.073879]  ret_from_fork+0x10/0x20
[   68.073911] 
[   68.144887] Allocated by task 346:
[   68.148274]  kasan_save_stack+0x3c/0x68
[   68.152092]  kasan_save_track+0x20/0x40
[   68.155911]  kasan_save_alloc_info+0x40/0x58
[   68.160164]  __kasan_kmalloc+0xd4/0xd8
[   68.163897]  __kmalloc_cache_noprof+0x16c/0x3c0
[   68.168411]  kasan_atomics+0xb8/0x2e0
[   68.172057]  kunit_try_run_case+0x170/0x3f0
[   68.176223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.181692]  kthread+0x328/0x630
[   68.184904]  ret_from_fork+0x10/0x20
[   68.188462] 
[   68.189938] The buggy address belongs to the object at ffff00080851b080
[   68.189938]  which belongs to the cache kmalloc-64 of size 64
[   68.202265] The buggy address is located 0 bytes to the right of
[   68.202265]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   68.215111] 
[   68.216587] The buggy address belongs to the physical page:
[   68.222145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   68.230129] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   68.236639] page_type: f5(slab)
[   68.239772] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   68.247496] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.255215] page dumped because: kasan: bad access detected
[   68.260770] 
[   68.262246] Memory state around the buggy address:
[   68.267024]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   68.274229]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.281434] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.288635]                                      ^
[   68.293413]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.300617]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.307818] ==================================================================
[   70.431290] ==================================================================
[   70.438344] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   70.445721] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   70.453012] 
[   70.454493] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   70.454540] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.454557] Hardware name: WinLink E850-96 board (DT)
[   70.454575] Call trace:
[   70.454588]  show_stack+0x20/0x38 (C)
[   70.454618]  dump_stack_lvl+0x8c/0xd0
[   70.454649]  print_report+0x118/0x5d0
[   70.454675]  kasan_report+0xdc/0x128
[   70.454702]  __asan_report_load4_noabort+0x20/0x30
[   70.454735]  kasan_atomics_helper+0x3dcc/0x4858
[   70.454769]  kasan_atomics+0x198/0x2e0
[   70.454801]  kunit_try_run_case+0x170/0x3f0
[   70.454831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.454865]  kthread+0x328/0x630
[   70.454891]  ret_from_fork+0x10/0x20
[   70.454921] 
[   70.522629] Allocated by task 346:
[   70.526016]  kasan_save_stack+0x3c/0x68
[   70.529833]  kasan_save_track+0x20/0x40
[   70.533653]  kasan_save_alloc_info+0x40/0x58
[   70.537907]  __kasan_kmalloc+0xd4/0xd8
[   70.541639]  __kmalloc_cache_noprof+0x16c/0x3c0
[   70.546153]  kasan_atomics+0xb8/0x2e0
[   70.549799]  kunit_try_run_case+0x170/0x3f0
[   70.553965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.559434]  kthread+0x328/0x630
[   70.562645]  ret_from_fork+0x10/0x20
[   70.566205] 
[   70.567680] The buggy address belongs to the object at ffff00080851b080
[   70.567680]  which belongs to the cache kmalloc-64 of size 64
[   70.580007] The buggy address is located 0 bytes to the right of
[   70.580007]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   70.592853] 
[   70.594329] The buggy address belongs to the physical page:
[   70.599888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   70.607871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   70.614381] page_type: f5(slab)
[   70.617516] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   70.625238] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.632957] page dumped because: kasan: bad access detected
[   70.638513] 
[   70.639988] Memory state around the buggy address:
[   70.644768]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   70.651971]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.659176] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.666377]                                      ^
[   70.671155]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.678359]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.685560] ==================================================================
[   71.484380] ==================================================================
[   71.491453] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   71.498830] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   71.506121] 
[   71.507604] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   71.507655] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.507671] Hardware name: WinLink E850-96 board (DT)
[   71.507690] Call trace:
[   71.507703]  show_stack+0x20/0x38 (C)
[   71.507732]  dump_stack_lvl+0x8c/0xd0
[   71.507765]  print_report+0x118/0x5d0
[   71.507794]  kasan_report+0xdc/0x128
[   71.507821]  __asan_report_load4_noabort+0x20/0x30
[   71.507852]  kasan_atomics_helper+0x3de4/0x4858
[   71.507887]  kasan_atomics+0x198/0x2e0
[   71.507918]  kunit_try_run_case+0x170/0x3f0
[   71.507948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.507983]  kthread+0x328/0x630
[   71.508007]  ret_from_fork+0x10/0x20
[   71.508040] 
[   71.575738] Allocated by task 346:
[   71.579126]  kasan_save_stack+0x3c/0x68
[   71.582943]  kasan_save_track+0x20/0x40
[   71.586763]  kasan_save_alloc_info+0x40/0x58
[   71.591016]  __kasan_kmalloc+0xd4/0xd8
[   71.594748]  __kmalloc_cache_noprof+0x16c/0x3c0
[   71.599262]  kasan_atomics+0xb8/0x2e0
[   71.602908]  kunit_try_run_case+0x170/0x3f0
[   71.607074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.612543]  kthread+0x328/0x630
[   71.615755]  ret_from_fork+0x10/0x20
[   71.619314] 
[   71.620790] The buggy address belongs to the object at ffff00080851b080
[   71.620790]  which belongs to the cache kmalloc-64 of size 64
[   71.633116] The buggy address is located 0 bytes to the right of
[   71.633116]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   71.645963] 
[   71.647440] The buggy address belongs to the physical page:
[   71.652997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   71.660980] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   71.667490] page_type: f5(slab)
[   71.670624] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   71.678348] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   71.686066] page dumped because: kasan: bad access detected
[   71.691622] 
[   71.693097] Memory state around the buggy address:
[   71.697876]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   71.705080]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.712285] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   71.719486]                                      ^
[   71.724264]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.731469]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.738670] ==================================================================
[   64.612779] ==================================================================
[   64.619857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   64.627146] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   64.634436] 
[   64.635918] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   64.635972] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.635990] Hardware name: WinLink E850-96 board (DT)
[   64.636011] Call trace:
[   64.636023]  show_stack+0x20/0x38 (C)
[   64.636057]  dump_stack_lvl+0x8c/0xd0
[   64.636092]  print_report+0x118/0x5d0
[   64.636120]  kasan_report+0xdc/0x128
[   64.636147]  kasan_check_range+0x100/0x1a8
[   64.636178]  __kasan_check_read+0x20/0x30
[   64.636207]  kasan_atomics_helper+0x2b0/0x4858
[   64.636240]  kasan_atomics+0x198/0x2e0
[   64.636272]  kunit_try_run_case+0x170/0x3f0
[   64.636301]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.636337]  kthread+0x328/0x630
[   64.636365]  ret_from_fork+0x10/0x20
[   64.636396] 
[   64.707265] Allocated by task 346:
[   64.710654]  kasan_save_stack+0x3c/0x68
[   64.714470]  kasan_save_track+0x20/0x40
[   64.718289]  kasan_save_alloc_info+0x40/0x58
[   64.722542]  __kasan_kmalloc+0xd4/0xd8
[   64.726275]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.730789]  kasan_atomics+0xb8/0x2e0
[   64.734435]  kunit_try_run_case+0x170/0x3f0
[   64.738601]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.744070]  kthread+0x328/0x630
[   64.747282]  ret_from_fork+0x10/0x20
[   64.750841] 
[   64.752318] The buggy address belongs to the object at ffff00080851b080
[   64.752318]  which belongs to the cache kmalloc-64 of size 64
[   64.764643] The buggy address is located 0 bytes to the right of
[   64.764643]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   64.777489] 
[   64.778967] The buggy address belongs to the physical page:
[   64.784525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   64.792508] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   64.799017] page_type: f5(slab)
[   64.802153] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   64.809874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.817593] page dumped because: kasan: bad access detected
[   64.823149] 
[   64.824624] Memory state around the buggy address:
[   64.829407]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.836607]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.843812] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.851012]                                      ^
[   64.855791]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.862995]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.870196] ==================================================================
[   65.665882] ==================================================================
[   65.672967] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   65.680254] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   65.687632] 
[   65.689115] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   65.689165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.689180] Hardware name: WinLink E850-96 board (DT)
[   65.689199] Call trace:
[   65.689211]  show_stack+0x20/0x38 (C)
[   65.689242]  dump_stack_lvl+0x8c/0xd0
[   65.689275]  print_report+0x118/0x5d0
[   65.689302]  kasan_report+0xdc/0x128
[   65.689328]  kasan_check_range+0x100/0x1a8
[   65.689359]  __kasan_check_write+0x20/0x30
[   65.689390]  kasan_atomics_helper+0x3ac/0x4858
[   65.689425]  kasan_atomics+0x198/0x2e0
[   65.689459]  kunit_try_run_case+0x170/0x3f0
[   65.689490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.689527]  kthread+0x328/0x630
[   65.689553]  ret_from_fork+0x10/0x20
[   65.689584] 
[   65.760548] Allocated by task 346:
[   65.763935]  kasan_save_stack+0x3c/0x68
[   65.767753]  kasan_save_track+0x20/0x40
[   65.771572]  kasan_save_alloc_info+0x40/0x58
[   65.775825]  __kasan_kmalloc+0xd4/0xd8
[   65.779558]  __kmalloc_cache_noprof+0x16c/0x3c0
[   65.784071]  kasan_atomics+0xb8/0x2e0
[   65.787717]  kunit_try_run_case+0x170/0x3f0
[   65.791884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.797353]  kthread+0x328/0x630
[   65.800564]  ret_from_fork+0x10/0x20
[   65.804123] 
[   65.805599] The buggy address belongs to the object at ffff00080851b080
[   65.805599]  which belongs to the cache kmalloc-64 of size 64
[   65.817926] The buggy address is located 0 bytes to the right of
[   65.817926]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   65.830772] 
[   65.832251] The buggy address belongs to the physical page:
[   65.837807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   65.845790] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   65.852299] page_type: f5(slab)
[   65.855433] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   65.863157] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.870879] page dumped because: kasan: bad access detected
[   65.876431] 
[   65.877907] Memory state around the buggy address:
[   65.882688]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.889890]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.897095] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.904296]                                      ^
[   65.909073]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.916278]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.923479] ==================================================================
[   73.590418] ==================================================================
[   73.597497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   73.604875] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   73.612253] 
[   73.613734] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   73.613780] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.613799] Hardware name: WinLink E850-96 board (DT)
[   73.613817] Call trace:
[   73.613828]  show_stack+0x20/0x38 (C)
[   73.613858]  dump_stack_lvl+0x8c/0xd0
[   73.613890]  print_report+0x118/0x5d0
[   73.613917]  kasan_report+0xdc/0x128
[   73.613946]  __asan_report_store8_noabort+0x20/0x30
[   73.613980]  kasan_atomics_helper+0x3e5c/0x4858
[   73.614015]  kasan_atomics+0x198/0x2e0
[   73.614049]  kunit_try_run_case+0x170/0x3f0
[   73.614077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.614111]  kthread+0x328/0x630
[   73.614138]  ret_from_fork+0x10/0x20
[   73.614169] 
[   73.681956] Allocated by task 346:
[   73.685343]  kasan_save_stack+0x3c/0x68
[   73.689161]  kasan_save_track+0x20/0x40
[   73.692981]  kasan_save_alloc_info+0x40/0x58
[   73.697234]  __kasan_kmalloc+0xd4/0xd8
[   73.700967]  __kmalloc_cache_noprof+0x16c/0x3c0
[   73.705480]  kasan_atomics+0xb8/0x2e0
[   73.709126]  kunit_try_run_case+0x170/0x3f0
[   73.713293]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.718762]  kthread+0x328/0x630
[   73.721974]  ret_from_fork+0x10/0x20
[   73.725532] 
[   73.727008] The buggy address belongs to the object at ffff00080851b080
[   73.727008]  which belongs to the cache kmalloc-64 of size 64
[   73.739334] The buggy address is located 0 bytes to the right of
[   73.739334]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   73.752181] 
[   73.753657] The buggy address belongs to the physical page:
[   73.759214] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   73.767198] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   73.773708] page_type: f5(slab)
[   73.776842] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   73.784566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.792284] page dumped because: kasan: bad access detected
[   73.797840] 
[   73.799316] Memory state around the buggy address:
[   73.804094]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.811299]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.818503] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.825704]                                      ^
[   73.830482]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.837687]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.844888] ==================================================================
[   73.852243] ==================================================================
[   73.859299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   73.866591] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   73.873968] 
[   73.875451] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   73.875502] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.875519] Hardware name: WinLink E850-96 board (DT)
[   73.875538] Call trace:
[   73.875550]  show_stack+0x20/0x38 (C)
[   73.875580]  dump_stack_lvl+0x8c/0xd0
[   73.875612]  print_report+0x118/0x5d0
[   73.875641]  kasan_report+0xdc/0x128
[   73.875669]  kasan_check_range+0x100/0x1a8
[   73.875699]  __kasan_check_write+0x20/0x30
[   73.875729]  kasan_atomics_helper+0xeb8/0x4858
[   73.875763]  kasan_atomics+0x198/0x2e0
[   73.875795]  kunit_try_run_case+0x170/0x3f0
[   73.875825]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.875862]  kthread+0x328/0x630
[   73.875889]  ret_from_fork+0x10/0x20
[   73.875920] 
[   73.946883] Allocated by task 346:
[   73.950270]  kasan_save_stack+0x3c/0x68
[   73.954088]  kasan_save_track+0x20/0x40
[   73.957907]  kasan_save_alloc_info+0x40/0x58
[   73.962161]  __kasan_kmalloc+0xd4/0xd8
[   73.965893]  __kmalloc_cache_noprof+0x16c/0x3c0
[   73.970407]  kasan_atomics+0xb8/0x2e0
[   73.974053]  kunit_try_run_case+0x170/0x3f0
[   73.978220]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.983688]  kthread+0x328/0x630
[   73.986900]  ret_from_fork+0x10/0x20
[   73.990459] 
[   73.991934] The buggy address belongs to the object at ffff00080851b080
[   73.991934]  which belongs to the cache kmalloc-64 of size 64
[   74.004261] The buggy address is located 0 bytes to the right of
[   74.004261]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   74.017108] 
[   74.018585] The buggy address belongs to the physical page:
[   74.024142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   74.032126] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   74.038635] page_type: f5(slab)
[   74.041770] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   74.049492] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.057211] page dumped because: kasan: bad access detected
[   74.062767] 
[   74.064242] Memory state around the buggy address:
[   74.069021]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.076225]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.083430] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.090631]                                      ^
[   74.095409]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.102614]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.109815] ==================================================================
[   69.901434] ==================================================================
[   69.908490] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   69.915781] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   69.923159] 
[   69.924639] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   69.924688] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.924705] Hardware name: WinLink E850-96 board (DT)
[   69.924722] Call trace:
[   69.924735]  show_stack+0x20/0x38 (C)
[   69.924767]  dump_stack_lvl+0x8c/0xd0
[   69.924799]  print_report+0x118/0x5d0
[   69.924825]  kasan_report+0xdc/0x128
[   69.924852]  kasan_check_range+0x100/0x1a8
[   69.924881]  __kasan_check_write+0x20/0x30
[   69.924913]  kasan_atomics_helper+0xa6c/0x4858
[   69.924948]  kasan_atomics+0x198/0x2e0
[   69.924980]  kunit_try_run_case+0x170/0x3f0
[   69.925014]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.925048]  kthread+0x328/0x630
[   69.925076]  ret_from_fork+0x10/0x20
[   69.925107] 
[   69.996074] Allocated by task 346:
[   69.999462]  kasan_save_stack+0x3c/0x68
[   70.003279]  kasan_save_track+0x20/0x40
[   70.007099]  kasan_save_alloc_info+0x40/0x58
[   70.011352]  __kasan_kmalloc+0xd4/0xd8
[   70.015085]  __kmalloc_cache_noprof+0x16c/0x3c0
[   70.019598]  kasan_atomics+0xb8/0x2e0
[   70.023244]  kunit_try_run_case+0x170/0x3f0
[   70.027411]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.032880]  kthread+0x328/0x630
[   70.036091]  ret_from_fork+0x10/0x20
[   70.039650] 
[   70.041125] The buggy address belongs to the object at ffff00080851b080
[   70.041125]  which belongs to the cache kmalloc-64 of size 64
[   70.053452] The buggy address is located 0 bytes to the right of
[   70.053452]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   70.066299] 
[   70.067775] The buggy address belongs to the physical page:
[   70.073332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   70.081318] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   70.087826] page_type: f5(slab)
[   70.090963] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   70.098684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.106402] page dumped because: kasan: bad access detected
[   70.111958] 
[   70.113433] Memory state around the buggy address:
[   70.118212]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   70.125416]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.132621] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.139822]                                      ^
[   70.144600]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.151805]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.159006] ==================================================================
[   64.877495] ==================================================================
[   64.884610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   64.891986] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   64.899276] 
[   64.900758] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   64.900811] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.900825] Hardware name: WinLink E850-96 board (DT)
[   64.900846] Call trace:
[   64.900862]  show_stack+0x20/0x38 (C)
[   64.900896]  dump_stack_lvl+0x8c/0xd0
[   64.900932]  print_report+0x118/0x5d0
[   64.900959]  kasan_report+0xdc/0x128
[   64.900985]  __asan_report_load4_noabort+0x20/0x30
[   64.901016]  kasan_atomics_helper+0x40fc/0x4858
[   64.901051]  kasan_atomics+0x198/0x2e0
[   64.901086]  kunit_try_run_case+0x170/0x3f0
[   64.901117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.901152]  kthread+0x328/0x630
[   64.901180]  ret_from_fork+0x10/0x20
[   64.901214] 
[   64.968892] Allocated by task 346:
[   64.972280]  kasan_save_stack+0x3c/0x68
[   64.976098]  kasan_save_track+0x20/0x40
[   64.979917]  kasan_save_alloc_info+0x40/0x58
[   64.984171]  __kasan_kmalloc+0xd4/0xd8
[   64.987903]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.992417]  kasan_atomics+0xb8/0x2e0
[   64.996063]  kunit_try_run_case+0x170/0x3f0
[   65.000229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.005698]  kthread+0x328/0x630
[   65.008910]  ret_from_fork+0x10/0x20
[   65.012469] 
[   65.013946] The buggy address belongs to the object at ffff00080851b080
[   65.013946]  which belongs to the cache kmalloc-64 of size 64
[   65.026270] The buggy address is located 0 bytes to the right of
[   65.026270]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   65.039117] 
[   65.040596] The buggy address belongs to the physical page:
[   65.046152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   65.054135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   65.060645] page_type: f5(slab)
[   65.063781] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   65.071502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.079222] page dumped because: kasan: bad access detected
[   65.084776] 
[   65.086252] Memory state around the buggy address:
[   65.091036]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.098235]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.105440] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.112641]                                      ^
[   65.117419]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.124623]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.131824] ==================================================================
[   67.520354] ==================================================================
[   67.527450] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   67.534740] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   67.542118] 
[   67.543599] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   67.543646] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.543660] Hardware name: WinLink E850-96 board (DT)
[   67.543679] Call trace:
[   67.543690]  show_stack+0x20/0x38 (C)
[   67.543723]  dump_stack_lvl+0x8c/0xd0
[   67.543753]  print_report+0x118/0x5d0
[   67.543778]  kasan_report+0xdc/0x128
[   67.543805]  kasan_check_range+0x100/0x1a8
[   67.543834]  __kasan_check_write+0x20/0x30
[   67.543865]  kasan_atomics_helper+0x684/0x4858
[   67.543900]  kasan_atomics+0x198/0x2e0
[   67.543932]  kunit_try_run_case+0x170/0x3f0
[   67.543960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.543994]  kthread+0x328/0x630
[   67.544021]  ret_from_fork+0x10/0x20
[   67.544051] 
[   67.615034] Allocated by task 346:
[   67.618421]  kasan_save_stack+0x3c/0x68
[   67.622239]  kasan_save_track+0x20/0x40
[   67.626058]  kasan_save_alloc_info+0x40/0x58
[   67.630311]  __kasan_kmalloc+0xd4/0xd8
[   67.634044]  __kmalloc_cache_noprof+0x16c/0x3c0
[   67.638558]  kasan_atomics+0xb8/0x2e0
[   67.642204]  kunit_try_run_case+0x170/0x3f0
[   67.646370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.651839]  kthread+0x328/0x630
[   67.655050]  ret_from_fork+0x10/0x20
[   67.658610] 
[   67.660085] The buggy address belongs to the object at ffff00080851b080
[   67.660085]  which belongs to the cache kmalloc-64 of size 64
[   67.672412] The buggy address is located 0 bytes to the right of
[   67.672412]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   67.685258] 
[   67.686734] The buggy address belongs to the physical page:
[   67.692291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   67.700276] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   67.706786] page_type: f5(slab)
[   67.709919] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   67.717643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.725362] page dumped because: kasan: bad access detected
[   67.730917] 
[   67.732393] Memory state around the buggy address:
[   67.737171]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   67.744376]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.751581] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.758782]                                      ^
[   67.763560]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.770764]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.777965] ==================================================================
[   66.725664] ==================================================================
[   66.732672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   66.739962] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   66.747338] 
[   66.748824] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   66.748877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.748892] Hardware name: WinLink E850-96 board (DT)
[   66.748912] Call trace:
[   66.748924]  show_stack+0x20/0x38 (C)
[   66.748956]  dump_stack_lvl+0x8c/0xd0
[   66.748989]  print_report+0x118/0x5d0
[   66.749018]  kasan_report+0xdc/0x128
[   66.749044]  kasan_check_range+0x100/0x1a8
[   66.749075]  __kasan_check_write+0x20/0x30
[   66.749107]  kasan_atomics_helper+0x54c/0x4858
[   66.749142]  kasan_atomics+0x198/0x2e0
[   66.749174]  kunit_try_run_case+0x170/0x3f0
[   66.749204]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.749240]  kthread+0x328/0x630
[   66.749267]  ret_from_fork+0x10/0x20
[   66.749296] 
[   66.820255] Allocated by task 346:
[   66.823641]  kasan_save_stack+0x3c/0x68
[   66.827459]  kasan_save_track+0x20/0x40
[   66.831278]  kasan_save_alloc_info+0x40/0x58
[   66.835532]  __kasan_kmalloc+0xd4/0xd8
[   66.839264]  __kmalloc_cache_noprof+0x16c/0x3c0
[   66.843778]  kasan_atomics+0xb8/0x2e0
[   66.847424]  kunit_try_run_case+0x170/0x3f0
[   66.851590]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.857059]  kthread+0x328/0x630
[   66.860271]  ret_from_fork+0x10/0x20
[   66.863830] 
[   66.865305] The buggy address belongs to the object at ffff00080851b080
[   66.865305]  which belongs to the cache kmalloc-64 of size 64
[   66.877632] The buggy address is located 0 bytes to the right of
[   66.877632]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   66.890479] 
[   66.891956] The buggy address belongs to the physical page:
[   66.897513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   66.905496] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   66.912006] page_type: f5(slab)
[   66.915143] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   66.922863] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.930582] page dumped because: kasan: bad access detected
[   66.936137] 
[   66.937613] Memory state around the buggy address:
[   66.942393]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   66.949596]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.956801] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.964002]                                      ^
[   66.968780]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.975984]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.983186] ==================================================================
[   65.139165] ==================================================================
[   65.146240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   65.153526] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   65.160904] 
[   65.162386] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   65.162439] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.162455] Hardware name: WinLink E850-96 board (DT)
[   65.162476] Call trace:
[   65.162489]  show_stack+0x20/0x38 (C)
[   65.162524]  dump_stack_lvl+0x8c/0xd0
[   65.162558]  print_report+0x118/0x5d0
[   65.162585]  kasan_report+0xdc/0x128
[   65.162613]  kasan_check_range+0x100/0x1a8
[   65.162642]  __kasan_check_write+0x20/0x30
[   65.162674]  kasan_atomics_helper+0x32c/0x4858
[   65.162710]  kasan_atomics+0x198/0x2e0
[   65.162742]  kunit_try_run_case+0x170/0x3f0
[   65.162773]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.162809]  kthread+0x328/0x630
[   65.162837]  ret_from_fork+0x10/0x20
[   65.162868] 
[   65.233819] Allocated by task 346:
[   65.237207]  kasan_save_stack+0x3c/0x68
[   65.241024]  kasan_save_track+0x20/0x40
[   65.244844]  kasan_save_alloc_info+0x40/0x58
[   65.249097]  __kasan_kmalloc+0xd4/0xd8
[   65.252830]  __kmalloc_cache_noprof+0x16c/0x3c0
[   65.257343]  kasan_atomics+0xb8/0x2e0
[   65.260989]  kunit_try_run_case+0x170/0x3f0
[   65.265156]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.270625]  kthread+0x328/0x630
[   65.273836]  ret_from_fork+0x10/0x20
[   65.277395] 
[   65.278872] The buggy address belongs to the object at ffff00080851b080
[   65.278872]  which belongs to the cache kmalloc-64 of size 64
[   65.291198] The buggy address is located 0 bytes to the right of
[   65.291198]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   65.304044] 
[   65.305522] The buggy address belongs to the physical page:
[   65.311079] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   65.319061] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   65.325571] page_type: f5(slab)
[   65.328704] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   65.336429] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.344148] page dumped because: kasan: bad access detected
[   65.349703] 
[   65.351179] Memory state around the buggy address:
[   65.355962]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.363161]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.370366] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.377567]                                      ^
[   65.382345]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.389550]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.396751] ==================================================================
[   65.930841] ==================================================================
[   65.937891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   65.945180] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   65.952559] 
[   65.954042] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   65.954093] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.954109] Hardware name: WinLink E850-96 board (DT)
[   65.954127] Call trace:
[   65.954139]  show_stack+0x20/0x38 (C)
[   65.954170]  dump_stack_lvl+0x8c/0xd0
[   65.954202]  print_report+0x118/0x5d0
[   65.954229]  kasan_report+0xdc/0x128
[   65.954257]  kasan_check_range+0x100/0x1a8
[   65.954285]  __kasan_check_write+0x20/0x30
[   65.954314]  kasan_atomics_helper+0x414/0x4858
[   65.954348]  kasan_atomics+0x198/0x2e0
[   65.954380]  kunit_try_run_case+0x170/0x3f0
[   65.954409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.954445]  kthread+0x328/0x630
[   65.954472]  ret_from_fork+0x10/0x20
[   65.954502] 
[   66.025474] Allocated by task 346:
[   66.028862]  kasan_save_stack+0x3c/0x68
[   66.032679]  kasan_save_track+0x20/0x40
[   66.036498]  kasan_save_alloc_info+0x40/0x58
[   66.040752]  __kasan_kmalloc+0xd4/0xd8
[   66.044484]  __kmalloc_cache_noprof+0x16c/0x3c0
[   66.048998]  kasan_atomics+0xb8/0x2e0
[   66.052644]  kunit_try_run_case+0x170/0x3f0
[   66.056810]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.062279]  kthread+0x328/0x630
[   66.065491]  ret_from_fork+0x10/0x20
[   66.069050] 
[   66.070525] The buggy address belongs to the object at ffff00080851b080
[   66.070525]  which belongs to the cache kmalloc-64 of size 64
[   66.082852] The buggy address is located 0 bytes to the right of
[   66.082852]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   66.095699] 
[   66.097176] The buggy address belongs to the physical page:
[   66.102732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   66.110716] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   66.117226] page_type: f5(slab)
[   66.120360] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   66.128084] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.135802] page dumped because: kasan: bad access detected
[   66.141358] 
[   66.142833] Memory state around the buggy address:
[   66.147614]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   66.154816]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.162022] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.169222]                                      ^
[   66.174000]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.181205]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.188406] ==================================================================
[   64.083106] ==================================================================
[   64.090179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   64.097467] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   64.104756] 
[   64.106240] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   64.106297] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.106314] Hardware name: WinLink E850-96 board (DT)
[   64.106335] Call trace:
[   64.106347]  show_stack+0x20/0x38 (C)
[   64.106382]  dump_stack_lvl+0x8c/0xd0
[   64.106416]  print_report+0x118/0x5d0
[   64.106445]  kasan_report+0xdc/0x128
[   64.106473]  kasan_check_range+0x100/0x1a8
[   64.106505]  __kasan_check_read+0x20/0x30
[   64.106538]  kasan_atomics_helper+0x1ec/0x4858
[   64.106572]  kasan_atomics+0x198/0x2e0
[   64.106604]  kunit_try_run_case+0x170/0x3f0
[   64.106638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.106674]  kthread+0x328/0x630
[   64.106704]  ret_from_fork+0x10/0x20
[   64.106736] 
[   64.177585] Allocated by task 346:
[   64.180973]  kasan_save_stack+0x3c/0x68
[   64.184790]  kasan_save_track+0x20/0x40
[   64.188610]  kasan_save_alloc_info+0x40/0x58
[   64.192863]  __kasan_kmalloc+0xd4/0xd8
[   64.196596]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.201109]  kasan_atomics+0xb8/0x2e0
[   64.204755]  kunit_try_run_case+0x170/0x3f0
[   64.208921]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.214390]  kthread+0x328/0x630
[   64.217602]  ret_from_fork+0x10/0x20
[   64.221161] 
[   64.222638] The buggy address belongs to the object at ffff00080851b080
[   64.222638]  which belongs to the cache kmalloc-64 of size 64
[   64.234965] The buggy address is located 0 bytes to the right of
[   64.234965]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   64.247810] 
[   64.249288] The buggy address belongs to the physical page:
[   64.254845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   64.262829] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   64.269339] page_type: f5(slab)
[   64.272476] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   64.280194] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.287913] page dumped because: kasan: bad access detected
[   64.293469] 
[   64.294944] Memory state around the buggy address:
[   64.299726]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.306927]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.314132] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.321333]                                      ^
[   64.326111]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.333316]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.340517] ==================================================================
[   76.502548] ==================================================================
[   76.509607] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   76.516983] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   76.524362] 
[   76.525843] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   76.525897] Tainted: [B]=BAD_PAGE, [N]=TEST
[   76.525911] Hardware name: WinLink E850-96 board (DT)
[   76.525931] Call trace:
[   76.525944]  show_stack+0x20/0x38 (C)
[   76.525976]  dump_stack_lvl+0x8c/0xd0
[   76.526010]  print_report+0x118/0x5d0
[   76.526040]  kasan_report+0xdc/0x128
[   76.526068]  kasan_check_range+0x100/0x1a8
[   76.526097]  __kasan_check_write+0x20/0x30
[   76.526127]  kasan_atomics_helper+0x12d8/0x4858
[   76.526161]  kasan_atomics+0x198/0x2e0
[   76.526194]  kunit_try_run_case+0x170/0x3f0
[   76.526227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.526261]  kthread+0x328/0x630
[   76.526288]  ret_from_fork+0x10/0x20
[   76.526319] 
[   76.597364] Allocated by task 346:
[   76.600751]  kasan_save_stack+0x3c/0x68
[   76.604569]  kasan_save_track+0x20/0x40
[   76.608388]  kasan_save_alloc_info+0x40/0x58
[   76.612642]  __kasan_kmalloc+0xd4/0xd8
[   76.616374]  __kmalloc_cache_noprof+0x16c/0x3c0
[   76.620888]  kasan_atomics+0xb8/0x2e0
[   76.624534]  kunit_try_run_case+0x170/0x3f0
[   76.628700]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.634169]  kthread+0x328/0x630
[   76.637381]  ret_from_fork+0x10/0x20
[   76.640940] 
[   76.642415] The buggy address belongs to the object at ffff00080851b080
[   76.642415]  which belongs to the cache kmalloc-64 of size 64
[   76.654742] The buggy address is located 0 bytes to the right of
[   76.654742]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   76.667589] 
[   76.669064] The buggy address belongs to the physical page:
[   76.674622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   76.682606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   76.689116] page_type: f5(slab)
[   76.692249] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   76.699973] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   76.707692] page dumped because: kasan: bad access detected
[   76.713248] 
[   76.714723] Memory state around the buggy address:
[   76.719501]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   76.726706]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   76.733911] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   76.741112]                                      ^
[   76.745890]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.753095]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.760296] ==================================================================
[   78.089662] ==================================================================
[   78.096735] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   78.104114] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   78.111491] 
[   78.112973] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   78.113022] Tainted: [B]=BAD_PAGE, [N]=TEST
[   78.113038] Hardware name: WinLink E850-96 board (DT)
[   78.113054] Call trace:
[   78.113067]  show_stack+0x20/0x38 (C)
[   78.113097]  dump_stack_lvl+0x8c/0xd0
[   78.113130]  print_report+0x118/0x5d0
[   78.113156]  kasan_report+0xdc/0x128
[   78.113183]  kasan_check_range+0x100/0x1a8
[   78.113213]  __kasan_check_write+0x20/0x30
[   78.113243]  kasan_atomics_helper+0x154c/0x4858
[   78.113277]  kasan_atomics+0x198/0x2e0
[   78.113311]  kunit_try_run_case+0x170/0x3f0
[   78.113342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.113376]  kthread+0x328/0x630
[   78.113402]  ret_from_fork+0x10/0x20
[   78.113436] 
[   78.184493] Allocated by task 346:
[   78.187880]  kasan_save_stack+0x3c/0x68
[   78.191698]  kasan_save_track+0x20/0x40
[   78.195517]  kasan_save_alloc_info+0x40/0x58
[   78.199771]  __kasan_kmalloc+0xd4/0xd8
[   78.203503]  __kmalloc_cache_noprof+0x16c/0x3c0
[   78.208017]  kasan_atomics+0xb8/0x2e0
[   78.211663]  kunit_try_run_case+0x170/0x3f0
[   78.215829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.221298]  kthread+0x328/0x630
[   78.224510]  ret_from_fork+0x10/0x20
[   78.228069] 
[   78.229545] The buggy address belongs to the object at ffff00080851b080
[   78.229545]  which belongs to the cache kmalloc-64 of size 64
[   78.241871] The buggy address is located 0 bytes to the right of
[   78.241871]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   78.254718] 
[   78.256194] The buggy address belongs to the physical page:
[   78.261752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   78.269735] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   78.276245] page_type: f5(slab)
[   78.279380] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   78.287102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   78.294821] page dumped because: kasan: bad access detected
[   78.300377] 
[   78.301852] Memory state around the buggy address:
[   78.306635]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   78.313835]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.321040] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   78.328241]                                      ^
[   78.333019]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.340223]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.347424] ==================================================================
[   63.552524] ==================================================================
[   63.566748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   63.574123] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   63.581413] 
[   63.582901] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   63.582957] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.582977] Hardware name: WinLink E850-96 board (DT)
[   63.582998] Call trace:
[   63.583011]  show_stack+0x20/0x38 (C)
[   63.583050]  dump_stack_lvl+0x8c/0xd0
[   63.583088]  print_report+0x118/0x5d0
[   63.583122]  kasan_report+0xdc/0x128
[   63.583150]  __asan_report_load4_noabort+0x20/0x30
[   63.583182]  kasan_atomics_helper+0x40a8/0x4858
[   63.583216]  kasan_atomics+0x198/0x2e0
[   63.583249]  kunit_try_run_case+0x170/0x3f0
[   63.583283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.583319]  kthread+0x328/0x630
[   63.583349]  ret_from_fork+0x10/0x20
[   63.583388] 
[   63.651034] Allocated by task 346:
[   63.654420]  kasan_save_stack+0x3c/0x68
[   63.658235]  kasan_save_track+0x20/0x40
[   63.662055]  kasan_save_alloc_info+0x40/0x58
[   63.666308]  __kasan_kmalloc+0xd4/0xd8
[   63.670041]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.674554]  kasan_atomics+0xb8/0x2e0
[   63.678202]  kunit_try_run_case+0x170/0x3f0
[   63.682367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.687836]  kthread+0x328/0x630
[   63.691047]  ret_from_fork+0x10/0x20
[   63.694607] 
[   63.696085] The buggy address belongs to the object at ffff00080851b080
[   63.696085]  which belongs to the cache kmalloc-64 of size 64
[   63.708412] The buggy address is located 0 bytes to the right of
[   63.708412]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   63.721255] 
[   63.722735] The buggy address belongs to the physical page:
[   63.728290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   63.736275] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.742784] page_type: f5(slab)
[   63.745920] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.753640] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.761362] page dumped because: kasan: bad access detected
[   63.766914] 
[   63.768391] Memory state around the buggy address:
[   63.773171]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   63.780373]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.787579] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.794778]                                      ^
[   63.799557]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.806761]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.813964] ==================================================================
[   68.580085] ==================================================================
[   68.587156] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   68.594446] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   68.601825] 
[   68.603305] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   68.603353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.603368] Hardware name: WinLink E850-96 board (DT)
[   68.603386] Call trace:
[   68.603397]  show_stack+0x20/0x38 (C)
[   68.603430]  dump_stack_lvl+0x8c/0xd0
[   68.603460]  print_report+0x118/0x5d0
[   68.603489]  kasan_report+0xdc/0x128
[   68.603517]  kasan_check_range+0x100/0x1a8
[   68.603545]  __kasan_check_write+0x20/0x30
[   68.603575]  kasan_atomics_helper+0x894/0x4858
[   68.603610]  kasan_atomics+0x198/0x2e0
[   68.603643]  kunit_try_run_case+0x170/0x3f0
[   68.603674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.603708]  kthread+0x328/0x630
[   68.603735]  ret_from_fork+0x10/0x20
[   68.603766] 
[   68.674740] Allocated by task 346:
[   68.678127]  kasan_save_stack+0x3c/0x68
[   68.681945]  kasan_save_track+0x20/0x40
[   68.685764]  kasan_save_alloc_info+0x40/0x58
[   68.690018]  __kasan_kmalloc+0xd4/0xd8
[   68.693750]  __kmalloc_cache_noprof+0x16c/0x3c0
[   68.698264]  kasan_atomics+0xb8/0x2e0
[   68.701910]  kunit_try_run_case+0x170/0x3f0
[   68.706076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.711545]  kthread+0x328/0x630
[   68.714757]  ret_from_fork+0x10/0x20
[   68.718316] 
[   68.719791] The buggy address belongs to the object at ffff00080851b080
[   68.719791]  which belongs to the cache kmalloc-64 of size 64
[   68.732118] The buggy address is located 0 bytes to the right of
[   68.732118]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   68.744965] 
[   68.746440] The buggy address belongs to the physical page:
[   68.751998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   68.759982] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   68.766493] page_type: f5(slab)
[   68.769625] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   68.777349] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.785068] page dumped because: kasan: bad access detected
[   68.790623] 
[   68.792099] Memory state around the buggy address:
[   68.796879]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   68.804082]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.811287] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.818488]                                      ^
[   68.823266]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.830471]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.837672] ==================================================================
[   70.957844] ==================================================================
[   70.964898] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   70.972277] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   70.979567] 
[   70.981049] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   70.981096] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.981112] Hardware name: WinLink E850-96 board (DT)
[   70.981131] Call trace:
[   70.981144]  show_stack+0x20/0x38 (C)
[   70.981177]  dump_stack_lvl+0x8c/0xd0
[   70.981211]  print_report+0x118/0x5d0
[   70.981238]  kasan_report+0xdc/0x128
[   70.981264]  __asan_report_load4_noabort+0x20/0x30
[   70.981296]  kasan_atomics_helper+0x3dbc/0x4858
[   70.981329]  kasan_atomics+0x198/0x2e0
[   70.981364]  kunit_try_run_case+0x170/0x3f0
[   70.981393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.981426]  kthread+0x328/0x630
[   70.981451]  ret_from_fork+0x10/0x20
[   70.981482] 
[   71.049184] Allocated by task 346:
[   71.052571]  kasan_save_stack+0x3c/0x68
[   71.056388]  kasan_save_track+0x20/0x40
[   71.060208]  kasan_save_alloc_info+0x40/0x58
[   71.064461]  __kasan_kmalloc+0xd4/0xd8
[   71.068194]  __kmalloc_cache_noprof+0x16c/0x3c0
[   71.072707]  kasan_atomics+0xb8/0x2e0
[   71.076353]  kunit_try_run_case+0x170/0x3f0
[   71.080520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.085988]  kthread+0x328/0x630
[   71.089200]  ret_from_fork+0x10/0x20
[   71.092759] 
[   71.094235] The buggy address belongs to the object at ffff00080851b080
[   71.094235]  which belongs to the cache kmalloc-64 of size 64
[   71.106562] The buggy address is located 0 bytes to the right of
[   71.106562]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   71.119408] 
[   71.120885] The buggy address belongs to the physical page:
[   71.126442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   71.134425] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   71.140935] page_type: f5(slab)
[   71.144070] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   71.151793] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   71.159512] page dumped because: kasan: bad access detected
[   71.165067] 
[   71.166543] Memory state around the buggy address:
[   71.171321]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   71.178526]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.185730] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   71.192931]                                      ^
[   71.197709]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.204914]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.212115] ==================================================================
[   72.537508] ==================================================================
[   72.544562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   72.551939] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   72.559230] 
[   72.560712] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   72.560765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.560780] Hardware name: WinLink E850-96 board (DT)
[   72.560799] Call trace:
[   72.560812]  show_stack+0x20/0x38 (C)
[   72.560843]  dump_stack_lvl+0x8c/0xd0
[   72.560877]  print_report+0x118/0x5d0
[   72.560902]  kasan_report+0xdc/0x128
[   72.560928]  __asan_report_load4_noabort+0x20/0x30
[   72.560959]  kasan_atomics_helper+0x3e04/0x4858
[   72.560994]  kasan_atomics+0x198/0x2e0
[   72.561026]  kunit_try_run_case+0x170/0x3f0
[   72.561058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.561091]  kthread+0x328/0x630
[   72.561117]  ret_from_fork+0x10/0x20
[   72.561147] 
[   72.628848] Allocated by task 346:
[   72.632234]  kasan_save_stack+0x3c/0x68
[   72.636052]  kasan_save_track+0x20/0x40
[   72.639871]  kasan_save_alloc_info+0x40/0x58
[   72.644125]  __kasan_kmalloc+0xd4/0xd8
[   72.647858]  __kmalloc_cache_noprof+0x16c/0x3c0
[   72.652371]  kasan_atomics+0xb8/0x2e0
[   72.656017]  kunit_try_run_case+0x170/0x3f0
[   72.660184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.665652]  kthread+0x328/0x630
[   72.668864]  ret_from_fork+0x10/0x20
[   72.672423] 
[   72.673898] The buggy address belongs to the object at ffff00080851b080
[   72.673898]  which belongs to the cache kmalloc-64 of size 64
[   72.686225] The buggy address is located 0 bytes to the right of
[   72.686225]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   72.699072] 
[   72.700549] The buggy address belongs to the physical page:
[   72.706106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   72.714091] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   72.720599] page_type: f5(slab)
[   72.723735] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   72.731457] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.739176] page dumped because: kasan: bad access detected
[   72.744731] 
[   72.746206] Memory state around the buggy address:
[   72.750985]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   72.758189]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.765394] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.772595]                                      ^
[   72.777373]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.784578]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.791779] ==================================================================
[   76.767609] ==================================================================
[   76.774707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   76.782084] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   76.789462] 
[   76.790944] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   76.790991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   76.791005] Hardware name: WinLink E850-96 board (DT)
[   76.791024] Call trace:
[   76.791037]  show_stack+0x20/0x38 (C)
[   76.791068]  dump_stack_lvl+0x8c/0xd0
[   76.791101]  print_report+0x118/0x5d0
[   76.791129]  kasan_report+0xdc/0x128
[   76.791157]  kasan_check_range+0x100/0x1a8
[   76.791186]  __kasan_check_write+0x20/0x30
[   76.791217]  kasan_atomics_helper+0x1384/0x4858
[   76.791254]  kasan_atomics+0x198/0x2e0
[   76.791287]  kunit_try_run_case+0x170/0x3f0
[   76.791316]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.791350]  kthread+0x328/0x630
[   76.791376]  ret_from_fork+0x10/0x20
[   76.791406] 
[   76.862464] Allocated by task 346:
[   76.865851]  kasan_save_stack+0x3c/0x68
[   76.869669]  kasan_save_track+0x20/0x40
[   76.873488]  kasan_save_alloc_info+0x40/0x58
[   76.877742]  __kasan_kmalloc+0xd4/0xd8
[   76.881475]  __kmalloc_cache_noprof+0x16c/0x3c0
[   76.885988]  kasan_atomics+0xb8/0x2e0
[   76.889634]  kunit_try_run_case+0x170/0x3f0
[   76.893801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.899269]  kthread+0x328/0x630
[   76.902481]  ret_from_fork+0x10/0x20
[   76.906040] 
[   76.907515] The buggy address belongs to the object at ffff00080851b080
[   76.907515]  which belongs to the cache kmalloc-64 of size 64
[   76.919842] The buggy address is located 0 bytes to the right of
[   76.919842]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   76.932689] 
[   76.934165] The buggy address belongs to the physical page:
[   76.939722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   76.947706] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   76.954216] page_type: f5(slab)
[   76.957349] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   76.965074] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   76.972792] page dumped because: kasan: bad access detected
[   76.978348] 
[   76.979823] Memory state around the buggy address:
[   76.984602]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   76.991807]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   76.999011] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.006212]                                      ^
[   77.010990]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.018195]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.025396] ==================================================================
[   72.010956] ==================================================================
[   72.018010] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   72.025384] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   72.032676] 
[   72.034157] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   72.034204] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.034220] Hardware name: WinLink E850-96 board (DT)
[   72.034239] Call trace:
[   72.034252]  show_stack+0x20/0x38 (C)
[   72.034286]  dump_stack_lvl+0x8c/0xd0
[   72.034319]  print_report+0x118/0x5d0
[   72.034347]  kasan_report+0xdc/0x128
[   72.034375]  __asan_report_load4_noabort+0x20/0x30
[   72.034407]  kasan_atomics_helper+0x3dd8/0x4858
[   72.034441]  kasan_atomics+0x198/0x2e0
[   72.034473]  kunit_try_run_case+0x170/0x3f0
[   72.034502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.034536]  kthread+0x328/0x630
[   72.034562]  ret_from_fork+0x10/0x20
[   72.034593] 
[   72.102292] Allocated by task 346:
[   72.105680]  kasan_save_stack+0x3c/0x68
[   72.109498]  kasan_save_track+0x20/0x40
[   72.113317]  kasan_save_alloc_info+0x40/0x58
[   72.117570]  __kasan_kmalloc+0xd4/0xd8
[   72.121303]  __kmalloc_cache_noprof+0x16c/0x3c0
[   72.125817]  kasan_atomics+0xb8/0x2e0
[   72.129463]  kunit_try_run_case+0x170/0x3f0
[   72.133629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.139098]  kthread+0x328/0x630
[   72.142310]  ret_from_fork+0x10/0x20
[   72.145868] 
[   72.147345] The buggy address belongs to the object at ffff00080851b080
[   72.147345]  which belongs to the cache kmalloc-64 of size 64
[   72.159671] The buggy address is located 0 bytes to the right of
[   72.159671]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   72.172517] 
[   72.173995] The buggy address belongs to the physical page:
[   72.179551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   72.187536] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   72.194045] page_type: f5(slab)
[   72.197178] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   72.204902] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.212621] page dumped because: kasan: bad access detected
[   72.218176] 
[   72.219652] Memory state around the buggy address:
[   72.224430]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   72.231635]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.238840] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.246040]                                      ^
[   72.250818]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.258023]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.265224] ==================================================================
[   79.146609] ==================================================================
[   79.153664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   79.161043] Read of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   79.168332] 
[   79.169815] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   79.169864] Tainted: [B]=BAD_PAGE, [N]=TEST
[   79.169880] Hardware name: WinLink E850-96 board (DT)
[   79.169897] Call trace:
[   79.169910]  show_stack+0x20/0x38 (C)
[   79.169940]  dump_stack_lvl+0x8c/0xd0
[   79.169973]  print_report+0x118/0x5d0
[   79.170002]  kasan_report+0xdc/0x128
[   79.170030]  __asan_report_load8_noabort+0x20/0x30
[   79.170063]  kasan_atomics_helper+0x3df4/0x4858
[   79.170098]  kasan_atomics+0x198/0x2e0
[   79.170130]  kunit_try_run_case+0x170/0x3f0
[   79.170160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.170194]  kthread+0x328/0x630
[   79.170221]  ret_from_fork+0x10/0x20
[   79.170251] 
[   79.237949] Allocated by task 346:
[   79.241336]  kasan_save_stack+0x3c/0x68
[   79.245154]  kasan_save_track+0x20/0x40
[   79.248974]  kasan_save_alloc_info+0x40/0x58
[   79.253227]  __kasan_kmalloc+0xd4/0xd8
[   79.256960]  __kmalloc_cache_noprof+0x16c/0x3c0
[   79.261474]  kasan_atomics+0xb8/0x2e0
[   79.265119]  kunit_try_run_case+0x170/0x3f0
[   79.269286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.274755]  kthread+0x328/0x630
[   79.277966]  ret_from_fork+0x10/0x20
[   79.281525] 
[   79.283001] The buggy address belongs to the object at ffff00080851b080
[   79.283001]  which belongs to the cache kmalloc-64 of size 64
[   79.295327] The buggy address is located 0 bytes to the right of
[   79.295327]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   79.308174] 
[   79.309650] The buggy address belongs to the physical page:
[   79.315207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   79.323193] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   79.329701] page_type: f5(slab)
[   79.332835] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   79.340559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   79.348278] page dumped because: kasan: bad access detected
[   79.353833] 
[   79.355309] Memory state around the buggy address:
[   79.360088]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   79.367292]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   79.374497] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   79.381697]                                      ^
[   79.386475]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.393680]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.400881] ==================================================================
[   69.371579] ==================================================================
[   69.378637] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   69.385927] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   69.393306] 
[   69.394787] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   69.394834] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.394850] Hardware name: WinLink E850-96 board (DT)
[   69.394868] Call trace:
[   69.394878]  show_stack+0x20/0x38 (C)
[   69.394909]  dump_stack_lvl+0x8c/0xd0
[   69.394940]  print_report+0x118/0x5d0
[   69.394970]  kasan_report+0xdc/0x128
[   69.394997]  kasan_check_range+0x100/0x1a8
[   69.395027]  __kasan_check_write+0x20/0x30
[   69.395057]  kasan_atomics_helper+0x99c/0x4858
[   69.395091]  kasan_atomics+0x198/0x2e0
[   69.395124]  kunit_try_run_case+0x170/0x3f0
[   69.395154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.395186]  kthread+0x328/0x630
[   69.395212]  ret_from_fork+0x10/0x20
[   69.395243] 
[   69.466221] Allocated by task 346:
[   69.469608]  kasan_save_stack+0x3c/0x68
[   69.473426]  kasan_save_track+0x20/0x40
[   69.477245]  kasan_save_alloc_info+0x40/0x58
[   69.481499]  __kasan_kmalloc+0xd4/0xd8
[   69.485231]  __kmalloc_cache_noprof+0x16c/0x3c0
[   69.489745]  kasan_atomics+0xb8/0x2e0
[   69.493391]  kunit_try_run_case+0x170/0x3f0
[   69.497558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.503026]  kthread+0x328/0x630
[   69.506238]  ret_from_fork+0x10/0x20
[   69.509797] 
[   69.511272] The buggy address belongs to the object at ffff00080851b080
[   69.511272]  which belongs to the cache kmalloc-64 of size 64
[   69.523599] The buggy address is located 0 bytes to the right of
[   69.523599]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   69.536446] 
[   69.537923] The buggy address belongs to the physical page:
[   69.543480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   69.551465] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   69.557973] page_type: f5(slab)
[   69.561106] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   69.568831] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.576549] page dumped because: kasan: bad access detected
[   69.582105] 
[   69.583580] Memory state around the buggy address:
[   69.588362]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   69.595563]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.602768] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.609969]                                      ^
[   69.614747]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.621952]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.629153] ==================================================================
[   77.294358] ==================================================================
[   77.301435] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   77.308812] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   77.316190] 
[   77.317672] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   77.317722] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.317738] Hardware name: WinLink E850-96 board (DT)
[   77.317756] Call trace:
[   77.317771]  show_stack+0x20/0x38 (C)
[   77.317803]  dump_stack_lvl+0x8c/0xd0
[   77.317835]  print_report+0x118/0x5d0
[   77.317864]  kasan_report+0xdc/0x128
[   77.317892]  kasan_check_range+0x100/0x1a8
[   77.317923]  __kasan_check_write+0x20/0x30
[   77.317954]  kasan_atomics_helper+0x1414/0x4858
[   77.317988]  kasan_atomics+0x198/0x2e0
[   77.318021]  kunit_try_run_case+0x170/0x3f0
[   77.318050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.318084]  kthread+0x328/0x630
[   77.318109]  ret_from_fork+0x10/0x20
[   77.318139] 
[   77.389193] Allocated by task 346:
[   77.392579]  kasan_save_stack+0x3c/0x68
[   77.396397]  kasan_save_track+0x20/0x40
[   77.400217]  kasan_save_alloc_info+0x40/0x58
[   77.404470]  __kasan_kmalloc+0xd4/0xd8
[   77.408203]  __kmalloc_cache_noprof+0x16c/0x3c0
[   77.412716]  kasan_atomics+0xb8/0x2e0
[   77.416362]  kunit_try_run_case+0x170/0x3f0
[   77.420529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.425997]  kthread+0x328/0x630
[   77.429209]  ret_from_fork+0x10/0x20
[   77.432768] 
[   77.434243] The buggy address belongs to the object at ffff00080851b080
[   77.434243]  which belongs to the cache kmalloc-64 of size 64
[   77.446571] The buggy address is located 0 bytes to the right of
[   77.446571]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   77.459417] 
[   77.460893] The buggy address belongs to the physical page:
[   77.466450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   77.474435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   77.480944] page_type: f5(slab)
[   77.484077] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   77.491802] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   77.499521] page dumped because: kasan: bad access detected
[   77.505076] 
[   77.506552] Memory state around the buggy address:
[   77.511330]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   77.518535]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.525739] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.532940]                                      ^
[   77.537718]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.544923]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.552124] ==================================================================
[   70.692895] ==================================================================
[   70.699971] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   70.707262] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   70.714640] 
[   70.716124] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   70.716174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.716190] Hardware name: WinLink E850-96 board (DT)
[   70.716207] Call trace:
[   70.716221]  show_stack+0x20/0x38 (C)
[   70.716252]  dump_stack_lvl+0x8c/0xd0
[   70.716283]  print_report+0x118/0x5d0
[   70.716311]  kasan_report+0xdc/0x128
[   70.716337]  kasan_check_range+0x100/0x1a8
[   70.716367]  __kasan_check_write+0x20/0x30
[   70.716398]  kasan_atomics_helper+0xb70/0x4858
[   70.716431]  kasan_atomics+0x198/0x2e0
[   70.716463]  kunit_try_run_case+0x170/0x3f0
[   70.716493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.716526]  kthread+0x328/0x630
[   70.716553]  ret_from_fork+0x10/0x20
[   70.716586] 
[   70.787556] Allocated by task 346:
[   70.790942]  kasan_save_stack+0x3c/0x68
[   70.794760]  kasan_save_track+0x20/0x40
[   70.798579]  kasan_save_alloc_info+0x40/0x58
[   70.802833]  __kasan_kmalloc+0xd4/0xd8
[   70.806566]  __kmalloc_cache_noprof+0x16c/0x3c0
[   70.811079]  kasan_atomics+0xb8/0x2e0
[   70.814725]  kunit_try_run_case+0x170/0x3f0
[   70.818892]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.824361]  kthread+0x328/0x630
[   70.827572]  ret_from_fork+0x10/0x20
[   70.831131] 
[   70.832607] The buggy address belongs to the object at ffff00080851b080
[   70.832607]  which belongs to the cache kmalloc-64 of size 64
[   70.844934] The buggy address is located 0 bytes to the right of
[   70.844934]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   70.857780] 
[   70.859256] The buggy address belongs to the physical page:
[   70.864813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   70.872797] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   70.879308] page_type: f5(slab)
[   70.882441] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   70.890165] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.897884] page dumped because: kasan: bad access detected
[   70.903439] 
[   70.904915] Memory state around the buggy address:
[   70.909694]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   70.916898]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.924103] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.931303]                                      ^
[   70.936082]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.943286]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.950487] ==================================================================
[   75.972350] ==================================================================
[   75.979407] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   75.986783] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   75.994161] 
[   75.995645] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   75.995693] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.995708] Hardware name: WinLink E850-96 board (DT)
[   75.995726] Call trace:
[   75.995739]  show_stack+0x20/0x38 (C)
[   75.995769]  dump_stack_lvl+0x8c/0xd0
[   75.995803]  print_report+0x118/0x5d0
[   75.995831]  kasan_report+0xdc/0x128
[   75.995856]  kasan_check_range+0x100/0x1a8
[   75.995885]  __kasan_check_write+0x20/0x30
[   75.995915]  kasan_atomics_helper+0x11f8/0x4858
[   75.995951]  kasan_atomics+0x198/0x2e0
[   75.995984]  kunit_try_run_case+0x170/0x3f0
[   75.996013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.996047]  kthread+0x328/0x630
[   75.996074]  ret_from_fork+0x10/0x20
[   75.996104] 
[   76.067164] Allocated by task 346:
[   76.070551]  kasan_save_stack+0x3c/0x68
[   76.074369]  kasan_save_track+0x20/0x40
[   76.078188]  kasan_save_alloc_info+0x40/0x58
[   76.082441]  __kasan_kmalloc+0xd4/0xd8
[   76.086174]  __kmalloc_cache_noprof+0x16c/0x3c0
[   76.090688]  kasan_atomics+0xb8/0x2e0
[   76.094334]  kunit_try_run_case+0x170/0x3f0
[   76.098500]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.103969]  kthread+0x328/0x630
[   76.107181]  ret_from_fork+0x10/0x20
[   76.110740] 
[   76.112215] The buggy address belongs to the object at ffff00080851b080
[   76.112215]  which belongs to the cache kmalloc-64 of size 64
[   76.124542] The buggy address is located 0 bytes to the right of
[   76.124542]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   76.137389] 
[   76.138864] The buggy address belongs to the physical page:
[   76.144423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   76.152407] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   76.158916] page_type: f5(slab)
[   76.162049] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   76.169773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   76.177492] page dumped because: kasan: bad access detected
[   76.183047] 
[   76.184523] Memory state around the buggy address:
[   76.189301]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   76.196506]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   76.203711] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   76.210912]                                      ^
[   76.215690]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.222894]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.230095] ==================================================================
[   72.799096] ==================================================================
[   72.806190] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   72.813480] Read of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   72.820771] 
[   72.822253] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   72.822301] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.822318] Hardware name: WinLink E850-96 board (DT)
[   72.822336] Call trace:
[   72.822350]  show_stack+0x20/0x38 (C)
[   72.822380]  dump_stack_lvl+0x8c/0xd0
[   72.822412]  print_report+0x118/0x5d0
[   72.822437]  kasan_report+0xdc/0x128
[   72.822464]  kasan_check_range+0x100/0x1a8
[   72.822493]  __kasan_check_read+0x20/0x30
[   72.822523]  kasan_atomics_helper+0xdd4/0x4858
[   72.822558]  kasan_atomics+0x198/0x2e0
[   72.822590]  kunit_try_run_case+0x170/0x3f0
[   72.822621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.822655]  kthread+0x328/0x630
[   72.822680]  ret_from_fork+0x10/0x20
[   72.822709] 
[   72.893600] Allocated by task 346:
[   72.896987]  kasan_save_stack+0x3c/0x68
[   72.900805]  kasan_save_track+0x20/0x40
[   72.904625]  kasan_save_alloc_info+0x40/0x58
[   72.908878]  __kasan_kmalloc+0xd4/0xd8
[   72.912610]  __kmalloc_cache_noprof+0x16c/0x3c0
[   72.917124]  kasan_atomics+0xb8/0x2e0
[   72.920770]  kunit_try_run_case+0x170/0x3f0
[   72.924937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.930405]  kthread+0x328/0x630
[   72.933617]  ret_from_fork+0x10/0x20
[   72.937176] 
[   72.938652] The buggy address belongs to the object at ffff00080851b080
[   72.938652]  which belongs to the cache kmalloc-64 of size 64
[   72.950980] The buggy address is located 0 bytes to the right of
[   72.950980]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   72.963825] 
[   72.965301] The buggy address belongs to the physical page:
[   72.970858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   72.978842] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   72.985352] page_type: f5(slab)
[   72.988485] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   72.996210] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.003928] page dumped because: kasan: bad access detected
[   73.009484] 
[   73.010959] Memory state around the buggy address:
[   73.015738]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.022942]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.030147] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.037348]                                      ^
[   73.042126]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.049331]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.056532] ==================================================================
[   74.117132] ==================================================================
[   74.124226] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   74.131516] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   74.138894] 
[   74.140378] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   74.140426] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.140443] Hardware name: WinLink E850-96 board (DT)
[   74.140462] Call trace:
[   74.140474]  show_stack+0x20/0x38 (C)
[   74.140505]  dump_stack_lvl+0x8c/0xd0
[   74.140537]  print_report+0x118/0x5d0
[   74.140565]  kasan_report+0xdc/0x128
[   74.140591]  kasan_check_range+0x100/0x1a8
[   74.140621]  __kasan_check_write+0x20/0x30
[   74.140653]  kasan_atomics_helper+0xf20/0x4858
[   74.140689]  kasan_atomics+0x198/0x2e0
[   74.140721]  kunit_try_run_case+0x170/0x3f0
[   74.140750]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.140783]  kthread+0x328/0x630
[   74.140810]  ret_from_fork+0x10/0x20
[   74.140840] 
[   74.211810] Allocated by task 346:
[   74.215196]  kasan_save_stack+0x3c/0x68
[   74.219014]  kasan_save_track+0x20/0x40
[   74.222834]  kasan_save_alloc_info+0x40/0x58
[   74.227087]  __kasan_kmalloc+0xd4/0xd8
[   74.230820]  __kmalloc_cache_noprof+0x16c/0x3c0
[   74.235334]  kasan_atomics+0xb8/0x2e0
[   74.238979]  kunit_try_run_case+0x170/0x3f0
[   74.243146]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.248615]  kthread+0x328/0x630
[   74.251826]  ret_from_fork+0x10/0x20
[   74.255385] 
[   74.256861] The buggy address belongs to the object at ffff00080851b080
[   74.256861]  which belongs to the cache kmalloc-64 of size 64
[   74.269188] The buggy address is located 0 bytes to the right of
[   74.269188]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   74.282034] 
[   74.283510] The buggy address belongs to the physical page:
[   74.289067] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   74.297053] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   74.303562] page_type: f5(slab)
[   74.306695] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   74.314419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.322138] page dumped because: kasan: bad access detected
[   74.327693] 
[   74.329169] Memory state around the buggy address:
[   74.333947]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.341152]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.348356] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.355557]                                      ^
[   74.360336]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.367540]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.374741] ==================================================================
[   66.195751] ==================================================================
[   66.202817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   66.210107] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   66.217485] 
[   66.218966] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   66.219015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.219032] Hardware name: WinLink E850-96 board (DT)
[   66.219051] Call trace:
[   66.219064]  show_stack+0x20/0x38 (C)
[   66.219096]  dump_stack_lvl+0x8c/0xd0
[   66.219128]  print_report+0x118/0x5d0
[   66.219156]  kasan_report+0xdc/0x128
[   66.219183]  kasan_check_range+0x100/0x1a8
[   66.219213]  __kasan_check_write+0x20/0x30
[   66.219243]  kasan_atomics_helper+0x47c/0x4858
[   66.219276]  kasan_atomics+0x198/0x2e0
[   66.219308]  kunit_try_run_case+0x170/0x3f0
[   66.219336]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.219370]  kthread+0x328/0x630
[   66.219398]  ret_from_fork+0x10/0x20
[   66.219426] 
[   66.290401] Allocated by task 346:
[   66.293788]  kasan_save_stack+0x3c/0x68
[   66.297606]  kasan_save_track+0x20/0x40
[   66.301425]  kasan_save_alloc_info+0x40/0x58
[   66.305678]  __kasan_kmalloc+0xd4/0xd8
[   66.309411]  __kmalloc_cache_noprof+0x16c/0x3c0
[   66.313925]  kasan_atomics+0xb8/0x2e0
[   66.317571]  kunit_try_run_case+0x170/0x3f0
[   66.321737]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.327206]  kthread+0x328/0x630
[   66.330418]  ret_from_fork+0x10/0x20
[   66.333977] 
[   66.335452] The buggy address belongs to the object at ffff00080851b080
[   66.335452]  which belongs to the cache kmalloc-64 of size 64
[   66.347779] The buggy address is located 0 bytes to the right of
[   66.347779]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   66.360625] 
[   66.362103] The buggy address belongs to the physical page:
[   66.367659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   66.375643] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   66.382153] page_type: f5(slab)
[   66.385286] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   66.393010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.400730] page dumped because: kasan: bad access detected
[   66.406285] 
[   66.407760] Memory state around the buggy address:
[   66.412540]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   66.419743]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.426948] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.434149]                                      ^
[   66.438926]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.446131]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.453332] ==================================================================
[   80.461693] ==================================================================
[   80.468748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   80.476126] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   80.483504] 
[   80.484986] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   80.485035] Tainted: [B]=BAD_PAGE, [N]=TEST
[   80.485049] Hardware name: WinLink E850-96 board (DT)
[   80.485067] Call trace:
[   80.485080]  show_stack+0x20/0x38 (C)
[   80.485110]  dump_stack_lvl+0x8c/0xd0
[   80.485146]  print_report+0x118/0x5d0
[   80.485173]  kasan_report+0xdc/0x128
[   80.485201]  kasan_check_range+0x100/0x1a8
[   80.485232]  __kasan_check_write+0x20/0x30
[   80.485261]  kasan_atomics_helper+0x17ec/0x4858
[   80.485297]  kasan_atomics+0x198/0x2e0
[   80.485331]  kunit_try_run_case+0x170/0x3f0
[   80.485363]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.485397]  kthread+0x328/0x630
[   80.485424]  ret_from_fork+0x10/0x20
[   80.485455] 
[   80.556506] Allocated by task 346:
[   80.559893]  kasan_save_stack+0x3c/0x68
[   80.563711]  kasan_save_track+0x20/0x40
[   80.567531]  kasan_save_alloc_info+0x40/0x58
[   80.571784]  __kasan_kmalloc+0xd4/0xd8
[   80.575516]  __kmalloc_cache_noprof+0x16c/0x3c0
[   80.580030]  kasan_atomics+0xb8/0x2e0
[   80.583676]  kunit_try_run_case+0x170/0x3f0
[   80.587842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.593311]  kthread+0x328/0x630
[   80.596523]  ret_from_fork+0x10/0x20
[   80.600082] 
[   80.601558] The buggy address belongs to the object at ffff00080851b080
[   80.601558]  which belongs to the cache kmalloc-64 of size 64
[   80.613884] The buggy address is located 0 bytes to the right of
[   80.613884]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   80.626730] 
[   80.628207] The buggy address belongs to the physical page:
[   80.633765] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   80.641748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   80.648258] page_type: f5(slab)
[   80.651394] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   80.659115] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   80.666834] page dumped because: kasan: bad access detected
[   80.672389] 
[   80.673865] Memory state around the buggy address:
[   80.678644]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   80.685848]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   80.693052] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   80.700254]                                      ^
[   80.705032]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.712237]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.719437] ==================================================================
[   63.821307] ==================================================================
[   63.828374] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   63.835751] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   63.843128] 
[   63.844613] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   63.844669] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.844684] Hardware name: WinLink E850-96 board (DT)
[   63.844705] Call trace:
[   63.844715]  show_stack+0x20/0x38 (C)
[   63.844749]  dump_stack_lvl+0x8c/0xd0
[   63.844784]  print_report+0x118/0x5d0
[   63.844813]  kasan_report+0xdc/0x128
[   63.844842]  __asan_report_store4_noabort+0x20/0x30
[   63.844877]  kasan_atomics_helper+0x3f7c/0x4858
[   63.844911]  kasan_atomics+0x198/0x2e0
[   63.844944]  kunit_try_run_case+0x170/0x3f0
[   63.844976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.845010]  kthread+0x328/0x630
[   63.845038]  ret_from_fork+0x10/0x20
[   63.845069] 
[   63.912832] Allocated by task 346:
[   63.916219]  kasan_save_stack+0x3c/0x68
[   63.920037]  kasan_save_track+0x20/0x40
[   63.923856]  kasan_save_alloc_info+0x40/0x58
[   63.928110]  __kasan_kmalloc+0xd4/0xd8
[   63.931842]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.936356]  kasan_atomics+0xb8/0x2e0
[   63.940004]  kunit_try_run_case+0x170/0x3f0
[   63.944169]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.949637]  kthread+0x328/0x630
[   63.952849]  ret_from_fork+0x10/0x20
[   63.956408] 
[   63.957885] The buggy address belongs to the object at ffff00080851b080
[   63.957885]  which belongs to the cache kmalloc-64 of size 64
[   63.970210] The buggy address is located 0 bytes to the right of
[   63.970210]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   63.983057] 
[   63.984535] The buggy address belongs to the physical page:
[   63.990092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   63.998076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   64.004584] page_type: f5(slab)
[   64.007719] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   64.015442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.023162] page dumped because: kasan: bad access detected
[   64.028716] 
[   64.030192] Memory state around the buggy address:
[   64.034970]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.042174]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.049379] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.056580]                                      ^
[   64.061358]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.068563]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.075765] ==================================================================
[   71.219457] ==================================================================
[   71.226526] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   71.233817] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   71.241195] 
[   71.242677] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   71.242726] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.242742] Hardware name: WinLink E850-96 board (DT)
[   71.242762] Call trace:
[   71.242773]  show_stack+0x20/0x38 (C)
[   71.242803]  dump_stack_lvl+0x8c/0xd0
[   71.242837]  print_report+0x118/0x5d0
[   71.242865]  kasan_report+0xdc/0x128
[   71.242891]  kasan_check_range+0x100/0x1a8
[   71.242918]  __kasan_check_write+0x20/0x30
[   71.242949]  kasan_atomics_helper+0xc08/0x4858
[   71.242984]  kasan_atomics+0x198/0x2e0
[   71.243016]  kunit_try_run_case+0x170/0x3f0
[   71.243044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.243078]  kthread+0x328/0x630
[   71.243101]  ret_from_fork+0x10/0x20
[   71.243132] 
[   71.314110] Allocated by task 346:
[   71.317497]  kasan_save_stack+0x3c/0x68
[   71.321315]  kasan_save_track+0x20/0x40
[   71.325134]  kasan_save_alloc_info+0x40/0x58
[   71.329388]  __kasan_kmalloc+0xd4/0xd8
[   71.333120]  __kmalloc_cache_noprof+0x16c/0x3c0
[   71.337634]  kasan_atomics+0xb8/0x2e0
[   71.341280]  kunit_try_run_case+0x170/0x3f0
[   71.345446]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.350915]  kthread+0x328/0x630
[   71.354127]  ret_from_fork+0x10/0x20
[   71.357686] 
[   71.359161] The buggy address belongs to the object at ffff00080851b080
[   71.359161]  which belongs to the cache kmalloc-64 of size 64
[   71.371488] The buggy address is located 0 bytes to the right of
[   71.371488]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   71.384335] 
[   71.385811] The buggy address belongs to the physical page:
[   71.391367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   71.399352] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   71.405862] page_type: f5(slab)
[   71.408995] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   71.416719] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   71.424438] page dumped because: kasan: bad access detected
[   71.429993] 
[   71.431469] Memory state around the buggy address:
[   71.436248]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   71.443452]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.450657] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   71.457858]                                      ^
[   71.462636]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.469841]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.477041] ==================================================================
[   79.934944] ==================================================================
[   79.942020] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   79.949397] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   79.956775] 
[   79.958258] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   79.958304] Tainted: [B]=BAD_PAGE, [N]=TEST
[   79.958322] Hardware name: WinLink E850-96 board (DT)
[   79.958340] Call trace:
[   79.958354]  show_stack+0x20/0x38 (C)
[   79.958385]  dump_stack_lvl+0x8c/0xd0
[   79.958415]  print_report+0x118/0x5d0
[   79.958443]  kasan_report+0xdc/0x128
[   79.958470]  kasan_check_range+0x100/0x1a8
[   79.958499]  __kasan_check_write+0x20/0x30
[   79.958530]  kasan_atomics_helper+0x175c/0x4858
[   79.958565]  kasan_atomics+0x198/0x2e0
[   79.958596]  kunit_try_run_case+0x170/0x3f0
[   79.958625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.958658]  kthread+0x328/0x630
[   79.958685]  ret_from_fork+0x10/0x20
[   79.958714] 
[   80.029779] Allocated by task 346:
[   80.033165]  kasan_save_stack+0x3c/0x68
[   80.036983]  kasan_save_track+0x20/0x40
[   80.040802]  kasan_save_alloc_info+0x40/0x58
[   80.045055]  __kasan_kmalloc+0xd4/0xd8
[   80.048788]  __kmalloc_cache_noprof+0x16c/0x3c0
[   80.053302]  kasan_atomics+0xb8/0x2e0
[   80.056947]  kunit_try_run_case+0x170/0x3f0
[   80.061114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.066583]  kthread+0x328/0x630
[   80.069795]  ret_from_fork+0x10/0x20
[   80.073354] 
[   80.074829] The buggy address belongs to the object at ffff00080851b080
[   80.074829]  which belongs to the cache kmalloc-64 of size 64
[   80.087156] The buggy address is located 0 bytes to the right of
[   80.087156]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   80.100003] 
[   80.101479] The buggy address belongs to the physical page:
[   80.107036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   80.115020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   80.121530] page_type: f5(slab)
[   80.124662] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   80.132387] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   80.140106] page dumped because: kasan: bad access detected
[   80.145662] 
[   80.147137] Memory state around the buggy address:
[   80.151916]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   80.159120]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   80.166325] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   80.173526]                                      ^
[   80.178304]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.185508]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.192710] ==================================================================
[   65.404077] ==================================================================
[   65.411163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   65.418541] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   65.425917] 
[   65.427400] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   65.427449] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.427464] Hardware name: WinLink E850-96 board (DT)
[   65.427484] Call trace:
[   65.427495]  show_stack+0x20/0x38 (C)
[   65.427524]  dump_stack_lvl+0x8c/0xd0
[   65.427559]  print_report+0x118/0x5d0
[   65.427588]  kasan_report+0xdc/0x128
[   65.427614]  __asan_report_store4_noabort+0x20/0x30
[   65.427647]  kasan_atomics_helper+0x3f94/0x4858
[   65.427681]  kasan_atomics+0x198/0x2e0
[   65.427713]  kunit_try_run_case+0x170/0x3f0
[   65.427747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.427781]  kthread+0x328/0x630
[   65.427806]  ret_from_fork+0x10/0x20
[   65.427836] 
[   65.495621] Allocated by task 346:
[   65.499008]  kasan_save_stack+0x3c/0x68
[   65.502826]  kasan_save_track+0x20/0x40
[   65.506645]  kasan_save_alloc_info+0x40/0x58
[   65.510899]  __kasan_kmalloc+0xd4/0xd8
[   65.514631]  __kmalloc_cache_noprof+0x16c/0x3c0
[   65.519145]  kasan_atomics+0xb8/0x2e0
[   65.522791]  kunit_try_run_case+0x170/0x3f0
[   65.526958]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.532426]  kthread+0x328/0x630
[   65.535638]  ret_from_fork+0x10/0x20
[   65.539197] 
[   65.540672] The buggy address belongs to the object at ffff00080851b080
[   65.540672]  which belongs to the cache kmalloc-64 of size 64
[   65.552999] The buggy address is located 0 bytes to the right of
[   65.552999]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   65.565845] 
[   65.567325] The buggy address belongs to the physical page:
[   65.572880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   65.580863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   65.587373] page_type: f5(slab)
[   65.590507] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   65.598231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.605949] page dumped because: kasan: bad access detected
[   65.611505] 
[   65.612980] Memory state around the buggy address:
[   65.617761]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.624963]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.632168] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.639369]                                      ^
[   65.644147]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.651352]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.658553] ==================================================================
[   80.200043] ==================================================================
[   80.207121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   80.214498] Read of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   80.221789] 
[   80.223270] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   80.223319] Tainted: [B]=BAD_PAGE, [N]=TEST
[   80.223334] Hardware name: WinLink E850-96 board (DT)
[   80.223349] Call trace:
[   80.223362]  show_stack+0x20/0x38 (C)
[   80.223393]  dump_stack_lvl+0x8c/0xd0
[   80.223426]  print_report+0x118/0x5d0
[   80.223455]  kasan_report+0xdc/0x128
[   80.223482]  __asan_report_load8_noabort+0x20/0x30
[   80.223514]  kasan_atomics_helper+0x3e20/0x4858
[   80.223551]  kasan_atomics+0x198/0x2e0
[   80.223583]  kunit_try_run_case+0x170/0x3f0
[   80.223611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.223644]  kthread+0x328/0x630
[   80.223670]  ret_from_fork+0x10/0x20
[   80.223702] 
[   80.291406] Allocated by task 346:
[   80.294793]  kasan_save_stack+0x3c/0x68
[   80.298611]  kasan_save_track+0x20/0x40
[   80.302430]  kasan_save_alloc_info+0x40/0x58
[   80.306683]  __kasan_kmalloc+0xd4/0xd8
[   80.310416]  __kmalloc_cache_noprof+0x16c/0x3c0
[   80.314930]  kasan_atomics+0xb8/0x2e0
[   80.318576]  kunit_try_run_case+0x170/0x3f0
[   80.322742]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.328211]  kthread+0x328/0x630
[   80.331423]  ret_from_fork+0x10/0x20
[   80.334982] 
[   80.336457] The buggy address belongs to the object at ffff00080851b080
[   80.336457]  which belongs to the cache kmalloc-64 of size 64
[   80.348784] The buggy address is located 0 bytes to the right of
[   80.348784]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   80.361630] 
[   80.363106] The buggy address belongs to the physical page:
[   80.368662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   80.376648] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   80.383158] page_type: f5(slab)
[   80.386291] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   80.394015] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   80.401734] page dumped because: kasan: bad access detected
[   80.407289] 
[   80.408765] Memory state around the buggy address:
[   80.413543]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   80.420748]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   80.427953] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   80.435154]                                      ^
[   80.439932]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.447137]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.454338] ==================================================================
[   68.315174] ==================================================================
[   68.322230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   68.329520] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   68.336898] 
[   68.338379] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   68.338432] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.338449] Hardware name: WinLink E850-96 board (DT)
[   68.338466] Call trace:
[   68.338478]  show_stack+0x20/0x38 (C)
[   68.338509]  dump_stack_lvl+0x8c/0xd0
[   68.338543]  print_report+0x118/0x5d0
[   68.338570]  kasan_report+0xdc/0x128
[   68.338596]  kasan_check_range+0x100/0x1a8
[   68.338627]  __kasan_check_write+0x20/0x30
[   68.338656]  kasan_atomics_helper+0x7cc/0x4858
[   68.338690]  kasan_atomics+0x198/0x2e0
[   68.338721]  kunit_try_run_case+0x170/0x3f0
[   68.338751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.338782]  kthread+0x328/0x630
[   68.338808]  ret_from_fork+0x10/0x20
[   68.338837] 
[   68.409813] Allocated by task 346:
[   68.413200]  kasan_save_stack+0x3c/0x68
[   68.417018]  kasan_save_track+0x20/0x40
[   68.420838]  kasan_save_alloc_info+0x40/0x58
[   68.425091]  __kasan_kmalloc+0xd4/0xd8
[   68.428823]  __kmalloc_cache_noprof+0x16c/0x3c0
[   68.433337]  kasan_atomics+0xb8/0x2e0
[   68.436983]  kunit_try_run_case+0x170/0x3f0
[   68.441150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.446618]  kthread+0x328/0x630
[   68.449830]  ret_from_fork+0x10/0x20
[   68.453389] 
[   68.454865] The buggy address belongs to the object at ffff00080851b080
[   68.454865]  which belongs to the cache kmalloc-64 of size 64
[   68.467191] The buggy address is located 0 bytes to the right of
[   68.467191]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   68.480038] 
[   68.481516] The buggy address belongs to the physical page:
[   68.487072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   68.495055] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   68.501566] page_type: f5(slab)
[   68.504700] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   68.512423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.520142] page dumped because: kasan: bad access detected
[   68.525697] 
[   68.527172] Memory state around the buggy address:
[   68.531951]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   68.539156]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.546360] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.553561]                                      ^
[   68.558339]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.565544]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.572745] ==================================================================
[   74.647003] ==================================================================
[   74.654079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   74.661369] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   74.668747] 
[   74.670229] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   74.670276] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.670293] Hardware name: WinLink E850-96 board (DT)
[   74.670312] Call trace:
[   74.670325]  show_stack+0x20/0x38 (C)
[   74.670355]  dump_stack_lvl+0x8c/0xd0
[   74.670386]  print_report+0x118/0x5d0
[   74.670414]  kasan_report+0xdc/0x128
[   74.670441]  kasan_check_range+0x100/0x1a8
[   74.670470]  __kasan_check_write+0x20/0x30
[   74.670502]  kasan_atomics_helper+0xff0/0x4858
[   74.670537]  kasan_atomics+0x198/0x2e0
[   74.670571]  kunit_try_run_case+0x170/0x3f0
[   74.670600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.670635]  kthread+0x328/0x630
[   74.670661]  ret_from_fork+0x10/0x20
[   74.670691] 
[   74.741663] Allocated by task 346:
[   74.745050]  kasan_save_stack+0x3c/0x68
[   74.748868]  kasan_save_track+0x20/0x40
[   74.752687]  kasan_save_alloc_info+0x40/0x58
[   74.756940]  __kasan_kmalloc+0xd4/0xd8
[   74.760673]  __kmalloc_cache_noprof+0x16c/0x3c0
[   74.765187]  kasan_atomics+0xb8/0x2e0
[   74.768832]  kunit_try_run_case+0x170/0x3f0
[   74.772999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.778468]  kthread+0x328/0x630
[   74.781680]  ret_from_fork+0x10/0x20
[   74.785239] 
[   74.786714] The buggy address belongs to the object at ffff00080851b080
[   74.786714]  which belongs to the cache kmalloc-64 of size 64
[   74.799041] The buggy address is located 0 bytes to the right of
[   74.799041]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   74.811887] 
[   74.813363] The buggy address belongs to the physical page:
[   74.818920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   74.826905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   74.833415] page_type: f5(slab)
[   74.836549] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   74.844272] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.851992] page dumped because: kasan: bad access detected
[   74.857546] 
[   74.859022] Memory state around the buggy address:
[   74.863800]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.871005]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.878210] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.885411]                                      ^
[   74.890189]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.897393]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.904595] ==================================================================
[   75.177033] ==================================================================
[   75.184106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   75.191483] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   75.198861] 
[   75.200342] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   75.200392] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.200407] Hardware name: WinLink E850-96 board (DT)
[   75.200426] Call trace:
[   75.200441]  show_stack+0x20/0x38 (C)
[   75.200472]  dump_stack_lvl+0x8c/0xd0
[   75.200505]  print_report+0x118/0x5d0
[   75.200533]  kasan_report+0xdc/0x128
[   75.200559]  kasan_check_range+0x100/0x1a8
[   75.200588]  __kasan_check_write+0x20/0x30
[   75.200620]  kasan_atomics_helper+0x10c0/0x4858
[   75.200656]  kasan_atomics+0x198/0x2e0
[   75.200689]  kunit_try_run_case+0x170/0x3f0
[   75.200716]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.200749]  kthread+0x328/0x630
[   75.200776]  ret_from_fork+0x10/0x20
[   75.200807] 
[   75.271863] Allocated by task 346:
[   75.275250]  kasan_save_stack+0x3c/0x68
[   75.279068]  kasan_save_track+0x20/0x40
[   75.282887]  kasan_save_alloc_info+0x40/0x58
[   75.287141]  __kasan_kmalloc+0xd4/0xd8
[   75.290874]  __kmalloc_cache_noprof+0x16c/0x3c0
[   75.295387]  kasan_atomics+0xb8/0x2e0
[   75.299033]  kunit_try_run_case+0x170/0x3f0
[   75.303200]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.308668]  kthread+0x328/0x630
[   75.311880]  ret_from_fork+0x10/0x20
[   75.315439] 
[   75.316914] The buggy address belongs to the object at ffff00080851b080
[   75.316914]  which belongs to the cache kmalloc-64 of size 64
[   75.329241] The buggy address is located 0 bytes to the right of
[   75.329241]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   75.342088] 
[   75.343564] The buggy address belongs to the physical page:
[   75.349121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   75.357105] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   75.363615] page_type: f5(slab)
[   75.366748] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   75.374472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.382191] page dumped because: kasan: bad access detected
[   75.387747] 
[   75.389223] Memory state around the buggy address:
[   75.394001]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   75.401206]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.408410] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.415611]                                      ^
[   75.420389]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.427594]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.434795] ==================================================================
[   69.636484] ==================================================================
[   69.643564] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   69.650854] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   69.658232] 
[   69.659713] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   69.659763] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.659778] Hardware name: WinLink E850-96 board (DT)
[   69.659796] Call trace:
[   69.659809]  show_stack+0x20/0x38 (C)
[   69.659839]  dump_stack_lvl+0x8c/0xd0
[   69.659870]  print_report+0x118/0x5d0
[   69.659898]  kasan_report+0xdc/0x128
[   69.659924]  kasan_check_range+0x100/0x1a8
[   69.659954]  __kasan_check_write+0x20/0x30
[   69.659984]  kasan_atomics_helper+0xa04/0x4858
[   69.660020]  kasan_atomics+0x198/0x2e0
[   69.660051]  kunit_try_run_case+0x170/0x3f0
[   69.660079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.660115]  kthread+0x328/0x630
[   69.660142]  ret_from_fork+0x10/0x20
[   69.660173] 
[   69.731148] Allocated by task 346:
[   69.734535]  kasan_save_stack+0x3c/0x68
[   69.738353]  kasan_save_track+0x20/0x40
[   69.742172]  kasan_save_alloc_info+0x40/0x58
[   69.746426]  __kasan_kmalloc+0xd4/0xd8
[   69.750158]  __kmalloc_cache_noprof+0x16c/0x3c0
[   69.754672]  kasan_atomics+0xb8/0x2e0
[   69.758318]  kunit_try_run_case+0x170/0x3f0
[   69.762484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.767953]  kthread+0x328/0x630
[   69.771164]  ret_from_fork+0x10/0x20
[   69.774724] 
[   69.776199] The buggy address belongs to the object at ffff00080851b080
[   69.776199]  which belongs to the cache kmalloc-64 of size 64
[   69.788526] The buggy address is located 0 bytes to the right of
[   69.788526]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   69.801372] 
[   69.802848] The buggy address belongs to the physical page:
[   69.808405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   69.816390] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   69.822900] page_type: f5(slab)
[   69.826033] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   69.833757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.841476] page dumped because: kasan: bad access detected
[   69.847031] 
[   69.848507] Memory state around the buggy address:
[   69.853287]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   69.860490]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.867695] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.874896]                                      ^
[   69.879674]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.886879]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.894079] ==================================================================
[   66.460722] ==================================================================
[   66.467745] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   66.475034] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   66.482412] 
[   66.483893] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   66.483943] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.483960] Hardware name: WinLink E850-96 board (DT)
[   66.483981] Call trace:
[   66.483995]  show_stack+0x20/0x38 (C)
[   66.484026]  dump_stack_lvl+0x8c/0xd0
[   66.484058]  print_report+0x118/0x5d0
[   66.484087]  kasan_report+0xdc/0x128
[   66.484114]  kasan_check_range+0x100/0x1a8
[   66.484143]  __kasan_check_write+0x20/0x30
[   66.484173]  kasan_atomics_helper+0x4e4/0x4858
[   66.484207]  kasan_atomics+0x198/0x2e0
[   66.484238]  kunit_try_run_case+0x170/0x3f0
[   66.484270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.484306]  kthread+0x328/0x630
[   66.484334]  ret_from_fork+0x10/0x20
[   66.484365] 
[   66.555327] Allocated by task 346:
[   66.558714]  kasan_save_stack+0x3c/0x68
[   66.562532]  kasan_save_track+0x20/0x40
[   66.566351]  kasan_save_alloc_info+0x40/0x58
[   66.570605]  __kasan_kmalloc+0xd4/0xd8
[   66.574338]  __kmalloc_cache_noprof+0x16c/0x3c0
[   66.578851]  kasan_atomics+0xb8/0x2e0
[   66.582497]  kunit_try_run_case+0x170/0x3f0
[   66.586664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.592132]  kthread+0x328/0x630
[   66.595344]  ret_from_fork+0x10/0x20
[   66.598903] 
[   66.600379] The buggy address belongs to the object at ffff00080851b080
[   66.600379]  which belongs to the cache kmalloc-64 of size 64
[   66.612705] The buggy address is located 0 bytes to the right of
[   66.612705]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   66.625552] 
[   66.627029] The buggy address belongs to the physical page:
[   66.632585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   66.640571] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   66.647079] page_type: f5(slab)
[   66.650212] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   66.657936] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.665656] page dumped because: kasan: bad access detected
[   66.671211] 
[   66.672687] Memory state around the buggy address:
[   66.677468]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   66.684669]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.691874] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.699075]                                      ^
[   66.703853]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.711058]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.718259] ==================================================================
[   75.707229] ==================================================================
[   75.714306] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   75.721683] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   75.729061] 
[   75.730543] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   75.730590] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.730604] Hardware name: WinLink E850-96 board (DT)
[   75.730622] Call trace:
[   75.730634]  show_stack+0x20/0x38 (C)
[   75.730665]  dump_stack_lvl+0x8c/0xd0
[   75.730699]  print_report+0x118/0x5d0
[   75.730727]  kasan_report+0xdc/0x128
[   75.730755]  kasan_check_range+0x100/0x1a8
[   75.730785]  __kasan_check_write+0x20/0x30
[   75.730814]  kasan_atomics_helper+0x1190/0x4858
[   75.730850]  kasan_atomics+0x198/0x2e0
[   75.730883]  kunit_try_run_case+0x170/0x3f0
[   75.730912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.730944]  kthread+0x328/0x630
[   75.730970]  ret_from_fork+0x10/0x20
[   75.731002] 
[   75.802064] Allocated by task 346:
[   75.805451]  kasan_save_stack+0x3c/0x68
[   75.809268]  kasan_save_track+0x20/0x40
[   75.813088]  kasan_save_alloc_info+0x40/0x58
[   75.817341]  __kasan_kmalloc+0xd4/0xd8
[   75.821074]  __kmalloc_cache_noprof+0x16c/0x3c0
[   75.825587]  kasan_atomics+0xb8/0x2e0
[   75.829233]  kunit_try_run_case+0x170/0x3f0
[   75.833400]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.838868]  kthread+0x328/0x630
[   75.842080]  ret_from_fork+0x10/0x20
[   75.845639] 
[   75.847115] The buggy address belongs to the object at ffff00080851b080
[   75.847115]  which belongs to the cache kmalloc-64 of size 64
[   75.859442] The buggy address is located 0 bytes to the right of
[   75.859442]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   75.872288] 
[   75.873764] The buggy address belongs to the physical page:
[   75.879323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   75.887307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   75.893816] page_type: f5(slab)
[   75.896950] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   75.904673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.912392] page dumped because: kasan: bad access detected
[   75.917947] 
[   75.919423] Memory state around the buggy address:
[   75.924201]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   75.931406]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.938610] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.945811]                                      ^
[   75.950589]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.957794]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.964995] ==================================================================
[   74.382103] ==================================================================
[   74.389152] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   74.396444] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   74.403821] 
[   74.405302] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   74.405350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.405366] Hardware name: WinLink E850-96 board (DT)
[   74.405384] Call trace:
[   74.405397]  show_stack+0x20/0x38 (C)
[   74.405428]  dump_stack_lvl+0x8c/0xd0
[   74.405460]  print_report+0x118/0x5d0
[   74.405488]  kasan_report+0xdc/0x128
[   74.405515]  kasan_check_range+0x100/0x1a8
[   74.405544]  __kasan_check_write+0x20/0x30
[   74.405576]  kasan_atomics_helper+0xf88/0x4858
[   74.405611]  kasan_atomics+0x198/0x2e0
[   74.405644]  kunit_try_run_case+0x170/0x3f0
[   74.405674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.405708]  kthread+0x328/0x630
[   74.405735]  ret_from_fork+0x10/0x20
[   74.405768] 
[   74.476736] Allocated by task 346:
[   74.480123]  kasan_save_stack+0x3c/0x68
[   74.483941]  kasan_save_track+0x20/0x40
[   74.487760]  kasan_save_alloc_info+0x40/0x58
[   74.492014]  __kasan_kmalloc+0xd4/0xd8
[   74.495746]  __kmalloc_cache_noprof+0x16c/0x3c0
[   74.500260]  kasan_atomics+0xb8/0x2e0
[   74.503906]  kunit_try_run_case+0x170/0x3f0
[   74.508073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.513541]  kthread+0x328/0x630
[   74.516753]  ret_from_fork+0x10/0x20
[   74.520312] 
[   74.521788] The buggy address belongs to the object at ffff00080851b080
[   74.521788]  which belongs to the cache kmalloc-64 of size 64
[   74.534114] The buggy address is located 0 bytes to the right of
[   74.534114]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   74.546961] 
[   74.548437] The buggy address belongs to the physical page:
[   74.553996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   74.561979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   74.568488] page_type: f5(slab)
[   74.571624] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   74.579346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.587065] page dumped because: kasan: bad access detected
[   74.592620] 
[   74.594095] Memory state around the buggy address:
[   74.598876]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.606078]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.613283] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.620484]                                      ^
[   74.625262]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.632467]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.639669] ==================================================================
[   74.911950] ==================================================================
[   74.919008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   74.926384] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   74.933761] 
[   74.935241] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   74.935290] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.935306] Hardware name: WinLink E850-96 board (DT)
[   74.935324] Call trace:
[   74.935337]  show_stack+0x20/0x38 (C)
[   74.935370]  dump_stack_lvl+0x8c/0xd0
[   74.935402]  print_report+0x118/0x5d0
[   74.935432]  kasan_report+0xdc/0x128
[   74.935458]  kasan_check_range+0x100/0x1a8
[   74.935487]  __kasan_check_write+0x20/0x30
[   74.935517]  kasan_atomics_helper+0x1058/0x4858
[   74.935552]  kasan_atomics+0x198/0x2e0
[   74.935582]  kunit_try_run_case+0x170/0x3f0
[   74.935612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.935645]  kthread+0x328/0x630
[   74.935669]  ret_from_fork+0x10/0x20
[   74.935700] 
[   75.006763] Allocated by task 346:
[   75.010150]  kasan_save_stack+0x3c/0x68
[   75.013968]  kasan_save_track+0x20/0x40
[   75.017787]  kasan_save_alloc_info+0x40/0x58
[   75.022040]  __kasan_kmalloc+0xd4/0xd8
[   75.025773]  __kmalloc_cache_noprof+0x16c/0x3c0
[   75.030287]  kasan_atomics+0xb8/0x2e0
[   75.033933]  kunit_try_run_case+0x170/0x3f0
[   75.038099]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.043568]  kthread+0x328/0x630
[   75.046780]  ret_from_fork+0x10/0x20
[   75.050339] 
[   75.051814] The buggy address belongs to the object at ffff00080851b080
[   75.051814]  which belongs to the cache kmalloc-64 of size 64
[   75.064141] The buggy address is located 0 bytes to the right of
[   75.064141]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   75.076988] 
[   75.078463] The buggy address belongs to the physical page:
[   75.084021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   75.092005] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   75.098515] page_type: f5(slab)
[   75.101650] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   75.109372] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.117091] page dumped because: kasan: bad access detected
[   75.122646] 
[   75.124122] Memory state around the buggy address:
[   75.128900]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   75.136105]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.143310] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.150511]                                      ^
[   75.155289]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.162494]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.169695] ==================================================================
[   78.354760] ==================================================================
[   78.361836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   78.369215] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   78.376591] 
[   78.378073] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   78.378121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   78.378137] Hardware name: WinLink E850-96 board (DT)
[   78.378156] Call trace:
[   78.378170]  show_stack+0x20/0x38 (C)
[   78.378202]  dump_stack_lvl+0x8c/0xd0
[   78.378235]  print_report+0x118/0x5d0
[   78.378263]  kasan_report+0xdc/0x128
[   78.378290]  kasan_check_range+0x100/0x1a8
[   78.378319]  __kasan_check_write+0x20/0x30
[   78.378350]  kasan_atomics_helper+0x15b4/0x4858
[   78.378385]  kasan_atomics+0x198/0x2e0
[   78.378417]  kunit_try_run_case+0x170/0x3f0
[   78.378447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.378480]  kthread+0x328/0x630
[   78.378506]  ret_from_fork+0x10/0x20
[   78.378537] 
[   78.449593] Allocated by task 346:
[   78.452980]  kasan_save_stack+0x3c/0x68
[   78.456798]  kasan_save_track+0x20/0x40
[   78.460618]  kasan_save_alloc_info+0x40/0x58
[   78.464871]  __kasan_kmalloc+0xd4/0xd8
[   78.468604]  __kmalloc_cache_noprof+0x16c/0x3c0
[   78.473117]  kasan_atomics+0xb8/0x2e0
[   78.476763]  kunit_try_run_case+0x170/0x3f0
[   78.480930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.486398]  kthread+0x328/0x630
[   78.489610]  ret_from_fork+0x10/0x20
[   78.493169] 
[   78.494644] The buggy address belongs to the object at ffff00080851b080
[   78.494644]  which belongs to the cache kmalloc-64 of size 64
[   78.506971] The buggy address is located 0 bytes to the right of
[   78.506971]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   78.519818] 
[   78.521294] The buggy address belongs to the physical page:
[   78.526851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   78.534835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   78.541345] page_type: f5(slab)
[   78.544478] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   78.552202] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   78.559921] page dumped because: kasan: bad access detected
[   78.565477] 
[   78.566952] Memory state around the buggy address:
[   78.571731]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   78.578935]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.586140] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   78.593341]                                      ^
[   78.598119]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.605324]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.612525] ==================================================================
[   66.990526] ==================================================================
[   66.997597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   67.004888] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   67.012265] 
[   67.013748] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   67.013795] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.013811] Hardware name: WinLink E850-96 board (DT)
[   67.013830] Call trace:
[   67.013842]  show_stack+0x20/0x38 (C)
[   67.013873]  dump_stack_lvl+0x8c/0xd0
[   67.013906]  print_report+0x118/0x5d0
[   67.013934]  kasan_report+0xdc/0x128
[   67.013961]  kasan_check_range+0x100/0x1a8
[   67.013990]  __kasan_check_write+0x20/0x30
[   67.014021]  kasan_atomics_helper+0x5b4/0x4858
[   67.014056]  kasan_atomics+0x198/0x2e0
[   67.014087]  kunit_try_run_case+0x170/0x3f0
[   67.014117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.014149]  kthread+0x328/0x630
[   67.014177]  ret_from_fork+0x10/0x20
[   67.014207] 
[   67.085182] Allocated by task 346:
[   67.088568]  kasan_save_stack+0x3c/0x68
[   67.092385]  kasan_save_track+0x20/0x40
[   67.096205]  kasan_save_alloc_info+0x40/0x58
[   67.100458]  __kasan_kmalloc+0xd4/0xd8
[   67.104191]  __kmalloc_cache_noprof+0x16c/0x3c0
[   67.108705]  kasan_atomics+0xb8/0x2e0
[   67.112350]  kunit_try_run_case+0x170/0x3f0
[   67.116517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.121986]  kthread+0x328/0x630
[   67.125198]  ret_from_fork+0x10/0x20
[   67.128757] 
[   67.130232] The buggy address belongs to the object at ffff00080851b080
[   67.130232]  which belongs to the cache kmalloc-64 of size 64
[   67.142558] The buggy address is located 0 bytes to the right of
[   67.142558]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   67.155405] 
[   67.156883] The buggy address belongs to the physical page:
[   67.162439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   67.170422] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   67.176933] page_type: f5(slab)
[   67.180066] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   67.187790] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.195509] page dumped because: kasan: bad access detected
[   67.201064] 
[   67.202540] Memory state around the buggy address:
[   67.207318]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   67.214523]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.221728] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.228928]                                      ^
[   67.233706]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.240911]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.248112] ==================================================================
[   77.559481] ==================================================================
[   77.566535] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   77.573912] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   77.581291] 
[   77.582773] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   77.582822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.582838] Hardware name: WinLink E850-96 board (DT)
[   77.582858] Call trace:
[   77.582870]  show_stack+0x20/0x38 (C)
[   77.582902]  dump_stack_lvl+0x8c/0xd0
[   77.582935]  print_report+0x118/0x5d0
[   77.582964]  kasan_report+0xdc/0x128
[   77.582992]  kasan_check_range+0x100/0x1a8
[   77.583023]  __kasan_check_write+0x20/0x30
[   77.583053]  kasan_atomics_helper+0x147c/0x4858
[   77.583088]  kasan_atomics+0x198/0x2e0
[   77.583122]  kunit_try_run_case+0x170/0x3f0
[   77.583151]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.583184]  kthread+0x328/0x630
[   77.583212]  ret_from_fork+0x10/0x20
[   77.583242] 
[   77.654293] Allocated by task 346:
[   77.657680]  kasan_save_stack+0x3c/0x68
[   77.661498]  kasan_save_track+0x20/0x40
[   77.665317]  kasan_save_alloc_info+0x40/0x58
[   77.669570]  __kasan_kmalloc+0xd4/0xd8
[   77.673303]  __kmalloc_cache_noprof+0x16c/0x3c0
[   77.677817]  kasan_atomics+0xb8/0x2e0
[   77.681462]  kunit_try_run_case+0x170/0x3f0
[   77.685629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.691097]  kthread+0x328/0x630
[   77.694309]  ret_from_fork+0x10/0x20
[   77.697868] 
[   77.699344] The buggy address belongs to the object at ffff00080851b080
[   77.699344]  which belongs to the cache kmalloc-64 of size 64
[   77.711671] The buggy address is located 0 bytes to the right of
[   77.711671]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   77.724517] 
[   77.725993] The buggy address belongs to the physical page:
[   77.731552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   77.739535] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   77.746045] page_type: f5(slab)
[   77.749179] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   77.756902] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   77.764621] page dumped because: kasan: bad access detected
[   77.770176] 
[   77.771652] Memory state around the buggy address:
[   77.776434]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   77.783635]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.790839] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.798040]                                      ^
[   77.802818]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.810023]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.817224] ==================================================================
[   68.845010] ==================================================================
[   68.852083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   68.859461] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   68.866751] 
[   68.868231] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   68.868280] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.868297] Hardware name: WinLink E850-96 board (DT)
[   68.868315] Call trace:
[   68.868329]  show_stack+0x20/0x38 (C)
[   68.868359]  dump_stack_lvl+0x8c/0xd0
[   68.868393]  print_report+0x118/0x5d0
[   68.868422]  kasan_report+0xdc/0x128
[   68.868449]  __asan_report_load4_noabort+0x20/0x30
[   68.868481]  kasan_atomics_helper+0x42d8/0x4858
[   68.868515]  kasan_atomics+0x198/0x2e0
[   68.868550]  kunit_try_run_case+0x170/0x3f0
[   68.868582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.868616]  kthread+0x328/0x630
[   68.868641]  ret_from_fork+0x10/0x20
[   68.868672] 
[   68.936368] Allocated by task 346:
[   68.939755]  kasan_save_stack+0x3c/0x68
[   68.943573]  kasan_save_track+0x20/0x40
[   68.947392]  kasan_save_alloc_info+0x40/0x58
[   68.951646]  __kasan_kmalloc+0xd4/0xd8
[   68.955378]  __kmalloc_cache_noprof+0x16c/0x3c0
[   68.959892]  kasan_atomics+0xb8/0x2e0
[   68.963538]  kunit_try_run_case+0x170/0x3f0
[   68.967704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.973173]  kthread+0x328/0x630
[   68.976385]  ret_from_fork+0x10/0x20
[   68.979944] 
[   68.981419] The buggy address belongs to the object at ffff00080851b080
[   68.981419]  which belongs to the cache kmalloc-64 of size 64
[   68.993746] The buggy address is located 0 bytes to the right of
[   68.993746]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   69.006592] 
[   69.008070] The buggy address belongs to the physical page:
[   69.013626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   69.021611] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   69.028120] page_type: f5(slab)
[   69.031254] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   69.038977] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.046696] page dumped because: kasan: bad access detected
[   69.052251] 
[   69.053727] Memory state around the buggy address:
[   69.058506]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   69.065710]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.072915] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.080116]                                      ^
[   69.084894]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.092099]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.099300] ==================================================================
[   70.166324] ==================================================================
[   70.173417] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   70.180707] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   70.188085] 
[   70.189568] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   70.189619] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.189634] Hardware name: WinLink E850-96 board (DT)
[   70.189652] Call trace:
[   70.189666]  show_stack+0x20/0x38 (C)
[   70.189698]  dump_stack_lvl+0x8c/0xd0
[   70.189730]  print_report+0x118/0x5d0
[   70.189757]  kasan_report+0xdc/0x128
[   70.189785]  kasan_check_range+0x100/0x1a8
[   70.189816]  __kasan_check_write+0x20/0x30
[   70.189845]  kasan_atomics_helper+0xad4/0x4858
[   70.189879]  kasan_atomics+0x198/0x2e0
[   70.189910]  kunit_try_run_case+0x170/0x3f0
[   70.189940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.189974]  kthread+0x328/0x630
[   70.190000]  ret_from_fork+0x10/0x20
[   70.190030] 
[   70.261001] Allocated by task 346:
[   70.264388]  kasan_save_stack+0x3c/0x68
[   70.268205]  kasan_save_track+0x20/0x40
[   70.272025]  kasan_save_alloc_info+0x40/0x58
[   70.276279]  __kasan_kmalloc+0xd4/0xd8
[   70.280011]  __kmalloc_cache_noprof+0x16c/0x3c0
[   70.284525]  kasan_atomics+0xb8/0x2e0
[   70.288171]  kunit_try_run_case+0x170/0x3f0
[   70.292337]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.297806]  kthread+0x328/0x630
[   70.301018]  ret_from_fork+0x10/0x20
[   70.304577] 
[   70.306052] The buggy address belongs to the object at ffff00080851b080
[   70.306052]  which belongs to the cache kmalloc-64 of size 64
[   70.318379] The buggy address is located 0 bytes to the right of
[   70.318379]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   70.331225] 
[   70.332701] The buggy address belongs to the physical page:
[   70.338258] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   70.346243] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   70.352753] page_type: f5(slab)
[   70.355886] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   70.363610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.371329] page dumped because: kasan: bad access detected
[   70.376884] 
[   70.378360] Memory state around the buggy address:
[   70.383138]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   70.390343]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.397548] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.404749]                                      ^
[   70.409526]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.416731]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.423933] ==================================================================
[   72.272557] ==================================================================
[   72.279635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   72.286926] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   72.294304] 
[   72.295785] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   72.295832] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.295848] Hardware name: WinLink E850-96 board (DT)
[   72.295866] Call trace:
[   72.295880]  show_stack+0x20/0x38 (C)
[   72.295913]  dump_stack_lvl+0x8c/0xd0
[   72.295945]  print_report+0x118/0x5d0
[   72.295971]  kasan_report+0xdc/0x128
[   72.296000]  kasan_check_range+0x100/0x1a8
[   72.296029]  __kasan_check_write+0x20/0x30
[   72.296060]  kasan_atomics_helper+0xd3c/0x4858
[   72.296095]  kasan_atomics+0x198/0x2e0
[   72.296129]  kunit_try_run_case+0x170/0x3f0
[   72.296160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.296192]  kthread+0x328/0x630
[   72.296218]  ret_from_fork+0x10/0x20
[   72.296247] 
[   72.367219] Allocated by task 346:
[   72.370606]  kasan_save_stack+0x3c/0x68
[   72.374424]  kasan_save_track+0x20/0x40
[   72.378244]  kasan_save_alloc_info+0x40/0x58
[   72.382497]  __kasan_kmalloc+0xd4/0xd8
[   72.386229]  __kmalloc_cache_noprof+0x16c/0x3c0
[   72.390743]  kasan_atomics+0xb8/0x2e0
[   72.394389]  kunit_try_run_case+0x170/0x3f0
[   72.398555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.404025]  kthread+0x328/0x630
[   72.407236]  ret_from_fork+0x10/0x20
[   72.410795] 
[   72.412270] The buggy address belongs to the object at ffff00080851b080
[   72.412270]  which belongs to the cache kmalloc-64 of size 64
[   72.424597] The buggy address is located 0 bytes to the right of
[   72.424597]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   72.437444] 
[   72.438920] The buggy address belongs to the physical page:
[   72.444477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   72.452464] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   72.458971] page_type: f5(slab)
[   72.462104] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   72.469829] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.477548] page dumped because: kasan: bad access detected
[   72.483103] 
[   72.484578] Memory state around the buggy address:
[   72.489358]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   72.496562]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.503766] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.510967]                                      ^
[   72.515745]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.522950]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.530151] ==================================================================
[   78.881488] ==================================================================
[   78.888564] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   78.895941] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   78.903319] 
[   78.904800] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   78.904850] Tainted: [B]=BAD_PAGE, [N]=TEST
[   78.904865] Hardware name: WinLink E850-96 board (DT)
[   78.904883] Call trace:
[   78.904894]  show_stack+0x20/0x38 (C)
[   78.904924]  dump_stack_lvl+0x8c/0xd0
[   78.904956]  print_report+0x118/0x5d0
[   78.904984]  kasan_report+0xdc/0x128
[   78.905009]  kasan_check_range+0x100/0x1a8
[   78.905039]  __kasan_check_write+0x20/0x30
[   78.905069]  kasan_atomics_helper+0x1644/0x4858
[   78.905106]  kasan_atomics+0x198/0x2e0
[   78.905137]  kunit_try_run_case+0x170/0x3f0
[   78.905167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.905201]  kthread+0x328/0x630
[   78.905225]  ret_from_fork+0x10/0x20
[   78.905255] 
[   78.976322] Allocated by task 346:
[   78.979708]  kasan_save_stack+0x3c/0x68
[   78.983526]  kasan_save_track+0x20/0x40
[   78.987346]  kasan_save_alloc_info+0x40/0x58
[   78.991599]  __kasan_kmalloc+0xd4/0xd8
[   78.995332]  __kmalloc_cache_noprof+0x16c/0x3c0
[   78.999846]  kasan_atomics+0xb8/0x2e0
[   79.003491]  kunit_try_run_case+0x170/0x3f0
[   79.007658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.013127]  kthread+0x328/0x630
[   79.016338]  ret_from_fork+0x10/0x20
[   79.019898] 
[   79.021373] The buggy address belongs to the object at ffff00080851b080
[   79.021373]  which belongs to the cache kmalloc-64 of size 64
[   79.033699] The buggy address is located 0 bytes to the right of
[   79.033699]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   79.046546] 
[   79.048023] The buggy address belongs to the physical page:
[   79.053579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   79.061565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   79.068074] page_type: f5(slab)
[   79.071207] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   79.078931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   79.086649] page dumped because: kasan: bad access detected
[   79.092205] 
[   79.093680] Memory state around the buggy address:
[   79.098459]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   79.105664]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   79.112868] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   79.120069]                                      ^
[   79.124847]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.132052]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.139253] ==================================================================
[   71.746008] ==================================================================
[   71.753081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   71.760371] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   71.767749] 
[   71.769230] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   71.769277] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.769293] Hardware name: WinLink E850-96 board (DT)
[   71.769311] Call trace:
[   71.769323]  show_stack+0x20/0x38 (C)
[   71.769354]  dump_stack_lvl+0x8c/0xd0
[   71.769388]  print_report+0x118/0x5d0
[   71.769416]  kasan_report+0xdc/0x128
[   71.769444]  kasan_check_range+0x100/0x1a8
[   71.769473]  __kasan_check_write+0x20/0x30
[   71.769502]  kasan_atomics_helper+0xca0/0x4858
[   71.769537]  kasan_atomics+0x198/0x2e0
[   71.769568]  kunit_try_run_case+0x170/0x3f0
[   71.769596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.769628]  kthread+0x328/0x630
[   71.769655]  ret_from_fork+0x10/0x20
[   71.769685] 
[   71.840665] Allocated by task 346:
[   71.844052]  kasan_save_stack+0x3c/0x68
[   71.847870]  kasan_save_track+0x20/0x40
[   71.851689]  kasan_save_alloc_info+0x40/0x58
[   71.855942]  __kasan_kmalloc+0xd4/0xd8
[   71.859675]  __kmalloc_cache_noprof+0x16c/0x3c0
[   71.864189]  kasan_atomics+0xb8/0x2e0
[   71.867835]  kunit_try_run_case+0x170/0x3f0
[   71.872001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.877470]  kthread+0x328/0x630
[   71.880682]  ret_from_fork+0x10/0x20
[   71.884240] 
[   71.885716] The buggy address belongs to the object at ffff00080851b080
[   71.885716]  which belongs to the cache kmalloc-64 of size 64
[   71.898043] The buggy address is located 0 bytes to the right of
[   71.898043]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   71.910889] 
[   71.912365] The buggy address belongs to the physical page:
[   71.917922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   71.925907] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   71.932417] page_type: f5(slab)
[   71.935550] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   71.943274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   71.950993] page dumped because: kasan: bad access detected
[   71.956548] 
[   71.958024] Memory state around the buggy address:
[   71.962802]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   71.970007]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.977212] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   71.984412]                                      ^
[   71.989190]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.996395]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.003596] ==================================================================
[   78.619883] ==================================================================
[   78.626936] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   78.634313] Read of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   78.641604] 
[   78.643086] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   78.643136] Tainted: [B]=BAD_PAGE, [N]=TEST
[   78.643150] Hardware name: WinLink E850-96 board (DT)
[   78.643168] Call trace:
[   78.643182]  show_stack+0x20/0x38 (C)
[   78.643214]  dump_stack_lvl+0x8c/0xd0
[   78.643248]  print_report+0x118/0x5d0
[   78.643276]  kasan_report+0xdc/0x128
[   78.643304]  __asan_report_load8_noabort+0x20/0x30
[   78.643337]  kasan_atomics_helper+0x3db0/0x4858
[   78.643372]  kasan_atomics+0x198/0x2e0
[   78.643403]  kunit_try_run_case+0x170/0x3f0
[   78.643435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.643470]  kthread+0x328/0x630
[   78.643496]  ret_from_fork+0x10/0x20
[   78.643526] 
[   78.711221] Allocated by task 346:
[   78.714608]  kasan_save_stack+0x3c/0x68
[   78.718426]  kasan_save_track+0x20/0x40
[   78.722246]  kasan_save_alloc_info+0x40/0x58
[   78.726499]  __kasan_kmalloc+0xd4/0xd8
[   78.730231]  __kmalloc_cache_noprof+0x16c/0x3c0
[   78.734745]  kasan_atomics+0xb8/0x2e0
[   78.738391]  kunit_try_run_case+0x170/0x3f0
[   78.742558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.748026]  kthread+0x328/0x630
[   78.751238]  ret_from_fork+0x10/0x20
[   78.754797] 
[   78.756273] The buggy address belongs to the object at ffff00080851b080
[   78.756273]  which belongs to the cache kmalloc-64 of size 64
[   78.768599] The buggy address is located 0 bytes to the right of
[   78.768599]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   78.781446] 
[   78.782922] The buggy address belongs to the physical page:
[   78.788479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   78.796465] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   78.802973] page_type: f5(slab)
[   78.806106] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   78.813831] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   78.821549] page dumped because: kasan: bad access detected
[   78.827105] 
[   78.828580] Memory state around the buggy address:
[   78.833360]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   78.840563]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.847768] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   78.854969]                                      ^
[   78.859747]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.866952]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.874153] ==================================================================
[   79.673345] ==================================================================
[   79.680392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   79.687771] Read of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   79.695061] 
[   79.696543] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   79.696592] Tainted: [B]=BAD_PAGE, [N]=TEST
[   79.696608] Hardware name: WinLink E850-96 board (DT)
[   79.696628] Call trace:
[   79.696641]  show_stack+0x20/0x38 (C)
[   79.696673]  dump_stack_lvl+0x8c/0xd0
[   79.696706]  print_report+0x118/0x5d0
[   79.696735]  kasan_report+0xdc/0x128
[   79.696762]  __asan_report_load8_noabort+0x20/0x30
[   79.696794]  kasan_atomics_helper+0x3e10/0x4858
[   79.696830]  kasan_atomics+0x198/0x2e0
[   79.696864]  kunit_try_run_case+0x170/0x3f0
[   79.696895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.696929]  kthread+0x328/0x630
[   79.696956]  ret_from_fork+0x10/0x20
[   79.696988] 
[   79.764679] Allocated by task 346:
[   79.768065]  kasan_save_stack+0x3c/0x68
[   79.771883]  kasan_save_track+0x20/0x40
[   79.775702]  kasan_save_alloc_info+0x40/0x58
[   79.779955]  __kasan_kmalloc+0xd4/0xd8
[   79.783688]  __kmalloc_cache_noprof+0x16c/0x3c0
[   79.788201]  kasan_atomics+0xb8/0x2e0
[   79.791847]  kunit_try_run_case+0x170/0x3f0
[   79.796014]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.801483]  kthread+0x328/0x630
[   79.804695]  ret_from_fork+0x10/0x20
[   79.808254] 
[   79.809729] The buggy address belongs to the object at ffff00080851b080
[   79.809729]  which belongs to the cache kmalloc-64 of size 64
[   79.822056] The buggy address is located 0 bytes to the right of
[   79.822056]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   79.834902] 
[   79.836378] The buggy address belongs to the physical page:
[   79.841936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   79.849921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   79.856430] page_type: f5(slab)
[   79.859563] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   79.867287] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   79.875006] page dumped because: kasan: bad access detected
[   79.880561] 
[   79.882037] Memory state around the buggy address:
[   79.886818]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   79.894020]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   79.901225] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   79.908426]                                      ^
[   79.913204]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.920408]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.927609] ==================================================================

[   33.240841] ==================================================================
[   33.240893] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   33.241107] Write of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.241170] 
[   33.241338] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.241470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.241507] Hardware name: linux,dummy-virt (DT)
[   33.241541] Call trace:
[   33.241586]  show_stack+0x20/0x38 (C)
[   33.241648]  dump_stack_lvl+0x8c/0xd0
[   33.241698]  print_report+0x118/0x5d0
[   33.241745]  kasan_report+0xdc/0x128
[   33.241958]  kasan_check_range+0x100/0x1a8
[   33.242064]  __kasan_check_write+0x20/0x30
[   33.242196]  kasan_atomics_helper+0xad4/0x4858
[   33.242260]  kasan_atomics+0x198/0x2e0
[   33.242321]  kunit_try_run_case+0x170/0x3f0
[   33.242379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.242464]  kthread+0x328/0x630
[   33.242512]  ret_from_fork+0x10/0x20
[   33.242562] 
[   33.242604] Allocated by task 297:
[   33.242634]  kasan_save_stack+0x3c/0x68
[   33.242884]  kasan_save_track+0x20/0x40
[   33.242941]  kasan_save_alloc_info+0x40/0x58
[   33.242982]  __kasan_kmalloc+0xd4/0xd8
[   33.243024]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.243121]  kasan_atomics+0xb8/0x2e0
[   33.243212]  kunit_try_run_case+0x170/0x3f0
[   33.243360]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.243511]  kthread+0x328/0x630
[   33.243712]  ret_from_fork+0x10/0x20
[   33.243933] 
[   33.244033] The buggy address belongs to the object at fff00000c64f7f00
[   33.244033]  which belongs to the cache kmalloc-64 of size 64
[   33.244141] The buggy address is located 0 bytes to the right of
[   33.244141]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.244274] 
[   33.244351] The buggy address belongs to the physical page:
[   33.244385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.244451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.244770] page_type: f5(slab)
[   33.244870] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.244950] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.245163] page dumped because: kasan: bad access detected
[   33.245199] 
[   33.245326] Memory state around the buggy address:
[   33.245375]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.245467]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.245597] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.245744]                                      ^
[   33.245814]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.245872]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.245912] ==================================================================
[   33.446610] ==================================================================
[   33.446694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   33.447254] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.447399] 
[   33.447479] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.447766] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.448034] Hardware name: linux,dummy-virt (DT)
[   33.448293] Call trace:
[   33.448344]  show_stack+0x20/0x38 (C)
[   33.448415]  dump_stack_lvl+0x8c/0xd0
[   33.448851]  print_report+0x118/0x5d0
[   33.449079]  kasan_report+0xdc/0x128
[   33.449144]  kasan_check_range+0x100/0x1a8
[   33.449200]  __kasan_check_write+0x20/0x30
[   33.449354]  kasan_atomics_helper+0x1414/0x4858
[   33.449783]  kasan_atomics+0x198/0x2e0
[   33.449834]  kunit_try_run_case+0x170/0x3f0
[   33.449884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.449940]  kthread+0x328/0x630
[   33.449985]  ret_from_fork+0x10/0x20
[   33.450037] 
[   33.450246] Allocated by task 297:
[   33.450296]  kasan_save_stack+0x3c/0x68
[   33.450535]  kasan_save_track+0x20/0x40
[   33.451359]  kasan_save_alloc_info+0x40/0x58
[   33.451616]  __kasan_kmalloc+0xd4/0xd8
[   33.451671]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.451716]  kasan_atomics+0xb8/0x2e0
[   33.451756]  kunit_try_run_case+0x170/0x3f0
[   33.452024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.452400]  kthread+0x328/0x630
[   33.452452]  ret_from_fork+0x10/0x20
[   33.452848] 
[   33.452876] The buggy address belongs to the object at fff00000c64f7f00
[   33.452876]  which belongs to the cache kmalloc-64 of size 64
[   33.453180] The buggy address is located 0 bytes to the right of
[   33.453180]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.453546] 
[   33.453575] The buggy address belongs to the physical page:
[   33.453834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.454098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.454150] page_type: f5(slab)
[   33.454300] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.454522] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.454566] page dumped because: kasan: bad access detected
[   33.455091] 
[   33.455314] Memory state around the buggy address:
[   33.455585]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.455655]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.455699] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.455738]                                      ^
[   33.455775]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.456407]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.456471] ==================================================================
[   33.501480] ==================================================================
[   33.501536] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   33.501951] Read of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.502019] 
[   33.502058] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.502153] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.502951] Hardware name: linux,dummy-virt (DT)
[   33.503018] Call trace:
[   33.503041]  show_stack+0x20/0x38 (C)
[   33.503096]  dump_stack_lvl+0x8c/0xd0
[   33.503754]  print_report+0x118/0x5d0
[   33.503933]  kasan_report+0xdc/0x128
[   33.504266]  __asan_report_load8_noabort+0x20/0x30
[   33.504335]  kasan_atomics_helper+0x3db0/0x4858
[   33.504390]  kasan_atomics+0x198/0x2e0
[   33.504738]  kunit_try_run_case+0x170/0x3f0
[   33.505119]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.505526]  kthread+0x328/0x630
[   33.505893]  ret_from_fork+0x10/0x20
[   33.506205] 
[   33.506232] Allocated by task 297:
[   33.506433]  kasan_save_stack+0x3c/0x68
[   33.506832]  kasan_save_track+0x20/0x40
[   33.507084]  kasan_save_alloc_info+0x40/0x58
[   33.507344]  __kasan_kmalloc+0xd4/0xd8
[   33.507673]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.508010]  kasan_atomics+0xb8/0x2e0
[   33.508055]  kunit_try_run_case+0x170/0x3f0
[   33.508930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.509034]  kthread+0x328/0x630
[   33.509405]  ret_from_fork+0x10/0x20
[   33.509595] 
[   33.509811] The buggy address belongs to the object at fff00000c64f7f00
[   33.509811]  which belongs to the cache kmalloc-64 of size 64
[   33.510337] The buggy address is located 0 bytes to the right of
[   33.510337]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.510465] 
[   33.510489] The buggy address belongs to the physical page:
[   33.510581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.510694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.510843] page_type: f5(slab)
[   33.510987] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.511059] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.511102] page dumped because: kasan: bad access detected
[   33.511147] 
[   33.511258] Memory state around the buggy address:
[   33.511422]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.511583]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.511735] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.511840]                                      ^
[   33.512007]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.512084]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.512171] ==================================================================
[   33.470015] ==================================================================
[   33.470071] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   33.470125] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.470175] 
[   33.470212] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.470299] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.470326] Hardware name: linux,dummy-virt (DT)
[   33.470359] Call trace:
[   33.471059]  show_stack+0x20/0x38 (C)
[   33.471212]  dump_stack_lvl+0x8c/0xd0
[   33.471732]  print_report+0x118/0x5d0
[   33.471783]  kasan_report+0xdc/0x128
[   33.471830]  kasan_check_range+0x100/0x1a8
[   33.471877]  __kasan_check_write+0x20/0x30
[   33.472585]  kasan_atomics_helper+0x14e4/0x4858
[   33.472688]  kasan_atomics+0x198/0x2e0
[   33.473113]  kunit_try_run_case+0x170/0x3f0
[   33.473331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.473386]  kthread+0x328/0x630
[   33.473431]  ret_from_fork+0x10/0x20
[   33.473626] 
[   33.473674] Allocated by task 297:
[   33.473705]  kasan_save_stack+0x3c/0x68
[   33.473753]  kasan_save_track+0x20/0x40
[   33.474021]  kasan_save_alloc_info+0x40/0x58
[   33.474255]  __kasan_kmalloc+0xd4/0xd8
[   33.474400]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.474469]  kasan_atomics+0xb8/0x2e0
[   33.475004]  kunit_try_run_case+0x170/0x3f0
[   33.475139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.475322]  kthread+0x328/0x630
[   33.475658]  ret_from_fork+0x10/0x20
[   33.475711] 
[   33.475897] The buggy address belongs to the object at fff00000c64f7f00
[   33.475897]  which belongs to the cache kmalloc-64 of size 64
[   33.476055] The buggy address is located 0 bytes to the right of
[   33.476055]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.476228] 
[   33.476251] The buggy address belongs to the physical page:
[   33.476285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.476556] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.477087] page_type: f5(slab)
[   33.477237] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.477544] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.477716] page dumped because: kasan: bad access detected
[   33.478232] 
[   33.478391] Memory state around the buggy address:
[   33.478433]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.478505]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.478657] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.478996]                                      ^
[   33.479161]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.479238]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.479408] ==================================================================
[   33.380961] ==================================================================
[   33.381016] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   33.381068] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.381119] 
[   33.381151] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.381236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.381263] Hardware name: linux,dummy-virt (DT)
[   33.381296] Call trace:
[   33.381320]  show_stack+0x20/0x38 (C)
[   33.381370]  dump_stack_lvl+0x8c/0xd0
[   33.382172]  print_report+0x118/0x5d0
[   33.382255]  kasan_report+0xdc/0x128
[   33.382307]  kasan_check_range+0x100/0x1a8
[   33.382356]  __kasan_check_write+0x20/0x30
[   33.382691]  kasan_atomics_helper+0x1190/0x4858
[   33.383221]  kasan_atomics+0x198/0x2e0
[   33.383594]  kunit_try_run_case+0x170/0x3f0
[   33.383797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.383868]  kthread+0x328/0x630
[   33.384162]  ret_from_fork+0x10/0x20
[   33.384472] 
[   33.384499] Allocated by task 297:
[   33.384531]  kasan_save_stack+0x3c/0x68
[   33.384580]  kasan_save_track+0x20/0x40
[   33.385019]  kasan_save_alloc_info+0x40/0x58
[   33.385347]  __kasan_kmalloc+0xd4/0xd8
[   33.385738]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.385982]  kasan_atomics+0xb8/0x2e0
[   33.386035]  kunit_try_run_case+0x170/0x3f0
[   33.386198]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.386246]  kthread+0x328/0x630
[   33.386283]  ret_from_fork+0x10/0x20
[   33.386530] 
[   33.386603] The buggy address belongs to the object at fff00000c64f7f00
[   33.386603]  which belongs to the cache kmalloc-64 of size 64
[   33.387019] The buggy address is located 0 bytes to the right of
[   33.387019]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.387600] 
[   33.387874] The buggy address belongs to the physical page:
[   33.387971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.388471] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.388524] page_type: f5(slab)
[   33.388563] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.388615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.388657] page dumped because: kasan: bad access detected
[   33.389152] 
[   33.389339] Memory state around the buggy address:
[   33.389420]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.389478]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.389529] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.389568]                                      ^
[   33.389768]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.389887]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.389935] ==================================================================
[   33.133403] ==================================================================
[   33.133516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   33.133742] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.133905] Call trace:
[   33.134317]  print_report+0x118/0x5d0
[   33.134970]  kasan_check_range+0x100/0x1a8
[   33.135067]  kasan_atomics_helper+0x1ec/0x4858
[   33.135293]  kthread+0x328/0x630
[   33.135387] 
[   33.135492]  kasan_save_track+0x20/0x40
[   33.136133]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.136333] The buggy address is located 0 bytes to the right of
[   33.136333]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.136601] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.137608] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.138507] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   33.138560] Write of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.138642] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.138911]  print_report+0x118/0x5d0
[   33.138958]  kasan_report+0xdc/0x128
[   33.139098]  kasan_atomics_helper+0x24c/0x4858
[   33.139204]  kunit_try_run_case+0x170/0x3f0
[   33.139305]  kthread+0x328/0x630
[   33.139472]  kasan_save_stack+0x3c/0x68
[   33.139776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.139982] The buggy address is located 0 bytes to the right of
[   33.139982]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.140099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.140369] 
[   33.140528] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.140830] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   33.140926] 
[   33.140954] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.141263]  kasan_report+0xdc/0x128
[   33.141377]  __kasan_check_read+0x20/0x30
[   33.141584]  kunit_try_run_case+0x170/0x3f0
[   33.142001] 
[   33.142116]  kasan_save_track+0x20/0x40
[   33.142357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.142712] The buggy address is located 0 bytes to the right of
[   33.142712]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.143777] page dumped because: kasan: bad access detected
[   33.144121] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.144160]                                      ^
[   33.144471] ==================================================================
[   33.402521] ==================================================================
[   33.402572] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   33.402624] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.402677] 
[   33.402709] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.402837] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.402941] Hardware name: linux,dummy-virt (DT)
[   33.403942] Call trace:
[   33.403980]  show_stack+0x20/0x38 (C)
[   33.404046]  dump_stack_lvl+0x8c/0xd0
[   33.404223]  print_report+0x118/0x5d0
[   33.404271]  kasan_report+0xdc/0x128
[   33.404699]  kasan_check_range+0x100/0x1a8
[   33.405027]  __kasan_check_write+0x20/0x30
[   33.405099]  kasan_atomics_helper+0x126c/0x4858
[   33.405510]  kasan_atomics+0x198/0x2e0
[   33.405612]  kunit_try_run_case+0x170/0x3f0
[   33.405827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.405908]  kthread+0x328/0x630
[   33.406601]  ret_from_fork+0x10/0x20
[   33.406710] 
[   33.406732] Allocated by task 297:
[   33.406763]  kasan_save_stack+0x3c/0x68
[   33.406808]  kasan_save_track+0x20/0x40
[   33.407406]  kasan_save_alloc_info+0x40/0x58
[   33.407718]  __kasan_kmalloc+0xd4/0xd8
[   33.408045]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.408216]  kasan_atomics+0xb8/0x2e0
[   33.408490]  kunit_try_run_case+0x170/0x3f0
[   33.408714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.408771]  kthread+0x328/0x630
[   33.409227]  ret_from_fork+0x10/0x20
[   33.409344] 
[   33.409659] The buggy address belongs to the object at fff00000c64f7f00
[   33.409659]  which belongs to the cache kmalloc-64 of size 64
[   33.409913] The buggy address is located 0 bytes to the right of
[   33.409913]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.409988] 
[   33.410010] The buggy address belongs to the physical page:
[   33.410612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.410714] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.411167] page_type: f5(slab)
[   33.411785] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.411936] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.412292] page dumped because: kasan: bad access detected
[   33.412453] 
[   33.412475] Memory state around the buggy address:
[   33.412510]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.412559]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.412603] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.413239]                                      ^
[   33.413299]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.413678]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.413722] ==================================================================
[   33.301231] ==================================================================
[   33.301303] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   33.301379] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.301455] 
[   33.301488] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.301573] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.301602] Hardware name: linux,dummy-virt (DT)
[   33.301769] Call trace:
[   33.301799]  show_stack+0x20/0x38 (C)
[   33.301959]  dump_stack_lvl+0x8c/0xd0
[   33.302120]  print_report+0x118/0x5d0
[   33.302199]  kasan_report+0xdc/0x128
[   33.302525]  kasan_check_range+0x100/0x1a8
[   33.302584]  __kasan_check_write+0x20/0x30
[   33.302633]  kasan_atomics_helper+0xe44/0x4858
[   33.302685]  kasan_atomics+0x198/0x2e0
[   33.303194]  kunit_try_run_case+0x170/0x3f0
[   33.303317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.303534]  kthread+0x328/0x630
[   33.303666]  ret_from_fork+0x10/0x20
[   33.303822] 
[   33.303883] Allocated by task 297:
[   33.303936]  kasan_save_stack+0x3c/0x68
[   33.303982]  kasan_save_track+0x20/0x40
[   33.304297]  kasan_save_alloc_info+0x40/0x58
[   33.304455]  __kasan_kmalloc+0xd4/0xd8
[   33.304570]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.304847]  kasan_atomics+0xb8/0x2e0
[   33.304977]  kunit_try_run_case+0x170/0x3f0
[   33.305052]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.305262]  kthread+0x328/0x630
[   33.305370]  ret_from_fork+0x10/0x20
[   33.305525] 
[   33.305623] The buggy address belongs to the object at fff00000c64f7f00
[   33.305623]  which belongs to the cache kmalloc-64 of size 64
[   33.305714] The buggy address is located 0 bytes to the right of
[   33.305714]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.305999] 
[   33.306106] The buggy address belongs to the physical page:
[   33.306232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.306322] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.306415] page_type: f5(slab)
[   33.306482] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.306556] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.306599] page dumped because: kasan: bad access detected
[   33.306633] 
[   33.306653] Memory state around the buggy address:
[   33.306686]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.306729]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.306977] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.307047]                                      ^
[   33.307143]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.307287]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.307402] ==================================================================
[   33.312925] ==================================================================
[   33.312984] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   33.313110] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.313161] 
[   33.313193] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.313317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.313575] Hardware name: linux,dummy-virt (DT)
[   33.313705] Call trace:
[   33.313741]  show_stack+0x20/0x38 (C)
[   33.313806]  dump_stack_lvl+0x8c/0xd0
[   33.313857]  print_report+0x118/0x5d0
[   33.313910]  kasan_report+0xdc/0x128
[   33.313963]  kasan_check_range+0x100/0x1a8
[   33.314034]  __kasan_check_write+0x20/0x30
[   33.314094]  kasan_atomics_helper+0xeb8/0x4858
[   33.314145]  kasan_atomics+0x198/0x2e0
[   33.314194]  kunit_try_run_case+0x170/0x3f0
[   33.314259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.314312]  kthread+0x328/0x630
[   33.314358]  ret_from_fork+0x10/0x20
[   33.314413] 
[   33.314454] Allocated by task 297:
[   33.314491]  kasan_save_stack+0x3c/0x68
[   33.314537]  kasan_save_track+0x20/0x40
[   33.314579]  kasan_save_alloc_info+0x40/0x58
[   33.314620]  __kasan_kmalloc+0xd4/0xd8
[   33.314669]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.314713]  kasan_atomics+0xb8/0x2e0
[   33.314761]  kunit_try_run_case+0x170/0x3f0
[   33.314804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.314851]  kthread+0x328/0x630
[   33.314887]  ret_from_fork+0x10/0x20
[   33.314935] 
[   33.314977] The buggy address belongs to the object at fff00000c64f7f00
[   33.314977]  which belongs to the cache kmalloc-64 of size 64
[   33.315037] The buggy address is located 0 bytes to the right of
[   33.315037]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.315103] 
[   33.315134] The buggy address belongs to the physical page:
[   33.315182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.315232] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.315289] page_type: f5(slab)
[   33.315334] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.315385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.315427] page dumped because: kasan: bad access detected
[   33.315470] 
[   33.315490] Memory state around the buggy address:
[   33.315524]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.315567]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.315643] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.315684]                                      ^
[   33.315718]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.315761]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.315801] ==================================================================
[   33.323458] ==================================================================
[   33.323506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   33.323556] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.323606] 
[   33.323637] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.323721] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.323750] Hardware name: linux,dummy-virt (DT)
[   33.323780] Call trace:
[   33.323803]  show_stack+0x20/0x38 (C)
[   33.323852]  dump_stack_lvl+0x8c/0xd0
[   33.323899]  print_report+0x118/0x5d0
[   33.323946]  kasan_report+0xdc/0x128
[   33.323990]  kasan_check_range+0x100/0x1a8
[   33.324036]  __kasan_check_write+0x20/0x30
[   33.324084]  kasan_atomics_helper+0xf88/0x4858
[   33.324135]  kasan_atomics+0x198/0x2e0
[   33.324184]  kunit_try_run_case+0x170/0x3f0
[   33.324232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.324286]  kthread+0x328/0x630
[   33.324331]  ret_from_fork+0x10/0x20
[   33.324380] 
[   33.324400] Allocated by task 297:
[   33.324429]  kasan_save_stack+0x3c/0x68
[   33.327217]  kasan_save_track+0x20/0x40
[   33.327263]  kasan_save_alloc_info+0x40/0x58
[   33.327304]  __kasan_kmalloc+0xd4/0xd8
[   33.327345]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.327388]  kasan_atomics+0xb8/0x2e0
[   33.327428]  kunit_try_run_case+0x170/0x3f0
[   33.327482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.327528]  kthread+0x328/0x630
[   33.327564]  ret_from_fork+0x10/0x20
[   33.327603] 
[   33.327627] The buggy address belongs to the object at fff00000c64f7f00
[   33.327627]  which belongs to the cache kmalloc-64 of size 64
[   33.327687] The buggy address is located 0 bytes to the right of
[   33.327687]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.327751] 
[   33.327774] The buggy address belongs to the physical page:
[   33.327807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.327857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.327905] page_type: f5(slab)
[   33.327944] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.327995] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.328036] page dumped because: kasan: bad access detected
[   33.328069] 
[   33.328088] Memory state around the buggy address:
[   33.328122]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.328166]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.328209] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.328250]                                      ^
[   33.328286]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.328329]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.328369] ==================================================================
[   33.246562] ==================================================================
[   33.246783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   33.246853] Read of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.246939] 
[   33.246987] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.247088] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.247125] Hardware name: linux,dummy-virt (DT)
[   33.247168] Call trace:
[   33.247193]  show_stack+0x20/0x38 (C)
[   33.247245]  dump_stack_lvl+0x8c/0xd0
[   33.247294]  print_report+0x118/0x5d0
[   33.247341]  kasan_report+0xdc/0x128
[   33.247387]  __asan_report_load4_noabort+0x20/0x30
[   33.247459]  kasan_atomics_helper+0x3dcc/0x4858
[   33.247512]  kasan_atomics+0x198/0x2e0
[   33.247560]  kunit_try_run_case+0x170/0x3f0
[   33.247608]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.247663]  kthread+0x328/0x630
[   33.247718]  ret_from_fork+0x10/0x20
[   33.247769] 
[   33.247791] Allocated by task 297:
[   33.247820]  kasan_save_stack+0x3c/0x68
[   33.247869]  kasan_save_track+0x20/0x40
[   33.247911]  kasan_save_alloc_info+0x40/0x58
[   33.247952]  __kasan_kmalloc+0xd4/0xd8
[   33.247992]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.248036]  kasan_atomics+0xb8/0x2e0
[   33.248084]  kunit_try_run_case+0x170/0x3f0
[   33.248129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.248174]  kthread+0x328/0x630
[   33.248209]  ret_from_fork+0x10/0x20
[   33.248247] 
[   33.248276] The buggy address belongs to the object at fff00000c64f7f00
[   33.248276]  which belongs to the cache kmalloc-64 of size 64
[   33.248333] The buggy address is located 0 bytes to the right of
[   33.248333]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.248396] 
[   33.248423] The buggy address belongs to the physical page:
[   33.248465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.248517] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.248915] page_type: f5(slab)
[   33.249070] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.249129] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.249179] page dumped because: kasan: bad access detected
[   33.249212] 
[   33.249234] Memory state around the buggy address:
[   33.249283]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.249347]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.249391] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.249449]                                      ^
[   33.249486]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.249675]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.249778] ==================================================================
[   33.275472] ==================================================================
[   33.275517] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   33.275568] Read of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.275660] 
[   33.275694] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.276025] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.276086] Hardware name: linux,dummy-virt (DT)
[   33.276139] Call trace:
[   33.276168]  show_stack+0x20/0x38 (C)
[   33.276242]  dump_stack_lvl+0x8c/0xd0
[   33.276449]  print_report+0x118/0x5d0
[   33.276566]  kasan_report+0xdc/0x128
[   33.276619]  __asan_report_load4_noabort+0x20/0x30
[   33.276672]  kasan_atomics_helper+0x3dd8/0x4858
[   33.276764]  kasan_atomics+0x198/0x2e0
[   33.276831]  kunit_try_run_case+0x170/0x3f0
[   33.276888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.276960]  kthread+0x328/0x630
[   33.277007]  ret_from_fork+0x10/0x20
[   33.277057] 
[   33.277187] Allocated by task 297:
[   33.277219]  kasan_save_stack+0x3c/0x68
[   33.277265]  kasan_save_track+0x20/0x40
[   33.277385]  kasan_save_alloc_info+0x40/0x58
[   33.277447]  __kasan_kmalloc+0xd4/0xd8
[   33.277559]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.277644]  kasan_atomics+0xb8/0x2e0
[   33.277708]  kunit_try_run_case+0x170/0x3f0
[   33.277983]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.278150]  kthread+0x328/0x630
[   33.278189]  ret_from_fork+0x10/0x20
[   33.278229] 
[   33.278250] The buggy address belongs to the object at fff00000c64f7f00
[   33.278250]  which belongs to the cache kmalloc-64 of size 64
[   33.278311] The buggy address is located 0 bytes to the right of
[   33.278311]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.278659] 
[   33.278721] The buggy address belongs to the physical page:
[   33.278811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.278918] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.279245] page_type: f5(slab)
[   33.279337] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.279493] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.279598] page dumped because: kasan: bad access detected
[   33.279687] 
[   33.279780] Memory state around the buggy address:
[   33.280020]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.280173]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.280273] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.280366]                                      ^
[   33.280492]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.280585]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.280646] ==================================================================
[   33.234794] ==================================================================
[   33.234869] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   33.234923] Write of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.235008] 
[   33.235238] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.235463] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.235496] Hardware name: linux,dummy-virt (DT)
[   33.235526] Call trace:
[   33.235784]  show_stack+0x20/0x38 (C)
[   33.235889]  dump_stack_lvl+0x8c/0xd0
[   33.235941]  print_report+0x118/0x5d0
[   33.235987]  kasan_report+0xdc/0x128
[   33.236063]  kasan_check_range+0x100/0x1a8
[   33.236130]  __kasan_check_write+0x20/0x30
[   33.236212]  kasan_atomics_helper+0xa6c/0x4858
[   33.236418]  kasan_atomics+0x198/0x2e0
[   33.236544]  kunit_try_run_case+0x170/0x3f0
[   33.236600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.236655]  kthread+0x328/0x630
[   33.236717]  ret_from_fork+0x10/0x20
[   33.236998] 
[   33.237071] Allocated by task 297:
[   33.237109]  kasan_save_stack+0x3c/0x68
[   33.237182]  kasan_save_track+0x20/0x40
[   33.237225]  kasan_save_alloc_info+0x40/0x58
[   33.237283]  __kasan_kmalloc+0xd4/0xd8
[   33.237535]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.237664]  kasan_atomics+0xb8/0x2e0
[   33.237793]  kunit_try_run_case+0x170/0x3f0
[   33.237834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.237897]  kthread+0x328/0x630
[   33.237933]  ret_from_fork+0x10/0x20
[   33.237970] 
[   33.237993] The buggy address belongs to the object at fff00000c64f7f00
[   33.237993]  which belongs to the cache kmalloc-64 of size 64
[   33.238090] The buggy address is located 0 bytes to the right of
[   33.238090]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.238153] 
[   33.238176] The buggy address belongs to the physical page:
[   33.238306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.238375] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.238471] page_type: f5(slab)
[   33.238528] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.238647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.238938] page dumped because: kasan: bad access detected
[   33.238978] 
[   33.238998] Memory state around the buggy address:
[   33.239032]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.239077]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.239270] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.239361]                                      ^
[   33.239445]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.239560]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.239635] ==================================================================
[   33.281054] ==================================================================
[   33.281108] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   33.281228] Write of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.281314] 
[   33.281362] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.281629] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.281738] Hardware name: linux,dummy-virt (DT)
[   33.281772] Call trace:
[   33.281813]  show_stack+0x20/0x38 (C)
[   33.281948]  dump_stack_lvl+0x8c/0xd0
[   33.282057]  print_report+0x118/0x5d0
[   33.282172]  kasan_report+0xdc/0x128
[   33.282236]  kasan_check_range+0x100/0x1a8
[   33.282290]  __kasan_check_write+0x20/0x30
[   33.282348]  kasan_atomics_helper+0xd3c/0x4858
[   33.282400]  kasan_atomics+0x198/0x2e0
[   33.282476]  kunit_try_run_case+0x170/0x3f0
[   33.282536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.282591]  kthread+0x328/0x630
[   33.282638]  ret_from_fork+0x10/0x20
[   33.282706] 
[   33.282733] Allocated by task 297:
[   33.282771]  kasan_save_stack+0x3c/0x68
[   33.282825]  kasan_save_track+0x20/0x40
[   33.282868]  kasan_save_alloc_info+0x40/0x58
[   33.282909]  __kasan_kmalloc+0xd4/0xd8
[   33.282957]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.283001]  kasan_atomics+0xb8/0x2e0
[   33.283040]  kunit_try_run_case+0x170/0x3f0
[   33.283086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.283135]  kthread+0x328/0x630
[   33.283172]  ret_from_fork+0x10/0x20
[   33.283212] 
[   33.283233] The buggy address belongs to the object at fff00000c64f7f00
[   33.283233]  which belongs to the cache kmalloc-64 of size 64
[   33.283294] The buggy address is located 0 bytes to the right of
[   33.283294]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.283366] 
[   33.283396] The buggy address belongs to the physical page:
[   33.283426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.283890] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.283946] page_type: f5(slab)
[   33.283985] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.284037] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.284139] page dumped because: kasan: bad access detected
[   33.284175] 
[   33.284370] Memory state around the buggy address:
[   33.284427]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.284593]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.284658] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.284962]                                      ^
[   33.285005]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.285096]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.285227] ==================================================================
[   33.516761] ==================================================================
[   33.516810] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   33.516861] Read of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.516911] 
[   33.516942] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.517026] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.517055] Hardware name: linux,dummy-virt (DT)
[   33.517087] Call trace:
[   33.517111]  show_stack+0x20/0x38 (C)
[   33.517160]  dump_stack_lvl+0x8c/0xd0
[   33.517210]  print_report+0x118/0x5d0
[   33.517255]  kasan_report+0xdc/0x128
[   33.517301]  __asan_report_load8_noabort+0x20/0x30
[   33.517361]  kasan_atomics_helper+0x3df4/0x4858
[   33.517659]  kasan_atomics+0x198/0x2e0
[   33.517712]  kunit_try_run_case+0x170/0x3f0
[   33.517828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.517919]  kthread+0x328/0x630
[   33.517966]  ret_from_fork+0x10/0x20
[   33.518017] 
[   33.518038] Allocated by task 297:
[   33.518068]  kasan_save_stack+0x3c/0x68
[   33.518192]  kasan_save_track+0x20/0x40
[   33.518235]  kasan_save_alloc_info+0x40/0x58
[   33.518275]  __kasan_kmalloc+0xd4/0xd8
[   33.518325]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.518500]  kasan_atomics+0xb8/0x2e0
[   33.518541]  kunit_try_run_case+0x170/0x3f0
[   33.518581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.518626]  kthread+0x328/0x630
[   33.518661]  ret_from_fork+0x10/0x20
[   33.518710] 
[   33.518805] The buggy address belongs to the object at fff00000c64f7f00
[   33.518805]  which belongs to the cache kmalloc-64 of size 64
[   33.518960] The buggy address is located 0 bytes to the right of
[   33.518960]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.519060] 
[   33.519083] The buggy address belongs to the physical page:
[   33.519123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.519225] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.519287] page_type: f5(slab)
[   33.519389] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.519449] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.519489] page dumped because: kasan: bad access detected
[   33.519591] 
[   33.519685] Memory state around the buggy address:
[   33.519719]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.519881]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.519926] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.519966]                                      ^
[   33.520042]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.520087]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.520128] ==================================================================
[   33.490449] ==================================================================
[   33.490505] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   33.490562] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.490721] 
[   33.490935] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.491034] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.491068] Hardware name: linux,dummy-virt (DT)
[   33.491709] Call trace:
[   33.491736]  show_stack+0x20/0x38 (C)
[   33.491990]  dump_stack_lvl+0x8c/0xd0
[   33.492151]  print_report+0x118/0x5d0
[   33.492371]  kasan_report+0xdc/0x128
[   33.492581]  kasan_check_range+0x100/0x1a8
[   33.492635]  __kasan_check_write+0x20/0x30
[   33.492682]  kasan_atomics_helper+0x15b4/0x4858
[   33.493114]  kasan_atomics+0x198/0x2e0
[   33.493367]  kunit_try_run_case+0x170/0x3f0
[   33.493637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.493755]  kthread+0x328/0x630
[   33.493855]  ret_from_fork+0x10/0x20
[   33.494161] 
[   33.494226] Allocated by task 297:
[   33.494259]  kasan_save_stack+0x3c/0x68
[   33.494317]  kasan_save_track+0x20/0x40
[   33.494363]  kasan_save_alloc_info+0x40/0x58
[   33.495261]  __kasan_kmalloc+0xd4/0xd8
[   33.495328]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.495681]  kasan_atomics+0xb8/0x2e0
[   33.495862]  kunit_try_run_case+0x170/0x3f0
[   33.495930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.496458]  kthread+0x328/0x630
[   33.496749]  ret_from_fork+0x10/0x20
[   33.496923] 
[   33.497134] The buggy address belongs to the object at fff00000c64f7f00
[   33.497134]  which belongs to the cache kmalloc-64 of size 64
[   33.497612] The buggy address is located 0 bytes to the right of
[   33.497612]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.497860] 
[   33.497890] The buggy address belongs to the physical page:
[   33.497938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.498005] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.498056] page_type: f5(slab)
[   33.498275] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.498330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.498373] page dumped because: kasan: bad access detected
[   33.498806] 
[   33.498896] Memory state around the buggy address:
[   33.498934]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.498981]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.499542] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.499590]                                      ^
[   33.499733]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.499873]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.499914] ==================================================================
[   33.215764] ==================================================================
[   33.215818] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   33.215871] Read of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.215921] 
[   33.215952] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.216044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.216072] Hardware name: linux,dummy-virt (DT)
[   33.216168] Call trace:
[   33.216240]  show_stack+0x20/0x38 (C)
[   33.216296]  dump_stack_lvl+0x8c/0xd0
[   33.216344]  print_report+0x118/0x5d0
[   33.216389]  kasan_report+0xdc/0x128
[   33.216689]  __asan_report_load4_noabort+0x20/0x30
[   33.216767]  kasan_atomics_helper+0x42d8/0x4858
[   33.216852]  kasan_atomics+0x198/0x2e0
[   33.216941]  kunit_try_run_case+0x170/0x3f0
[   33.216997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.217133]  kthread+0x328/0x630
[   33.217209]  ret_from_fork+0x10/0x20
[   33.217279] 
[   33.217318] Allocated by task 297:
[   33.217380]  kasan_save_stack+0x3c/0x68
[   33.217425]  kasan_save_track+0x20/0x40
[   33.217496]  kasan_save_alloc_info+0x40/0x58
[   33.217538]  __kasan_kmalloc+0xd4/0xd8
[   33.217709]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.217925]  kasan_atomics+0xb8/0x2e0
[   33.218365] The buggy address is located 0 bytes to the right of
[   33.218365]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.218632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.218706] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.219594] Memory state around the buggy address:
[   33.219936]                                      ^
[   33.220318] ==================================================================
[   33.285584] ==================================================================
[   33.285694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   33.285788] Read of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.285874] 
[   33.285913] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.285999] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.286028] Hardware name: linux,dummy-virt (DT)
[   33.286205] Call trace:
[   33.286264]  show_stack+0x20/0x38 (C)
[   33.286350]  dump_stack_lvl+0x8c/0xd0
[   33.286528]  print_report+0x118/0x5d0
[   33.286656]  kasan_report+0xdc/0x128
[   33.286764]  __asan_report_load4_noabort+0x20/0x30
[   33.287073]  kasan_atomics_helper+0x3e04/0x4858
[   33.287188]  kasan_atomics+0x198/0x2e0
[   33.287322]  kunit_try_run_case+0x170/0x3f0
[   33.287407]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.287474]  kthread+0x328/0x630
[   33.287521]  ret_from_fork+0x10/0x20
[   33.287572] 
[   33.287592] Allocated by task 297:
[   33.287623]  kasan_save_stack+0x3c/0x68
[   33.287843]  kasan_save_track+0x20/0x40
[   33.287931]  kasan_save_alloc_info+0x40/0x58
[   33.288056]  __kasan_kmalloc+0xd4/0xd8
[   33.288145]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.288205]  kasan_atomics+0xb8/0x2e0
[   33.288493]  kunit_try_run_case+0x170/0x3f0
[   33.288634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.288682]  kthread+0x328/0x630
[   33.288977]  ret_from_fork+0x10/0x20
[   33.289104] 
[   33.289169] The buggy address belongs to the object at fff00000c64f7f00
[   33.289169]  which belongs to the cache kmalloc-64 of size 64
[   33.289456] The buggy address is located 0 bytes to the right of
[   33.289456]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.289602] 
[   33.289667] The buggy address belongs to the physical page:
[   33.289728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.289825] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.289974] page_type: f5(slab)
[   33.290017] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.290080] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.290123] page dumped because: kasan: bad access detected
[   33.290155] 
[   33.290444] Memory state around the buggy address:
[   33.290613]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.290688]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.290750] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.291055]                                      ^
[   33.291125]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.291226]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.291304] ==================================================================
[   33.414431] ==================================================================
[   33.414493] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   33.414545] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.414595] 
[   33.414627] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.414713] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.414742] Hardware name: linux,dummy-virt (DT)
[   33.414772] Call trace:
[   33.414798]  show_stack+0x20/0x38 (C)
[   33.414846]  dump_stack_lvl+0x8c/0xd0
[   33.416564]  print_report+0x118/0x5d0
[   33.416696]  kasan_report+0xdc/0x128
[   33.416745]  kasan_check_range+0x100/0x1a8
[   33.416794]  __kasan_check_write+0x20/0x30
[   33.416871]  kasan_atomics_helper+0x12d8/0x4858
[   33.416923]  kasan_atomics+0x198/0x2e0
[   33.416970]  kunit_try_run_case+0x170/0x3f0
[   33.417018]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.417074]  kthread+0x328/0x630
[   33.417122]  ret_from_fork+0x10/0x20
[   33.417173] 
[   33.418071] Allocated by task 297:
[   33.418124]  kasan_save_stack+0x3c/0x68
[   33.418241]  kasan_save_track+0x20/0x40
[   33.418325]  kasan_save_alloc_info+0x40/0x58
[   33.418719]  __kasan_kmalloc+0xd4/0xd8
[   33.418770]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.419286]  kasan_atomics+0xb8/0x2e0
[   33.419400]  kunit_try_run_case+0x170/0x3f0
[   33.419531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.419577]  kthread+0x328/0x630
[   33.419615]  ret_from_fork+0x10/0x20
[   33.420249] 
[   33.420279] The buggy address belongs to the object at fff00000c64f7f00
[   33.420279]  which belongs to the cache kmalloc-64 of size 64
[   33.420485] The buggy address is located 0 bytes to the right of
[   33.420485]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.420578] 
[   33.420866] The buggy address belongs to the physical page:
[   33.421319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.421647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.421695] page_type: f5(slab)
[   33.421832] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.421938] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.422381] page dumped because: kasan: bad access detected
[   33.422429] 
[   33.422589] Memory state around the buggy address:
[   33.422786]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.422907]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.423268] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.423310]                                      ^
[   33.423346]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.423825]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.423884] ==================================================================
[   33.524773] ==================================================================
[   33.524822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   33.524872] Read of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.524952] 
[   33.524995] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.525198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.525334] Hardware name: linux,dummy-virt (DT)
[   33.525367] Call trace:
[   33.525390]  show_stack+0x20/0x38 (C)
[   33.525452]  dump_stack_lvl+0x8c/0xd0
[   33.525500]  print_report+0x118/0x5d0
[   33.525547]  kasan_report+0xdc/0x128
[   33.525599]  __asan_report_load8_noabort+0x20/0x30
[   33.525708]  kasan_atomics_helper+0x3e10/0x4858
[   33.525815]  kasan_atomics+0x198/0x2e0
[   33.525967]  kunit_try_run_case+0x170/0x3f0
[   33.526016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.526076]  kthread+0x328/0x630
[   33.526140]  ret_from_fork+0x10/0x20
[   33.526206] 
[   33.526228] Allocated by task 297:
[   33.526267]  kasan_save_stack+0x3c/0x68
[   33.526515]  kasan_save_track+0x20/0x40
[   33.526559]  kasan_save_alloc_info+0x40/0x58
[   33.526599]  __kasan_kmalloc+0xd4/0xd8
[   33.526678]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.526798]  kasan_atomics+0xb8/0x2e0
[   33.526889]  kunit_try_run_case+0x170/0x3f0
[   33.526948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.527087]  kthread+0x328/0x630
[   33.527173]  ret_from_fork+0x10/0x20
[   33.527341] 
[   33.527370] The buggy address belongs to the object at fff00000c64f7f00
[   33.527370]  which belongs to the cache kmalloc-64 of size 64
[   33.527430] The buggy address is located 0 bytes to the right of
[   33.527430]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.527979] 
[   33.528011] The buggy address belongs to the physical page:
[   33.528045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.528457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.528524] page_type: f5(slab)
[   33.528567] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.528898] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.528943] page dumped because: kasan: bad access detected
[   33.528977] 
[   33.528998] Memory state around the buggy address:
[   33.529377]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.529428]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.529486] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.529667]                                      ^
[   33.529706]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.530074]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.530119] ==================================================================
[   33.480268] ==================================================================
[   33.480324] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   33.480381] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.480432] 
[   33.480480] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.480567] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.480594] Hardware name: linux,dummy-virt (DT)
[   33.481323] Call trace:
[   33.481364]  show_stack+0x20/0x38 (C)
[   33.481822]  dump_stack_lvl+0x8c/0xd0
[   33.482290]  print_report+0x118/0x5d0
[   33.482354]  kasan_report+0xdc/0x128
[   33.482402]  kasan_check_range+0x100/0x1a8
[   33.482625]  __kasan_check_write+0x20/0x30
[   33.482674]  kasan_atomics_helper+0x154c/0x4858
[   33.482727]  kasan_atomics+0x198/0x2e0
[   33.482776]  kunit_try_run_case+0x170/0x3f0
[   33.483303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.483401]  kthread+0x328/0x630
[   33.483463]  ret_from_fork+0x10/0x20
[   33.483931] 
[   33.484101] Allocated by task 297:
[   33.484135]  kasan_save_stack+0x3c/0x68
[   33.484415]  kasan_save_track+0x20/0x40
[   33.484468]  kasan_save_alloc_info+0x40/0x58
[   33.484509]  __kasan_kmalloc+0xd4/0xd8
[   33.484551]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.484596]  kasan_atomics+0xb8/0x2e0
[   33.484847]  kunit_try_run_case+0x170/0x3f0
[   33.485176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.485561]  kthread+0x328/0x630
[   33.485601]  ret_from_fork+0x10/0x20
[   33.485641] 
[   33.485664] The buggy address belongs to the object at fff00000c64f7f00
[   33.485664]  which belongs to the cache kmalloc-64 of size 64
[   33.485724] The buggy address is located 0 bytes to the right of
[   33.485724]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.485973] 
[   33.486003] The buggy address belongs to the physical page:
[   33.486093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.486200] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.486249] page_type: f5(slab)
[   33.486579] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.486980] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.487318] page dumped because: kasan: bad access detected
[   33.487357] 
[   33.487913] Memory state around the buggy address:
[   33.488334]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.488623]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.488728] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.489060]                                      ^
[   33.489106]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.489155]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.489492] ==================================================================
[   33.368633] ==================================================================
[   33.368685] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   33.369599] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.369681] 
[   33.369719] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.370160] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.370223] Hardware name: linux,dummy-virt (DT)
[   33.370256] Call trace:
[   33.370282]  show_stack+0x20/0x38 (C)
[   33.370851]  dump_stack_lvl+0x8c/0xd0
[   33.371199]  print_report+0x118/0x5d0
[   33.371255]  kasan_report+0xdc/0x128
[   33.371303]  kasan_check_range+0x100/0x1a8
[   33.371350]  __kasan_check_write+0x20/0x30
[   33.371400]  kasan_atomics_helper+0x1128/0x4858
[   33.371461]  kasan_atomics+0x198/0x2e0
[   33.371509]  kunit_try_run_case+0x170/0x3f0
[   33.371558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.372369]  kthread+0x328/0x630
[   33.372546]  ret_from_fork+0x10/0x20
[   33.373176] 
[   33.373205] Allocated by task 297:
[   33.373842]  kasan_save_stack+0x3c/0x68
[   33.373980]  kasan_save_track+0x20/0x40
[   33.374030]  kasan_save_alloc_info+0x40/0x58
[   33.374543]  __kasan_kmalloc+0xd4/0xd8
[   33.374595]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.374640]  kasan_atomics+0xb8/0x2e0
[   33.374680]  kunit_try_run_case+0x170/0x3f0
[   33.374720]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.374766]  kthread+0x328/0x630
[   33.375586]  ret_from_fork+0x10/0x20
[   33.375703] 
[   33.375732] The buggy address belongs to the object at fff00000c64f7f00
[   33.375732]  which belongs to the cache kmalloc-64 of size 64
[   33.375795] The buggy address is located 0 bytes to the right of
[   33.375795]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.375860] 
[   33.375883] The buggy address belongs to the physical page:
[   33.375916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.376798] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.376877] page_type: f5(slab)
[   33.377122] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.377566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.377857] page dumped because: kasan: bad access detected
[   33.377896] 
[   33.377916] Memory state around the buggy address:
[   33.378334]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.378655]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.378707] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.379238]                                      ^
[   33.379598]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.379656]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.379697] ==================================================================
[   33.457487] ==================================================================
[   33.457549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   33.457845] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.458021] 
[   33.458627] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.459134] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.459165] Hardware name: linux,dummy-virt (DT)
[   33.459554] Call trace:
[   33.459777]  show_stack+0x20/0x38 (C)
[   33.460058]  dump_stack_lvl+0x8c/0xd0
[   33.460125]  print_report+0x118/0x5d0
[   33.460179]  kasan_report+0xdc/0x128
[   33.460388]  kasan_check_range+0x100/0x1a8
[   33.460833]  __kasan_check_write+0x20/0x30
[   33.461310]  kasan_atomics_helper+0x147c/0x4858
[   33.461493]  kasan_atomics+0x198/0x2e0
[   33.461769]  kunit_try_run_case+0x170/0x3f0
[   33.462246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.462320]  kthread+0x328/0x630
[   33.462370]  ret_from_fork+0x10/0x20
[   33.462422] 
[   33.462454] Allocated by task 297:
[   33.462709]  kasan_save_stack+0x3c/0x68
[   33.462833]  kasan_save_track+0x20/0x40
[   33.463206]  kasan_save_alloc_info+0x40/0x58
[   33.463253]  __kasan_kmalloc+0xd4/0xd8
[   33.463491]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.464007]  kasan_atomics+0xb8/0x2e0
[   33.464222]  kunit_try_run_case+0x170/0x3f0
[   33.464270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.464609]  kthread+0x328/0x630
[   33.464650]  ret_from_fork+0x10/0x20
[   33.464891] 
[   33.464993] The buggy address belongs to the object at fff00000c64f7f00
[   33.464993]  which belongs to the cache kmalloc-64 of size 64
[   33.465324] The buggy address is located 0 bytes to the right of
[   33.465324]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.465412] 
[   33.465679] The buggy address belongs to the physical page:
[   33.465821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.466170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.466279] page_type: f5(slab)
[   33.466337] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.466757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.467014] page dumped because: kasan: bad access detected
[   33.467269] 
[   33.467424] Memory state around the buggy address:
[   33.467522]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.467622]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.467734] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.467773]                                      ^
[   33.467808]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.467854]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.468737] ==================================================================
[   33.357098] ==================================================================
[   33.357152] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   33.357727] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.357911] 
[   33.357948] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.358043] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.358071] Hardware name: linux,dummy-virt (DT)
[   33.358289] Call trace:
[   33.358319]  show_stack+0x20/0x38 (C)
[   33.358544]  dump_stack_lvl+0x8c/0xd0
[   33.359023]  print_report+0x118/0x5d0
[   33.359156]  kasan_report+0xdc/0x128
[   33.359204]  kasan_check_range+0x100/0x1a8
[   33.359251]  __kasan_check_write+0x20/0x30
[   33.359298]  kasan_atomics_helper+0x10c0/0x4858
[   33.359351]  kasan_atomics+0x198/0x2e0
[   33.359401]  kunit_try_run_case+0x170/0x3f0
[   33.359461]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.360299]  kthread+0x328/0x630
[   33.360417]  ret_from_fork+0x10/0x20
[   33.360650] 
[   33.360671] Allocated by task 297:
[   33.360702]  kasan_save_stack+0x3c/0x68
[   33.361600]  kasan_save_track+0x20/0x40
[   33.361655]  kasan_save_alloc_info+0x40/0x58
[   33.361709]  __kasan_kmalloc+0xd4/0xd8
[   33.361750]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.362338]  kasan_atomics+0xb8/0x2e0
[   33.362396]  kunit_try_run_case+0x170/0x3f0
[   33.362460]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.362507]  kthread+0x328/0x630
[   33.362545]  ret_from_fork+0x10/0x20
[   33.362586] 
[   33.362609] The buggy address belongs to the object at fff00000c64f7f00
[   33.362609]  which belongs to the cache kmalloc-64 of size 64
[   33.362970] The buggy address is located 0 bytes to the right of
[   33.362970]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.363599] 
[   33.363785] The buggy address belongs to the physical page:
[   33.364100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.364740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.364857] page_type: f5(slab)
[   33.365168] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.365396] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.365824] page dumped because: kasan: bad access detected
[   33.366035] 
[   33.366223] Memory state around the buggy address:
[   33.366262]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.366418]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.366473] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.367021]                                      ^
[   33.367348]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.367488]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.367532] ==================================================================
[   33.531188] ==================================================================
[   33.531245] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   33.531297] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.531347] 
[   33.531389] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.531632] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.531665] Hardware name: linux,dummy-virt (DT)
[   33.531977] Call trace:
[   33.532004]  show_stack+0x20/0x38 (C)
[   33.532055]  dump_stack_lvl+0x8c/0xd0
[   33.532105]  print_report+0x118/0x5d0
[   33.532150]  kasan_report+0xdc/0x128
[   33.532494]  kasan_check_range+0x100/0x1a8
[   33.532799]  __kasan_check_write+0x20/0x30
[   33.532931]  kasan_atomics_helper+0x175c/0x4858
[   33.532983]  kasan_atomics+0x198/0x2e0
[   33.533030]  kunit_try_run_case+0x170/0x3f0
[   33.533078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.533139]  kthread+0x328/0x630
[   33.533339]  ret_from_fork+0x10/0x20
[   33.533649] 
[   33.533755] Allocated by task 297:
[   33.533787]  kasan_save_stack+0x3c/0x68
[   33.533951]  kasan_save_track+0x20/0x40
[   33.533994]  kasan_save_alloc_info+0x40/0x58
[   33.534035]  __kasan_kmalloc+0xd4/0xd8
[   33.534074]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.534117]  kasan_atomics+0xb8/0x2e0
[   33.534157]  kunit_try_run_case+0x170/0x3f0
[   33.534210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.534279]  kthread+0x328/0x630
[   33.534315]  ret_from_fork+0x10/0x20
[   33.534355] 
[   33.534378] The buggy address belongs to the object at fff00000c64f7f00
[   33.534378]  which belongs to the cache kmalloc-64 of size 64
[   33.534447] The buggy address is located 0 bytes to the right of
[   33.534447]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.534513] 
[   33.534536] The buggy address belongs to the physical page:
[   33.534569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.534687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.534739] page_type: f5(slab)
[   33.534790] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.534950] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.534992] page dumped because: kasan: bad access detected
[   33.535032] 
[   33.535076] Memory state around the buggy address:
[   33.535113]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.535156]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.535246] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.535452]                                      ^
[   33.535563]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.535639]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.535682] ==================================================================
[   33.520397] ==================================================================
[   33.520703] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   33.520766] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.521051] 
[   33.521091] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.521287] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.521315] Hardware name: linux,dummy-virt (DT)
[   33.521347] Call trace:
[   33.521371]  show_stack+0x20/0x38 (C)
[   33.521499]  dump_stack_lvl+0x8c/0xd0
[   33.521554]  print_report+0x118/0x5d0
[   33.521601]  kasan_report+0xdc/0x128
[   33.521651]  kasan_check_range+0x100/0x1a8
[   33.521700]  __kasan_check_write+0x20/0x30
[   33.521749]  kasan_atomics_helper+0x16d0/0x4858
[   33.521799]  kasan_atomics+0x198/0x2e0
[   33.521880]  kunit_try_run_case+0x170/0x3f0
[   33.521933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.521991]  kthread+0x328/0x630
[   33.522085]  ret_from_fork+0x10/0x20
[   33.522148] 
[   33.522170] Allocated by task 297:
[   33.522200]  kasan_save_stack+0x3c/0x68
[   33.522244]  kasan_save_track+0x20/0x40
[   33.522285]  kasan_save_alloc_info+0x40/0x58
[   33.522325]  __kasan_kmalloc+0xd4/0xd8
[   33.522393]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.522449]  kasan_atomics+0xb8/0x2e0
[   33.522490]  kunit_try_run_case+0x170/0x3f0
[   33.522530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.522633]  kthread+0x328/0x630
[   33.522773]  ret_from_fork+0x10/0x20
[   33.522816] 
[   33.522864] The buggy address belongs to the object at fff00000c64f7f00
[   33.522864]  which belongs to the cache kmalloc-64 of size 64
[   33.523144] The buggy address is located 0 bytes to the right of
[   33.523144]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.523287] 
[   33.523312] The buggy address belongs to the physical page:
[   33.523395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.523542] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.523591] page_type: f5(slab)
[   33.523666] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.523718] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.523757] page dumped because: kasan: bad access detected
[   33.523807] 
[   33.523847] Memory state around the buggy address:
[   33.523935]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.524042]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.524142] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.524226]                                      ^
[   33.524314]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.524449]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.524490] ==================================================================
[   33.226664] ==================================================================
[   33.226753] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   33.226807] Write of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.226883] 
[   33.226950] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.227052] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.227100] Hardware name: linux,dummy-virt (DT)
[   33.227162] Call trace:
[   33.227186]  show_stack+0x20/0x38 (C)
[   33.227238]  dump_stack_lvl+0x8c/0xd0
[   33.227325]  print_report+0x118/0x5d0
[   33.227505]  kasan_report+0xdc/0x128
[   33.227560]  kasan_check_range+0x100/0x1a8
[   33.227637]  __kasan_check_write+0x20/0x30
[   33.227703]  kasan_atomics_helper+0x99c/0x4858
[   33.227756]  kasan_atomics+0x198/0x2e0
[   33.227803]  kunit_try_run_case+0x170/0x3f0
[   33.227869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.227922]  kthread+0x328/0x630
[   33.227974]  ret_from_fork+0x10/0x20
[   33.228040] 
[   33.228069] Allocated by task 297:
[   33.228139]  kasan_save_stack+0x3c/0x68
[   33.228185]  kasan_save_track+0x20/0x40
[   33.228231]  kasan_save_alloc_info+0x40/0x58
[   33.228480]  __kasan_kmalloc+0xd4/0xd8
[   33.228583]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.228636]  kasan_atomics+0xb8/0x2e0
[   33.228706]  kunit_try_run_case+0x170/0x3f0
[   33.228787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.228852]  kthread+0x328/0x630
[   33.228903]  ret_from_fork+0x10/0x20
[   33.228967] 
[   33.228990] The buggy address belongs to the object at fff00000c64f7f00
[   33.228990]  which belongs to the cache kmalloc-64 of size 64
[   33.229265] The buggy address is located 0 bytes to the right of
[   33.229265]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.229344] 
[   33.229404] The buggy address belongs to the physical page:
[   33.229471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.229526] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.229602] page_type: f5(slab)
[   33.229745] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.229922] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.229968] page dumped because: kasan: bad access detected
[   33.230014] 
[   33.230035] Memory state around the buggy address:
[   33.230086]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.230130]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.230195] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.230237]                                      ^
[   33.230272]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.230348]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.230389] ==================================================================
[   33.329868] ==================================================================
[   33.330079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   33.330147] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.330199] 
[   33.330637] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.330897] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.331049] Hardware name: linux,dummy-virt (DT)
[   33.331201] Call trace:
[   33.331248]  show_stack+0x20/0x38 (C)
[   33.331303]  dump_stack_lvl+0x8c/0xd0
[   33.331351]  print_report+0x118/0x5d0
[   33.331398]  kasan_report+0xdc/0x128
[   33.331465]  kasan_check_range+0x100/0x1a8
[   33.331534]  __kasan_check_write+0x20/0x30
[   33.331583]  kasan_atomics_helper+0xff0/0x4858
[   33.331635]  kasan_atomics+0x198/0x2e0
[   33.331693]  kunit_try_run_case+0x170/0x3f0
[   33.331994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.332106]  kthread+0x328/0x630
[   33.332154]  ret_from_fork+0x10/0x20
[   33.333522] 
[   33.333627] Allocated by task 297:
[   33.333936]  kasan_save_stack+0x3c/0x68
[   33.333996]  kasan_save_track+0x20/0x40
[   33.334355]  kasan_save_alloc_info+0x40/0x58
[   33.334887]  __kasan_kmalloc+0xd4/0xd8
[   33.335052]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.335098]  kasan_atomics+0xb8/0x2e0
[   33.335145]  kunit_try_run_case+0x170/0x3f0
[   33.335185]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.335232]  kthread+0x328/0x630
[   33.335269]  ret_from_fork+0x10/0x20
[   33.336770] 
[   33.336802] The buggy address belongs to the object at fff00000c64f7f00
[   33.336802]  which belongs to the cache kmalloc-64 of size 64
[   33.337885] The buggy address is located 0 bytes to the right of
[   33.337885]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.338564] 
[   33.338668] The buggy address belongs to the physical page:
[   33.338704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.338879] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.339173] page_type: f5(slab)
[   33.340017] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.340193] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.340715] page dumped because: kasan: bad access detected
[   33.340991] 
[   33.341298] Memory state around the buggy address:
[   33.341337]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.341893]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.342131] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.342205]                                      ^
[   33.342600]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.343132]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.344146] ==================================================================
[   33.307913] ==================================================================
[   33.307962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   33.308027] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.308113] 
[   33.308172] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.308257] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.308285] Hardware name: linux,dummy-virt (DT)
[   33.308617] Call trace:
[   33.308661]  show_stack+0x20/0x38 (C)
[   33.308714]  dump_stack_lvl+0x8c/0xd0
[   33.308799]  print_report+0x118/0x5d0
[   33.308935]  kasan_report+0xdc/0x128
[   33.308984]  __asan_report_store8_noabort+0x20/0x30
[   33.309142]  kasan_atomics_helper+0x3e5c/0x4858
[   33.309225]  kasan_atomics+0x198/0x2e0
[   33.309292]  kunit_try_run_case+0x170/0x3f0
[   33.309343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.309398]  kthread+0x328/0x630
[   33.309467]  ret_from_fork+0x10/0x20
[   33.309518] 
[   33.309538] Allocated by task 297:
[   33.309566]  kasan_save_stack+0x3c/0x68
[   33.309611]  kasan_save_track+0x20/0x40
[   33.309683]  kasan_save_alloc_info+0x40/0x58
[   33.309723]  __kasan_kmalloc+0xd4/0xd8
[   33.309894]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.310046]  kasan_atomics+0xb8/0x2e0
[   33.310138]  kunit_try_run_case+0x170/0x3f0
[   33.310281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.310384]  kthread+0x328/0x630
[   33.310670]  ret_from_fork+0x10/0x20
[   33.310854] 
[   33.310905] The buggy address belongs to the object at fff00000c64f7f00
[   33.310905]  which belongs to the cache kmalloc-64 of size 64
[   33.311006] The buggy address is located 0 bytes to the right of
[   33.311006]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.311072] 
[   33.311094] The buggy address belongs to the physical page:
[   33.311140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.311191] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.311239] page_type: f5(slab)
[   33.311282] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.311335] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.311573] page dumped because: kasan: bad access detected
[   33.311649] 
[   33.311796] Memory state around the buggy address:
[   33.312116]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.312175]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.312240] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.312310]                                      ^
[   33.312422]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.312507]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.312657] ==================================================================
[   33.250222] ==================================================================
[   33.250270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   33.250319] Write of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.250369] 
[   33.250399] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.250709] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.250752] Hardware name: linux,dummy-virt (DT)
[   33.250785] Call trace:
[   33.250810]  show_stack+0x20/0x38 (C)
[   33.250864]  dump_stack_lvl+0x8c/0xd0
[   33.250912]  print_report+0x118/0x5d0
[   33.250958]  kasan_report+0xdc/0x128
[   33.251004]  kasan_check_range+0x100/0x1a8
[   33.251052]  __kasan_check_write+0x20/0x30
[   33.251101]  kasan_atomics_helper+0xb70/0x4858
[   33.251160]  kasan_atomics+0x198/0x2e0
[   33.251209]  kunit_try_run_case+0x170/0x3f0
[   33.251257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.251310]  kthread+0x328/0x630
[   33.251355]  ret_from_fork+0x10/0x20
[   33.251406] 
[   33.251426] Allocated by task 297:
[   33.251514]  kasan_save_stack+0x3c/0x68
[   33.251570]  kasan_save_track+0x20/0x40
[   33.251612]  kasan_save_alloc_info+0x40/0x58
[   33.251659]  __kasan_kmalloc+0xd4/0xd8
[   33.251701]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.251743]  kasan_atomics+0xb8/0x2e0
[   33.251918]  kunit_try_run_case+0x170/0x3f0
[   33.251961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.252007]  kthread+0x328/0x630
[   33.252249]  ret_from_fork+0x10/0x20
[   33.252341] 
[   33.252381] The buggy address belongs to the object at fff00000c64f7f00
[   33.252381]  which belongs to the cache kmalloc-64 of size 64
[   33.252472] The buggy address is located 0 bytes to the right of
[   33.252472]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.252544] 
[   33.252572] The buggy address belongs to the physical page:
[   33.252605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.252679] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.252888] page_type: f5(slab)
[   33.252945] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.253086] page dumped because: kasan: bad access detected
[   33.253145] Memory state around the buggy address:
[   33.253516] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.253841]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.254955] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   33.255068] 
[   33.255203] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.255234] Hardware name: linux,dummy-virt (DT)
[   33.256019]  kasan_atomics+0x198/0x2e0
[   33.257359]  kasan_save_alloc_info+0x40/0x58
[   33.258476]  ret_from_fork+0x10/0x20
[   33.258829] 
[   33.258888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.258951] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.259154] page_type: f5(slab)
[   33.259220] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.259468] 
[   33.259705]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.259910]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.261208] Write of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.261484] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.261682] Call trace:
[   33.262074]  kasan_report+0xdc/0x128
[   33.262366]  kasan_atomics_helper+0xc08/0x4858
[   33.264456] 
[   33.264744] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.264800] page_type: f5(slab)
[   33.265076] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.265770]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.266286]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.267315] ==================================================================
[   33.539994] ==================================================================
[   33.540223] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   33.540326] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.540536] 
[   33.540578] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.540780] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.540824] Hardware name: linux,dummy-virt (DT)
[   33.540857] Call trace:
[   33.540881]  show_stack+0x20/0x38 (C)
[   33.540931]  dump_stack_lvl+0x8c/0xd0
[   33.540984]  print_report+0x118/0x5d0
[   33.541210]  kasan_report+0xdc/0x128
[   33.541421]  kasan_check_range+0x100/0x1a8
[   33.541491]  __kasan_check_write+0x20/0x30
[   33.541538]  kasan_atomics_helper+0x17ec/0x4858
[   33.541591]  kasan_atomics+0x198/0x2e0
[   33.541738]  kunit_try_run_case+0x170/0x3f0
[   33.541820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.541875]  kthread+0x328/0x630
[   33.541919]  ret_from_fork+0x10/0x20
[   33.541970] 
[   33.541992] Allocated by task 297:
[   33.542114]  kasan_save_stack+0x3c/0x68
[   33.542160]  kasan_save_track+0x20/0x40
[   33.542201]  kasan_save_alloc_info+0x40/0x58
[   33.542242]  __kasan_kmalloc+0xd4/0xd8
[   33.542305]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.542350]  kasan_atomics+0xb8/0x2e0
[   33.542407]  kunit_try_run_case+0x170/0x3f0
[   33.542457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.542503]  kthread+0x328/0x630
[   33.542537]  ret_from_fork+0x10/0x20
[   33.542576] 
[   33.542599] The buggy address belongs to the object at fff00000c64f7f00
[   33.542599]  which belongs to the cache kmalloc-64 of size 64
[   33.542658] The buggy address is located 0 bytes to the right of
[   33.542658]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.542723] 
[   33.542746] The buggy address belongs to the physical page:
[   33.542778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.542830] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.543213] page_type: f5(slab)
[   33.543347] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.543398] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.543459] page dumped because: kasan: bad access detected
[   33.543491] 
[   33.543510] Memory state around the buggy address:
[   33.543692]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.543781]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.543826] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.543932]                                      ^
[   33.543966]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.544011]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.544051] ==================================================================
[   33.316819] ==================================================================
[   33.316875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   33.316926] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.316983] 
[   33.317020] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.317105] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.317132] Hardware name: linux,dummy-virt (DT)
[   33.317177] Call trace:
[   33.317216]  show_stack+0x20/0x38 (C)
[   33.317272]  dump_stack_lvl+0x8c/0xd0
[   33.317538]  print_report+0x118/0x5d0
[   33.317597]  kasan_report+0xdc/0x128
[   33.317907]  kasan_check_range+0x100/0x1a8
[   33.317980]  __kasan_check_write+0x20/0x30
[   33.318029]  kasan_atomics_helper+0xf20/0x4858
[   33.318081]  kasan_atomics+0x198/0x2e0
[   33.318188]  kunit_try_run_case+0x170/0x3f0
[   33.318239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.318294]  kthread+0x328/0x630
[   33.318338]  ret_from_fork+0x10/0x20
[   33.318524] 
[   33.318548] Allocated by task 297:
[   33.318580]  kasan_save_stack+0x3c/0x68
[   33.318625]  kasan_save_track+0x20/0x40
[   33.318667]  kasan_save_alloc_info+0x40/0x58
[   33.318707]  __kasan_kmalloc+0xd4/0xd8
[   33.318748]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.318791]  kasan_atomics+0xb8/0x2e0
[   33.318831]  kunit_try_run_case+0x170/0x3f0
[   33.318874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.318919]  kthread+0x328/0x630
[   33.318955]  ret_from_fork+0x10/0x20
[   33.318993] 
[   33.319016] The buggy address belongs to the object at fff00000c64f7f00
[   33.319016]  which belongs to the cache kmalloc-64 of size 64
[   33.320389] The buggy address is located 0 bytes to the right of
[   33.320389]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.322582] 
[   33.322621] The buggy address belongs to the physical page:
[   33.322656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.322710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.322759] page_type: f5(slab)
[   33.322797] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.322850] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.322892] page dumped because: kasan: bad access detected
[   33.322926] 
[   33.322946] Memory state around the buggy address:
[   33.322979]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.323023]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.323066] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.323106]                                      ^
[   33.323150]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.323194]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.323233] ==================================================================
[   33.535874] ==================================================================
[   33.535919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   33.536047] Read of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.536099] 
[   33.536142] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.536325] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.536356] Hardware name: linux,dummy-virt (DT)
[   33.536387] Call trace:
[   33.536411]  show_stack+0x20/0x38 (C)
[   33.536588]  dump_stack_lvl+0x8c/0xd0
[   33.536646]  print_report+0x118/0x5d0
[   33.536723]  kasan_report+0xdc/0x128
[   33.536769]  __asan_report_load8_noabort+0x20/0x30
[   33.536826]  kasan_atomics_helper+0x3e20/0x4858
[   33.537056]  kasan_atomics+0x198/0x2e0
[   33.537105]  kunit_try_run_case+0x170/0x3f0
[   33.537187]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.537417]  kthread+0x328/0x630
[   33.537481]  ret_from_fork+0x10/0x20
[   33.537687] 
[   33.537709] Allocated by task 297:
[   33.537739]  kasan_save_stack+0x3c/0x68
[   33.537815]  kasan_save_track+0x20/0x40
[   33.537935]  kasan_save_alloc_info+0x40/0x58
[   33.537989]  __kasan_kmalloc+0xd4/0xd8
[   33.538030]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.538073]  kasan_atomics+0xb8/0x2e0
[   33.538136]  kunit_try_run_case+0x170/0x3f0
[   33.538177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.538222]  kthread+0x328/0x630
[   33.538257]  ret_from_fork+0x10/0x20
[   33.538297] 
[   33.538384] The buggy address belongs to the object at fff00000c64f7f00
[   33.538384]  which belongs to the cache kmalloc-64 of size 64
[   33.538463] The buggy address is located 0 bytes to the right of
[   33.538463]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.538530] 
[   33.538554] The buggy address belongs to the physical page:
[   33.538586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.538664] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.538742] page_type: f5(slab)
[   33.538788] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.538852] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.539011] page dumped because: kasan: bad access detected
[   33.539042] 
[   33.539061] Memory state around the buggy address:
[   33.539095]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.539236]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.539296] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.539337]                                      ^
[   33.539381]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.539461]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.539610] ==================================================================
[   33.391002] ==================================================================
[   33.391135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   33.391489] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.391541] 
[   33.391571] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.391656] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.391684] Hardware name: linux,dummy-virt (DT)
[   33.392550] Call trace:
[   33.392741]  show_stack+0x20/0x38 (C)
[   33.392933]  dump_stack_lvl+0x8c/0xd0
[   33.393129]  print_report+0x118/0x5d0
[   33.393176]  kasan_report+0xdc/0x128
[   33.393222]  kasan_check_range+0x100/0x1a8
[   33.393271]  __kasan_check_write+0x20/0x30
[   33.393317]  kasan_atomics_helper+0x11f8/0x4858
[   33.393370]  kasan_atomics+0x198/0x2e0
[   33.393925]  kunit_try_run_case+0x170/0x3f0
[   33.394132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.394666]  kthread+0x328/0x630
[   33.394730]  ret_from_fork+0x10/0x20
[   33.395182] 
[   33.395423] Allocated by task 297:
[   33.395744]  kasan_save_stack+0x3c/0x68
[   33.395798]  kasan_save_track+0x20/0x40
[   33.396075]  kasan_save_alloc_info+0x40/0x58
[   33.396369]  __kasan_kmalloc+0xd4/0xd8
[   33.396422]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.396817]  kasan_atomics+0xb8/0x2e0
[   33.396876]  kunit_try_run_case+0x170/0x3f0
[   33.397373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.397754]  kthread+0x328/0x630
[   33.397928]  ret_from_fork+0x10/0x20
[   33.398149] 
[   33.398177] The buggy address belongs to the object at fff00000c64f7f00
[   33.398177]  which belongs to the cache kmalloc-64 of size 64
[   33.398582] The buggy address is located 0 bytes to the right of
[   33.398582]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.398736] 
[   33.398758] The buggy address belongs to the physical page:
[   33.398791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.399405] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.399559] page_type: f5(slab)
[   33.399600] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.399652] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.399695] page dumped because: kasan: bad access detected
[   33.400770] 
[   33.400997] Memory state around the buggy address:
[   33.401035]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.401126]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.401627] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.401717]                                      ^
[   33.401757]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.401809]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.402100] ==================================================================
[   33.344596] ==================================================================
[   33.345330] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   33.345831] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.346193] 
[   33.346230] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.346317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.346345] Hardware name: linux,dummy-virt (DT)
[   33.346774] Call trace:
[   33.346814]  show_stack+0x20/0x38 (C)
[   33.347233]  dump_stack_lvl+0x8c/0xd0
[   33.347384]  print_report+0x118/0x5d0
[   33.347588]  kasan_report+0xdc/0x128
[   33.347639]  kasan_check_range+0x100/0x1a8
[   33.348027]  __kasan_check_write+0x20/0x30
[   33.348473]  kasan_atomics_helper+0x1058/0x4858
[   33.348538]  kasan_atomics+0x198/0x2e0
[   33.348588]  kunit_try_run_case+0x170/0x3f0
[   33.348638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.348692]  kthread+0x328/0x630
[   33.348740]  ret_from_fork+0x10/0x20
[   33.349953] 
[   33.349999] Allocated by task 297:
[   33.350165]  kasan_save_stack+0x3c/0x68
[   33.350222]  kasan_save_track+0x20/0x40
[   33.350263]  kasan_save_alloc_info+0x40/0x58
[   33.350304]  __kasan_kmalloc+0xd4/0xd8
[   33.350344]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.350389]  kasan_atomics+0xb8/0x2e0
[   33.350429]  kunit_try_run_case+0x170/0x3f0
[   33.350482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.351170]  kthread+0x328/0x630
[   33.351355]  ret_from_fork+0x10/0x20
[   33.351779] 
[   33.351805] The buggy address belongs to the object at fff00000c64f7f00
[   33.351805]  which belongs to the cache kmalloc-64 of size 64
[   33.352310] The buggy address is located 0 bytes to the right of
[   33.352310]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.352567] 
[   33.352881] The buggy address belongs to the physical page:
[   33.353043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.353106] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.353504] page_type: f5(slab)
[   33.353975] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.354045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.354479] page dumped because: kasan: bad access detected
[   33.354518] 
[   33.354537] Memory state around the buggy address:
[   33.354715]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.355234]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.355288] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.355845]                                      ^
[   33.355968]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.356292]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.356335] ==================================================================
[   33.436590] ==================================================================
[   33.436650] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   33.436849] Read of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.437187] 
[   33.437425] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.437527] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.437555] Hardware name: linux,dummy-virt (DT)
[   33.437653] Call trace:
[   33.437683]  show_stack+0x20/0x38 (C)
[   33.437787]  dump_stack_lvl+0x8c/0xd0
[   33.437990]  print_report+0x118/0x5d0
[   33.438448]  kasan_report+0xdc/0x128
[   33.438500]  __asan_report_load8_noabort+0x20/0x30
[   33.438971]  kasan_atomics_helper+0x3f04/0x4858
[   33.439167]  kasan_atomics+0x198/0x2e0
[   33.439503]  kunit_try_run_case+0x170/0x3f0
[   33.439681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.439739]  kthread+0x328/0x630
[   33.440007]  ret_from_fork+0x10/0x20
[   33.440402] 
[   33.440430] Allocated by task 297:
[   33.440753]  kasan_save_stack+0x3c/0x68
[   33.440954]  kasan_save_track+0x20/0x40
[   33.441001]  kasan_save_alloc_info+0x40/0x58
[   33.441042]  __kasan_kmalloc+0xd4/0xd8
[   33.441084]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.441576]  kasan_atomics+0xb8/0x2e0
[   33.441642]  kunit_try_run_case+0x170/0x3f0
[   33.441683]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.441911]  kthread+0x328/0x630
[   33.442108]  ret_from_fork+0x10/0x20
[   33.442272] 
[   33.442307] The buggy address belongs to the object at fff00000c64f7f00
[   33.442307]  which belongs to the cache kmalloc-64 of size 64
[   33.442507] The buggy address is located 0 bytes to the right of
[   33.442507]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.442598] 
[   33.442799] The buggy address belongs to the physical page:
[   33.442974] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.443604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.443745] page_type: f5(slab)
[   33.443787] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.443839] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.444632] page dumped because: kasan: bad access detected
[   33.444959] 
[   33.445013] Memory state around the buggy address:
[   33.445221]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.445281]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.445379] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.445446]                                      ^
[   33.445481]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.445528]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.445569] ==================================================================
[   33.230691] ==================================================================
[   33.230787] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   33.230840] Write of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.230907] 
[   33.230961] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.231048] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.231076] Hardware name: linux,dummy-virt (DT)
[   33.231115] Call trace:
[   33.231141]  show_stack+0x20/0x38 (C)
[   33.231341]  dump_stack_lvl+0x8c/0xd0
[   33.231397]  print_report+0x118/0x5d0
[   33.231457]  kasan_report+0xdc/0x128
[   33.231514]  kasan_check_range+0x100/0x1a8
[   33.231562]  __kasan_check_write+0x20/0x30
[   33.231609]  kasan_atomics_helper+0xa04/0x4858
[   33.231660]  kasan_atomics+0x198/0x2e0
[   33.231707]  kunit_try_run_case+0x170/0x3f0
[   33.231755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.231808]  kthread+0x328/0x630
[   33.231854]  ret_from_fork+0x10/0x20
[   33.231912] 
[   33.231947] Allocated by task 297:
[   33.231993]  kasan_save_stack+0x3c/0x68
[   33.232036]  kasan_save_track+0x20/0x40
[   33.232079]  kasan_save_alloc_info+0x40/0x58
[   33.232242]  kunit_try_run_case+0x170/0x3f0
[   33.232861] The buggy address is located 0 bytes to the right of
[   33.232861]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.232981] 
[   33.233019] The buggy address belongs to the physical page:
[   33.233052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.233103] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.233265] page_type: f5(slab)
[   33.233429] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.233502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.233570] page dumped because: kasan: bad access detected
[   33.233606] 
[   33.233780] Memory state around the buggy address:
[   33.233839]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.233884]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.233944] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.233984]                                      ^
[   33.234052]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.234098]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.234140] ==================================================================
[   33.512664] ==================================================================
[   33.512809] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   33.512866] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.512916] 
[   33.512952] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.513038] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.513067] Hardware name: linux,dummy-virt (DT)
[   33.513098] Call trace:
[   33.513123]  show_stack+0x20/0x38 (C)
[   33.513180]  dump_stack_lvl+0x8c/0xd0
[   33.513288]  print_report+0x118/0x5d0
[   33.513433]  kasan_report+0xdc/0x128
[   33.513529]  kasan_check_range+0x100/0x1a8
[   33.513578]  __kasan_check_write+0x20/0x30
[   33.513652]  kasan_atomics_helper+0x1644/0x4858
[   33.513740]  kasan_atomics+0x198/0x2e0
[   33.513789]  kunit_try_run_case+0x170/0x3f0
[   33.513849]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.513904]  kthread+0x328/0x630
[   33.513949]  ret_from_fork+0x10/0x20
[   33.514016] 
[   33.514038] Allocated by task 297:
[   33.514068]  kasan_save_stack+0x3c/0x68
[   33.514189]  kasan_save_track+0x20/0x40
[   33.514281]  kasan_save_alloc_info+0x40/0x58
[   33.514420]  __kasan_kmalloc+0xd4/0xd8
[   33.514471]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.514515]  kasan_atomics+0xb8/0x2e0
[   33.514586]  kunit_try_run_case+0x170/0x3f0
[   33.514626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.514705]  kthread+0x328/0x630
[   33.514767]  ret_from_fork+0x10/0x20
[   33.514827] 
[   33.514996] The buggy address belongs to the object at fff00000c64f7f00
[   33.514996]  which belongs to the cache kmalloc-64 of size 64
[   33.515056] The buggy address is located 0 bytes to the right of
[   33.515056]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.515126] 
[   33.515147] The buggy address belongs to the physical page:
[   33.515180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.515245] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.515292] page_type: f5(slab)
[   33.515517] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.515575] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.515863] page dumped because: kasan: bad access detected
[   33.515899] 
[   33.515969] Memory state around the buggy address:
[   33.516002]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.516048]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.516139] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.516198]                                      ^
[   33.516295]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.516341]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.516380] ==================================================================
[   33.425101] ==================================================================
[   33.425374] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   33.425557] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.425613] 
[   33.425702] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.426073] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.426219] Hardware name: linux,dummy-virt (DT)
[   33.426551] Call trace:
[   33.426714]  show_stack+0x20/0x38 (C)
[   33.426851]  dump_stack_lvl+0x8c/0xd0
[   33.427300]  print_report+0x118/0x5d0
[   33.427761]  kasan_report+0xdc/0x128
[   33.427825]  kasan_check_range+0x100/0x1a8
[   33.427874]  __kasan_check_write+0x20/0x30
[   33.428318]  kasan_atomics_helper+0x1384/0x4858
[   33.428466]  kasan_atomics+0x198/0x2e0
[   33.428516]  kunit_try_run_case+0x170/0x3f0
[   33.429060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.429182]  kthread+0x328/0x630
[   33.429229]  ret_from_fork+0x10/0x20
[   33.429280] 
[   33.429730] Allocated by task 297:
[   33.429768]  kasan_save_stack+0x3c/0x68
[   33.430270]  kasan_save_track+0x20/0x40
[   33.430455]  kasan_save_alloc_info+0x40/0x58
[   33.430791]  __kasan_kmalloc+0xd4/0xd8
[   33.430835]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.430887]  kasan_atomics+0xb8/0x2e0
[   33.430929]  kunit_try_run_case+0x170/0x3f0
[   33.431527]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.431605]  kthread+0x328/0x630
[   33.431643]  ret_from_fork+0x10/0x20
[   33.431683] 
[   33.431705] The buggy address belongs to the object at fff00000c64f7f00
[   33.431705]  which belongs to the cache kmalloc-64 of size 64
[   33.432358] The buggy address is located 0 bytes to the right of
[   33.432358]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.432465] 
[   33.432488] The buggy address belongs to the physical page:
[   33.432911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.433131] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.433181] page_type: f5(slab)
[   33.433225] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.433574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.433652] page dumped because: kasan: bad access detected
[   33.434265] 
[   33.434337] Memory state around the buggy address:
[   33.434503]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.434688]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.434737] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.434814]                                      ^
[   33.434876]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.434922]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.435344] ==================================================================
[   33.295991] ==================================================================
[   33.296036] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   33.296085] Read of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.296136] 
[   33.296165] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.296248] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.296279] Hardware name: linux,dummy-virt (DT)
[   33.296329] Call trace:
[   33.296352]  show_stack+0x20/0x38 (C)
[   33.296403]  dump_stack_lvl+0x8c/0xd0
[   33.296820]  print_report+0x118/0x5d0
[   33.296926]  kasan_report+0xdc/0x128
[   33.297002]  __asan_report_load8_noabort+0x20/0x30
[   33.297055]  kasan_atomics_helper+0x3f58/0x4858
[   33.297108]  kasan_atomics+0x198/0x2e0
[   33.297172]  kunit_try_run_case+0x170/0x3f0
[   33.297221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.297277]  kthread+0x328/0x630
[   33.297354]  ret_from_fork+0x10/0x20
[   33.297407] 
[   33.297550] Allocated by task 297:
[   33.297608]  kasan_save_stack+0x3c/0x68
[   33.297694]  kasan_save_track+0x20/0x40
[   33.297772]  kasan_save_alloc_info+0x40/0x58
[   33.297853]  __kasan_kmalloc+0xd4/0xd8
[   33.298171]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.298258]  kasan_atomics+0xb8/0x2e0
[   33.298337]  kunit_try_run_case+0x170/0x3f0
[   33.298514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.298602]  kthread+0x328/0x630
[   33.298638]  ret_from_fork+0x10/0x20
[   33.298699] 
[   33.298722] The buggy address belongs to the object at fff00000c64f7f00
[   33.298722]  which belongs to the cache kmalloc-64 of size 64
[   33.298781] The buggy address is located 0 bytes to the right of
[   33.298781]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.298847] 
[   33.298868] The buggy address belongs to the physical page:
[   33.298898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.299065] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.299172] page_type: f5(slab)
[   33.299240] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.299532] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.299589] page dumped because: kasan: bad access detected
[   33.299700] 
[   33.299815] Memory state around the buggy address:
[   33.299882]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.299970]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.300035] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.300101]                                      ^
[   33.300155]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.300203]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.300291] ==================================================================
[   33.291580] ==================================================================
[   33.291630] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   33.291743] Read of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.291797] 
[   33.291844] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.291957] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.292005] Hardware name: linux,dummy-virt (DT)
[   33.292067] Call trace:
[   33.292093]  show_stack+0x20/0x38 (C)
[   33.292141]  dump_stack_lvl+0x8c/0xd0
[   33.292190]  print_report+0x118/0x5d0
[   33.292520]  kasan_report+0xdc/0x128
[   33.292622]  kasan_check_range+0x100/0x1a8
[   33.292971]  __kasan_check_read+0x20/0x30
[   33.293041]  kasan_atomics_helper+0xdd4/0x4858
[   33.293135]  kasan_atomics+0x198/0x2e0
[   33.293212]  kunit_try_run_case+0x170/0x3f0
[   33.293261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.293315]  kthread+0x328/0x630
[   33.293367]  ret_from_fork+0x10/0x20
[   33.293418] 
[   33.293451] Allocated by task 297:
[   33.293479]  kasan_save_stack+0x3c/0x68
[   33.293524]  kasan_save_track+0x20/0x40
[   33.293705]  kasan_save_alloc_info+0x40/0x58
[   33.293830]  __kasan_kmalloc+0xd4/0xd8
[   33.293939]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.294068]  kasan_atomics+0xb8/0x2e0
[   33.294182]  kunit_try_run_case+0x170/0x3f0
[   33.294495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.294581]  kthread+0x328/0x630
[   33.294618]  ret_from_fork+0x10/0x20
[   33.294680] 
[   33.294702] The buggy address belongs to the object at fff00000c64f7f00
[   33.294702]  which belongs to the cache kmalloc-64 of size 64
[   33.294762] The buggy address is located 0 bytes to the right of
[   33.294762]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.294825] 
[   33.294847] The buggy address belongs to the physical page:
[   33.295058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7
[   33.295152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.295201] page_type: f5(slab)
[   33.295249] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.295300] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.295342] page dumped because: kasan: bad access detected
[   33.295375] 
[   33.295394] Memory state around the buggy address:
[   33.295453]  fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.295500]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.295563] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.295602]                                      ^
[   33.295645]  fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.295688]  fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.295737] ==================================================================
[   33.159051] ==================================================================
[   33.159735] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   33.159897] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.160061] Call trace:
[   33.160346]  __kasan_check_write+0x20/0x30
[   33.160523]  kunit_try_run_case+0x170/0x3f0
[   33.160625]  kthread+0x328/0x630
[   33.160824]  kasan_save_track+0x20/0x40
[   33.161137]  kthread+0x328/0x630
[   33.161295] The buggy address is located 0 bytes to the right of
[   33.161295]  allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30)
[   33.161759] page dumped because: kasan: bad access detected
[   33.162247]  fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.162309] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.163394] Write of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297
[   33.163570] 
[   33.163603] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.163773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.163858] Call trace:
[   33.163972]  dump_stack_lvl+0x8c/0xd0
[   33.164685]  kthread+0x328/0x630
[   33.164813] 
[   33.165126]  kasan_save_alloc_info+0x40/0x58
[   33.165770] 
[   33.166030] 
[   33.166100] The buggy address belongs to the physical page:
[   33.166361] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.166801] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.167022] ==================================================================

[   27.904127] ==================================================================
[   27.904364] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   27.904805] Read of size 8 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.905477] 
[   27.905593] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.905688] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.905704] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.905748] Call Trace:
[   27.905764]  <TASK>
[   27.905781]  dump_stack_lvl+0x73/0xb0
[   27.905833]  print_report+0xd1/0x610
[   27.905881]  ? __virt_addr_valid+0x1db/0x2d0
[   27.905912]  ? kasan_atomics_helper+0x5115/0x5450
[   27.905940]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.905973]  ? kasan_atomics_helper+0x5115/0x5450
[   27.906002]  kasan_report+0x141/0x180
[   27.906032]  ? kasan_atomics_helper+0x5115/0x5450
[   27.906068]  __asan_report_load8_noabort+0x18/0x20
[   27.906099]  kasan_atomics_helper+0x5115/0x5450
[   27.906129]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.906159]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.906191]  ? kasan_atomics+0x152/0x310
[   27.906244]  kasan_atomics+0x1dc/0x310
[   27.906275]  ? __pfx_kasan_atomics+0x10/0x10
[   27.906307]  ? __pfx_read_tsc+0x10/0x10
[   27.906335]  ? ktime_get_ts64+0x86/0x230
[   27.906367]  kunit_try_run_case+0x1a5/0x480
[   27.906398]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.906426]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.906455]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.906493]  ? __kthread_parkme+0x82/0x180
[   27.906547]  ? preempt_count_sub+0x50/0x80
[   27.906580]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.906630]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.906664]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.906698]  kthread+0x337/0x6f0
[   27.906724]  ? trace_preempt_on+0x20/0xc0
[   27.906773]  ? __pfx_kthread+0x10/0x10
[   27.906801]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.906833]  ? calculate_sigpending+0x7b/0xa0
[   27.906865]  ? __pfx_kthread+0x10/0x10
[   27.906894]  ret_from_fork+0x116/0x1d0
[   27.906939]  ? __pfx_kthread+0x10/0x10
[   27.906967]  ret_from_fork_asm+0x1a/0x30
[   27.907008]  </TASK>
[   27.907021] 
[   27.914698] Allocated by task 313:
[   27.914864]  kasan_save_stack+0x45/0x70
[   27.915037]  kasan_save_track+0x18/0x40
[   27.915251]  kasan_save_alloc_info+0x3b/0x50
[   27.915509]  __kasan_kmalloc+0xb7/0xc0
[   27.915728]  __kmalloc_cache_noprof+0x189/0x420
[   27.915948]  kasan_atomics+0x95/0x310
[   27.916140]  kunit_try_run_case+0x1a5/0x480
[   27.916355]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.916541]  kthread+0x337/0x6f0
[   27.916763]  ret_from_fork+0x116/0x1d0
[   27.916998]  ret_from_fork_asm+0x1a/0x30
[   27.917196] 
[   27.917288] The buggy address belongs to the object at ffff888105926b00
[   27.917288]  which belongs to the cache kmalloc-64 of size 64
[   27.917833] The buggy address is located 0 bytes to the right of
[   27.917833]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.918369] 
[   27.918461] The buggy address belongs to the physical page:
[   27.918745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.919004] flags: 0x200000000000000(node=0|zone=2)
[   27.919162] page_type: f5(slab)
[   27.919278] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.919502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.919754] page dumped because: kasan: bad access detected
[   27.920017] 
[   27.920111] Memory state around the buggy address:
[   27.920405]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.920838]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.921206] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.921520]                                      ^
[   27.921815]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.922161]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.922504] ==================================================================
[   27.429457] ==================================================================
[   27.430092] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   27.430547] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.431161] 
[   27.431400] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.431548] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.431569] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.431595] Call Trace:
[   27.431615]  <TASK>
[   27.431636]  dump_stack_lvl+0x73/0xb0
[   27.431673]  print_report+0xd1/0x610
[   27.431703]  ? __virt_addr_valid+0x1db/0x2d0
[   27.431733]  ? kasan_atomics_helper+0x164f/0x5450
[   27.431761]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.431795]  ? kasan_atomics_helper+0x164f/0x5450
[   27.431824]  kasan_report+0x141/0x180
[   27.431854]  ? kasan_atomics_helper+0x164f/0x5450
[   27.431889]  kasan_check_range+0x10c/0x1c0
[   27.431920]  __kasan_check_write+0x18/0x20
[   27.431951]  kasan_atomics_helper+0x164f/0x5450
[   27.431982]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.432012]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.432045]  ? kasan_atomics+0x152/0x310
[   27.432080]  kasan_atomics+0x1dc/0x310
[   27.432109]  ? __pfx_kasan_atomics+0x10/0x10
[   27.432141]  ? __pfx_read_tsc+0x10/0x10
[   27.432169]  ? ktime_get_ts64+0x86/0x230
[   27.432201]  kunit_try_run_case+0x1a5/0x480
[   27.432232]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.432261]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.432291]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.432321]  ? __kthread_parkme+0x82/0x180
[   27.432348]  ? preempt_count_sub+0x50/0x80
[   27.432380]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.432410]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.432444]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.432478]  kthread+0x337/0x6f0
[   27.432505]  ? trace_preempt_on+0x20/0xc0
[   27.432546]  ? __pfx_kthread+0x10/0x10
[   27.432574]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.432606]  ? calculate_sigpending+0x7b/0xa0
[   27.432638]  ? __pfx_kthread+0x10/0x10
[   27.432666]  ret_from_fork+0x116/0x1d0
[   27.432693]  ? __pfx_kthread+0x10/0x10
[   27.432721]  ret_from_fork_asm+0x1a/0x30
[   27.432763]  </TASK>
[   27.432777] 
[   27.443165] Allocated by task 313:
[   27.443339]  kasan_save_stack+0x45/0x70
[   27.443682]  kasan_save_track+0x18/0x40
[   27.443865]  kasan_save_alloc_info+0x3b/0x50
[   27.444224]  __kasan_kmalloc+0xb7/0xc0
[   27.444492]  __kmalloc_cache_noprof+0x189/0x420
[   27.444807]  kasan_atomics+0x95/0x310
[   27.445083]  kunit_try_run_case+0x1a5/0x480
[   27.445253]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.445680]  kthread+0x337/0x6f0
[   27.446002]  ret_from_fork+0x116/0x1d0
[   27.446292]  ret_from_fork_asm+0x1a/0x30
[   27.446517] 
[   27.446611] The buggy address belongs to the object at ffff888105926b00
[   27.446611]  which belongs to the cache kmalloc-64 of size 64
[   27.447269] The buggy address is located 0 bytes to the right of
[   27.447269]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.448052] 
[   27.448139] The buggy address belongs to the physical page:
[   27.448548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.448960] flags: 0x200000000000000(node=0|zone=2)
[   27.449263] page_type: f5(slab)
[   27.449396] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.449867] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.450274] page dumped because: kasan: bad access detected
[   27.450539] 
[   27.450615] Memory state around the buggy address:
[   27.451007]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.451329]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.451801] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.452199]                                      ^
[   27.452402]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.452962]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.453342] ==================================================================
[   27.853186] ==================================================================
[   27.853490] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   27.853860] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.854163] 
[   27.854256] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.854307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.854323] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.854348] Call Trace:
[   27.854368]  <TASK>
[   27.854385]  dump_stack_lvl+0x73/0xb0
[   27.854419]  print_report+0xd1/0x610
[   27.854449]  ? __virt_addr_valid+0x1db/0x2d0
[   27.854486]  ? kasan_atomics_helper+0x218a/0x5450
[   27.854516]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.854560]  ? kasan_atomics_helper+0x218a/0x5450
[   27.854590]  kasan_report+0x141/0x180
[   27.854639]  ? kasan_atomics_helper+0x218a/0x5450
[   27.854675]  kasan_check_range+0x10c/0x1c0
[   27.854706]  __kasan_check_write+0x18/0x20
[   27.854737]  kasan_atomics_helper+0x218a/0x5450
[   27.854767]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.854796]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.854828]  ? kasan_atomics+0x152/0x310
[   27.854864]  kasan_atomics+0x1dc/0x310
[   27.854894]  ? __pfx_kasan_atomics+0x10/0x10
[   27.854926]  ? __pfx_read_tsc+0x10/0x10
[   27.854954]  ? ktime_get_ts64+0x86/0x230
[   27.854987]  kunit_try_run_case+0x1a5/0x480
[   27.855017]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.855046]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.855075]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.855106]  ? __kthread_parkme+0x82/0x180
[   27.855133]  ? preempt_count_sub+0x50/0x80
[   27.855165]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.855196]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.855230]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.855264]  kthread+0x337/0x6f0
[   27.855290]  ? trace_preempt_on+0x20/0xc0
[   27.855320]  ? __pfx_kthread+0x10/0x10
[   27.855349]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.855381]  ? calculate_sigpending+0x7b/0xa0
[   27.855412]  ? __pfx_kthread+0x10/0x10
[   27.855441]  ret_from_fork+0x116/0x1d0
[   27.855467]  ? __pfx_kthread+0x10/0x10
[   27.855496]  ret_from_fork_asm+0x1a/0x30
[   27.855547]  </TASK>
[   27.855561] 
[   27.862458] Allocated by task 313:
[   27.862674]  kasan_save_stack+0x45/0x70
[   27.862876]  kasan_save_track+0x18/0x40
[   27.863073]  kasan_save_alloc_info+0x3b/0x50
[   27.863288]  __kasan_kmalloc+0xb7/0xc0
[   27.863480]  __kmalloc_cache_noprof+0x189/0x420
[   27.863722]  kasan_atomics+0x95/0x310
[   27.863861]  kunit_try_run_case+0x1a5/0x480
[   27.864010]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.864191]  kthread+0x337/0x6f0
[   27.864316]  ret_from_fork+0x116/0x1d0
[   27.864451]  ret_from_fork_asm+0x1a/0x30
[   27.864659] 
[   27.864752] The buggy address belongs to the object at ffff888105926b00
[   27.864752]  which belongs to the cache kmalloc-64 of size 64
[   27.865275] The buggy address is located 0 bytes to the right of
[   27.865275]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.865859] 
[   27.865954] The buggy address belongs to the physical page:
[   27.866203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.866546] flags: 0x200000000000000(node=0|zone=2)
[   27.866732] page_type: f5(slab)
[   27.866854] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.867137] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.867477] page dumped because: kasan: bad access detected
[   27.867762] 
[   27.867856] Memory state around the buggy address:
[   27.868081]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.868376]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.868618] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.868832]                                      ^
[   27.868988]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.869307]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.869653] ==================================================================
[   27.390210] ==================================================================
[   27.390594] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   27.390925] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.391250] 
[   27.391360] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.391415] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.391442] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.391469] Call Trace:
[   27.391484]  <TASK>
[   27.391501]  dump_stack_lvl+0x73/0xb0
[   27.391544]  print_report+0xd1/0x610
[   27.391574]  ? __virt_addr_valid+0x1db/0x2d0
[   27.391613]  ? kasan_atomics_helper+0x151d/0x5450
[   27.391642]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.391687]  ? kasan_atomics_helper+0x151d/0x5450
[   27.391716]  kasan_report+0x141/0x180
[   27.391771]  ? kasan_atomics_helper+0x151d/0x5450
[   27.391807]  kasan_check_range+0x10c/0x1c0
[   27.391839]  __kasan_check_write+0x18/0x20
[   27.391869]  kasan_atomics_helper+0x151d/0x5450
[   27.391900]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.391931]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.391963]  ? kasan_atomics+0x152/0x310
[   27.391998]  kasan_atomics+0x1dc/0x310
[   27.392028]  ? __pfx_kasan_atomics+0x10/0x10
[   27.392060]  ? __pfx_read_tsc+0x10/0x10
[   27.392088]  ? ktime_get_ts64+0x86/0x230
[   27.392120]  kunit_try_run_case+0x1a5/0x480
[   27.392160]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.392188]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.392218]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.392259]  ? __kthread_parkme+0x82/0x180
[   27.392287]  ? preempt_count_sub+0x50/0x80
[   27.392318]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.392348]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.392381]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.392414]  kthread+0x337/0x6f0
[   27.392440]  ? trace_preempt_on+0x20/0xc0
[   27.392470]  ? __pfx_kthread+0x10/0x10
[   27.392499]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.392539]  ? calculate_sigpending+0x7b/0xa0
[   27.392570]  ? __pfx_kthread+0x10/0x10
[   27.392599]  ret_from_fork+0x116/0x1d0
[   27.392633]  ? __pfx_kthread+0x10/0x10
[   27.392661]  ret_from_fork_asm+0x1a/0x30
[   27.392704]  </TASK>
[   27.392717] 
[   27.400451] Allocated by task 313:
[   27.400672]  kasan_save_stack+0x45/0x70
[   27.400853]  kasan_save_track+0x18/0x40
[   27.401060]  kasan_save_alloc_info+0x3b/0x50
[   27.401251]  __kasan_kmalloc+0xb7/0xc0
[   27.401446]  __kmalloc_cache_noprof+0x189/0x420
[   27.401715]  kasan_atomics+0x95/0x310
[   27.401889]  kunit_try_run_case+0x1a5/0x480
[   27.402129]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.402363]  kthread+0x337/0x6f0
[   27.402552]  ret_from_fork+0x116/0x1d0
[   27.402820]  ret_from_fork_asm+0x1a/0x30
[   27.403044] 
[   27.403115] The buggy address belongs to the object at ffff888105926b00
[   27.403115]  which belongs to the cache kmalloc-64 of size 64
[   27.403609] The buggy address is located 0 bytes to the right of
[   27.403609]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.404123] 
[   27.404194] The buggy address belongs to the physical page:
[   27.404446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.404855] flags: 0x200000000000000(node=0|zone=2)
[   27.405055] page_type: f5(slab)
[   27.405198] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.405468] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.405809] page dumped because: kasan: bad access detected
[   27.406061] 
[   27.406157] Memory state around the buggy address:
[   27.406378]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.406685]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.406902] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.407115]                                      ^
[   27.407270]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.407705]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.408021] ==================================================================
[   26.535344] ==================================================================
[   26.536268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   26.537087] Read of size 4 at addr ffff888105926b30 by task kunit_try_catch/313
[   26.537907] 
[   26.538247] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.538415] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.538432] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.538457] Call Trace:
[   26.538481]  <TASK>
[   26.538499]  dump_stack_lvl+0x73/0xb0
[   26.538551]  print_report+0xd1/0x610
[   26.538596]  ? __virt_addr_valid+0x1db/0x2d0
[   26.538654]  ? kasan_atomics_helper+0x4bbc/0x5450
[   26.538682]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.538713]  ? kasan_atomics_helper+0x4bbc/0x5450
[   26.538741]  kasan_report+0x141/0x180
[   26.538770]  ? kasan_atomics_helper+0x4bbc/0x5450
[   26.538803]  __asan_report_load4_noabort+0x18/0x20
[   26.538833]  kasan_atomics_helper+0x4bbc/0x5450
[   26.538861]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.538889]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.538920]  ? kasan_atomics+0x152/0x310
[   26.538954]  kasan_atomics+0x1dc/0x310
[   26.538982]  ? __pfx_kasan_atomics+0x10/0x10
[   26.539012]  ? __pfx_read_tsc+0x10/0x10
[   26.539039]  ? ktime_get_ts64+0x86/0x230
[   26.539072]  kunit_try_run_case+0x1a5/0x480
[   26.539102]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.539128]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.539157]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.539185]  ? __kthread_parkme+0x82/0x180
[   26.539212]  ? preempt_count_sub+0x50/0x80
[   26.539244]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.539272]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.539305]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.539338]  kthread+0x337/0x6f0
[   26.539363]  ? trace_preempt_on+0x20/0xc0
[   26.539392]  ? __pfx_kthread+0x10/0x10
[   26.539419]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.539450]  ? calculate_sigpending+0x7b/0xa0
[   26.539480]  ? __pfx_kthread+0x10/0x10
[   26.539508]  ret_from_fork+0x116/0x1d0
[   26.539543]  ? __pfx_kthread+0x10/0x10
[   26.539570]  ret_from_fork_asm+0x1a/0x30
[   26.539617]  </TASK>
[   26.539629] 
[   26.557135] Allocated by task 313:
[   26.557616]  kasan_save_stack+0x45/0x70
[   26.557795]  kasan_save_track+0x18/0x40
[   26.558253]  kasan_save_alloc_info+0x3b/0x50
[   26.558750]  __kasan_kmalloc+0xb7/0xc0
[   26.559144]  __kmalloc_cache_noprof+0x189/0x420
[   26.559399]  kasan_atomics+0x95/0x310
[   26.559547]  kunit_try_run_case+0x1a5/0x480
[   26.560029]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.560547]  kthread+0x337/0x6f0
[   26.560910]  ret_from_fork+0x116/0x1d0
[   26.561336]  ret_from_fork_asm+0x1a/0x30
[   26.561484] 
[   26.561569] The buggy address belongs to the object at ffff888105926b00
[   26.561569]  which belongs to the cache kmalloc-64 of size 64
[   26.563009] The buggy address is located 0 bytes to the right of
[   26.563009]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   26.563418] 
[   26.563490] The buggy address belongs to the physical page:
[   26.563978] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   26.564888] flags: 0x200000000000000(node=0|zone=2)
[   26.565348] page_type: f5(slab)
[   26.565700] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.566246] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.566487] page dumped because: kasan: bad access detected
[   26.566701] 
[   26.566770] Memory state around the buggy address:
[   26.567114]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.567386]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.567833] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.568101]                                      ^
[   26.568427]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.568719]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.569349] ==================================================================
[   26.625205] ==================================================================
[   26.625515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   26.625800] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313
[   26.626298] 
[   26.626425] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.626494] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.626510] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.626552] Call Trace:
[   26.626569]  <TASK>
[   26.626587]  dump_stack_lvl+0x73/0xb0
[   26.626686]  print_report+0xd1/0x610
[   26.626718]  ? __virt_addr_valid+0x1db/0x2d0
[   26.626759]  ? kasan_atomics_helper+0x4b6e/0x5450
[   26.626788]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.626834]  ? kasan_atomics_helper+0x4b6e/0x5450
[   26.626863]  kasan_report+0x141/0x180
[   26.626893]  ? kasan_atomics_helper+0x4b6e/0x5450
[   26.626929]  __asan_report_store4_noabort+0x1b/0x30
[   26.626961]  kasan_atomics_helper+0x4b6e/0x5450
[   26.626991]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.627020]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.627052]  ? kasan_atomics+0x152/0x310
[   26.627097]  kasan_atomics+0x1dc/0x310
[   26.627127]  ? __pfx_kasan_atomics+0x10/0x10
[   26.627172]  ? __pfx_read_tsc+0x10/0x10
[   26.627200]  ? ktime_get_ts64+0x86/0x230
[   26.627233]  kunit_try_run_case+0x1a5/0x480
[   26.627272]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.627301]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.627341]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.627371]  ? __kthread_parkme+0x82/0x180
[   26.627398]  ? preempt_count_sub+0x50/0x80
[   26.627431]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.627462]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.627496]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.627541]  kthread+0x337/0x6f0
[   26.627568]  ? trace_preempt_on+0x20/0xc0
[   26.627598]  ? __pfx_kthread+0x10/0x10
[   26.627698]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.627733]  ? calculate_sigpending+0x7b/0xa0
[   26.627765]  ? __pfx_kthread+0x10/0x10
[   26.627794]  ret_from_fork+0x116/0x1d0
[   26.627821]  ? __pfx_kthread+0x10/0x10
[   26.627850]  ret_from_fork_asm+0x1a/0x30
[   26.627892]  </TASK>
[   26.627906] 
[   26.636277] Allocated by task 313:
[   26.636409]  kasan_save_stack+0x45/0x70
[   26.636638]  kasan_save_track+0x18/0x40
[   26.636918]  kasan_save_alloc_info+0x3b/0x50
[   26.637170]  __kasan_kmalloc+0xb7/0xc0
[   26.637341]  __kmalloc_cache_noprof+0x189/0x420
[   26.637587]  kasan_atomics+0x95/0x310
[   26.637761]  kunit_try_run_case+0x1a5/0x480
[   26.638026]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.638275]  kthread+0x337/0x6f0
[   26.638456]  ret_from_fork+0x116/0x1d0
[   26.638732]  ret_from_fork_asm+0x1a/0x30
[   26.638943] 
[   26.639015] The buggy address belongs to the object at ffff888105926b00
[   26.639015]  which belongs to the cache kmalloc-64 of size 64
[   26.639370] The buggy address is located 0 bytes to the right of
[   26.639370]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   26.639950] 
[   26.640045] The buggy address belongs to the physical page:
[   26.640301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   26.640742] flags: 0x200000000000000(node=0|zone=2)
[   26.640978] page_type: f5(slab)
[   26.641102] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.641337] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.641697] page dumped because: kasan: bad access detected
[   26.642324] 
[   26.642427] Memory state around the buggy address:
[   26.642769]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.642990]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.643401] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.643806]                                      ^
[   26.644005]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.644303]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.644652] ==================================================================
[   26.750926] ==================================================================
[   26.751259] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   26.751659] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313
[   26.752004] 
[   26.752131] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.752197] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.752213] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.752240] Call Trace:
[   26.752271]  <TASK>
[   26.752291]  dump_stack_lvl+0x73/0xb0
[   26.752327]  print_report+0xd1/0x610
[   26.752357]  ? __virt_addr_valid+0x1db/0x2d0
[   26.752388]  ? kasan_atomics_helper+0x5fe/0x5450
[   26.752416]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.752448]  ? kasan_atomics_helper+0x5fe/0x5450
[   26.752478]  kasan_report+0x141/0x180
[   26.752507]  ? kasan_atomics_helper+0x5fe/0x5450
[   26.752552]  kasan_check_range+0x10c/0x1c0
[   26.752643]  __kasan_check_write+0x18/0x20
[   26.752677]  kasan_atomics_helper+0x5fe/0x5450
[   26.752727]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.752757]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.752790]  ? kasan_atomics+0x152/0x310
[   26.752834]  kasan_atomics+0x1dc/0x310
[   26.752864]  ? __pfx_kasan_atomics+0x10/0x10
[   26.752907]  ? __pfx_read_tsc+0x10/0x10
[   26.752937]  ? ktime_get_ts64+0x86/0x230
[   26.752981]  kunit_try_run_case+0x1a5/0x480
[   26.753013]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.753048]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.753092]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.753125]  ? __kthread_parkme+0x82/0x180
[   26.753163]  ? preempt_count_sub+0x50/0x80
[   26.753196]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.753227]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.753264]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.753308]  kthread+0x337/0x6f0
[   26.753336]  ? trace_preempt_on+0x20/0xc0
[   26.753378]  ? __pfx_kthread+0x10/0x10
[   26.753407]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.753440]  ? calculate_sigpending+0x7b/0xa0
[   26.753472]  ? __pfx_kthread+0x10/0x10
[   26.753504]  ret_from_fork+0x116/0x1d0
[   26.753539]  ? __pfx_kthread+0x10/0x10
[   26.753568]  ret_from_fork_asm+0x1a/0x30
[   26.753658]  </TASK>
[   26.753673] 
[   26.762062] Allocated by task 313:
[   26.762200]  kasan_save_stack+0x45/0x70
[   26.762353]  kasan_save_track+0x18/0x40
[   26.762522]  kasan_save_alloc_info+0x3b/0x50
[   26.762808]  __kasan_kmalloc+0xb7/0xc0
[   26.763023]  __kmalloc_cache_noprof+0x189/0x420
[   26.763251]  kasan_atomics+0x95/0x310
[   26.763469]  kunit_try_run_case+0x1a5/0x480
[   26.763833]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.764149]  kthread+0x337/0x6f0
[   26.764320]  ret_from_fork+0x116/0x1d0
[   26.764516]  ret_from_fork_asm+0x1a/0x30
[   26.764863] 
[   26.764965] The buggy address belongs to the object at ffff888105926b00
[   26.764965]  which belongs to the cache kmalloc-64 of size 64
[   26.765471] The buggy address is located 0 bytes to the right of
[   26.765471]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   26.766085] 
[   26.766167] The buggy address belongs to the physical page:
[   26.766350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   26.766850] flags: 0x200000000000000(node=0|zone=2)
[   26.767086] page_type: f5(slab)
[   26.767253] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.767488] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.767929] page dumped because: kasan: bad access detected
[   26.768219] 
[   26.768327] Memory state around the buggy address:
[   26.768510]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.768740]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.769141] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.769488]                                      ^
[   26.769720]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.770067]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.770353] ==================================================================
[   27.622213] ==================================================================
[   27.623063] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   27.623780] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.624419] 
[   27.624560] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.624626] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.624641] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.624666] Call Trace:
[   27.624682]  <TASK>
[   27.624700]  dump_stack_lvl+0x73/0xb0
[   27.624734]  print_report+0xd1/0x610
[   27.624765]  ? __virt_addr_valid+0x1db/0x2d0
[   27.624794]  ? kasan_atomics_helper+0x1c18/0x5450
[   27.624822]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.624857]  ? kasan_atomics_helper+0x1c18/0x5450
[   27.624887]  kasan_report+0x141/0x180
[   27.624917]  ? kasan_atomics_helper+0x1c18/0x5450
[   27.624951]  kasan_check_range+0x10c/0x1c0
[   27.624982]  __kasan_check_write+0x18/0x20
[   27.625012]  kasan_atomics_helper+0x1c18/0x5450
[   27.625043]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.625072]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.625104]  ? kasan_atomics+0x152/0x310
[   27.625137]  kasan_atomics+0x1dc/0x310
[   27.625167]  ? __pfx_kasan_atomics+0x10/0x10
[   27.625198]  ? __pfx_read_tsc+0x10/0x10
[   27.625226]  ? ktime_get_ts64+0x86/0x230
[   27.625258]  kunit_try_run_case+0x1a5/0x480
[   27.625288]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.625317]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.625346]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.625375]  ? __kthread_parkme+0x82/0x180
[   27.625402]  ? preempt_count_sub+0x50/0x80
[   27.625434]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.625463]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.625496]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.625542]  kthread+0x337/0x6f0
[   27.625569]  ? trace_preempt_on+0x20/0xc0
[   27.625598]  ? __pfx_kthread+0x10/0x10
[   27.625634]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.625666]  ? calculate_sigpending+0x7b/0xa0
[   27.625697]  ? __pfx_kthread+0x10/0x10
[   27.625725]  ret_from_fork+0x116/0x1d0
[   27.625751]  ? __pfx_kthread+0x10/0x10
[   27.625779]  ret_from_fork_asm+0x1a/0x30
[   27.625821]  </TASK>
[   27.625834] 
[   27.635643] Allocated by task 313:
[   27.635824]  kasan_save_stack+0x45/0x70
[   27.636029]  kasan_save_track+0x18/0x40
[   27.636230]  kasan_save_alloc_info+0x3b/0x50
[   27.636477]  __kasan_kmalloc+0xb7/0xc0
[   27.636672]  __kmalloc_cache_noprof+0x189/0x420
[   27.636833]  kasan_atomics+0x95/0x310
[   27.636971]  kunit_try_run_case+0x1a5/0x480
[   27.637177]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.637460]  kthread+0x337/0x6f0
[   27.637756]  ret_from_fork+0x116/0x1d0
[   27.637911]  ret_from_fork_asm+0x1a/0x30
[   27.638057] 
[   27.638126] The buggy address belongs to the object at ffff888105926b00
[   27.638126]  which belongs to the cache kmalloc-64 of size 64
[   27.638681] The buggy address is located 0 bytes to the right of
[   27.638681]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.639158] 
[   27.639253] The buggy address belongs to the physical page:
[   27.639479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.639964] flags: 0x200000000000000(node=0|zone=2)
[   27.640127] page_type: f5(slab)
[   27.640290] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.640663] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.640942] page dumped because: kasan: bad access detected
[   27.641114] 
[   27.641208] Memory state around the buggy address:
[   27.641428]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.641743]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.641960] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.642459]                                      ^
[   27.642766]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.642989]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.643233] ==================================================================
[   27.802097] ==================================================================
[   27.802431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   27.802739] Read of size 8 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.802968] 
[   27.803076] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.803128] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.803144] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.803169] Call Trace:
[   27.803184]  <TASK>
[   27.803202]  dump_stack_lvl+0x73/0xb0
[   27.803236]  print_report+0xd1/0x610
[   27.803265]  ? __virt_addr_valid+0x1db/0x2d0
[   27.803296]  ? kasan_atomics_helper+0x4f98/0x5450
[   27.803324]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.803357]  ? kasan_atomics_helper+0x4f98/0x5450
[   27.803387]  kasan_report+0x141/0x180
[   27.803417]  ? kasan_atomics_helper+0x4f98/0x5450
[   27.803453]  __asan_report_load8_noabort+0x18/0x20
[   27.803484]  kasan_atomics_helper+0x4f98/0x5450
[   27.803515]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.803556]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.803589]  ? kasan_atomics+0x152/0x310
[   27.803644]  kasan_atomics+0x1dc/0x310
[   27.803675]  ? __pfx_kasan_atomics+0x10/0x10
[   27.803708]  ? __pfx_read_tsc+0x10/0x10
[   27.803736]  ? ktime_get_ts64+0x86/0x230
[   27.803769]  kunit_try_run_case+0x1a5/0x480
[   27.803800]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.803830]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.803861]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.803891]  ? __kthread_parkme+0x82/0x180
[   27.803918]  ? preempt_count_sub+0x50/0x80
[   27.803950]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.803982]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.804016]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.804049]  kthread+0x337/0x6f0
[   27.804075]  ? trace_preempt_on+0x20/0xc0
[   27.804104]  ? __pfx_kthread+0x10/0x10
[   27.804132]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.804164]  ? calculate_sigpending+0x7b/0xa0
[   27.804195]  ? __pfx_kthread+0x10/0x10
[   27.804225]  ret_from_fork+0x116/0x1d0
[   27.804251]  ? __pfx_kthread+0x10/0x10
[   27.804279]  ret_from_fork_asm+0x1a/0x30
[   27.804320]  </TASK>
[   27.804334] 
[   27.811385] Allocated by task 313:
[   27.811569]  kasan_save_stack+0x45/0x70
[   27.811789]  kasan_save_track+0x18/0x40
[   27.811977]  kasan_save_alloc_info+0x3b/0x50
[   27.812128]  __kasan_kmalloc+0xb7/0xc0
[   27.812301]  __kmalloc_cache_noprof+0x189/0x420
[   27.812540]  kasan_atomics+0x95/0x310
[   27.812764]  kunit_try_run_case+0x1a5/0x480
[   27.812975]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.813186]  kthread+0x337/0x6f0
[   27.813336]  ret_from_fork+0x116/0x1d0
[   27.813539]  ret_from_fork_asm+0x1a/0x30
[   27.813728] 
[   27.813800] The buggy address belongs to the object at ffff888105926b00
[   27.813800]  which belongs to the cache kmalloc-64 of size 64
[   27.814153] The buggy address is located 0 bytes to the right of
[   27.814153]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.814537] 
[   27.814626] The buggy address belongs to the physical page:
[   27.814833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.815191] flags: 0x200000000000000(node=0|zone=2)
[   27.815425] page_type: f5(slab)
[   27.815617] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.815958] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.816290] page dumped because: kasan: bad access detected
[   27.816550] 
[   27.816669] Memory state around the buggy address:
[   27.816890]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.817201]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.817417] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.817663]                                      ^
[   27.817821]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.818122]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.818447] ==================================================================
[   27.661315] ==================================================================
[   27.661697] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   27.661939] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.662165] 
[   27.662247] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.662298] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.662314] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.662339] Call Trace:
[   27.662355]  <TASK>
[   27.662374]  dump_stack_lvl+0x73/0xb0
[   27.662408]  print_report+0xd1/0x610
[   27.662438]  ? __virt_addr_valid+0x1db/0x2d0
[   27.662467]  ? kasan_atomics_helper+0x1ce1/0x5450
[   27.662503]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.662547]  ? kasan_atomics_helper+0x1ce1/0x5450
[   27.662577]  kasan_report+0x141/0x180
[   27.662607]  ? kasan_atomics_helper+0x1ce1/0x5450
[   27.662641]  kasan_check_range+0x10c/0x1c0
[   27.662672]  __kasan_check_write+0x18/0x20
[   27.662702]  kasan_atomics_helper+0x1ce1/0x5450
[   27.662732]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.662761]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.662793]  ? kasan_atomics+0x152/0x310
[   27.662828]  kasan_atomics+0x1dc/0x310
[   27.662857]  ? __pfx_kasan_atomics+0x10/0x10
[   27.662889]  ? __pfx_read_tsc+0x10/0x10
[   27.662916]  ? ktime_get_ts64+0x86/0x230
[   27.662949]  kunit_try_run_case+0x1a5/0x480
[   27.662980]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.663008]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.663038]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.663067]  ? __kthread_parkme+0x82/0x180
[   27.663094]  ? preempt_count_sub+0x50/0x80
[   27.663125]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.663156]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.663189]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.663223]  kthread+0x337/0x6f0
[   27.663248]  ? trace_preempt_on+0x20/0xc0
[   27.663279]  ? __pfx_kthread+0x10/0x10
[   27.663307]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.663337]  ? calculate_sigpending+0x7b/0xa0
[   27.663369]  ? __pfx_kthread+0x10/0x10
[   27.663398]  ret_from_fork+0x116/0x1d0
[   27.663424]  ? __pfx_kthread+0x10/0x10
[   27.663451]  ret_from_fork_asm+0x1a/0x30
[   27.663493]  </TASK>
[   27.663506] 
[   27.671382] Allocated by task 313:
[   27.671571]  kasan_save_stack+0x45/0x70
[   27.671783]  kasan_save_track+0x18/0x40
[   27.671980]  kasan_save_alloc_info+0x3b/0x50
[   27.672206]  __kasan_kmalloc+0xb7/0xc0
[   27.672396]  __kmalloc_cache_noprof+0x189/0x420
[   27.672594]  kasan_atomics+0x95/0x310
[   27.672788]  kunit_try_run_case+0x1a5/0x480
[   27.672971]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.673191]  kthread+0x337/0x6f0
[   27.673345]  ret_from_fork+0x116/0x1d0
[   27.673514]  ret_from_fork_asm+0x1a/0x30
[   27.673726] 
[   27.673797] The buggy address belongs to the object at ffff888105926b00
[   27.673797]  which belongs to the cache kmalloc-64 of size 64
[   27.674147] The buggy address is located 0 bytes to the right of
[   27.674147]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.674517] 
[   27.674617] The buggy address belongs to the physical page:
[   27.674874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.675243] flags: 0x200000000000000(node=0|zone=2)
[   27.675477] page_type: f5(slab)
[   27.675651] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.675991] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.676301] page dumped because: kasan: bad access detected
[   27.676483] 
[   27.676560] Memory state around the buggy address:
[   27.676716]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.677248]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.677582] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.678184]                                      ^
[   27.678342]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.678572]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.678904] ==================================================================
[   27.115319] ==================================================================
[   27.115687] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   27.116269] Read of size 4 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.116525] 
[   27.116620] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.116692] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.116722] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.116760] Call Trace:
[   27.116779]  <TASK>
[   27.116810]  dump_stack_lvl+0x73/0xb0
[   27.116859]  print_report+0xd1/0x610
[   27.116889]  ? __virt_addr_valid+0x1db/0x2d0
[   27.116921]  ? kasan_atomics_helper+0x4a36/0x5450
[   27.116950]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.116984]  ? kasan_atomics_helper+0x4a36/0x5450
[   27.117013]  kasan_report+0x141/0x180
[   27.117044]  ? kasan_atomics_helper+0x4a36/0x5450
[   27.117080]  __asan_report_load4_noabort+0x18/0x20
[   27.117111]  kasan_atomics_helper+0x4a36/0x5450
[   27.117141]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.117171]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.117203]  ? kasan_atomics+0x152/0x310
[   27.117237]  kasan_atomics+0x1dc/0x310
[   27.117267]  ? __pfx_kasan_atomics+0x10/0x10
[   27.117298]  ? __pfx_read_tsc+0x10/0x10
[   27.117326]  ? ktime_get_ts64+0x86/0x230
[   27.117359]  kunit_try_run_case+0x1a5/0x480
[   27.117388]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.117416]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.117447]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.117477]  ? __kthread_parkme+0x82/0x180
[   27.117505]  ? preempt_count_sub+0x50/0x80
[   27.117546]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.117577]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.117610]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.117678]  kthread+0x337/0x6f0
[   27.117705]  ? trace_preempt_on+0x20/0xc0
[   27.117737]  ? __pfx_kthread+0x10/0x10
[   27.117765]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.117797]  ? calculate_sigpending+0x7b/0xa0
[   27.117829]  ? __pfx_kthread+0x10/0x10
[   27.117859]  ret_from_fork+0x116/0x1d0
[   27.117885]  ? __pfx_kthread+0x10/0x10
[   27.117913]  ret_from_fork_asm+0x1a/0x30
[   27.117956]  </TASK>
[   27.117970] 
[   27.125729] Allocated by task 313:
[   27.125938]  kasan_save_stack+0x45/0x70
[   27.126082]  kasan_save_track+0x18/0x40
[   27.126221]  kasan_save_alloc_info+0x3b/0x50
[   27.126482]  __kasan_kmalloc+0xb7/0xc0
[   27.126830]  __kmalloc_cache_noprof+0x189/0x420
[   27.127094]  kasan_atomics+0x95/0x310
[   27.127293]  kunit_try_run_case+0x1a5/0x480
[   27.127521]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.127828]  kthread+0x337/0x6f0
[   27.128003]  ret_from_fork+0x116/0x1d0
[   27.128190]  ret_from_fork_asm+0x1a/0x30
[   27.128395] 
[   27.128480] The buggy address belongs to the object at ffff888105926b00
[   27.128480]  which belongs to the cache kmalloc-64 of size 64
[   27.129029] The buggy address is located 0 bytes to the right of
[   27.129029]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.129566] 
[   27.129690] The buggy address belongs to the physical page:
[   27.129987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.130323] flags: 0x200000000000000(node=0|zone=2)
[   27.130548] page_type: f5(slab)
[   27.130837] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.131097] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.131449] page dumped because: kasan: bad access detected
[   27.131751] 
[   27.131847] Memory state around the buggy address:
[   27.132072]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.132415]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.132732] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.133060]                                      ^
[   27.133294]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.133632]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.133950] ==================================================================
[   27.284678] ==================================================================
[   27.285014] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   27.285350] Read of size 4 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.285815] 
[   27.285905] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.285957] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.285972] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.285996] Call Trace:
[   27.286011]  <TASK>
[   27.286027]  dump_stack_lvl+0x73/0xb0
[   27.286063]  print_report+0xd1/0x610
[   27.286092]  ? __virt_addr_valid+0x1db/0x2d0
[   27.286122]  ? kasan_atomics_helper+0x49ce/0x5450
[   27.286151]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.286185]  ? kasan_atomics_helper+0x49ce/0x5450
[   27.286213]  kasan_report+0x141/0x180
[   27.286243]  ? kasan_atomics_helper+0x49ce/0x5450
[   27.286278]  __asan_report_load4_noabort+0x18/0x20
[   27.286310]  kasan_atomics_helper+0x49ce/0x5450
[   27.286339]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.286368]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.286401]  ? kasan_atomics+0x152/0x310
[   27.286436]  kasan_atomics+0x1dc/0x310
[   27.286465]  ? __pfx_kasan_atomics+0x10/0x10
[   27.286501]  ? __pfx_read_tsc+0x10/0x10
[   27.286541]  ? ktime_get_ts64+0x86/0x230
[   27.286574]  kunit_try_run_case+0x1a5/0x480
[   27.286604]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.286633]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.286661]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.286690]  ? __kthread_parkme+0x82/0x180
[   27.286717]  ? preempt_count_sub+0x50/0x80
[   27.286749]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.286778]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.286813]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.286846]  kthread+0x337/0x6f0
[   27.286873]  ? trace_preempt_on+0x20/0xc0
[   27.286903]  ? __pfx_kthread+0x10/0x10
[   27.286931]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.286962]  ? calculate_sigpending+0x7b/0xa0
[   27.286993]  ? __pfx_kthread+0x10/0x10
[   27.287022]  ret_from_fork+0x116/0x1d0
[   27.287048]  ? __pfx_kthread+0x10/0x10
[   27.287075]  ret_from_fork_asm+0x1a/0x30
[   27.287118]  </TASK>
[   27.287130] 
[   27.300153] Allocated by task 313:
[   27.300361]  kasan_save_stack+0x45/0x70
[   27.300514]  kasan_save_track+0x18/0x40
[   27.300675]  kasan_save_alloc_info+0x3b/0x50
[   27.300829]  __kasan_kmalloc+0xb7/0xc0
[   27.301221]  __kmalloc_cache_noprof+0x189/0x420
[   27.301668]  kasan_atomics+0x95/0x310
[   27.302132]  kunit_try_run_case+0x1a5/0x480
[   27.302541]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.303087]  kthread+0x337/0x6f0
[   27.303416]  ret_from_fork+0x116/0x1d0
[   27.303853]  ret_from_fork_asm+0x1a/0x30
[   27.304211] 
[   27.304314] The buggy address belongs to the object at ffff888105926b00
[   27.304314]  which belongs to the cache kmalloc-64 of size 64
[   27.304915] The buggy address is located 0 bytes to the right of
[   27.304915]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.305287] 
[   27.305359] The buggy address belongs to the physical page:
[   27.305546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.306298] flags: 0x200000000000000(node=0|zone=2)
[   27.306808] page_type: f5(slab)
[   27.307120] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.307800] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.308570] page dumped because: kasan: bad access detected
[   27.308979] 
[   27.309052] Memory state around the buggy address:
[   27.309210]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.309429]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.309677] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.309974]                                      ^
[   27.310222]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.310507]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.311019] ==================================================================
[   27.051904] ==================================================================
[   27.052543] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   27.052915] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.053246] 
[   27.053341] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.053395] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.053411] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.053436] Call Trace:
[   27.053452]  <TASK>
[   27.053470]  dump_stack_lvl+0x73/0xb0
[   27.053505]  print_report+0xd1/0x610
[   27.053547]  ? __virt_addr_valid+0x1db/0x2d0
[   27.053577]  ? kasan_atomics_helper+0xe78/0x5450
[   27.053605]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.053961]  ? kasan_atomics_helper+0xe78/0x5450
[   27.053995]  kasan_report+0x141/0x180
[   27.054027]  ? kasan_atomics_helper+0xe78/0x5450
[   27.054062]  kasan_check_range+0x10c/0x1c0
[   27.054093]  __kasan_check_write+0x18/0x20
[   27.054123]  kasan_atomics_helper+0xe78/0x5450
[   27.054153]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.054183]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.054215]  ? kasan_atomics+0x152/0x310
[   27.054250]  kasan_atomics+0x1dc/0x310
[   27.054280]  ? __pfx_kasan_atomics+0x10/0x10
[   27.054312]  ? __pfx_read_tsc+0x10/0x10
[   27.054340]  ? ktime_get_ts64+0x86/0x230
[   27.054372]  kunit_try_run_case+0x1a5/0x480
[   27.054403]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.054432]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.054463]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.054505]  ? __kthread_parkme+0x82/0x180
[   27.054544]  ? preempt_count_sub+0x50/0x80
[   27.054577]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.054607]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.054650]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.054685]  kthread+0x337/0x6f0
[   27.054711]  ? trace_preempt_on+0x20/0xc0
[   27.054741]  ? __pfx_kthread+0x10/0x10
[   27.054770]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.054802]  ? calculate_sigpending+0x7b/0xa0
[   27.054833]  ? __pfx_kthread+0x10/0x10
[   27.054862]  ret_from_fork+0x116/0x1d0
[   27.054889]  ? __pfx_kthread+0x10/0x10
[   27.054916]  ret_from_fork_asm+0x1a/0x30
[   27.054958]  </TASK>
[   27.054972] 
[   27.065241] Allocated by task 313:
[   27.065430]  kasan_save_stack+0x45/0x70
[   27.065800]  kasan_save_track+0x18/0x40
[   27.065983]  kasan_save_alloc_info+0x3b/0x50
[   27.066319]  __kasan_kmalloc+0xb7/0xc0
[   27.066618]  __kmalloc_cache_noprof+0x189/0x420
[   27.066884]  kasan_atomics+0x95/0x310
[   27.067177]  kunit_try_run_case+0x1a5/0x480
[   27.067400]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.067849]  kthread+0x337/0x6f0
[   27.068096]  ret_from_fork+0x116/0x1d0
[   27.068303]  ret_from_fork_asm+0x1a/0x30
[   27.068626] 
[   27.068768] The buggy address belongs to the object at ffff888105926b00
[   27.068768]  which belongs to the cache kmalloc-64 of size 64
[   27.069438] The buggy address is located 0 bytes to the right of
[   27.069438]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.070169] 
[   27.070278] The buggy address belongs to the physical page:
[   27.070650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.071029] flags: 0x200000000000000(node=0|zone=2)
[   27.071254] page_type: f5(slab)
[   27.071411] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.071964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.072359] page dumped because: kasan: bad access detected
[   27.072703] 
[   27.072810] Memory state around the buggy address:
[   27.073147]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.073490]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.074002] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.074396]                                      ^
[   27.074716]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.075123]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.075430] ==================================================================
[   27.836219] ==================================================================
[   27.836461] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   27.836856] Read of size 8 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.837134] 
[   27.837221] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.837274] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.837289] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.837315] Call Trace:
[   27.837331]  <TASK>
[   27.837349]  dump_stack_lvl+0x73/0xb0
[   27.837385]  print_report+0xd1/0x610
[   27.837415]  ? __virt_addr_valid+0x1db/0x2d0
[   27.837446]  ? kasan_atomics_helper+0x4fb2/0x5450
[   27.837474]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.837507]  ? kasan_atomics_helper+0x4fb2/0x5450
[   27.837546]  kasan_report+0x141/0x180
[   27.837577]  ? kasan_atomics_helper+0x4fb2/0x5450
[   27.837631]  __asan_report_load8_noabort+0x18/0x20
[   27.837663]  kasan_atomics_helper+0x4fb2/0x5450
[   27.837694]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.837723]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.837755]  ? kasan_atomics+0x152/0x310
[   27.837789]  kasan_atomics+0x1dc/0x310
[   27.837820]  ? __pfx_kasan_atomics+0x10/0x10
[   27.837852]  ? __pfx_read_tsc+0x10/0x10
[   27.837879]  ? ktime_get_ts64+0x86/0x230
[   27.837911]  kunit_try_run_case+0x1a5/0x480
[   27.837943]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.837972]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.838001]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.838032]  ? __kthread_parkme+0x82/0x180
[   27.838059]  ? preempt_count_sub+0x50/0x80
[   27.838091]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.838121]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.838155]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.838188]  kthread+0x337/0x6f0
[   27.838215]  ? trace_preempt_on+0x20/0xc0
[   27.838246]  ? __pfx_kthread+0x10/0x10
[   27.838274]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.838305]  ? calculate_sigpending+0x7b/0xa0
[   27.838336]  ? __pfx_kthread+0x10/0x10
[   27.838366]  ret_from_fork+0x116/0x1d0
[   27.838391]  ? __pfx_kthread+0x10/0x10
[   27.838419]  ret_from_fork_asm+0x1a/0x30
[   27.838461]  </TASK>
[   27.838481] 
[   27.845599] Allocated by task 313:
[   27.845771]  kasan_save_stack+0x45/0x70
[   27.845974]  kasan_save_track+0x18/0x40
[   27.846120]  kasan_save_alloc_info+0x3b/0x50
[   27.846273]  __kasan_kmalloc+0xb7/0xc0
[   27.846408]  __kmalloc_cache_noprof+0x189/0x420
[   27.846580]  kasan_atomics+0x95/0x310
[   27.846735]  kunit_try_run_case+0x1a5/0x480
[   27.846885]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.847066]  kthread+0x337/0x6f0
[   27.847231]  ret_from_fork+0x116/0x1d0
[   27.847420]  ret_from_fork_asm+0x1a/0x30
[   27.847654] 
[   27.847746] The buggy address belongs to the object at ffff888105926b00
[   27.847746]  which belongs to the cache kmalloc-64 of size 64
[   27.848272] The buggy address is located 0 bytes to the right of
[   27.848272]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.848854] 
[   27.848952] The buggy address belongs to the physical page:
[   27.849202] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.849489] flags: 0x200000000000000(node=0|zone=2)
[   27.849679] page_type: f5(slab)
[   27.849803] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.850039] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.850346] page dumped because: kasan: bad access detected
[   27.850620] 
[   27.850718] Memory state around the buggy address:
[   27.850942]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.851263]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.851587] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.851867]                                      ^
[   27.852062]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.852329]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.852668] ==================================================================
[   27.784981] ==================================================================
[   27.785442] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   27.785804] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.786180] 
[   27.786266] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.786318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.786334] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.786359] Call Trace:
[   27.786375]  <TASK>
[   27.786390]  dump_stack_lvl+0x73/0xb0
[   27.786424]  print_report+0xd1/0x610
[   27.786453]  ? __virt_addr_valid+0x1db/0x2d0
[   27.786487]  ? kasan_atomics_helper+0x2006/0x5450
[   27.786516]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.786559]  ? kasan_atomics_helper+0x2006/0x5450
[   27.786588]  kasan_report+0x141/0x180
[   27.786638]  ? kasan_atomics_helper+0x2006/0x5450
[   27.786673]  kasan_check_range+0x10c/0x1c0
[   27.786705]  __kasan_check_write+0x18/0x20
[   27.786735]  kasan_atomics_helper+0x2006/0x5450
[   27.786766]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.786796]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.786829]  ? kasan_atomics+0x152/0x310
[   27.786864]  kasan_atomics+0x1dc/0x310
[   27.786896]  ? __pfx_kasan_atomics+0x10/0x10
[   27.786929]  ? __pfx_read_tsc+0x10/0x10
[   27.786957]  ? ktime_get_ts64+0x86/0x230
[   27.786990]  kunit_try_run_case+0x1a5/0x480
[   27.787021]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.787050]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.787080]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.787112]  ? __kthread_parkme+0x82/0x180
[   27.787138]  ? preempt_count_sub+0x50/0x80
[   27.787169]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.787199]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.787232]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.787266]  kthread+0x337/0x6f0
[   27.787292]  ? trace_preempt_on+0x20/0xc0
[   27.787321]  ? __pfx_kthread+0x10/0x10
[   27.787350]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.787380]  ? calculate_sigpending+0x7b/0xa0
[   27.787412]  ? __pfx_kthread+0x10/0x10
[   27.787441]  ret_from_fork+0x116/0x1d0
[   27.787468]  ? __pfx_kthread+0x10/0x10
[   27.787495]  ret_from_fork_asm+0x1a/0x30
[   27.787544]  </TASK>
[   27.787558] 
[   27.794526] Allocated by task 313:
[   27.794713]  kasan_save_stack+0x45/0x70
[   27.794914]  kasan_save_track+0x18/0x40
[   27.795081]  kasan_save_alloc_info+0x3b/0x50
[   27.795263]  __kasan_kmalloc+0xb7/0xc0
[   27.795460]  __kmalloc_cache_noprof+0x189/0x420
[   27.795690]  kasan_atomics+0x95/0x310
[   27.795861]  kunit_try_run_case+0x1a5/0x480
[   27.796068]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.796282]  kthread+0x337/0x6f0
[   27.796456]  ret_from_fork+0x116/0x1d0
[   27.796620]  ret_from_fork_asm+0x1a/0x30
[   27.796789] 
[   27.796881] The buggy address belongs to the object at ffff888105926b00
[   27.796881]  which belongs to the cache kmalloc-64 of size 64
[   27.797332] The buggy address is located 0 bytes to the right of
[   27.797332]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.797882] 
[   27.797980] The buggy address belongs to the physical page:
[   27.798215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.798494] flags: 0x200000000000000(node=0|zone=2)
[   27.798760] page_type: f5(slab)
[   27.798903] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.799221] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.799499] page dumped because: kasan: bad access detected
[   27.799702] 
[   27.799772] Memory state around the buggy address:
[   27.799928]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.800144]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.800429] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.800772]                                      ^
[   27.800997]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.801312]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.801665] ==================================================================
[   26.730780] ==================================================================
[   26.731131] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   26.731579] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313
[   26.732028] 
[   26.732155] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.732221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.732239] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.732264] Call Trace:
[   26.732281]  <TASK>
[   26.732299]  dump_stack_lvl+0x73/0xb0
[   26.732344]  print_report+0xd1/0x610
[   26.732374]  ? __virt_addr_valid+0x1db/0x2d0
[   26.732417]  ? kasan_atomics_helper+0x565/0x5450
[   26.732444]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.732477]  ? kasan_atomics_helper+0x565/0x5450
[   26.732506]  kasan_report+0x141/0x180
[   26.732546]  ? kasan_atomics_helper+0x565/0x5450
[   26.732582]  kasan_check_range+0x10c/0x1c0
[   26.732613]  __kasan_check_write+0x18/0x20
[   26.732643]  kasan_atomics_helper+0x565/0x5450
[   26.732672]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.732702]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.732735]  ? kasan_atomics+0x152/0x310
[   26.732778]  kasan_atomics+0x1dc/0x310
[   26.732807]  ? __pfx_kasan_atomics+0x10/0x10
[   26.732849]  ? __pfx_read_tsc+0x10/0x10
[   26.732877]  ? ktime_get_ts64+0x86/0x230
[   26.732909]  kunit_try_run_case+0x1a5/0x480
[   26.732940]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.732969]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.732997]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.733027]  ? __kthread_parkme+0x82/0x180
[   26.733054]  ? preempt_count_sub+0x50/0x80
[   26.733085]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.733136]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.733170]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.733204]  kthread+0x337/0x6f0
[   26.733230]  ? trace_preempt_on+0x20/0xc0
[   26.733260]  ? __pfx_kthread+0x10/0x10
[   26.733345]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.733390]  ? calculate_sigpending+0x7b/0xa0
[   26.733431]  ? __pfx_kthread+0x10/0x10
[   26.733460]  ret_from_fork+0x116/0x1d0
[   26.733497]  ? __pfx_kthread+0x10/0x10
[   26.733534]  ret_from_fork_asm+0x1a/0x30
[   26.733577]  </TASK>
[   26.733630] 
[   26.741697] Allocated by task 313:
[   26.741886]  kasan_save_stack+0x45/0x70
[   26.742088]  kasan_save_track+0x18/0x40
[   26.742283]  kasan_save_alloc_info+0x3b/0x50
[   26.742493]  __kasan_kmalloc+0xb7/0xc0
[   26.742713]  __kmalloc_cache_noprof+0x189/0x420
[   26.742958]  kasan_atomics+0x95/0x310
[   26.743097]  kunit_try_run_case+0x1a5/0x480
[   26.743335]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.743626]  kthread+0x337/0x6f0
[   26.743801]  ret_from_fork+0x116/0x1d0
[   26.743941]  ret_from_fork_asm+0x1a/0x30
[   26.744085] 
[   26.744156] The buggy address belongs to the object at ffff888105926b00
[   26.744156]  which belongs to the cache kmalloc-64 of size 64
[   26.744610] The buggy address is located 0 bytes to the right of
[   26.744610]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   26.745290] 
[   26.745366] The buggy address belongs to the physical page:
[   26.745549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   26.745789] flags: 0x200000000000000(node=0|zone=2)
[   26.746169] page_type: f5(slab)
[   26.746578] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.747061] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.747455] page dumped because: kasan: bad access detected
[   26.747816] 
[   26.747891] Memory state around the buggy address:
[   26.748053]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.748392]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.748949] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.749329]                                      ^
[   26.749566]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.750029]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.750336] ==================================================================
[   27.096779] ==================================================================
[   27.097077] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   27.097410] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.098194] 
[   27.098321] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.098376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.098408] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.098434] Call Trace:
[   27.098454]  <TASK>
[   27.098479]  dump_stack_lvl+0x73/0xb0
[   27.098516]  print_report+0xd1/0x610
[   27.098558]  ? __virt_addr_valid+0x1db/0x2d0
[   27.098589]  ? kasan_atomics_helper+0xfa9/0x5450
[   27.098617]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.098651]  ? kasan_atomics_helper+0xfa9/0x5450
[   27.098680]  kasan_report+0x141/0x180
[   27.098711]  ? kasan_atomics_helper+0xfa9/0x5450
[   27.098746]  kasan_check_range+0x10c/0x1c0
[   27.098777]  __kasan_check_write+0x18/0x20
[   27.098807]  kasan_atomics_helper+0xfa9/0x5450
[   27.098837]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.098868]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.098900]  ? kasan_atomics+0x152/0x310
[   27.098934]  kasan_atomics+0x1dc/0x310
[   27.098964]  ? __pfx_kasan_atomics+0x10/0x10
[   27.098995]  ? __pfx_read_tsc+0x10/0x10
[   27.099024]  ? ktime_get_ts64+0x86/0x230
[   27.099056]  kunit_try_run_case+0x1a5/0x480
[   27.099087]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.099116]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.099146]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.099176]  ? __kthread_parkme+0x82/0x180
[   27.099203]  ? preempt_count_sub+0x50/0x80
[   27.099236]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.099267]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.099301]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.099334]  kthread+0x337/0x6f0
[   27.099361]  ? trace_preempt_on+0x20/0xc0
[   27.099391]  ? __pfx_kthread+0x10/0x10
[   27.099420]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.099451]  ? calculate_sigpending+0x7b/0xa0
[   27.099482]  ? __pfx_kthread+0x10/0x10
[   27.099511]  ret_from_fork+0x116/0x1d0
[   27.099546]  ? __pfx_kthread+0x10/0x10
[   27.099574]  ret_from_fork_asm+0x1a/0x30
[   27.099616]  </TASK>
[   27.099631] 
[   27.107057] Allocated by task 313:
[   27.107254]  kasan_save_stack+0x45/0x70
[   27.107478]  kasan_save_track+0x18/0x40
[   27.107766]  kasan_save_alloc_info+0x3b/0x50
[   27.107995]  __kasan_kmalloc+0xb7/0xc0
[   27.108174]  __kmalloc_cache_noprof+0x189/0x420
[   27.108346]  kasan_atomics+0x95/0x310
[   27.108479]  kunit_try_run_case+0x1a5/0x480
[   27.108753]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.109027]  kthread+0x337/0x6f0
[   27.109196]  ret_from_fork+0x116/0x1d0
[   27.109388]  ret_from_fork_asm+0x1a/0x30
[   27.109626] 
[   27.109700] The buggy address belongs to the object at ffff888105926b00
[   27.109700]  which belongs to the cache kmalloc-64 of size 64
[   27.110065] The buggy address is located 0 bytes to the right of
[   27.110065]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.110467] 
[   27.110591] The buggy address belongs to the physical page:
[   27.110862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.111420] flags: 0x200000000000000(node=0|zone=2)
[   27.111696] page_type: f5(slab)
[   27.111880] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.112200] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.112577] page dumped because: kasan: bad access detected
[   27.112823] 
[   27.112914] Memory state around the buggy address:
[   27.113142]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.113419]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.113701] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.114021]                                      ^
[   27.114261]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.114591]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.114814] ==================================================================
[   27.716682] ==================================================================
[   27.716920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   27.720271] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.720601] 
[   27.722157] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.722218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.722236] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.722262] Call Trace:
[   27.722280]  <TASK>
[   27.722301]  dump_stack_lvl+0x73/0xb0
[   27.722338]  print_report+0xd1/0x610
[   27.722368]  ? __virt_addr_valid+0x1db/0x2d0
[   27.722398]  ? kasan_atomics_helper+0x1eaa/0x5450
[   27.722426]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.722460]  ? kasan_atomics_helper+0x1eaa/0x5450
[   27.722496]  kasan_report+0x141/0x180
[   27.722526]  ? kasan_atomics_helper+0x1eaa/0x5450
[   27.722575]  kasan_check_range+0x10c/0x1c0
[   27.722888]  __kasan_check_write+0x18/0x20
[   27.722936]  kasan_atomics_helper+0x1eaa/0x5450
[   27.722972]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.723003]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.723038]  ? kasan_atomics+0x152/0x310
[   27.723075]  kasan_atomics+0x1dc/0x310
[   27.723107]  ? __pfx_kasan_atomics+0x10/0x10
[   27.723141]  ? __pfx_read_tsc+0x10/0x10
[   27.723168]  ? ktime_get_ts64+0x86/0x230
[   27.723202]  kunit_try_run_case+0x1a5/0x480
[   27.723232]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.723260]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.723291]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.723322]  ? __kthread_parkme+0x82/0x180
[   27.723350]  ? preempt_count_sub+0x50/0x80
[   27.723383]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.723415]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.723450]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.723483]  kthread+0x337/0x6f0
[   27.723509]  ? trace_preempt_on+0x20/0xc0
[   27.723554]  ? __pfx_kthread+0x10/0x10
[   27.723582]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.723620]  ? calculate_sigpending+0x7b/0xa0
[   27.723651]  ? __pfx_kthread+0x10/0x10
[   27.723680]  ret_from_fork+0x116/0x1d0
[   27.723706]  ? __pfx_kthread+0x10/0x10
[   27.723734]  ret_from_fork_asm+0x1a/0x30
[   27.723775]  </TASK>
[   27.723789] 
[   27.735822] Allocated by task 313:
[   27.736021]  kasan_save_stack+0x45/0x70
[   27.736328]  kasan_save_track+0x18/0x40
[   27.736555]  kasan_save_alloc_info+0x3b/0x50
[   27.736909]  __kasan_kmalloc+0xb7/0xc0
[   27.737195]  __kmalloc_cache_noprof+0x189/0x420
[   27.737489]  kasan_atomics+0x95/0x310
[   27.737813]  kunit_try_run_case+0x1a5/0x480
[   27.737985]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.738378]  kthread+0x337/0x6f0
[   27.738583]  ret_from_fork+0x116/0x1d0
[   27.738808]  ret_from_fork_asm+0x1a/0x30
[   27.738999] 
[   27.739084] The buggy address belongs to the object at ffff888105926b00
[   27.739084]  which belongs to the cache kmalloc-64 of size 64
[   27.739928] The buggy address is located 0 bytes to the right of
[   27.739928]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.740891] 
[   27.741152] The buggy address belongs to the physical page:
[   27.741574] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.741820] flags: 0x200000000000000(node=0|zone=2)
[   27.741981] page_type: f5(slab)
[   27.742099] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.742324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.742598] page dumped because: kasan: bad access detected
[   27.743065] 
[   27.743176] Memory state around the buggy address:
[   27.743405]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.744017]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.744422] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.744999]                                      ^
[   27.745672]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.746356]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.746599] ==================================================================
[   27.311645] ==================================================================
[   27.312063] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   27.312412] Read of size 8 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.312765] 
[   27.312899] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.312952] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.312967] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.312992] Call Trace:
[   27.313009]  <TASK>
[   27.313036]  dump_stack_lvl+0x73/0xb0
[   27.313071]  print_report+0xd1/0x610
[   27.313112]  ? __virt_addr_valid+0x1db/0x2d0
[   27.313144]  ? kasan_atomics_helper+0x13b5/0x5450
[   27.313172]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.313214]  ? kasan_atomics_helper+0x13b5/0x5450
[   27.313243]  kasan_report+0x141/0x180
[   27.313272]  ? kasan_atomics_helper+0x13b5/0x5450
[   27.313320]  kasan_check_range+0x10c/0x1c0
[   27.313350]  __kasan_check_read+0x15/0x20
[   27.313390]  kasan_atomics_helper+0x13b5/0x5450
[   27.313421]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.313450]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.313493]  ? kasan_atomics+0x152/0x310
[   27.313537]  kasan_atomics+0x1dc/0x310
[   27.313567]  ? __pfx_kasan_atomics+0x10/0x10
[   27.313599]  ? __pfx_read_tsc+0x10/0x10
[   27.313638]  ? ktime_get_ts64+0x86/0x230
[   27.313671]  kunit_try_run_case+0x1a5/0x480
[   27.313701]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.313730]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.313759]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.313788]  ? __kthread_parkme+0x82/0x180
[   27.313815]  ? preempt_count_sub+0x50/0x80
[   27.313847]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.313876]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.313911]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.313945]  kthread+0x337/0x6f0
[   27.313981]  ? trace_preempt_on+0x20/0xc0
[   27.314011]  ? __pfx_kthread+0x10/0x10
[   27.314050]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.314082]  ? calculate_sigpending+0x7b/0xa0
[   27.314113]  ? __pfx_kthread+0x10/0x10
[   27.314142]  ret_from_fork+0x116/0x1d0
[   27.314167]  ? __pfx_kthread+0x10/0x10
[   27.314195]  ret_from_fork_asm+0x1a/0x30
[   27.314238]  </TASK>
[   27.314252] 
[   27.322042] Allocated by task 313:
[   27.322167]  kasan_save_stack+0x45/0x70
[   27.322491]  kasan_save_track+0x18/0x40
[   27.322876]  kasan_save_alloc_info+0x3b/0x50
[   27.323093]  __kasan_kmalloc+0xb7/0xc0
[   27.323282]  __kmalloc_cache_noprof+0x189/0x420
[   27.323479]  kasan_atomics+0x95/0x310
[   27.323648]  kunit_try_run_case+0x1a5/0x480
[   27.323867]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.324147]  kthread+0x337/0x6f0
[   27.324284]  ret_from_fork+0x116/0x1d0
[   27.324422]  ret_from_fork_asm+0x1a/0x30
[   27.324576] 
[   27.324667] The buggy address belongs to the object at ffff888105926b00
[   27.324667]  which belongs to the cache kmalloc-64 of size 64
[   27.325218] The buggy address is located 0 bytes to the right of
[   27.325218]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.326192] 
[   27.326293] The buggy address belongs to the physical page:
[   27.326535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.326780] flags: 0x200000000000000(node=0|zone=2)
[   27.326941] page_type: f5(slab)
[   27.327208] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.327585] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.327929] page dumped because: kasan: bad access detected
[   27.328204] 
[   27.328280] Memory state around the buggy address:
[   27.328435]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.328870]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.329187] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.329458]                                      ^
[   27.329662]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.329985]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.330312] ==================================================================
[   27.175032] ==================================================================
[   27.175466] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   27.175854] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.176186] 
[   27.176302] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.176358] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.176373] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.176398] Call Trace:
[   27.176418]  <TASK>
[   27.176437]  dump_stack_lvl+0x73/0xb0
[   27.176473]  print_report+0xd1/0x610
[   27.176502]  ? __virt_addr_valid+0x1db/0x2d0
[   27.176546]  ? kasan_atomics_helper+0x1148/0x5450
[   27.176575]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.176607]  ? kasan_atomics_helper+0x1148/0x5450
[   27.176648]  kasan_report+0x141/0x180
[   27.176698]  ? kasan_atomics_helper+0x1148/0x5450
[   27.176761]  kasan_check_range+0x10c/0x1c0
[   27.176806]  __kasan_check_write+0x18/0x20
[   27.176862]  kasan_atomics_helper+0x1148/0x5450
[   27.176907]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.176936]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.176967]  ? kasan_atomics+0x152/0x310
[   27.177003]  kasan_atomics+0x1dc/0x310
[   27.177033]  ? __pfx_kasan_atomics+0x10/0x10
[   27.177064]  ? __pfx_read_tsc+0x10/0x10
[   27.177092]  ? ktime_get_ts64+0x86/0x230
[   27.177125]  kunit_try_run_case+0x1a5/0x480
[   27.177155]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.177185]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.177215]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.177245]  ? __kthread_parkme+0x82/0x180
[   27.177273]  ? preempt_count_sub+0x50/0x80
[   27.177305]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.177336]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.177369]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.177405]  kthread+0x337/0x6f0
[   27.177449]  ? trace_preempt_on+0x20/0xc0
[   27.177482]  ? __pfx_kthread+0x10/0x10
[   27.177525]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.177580]  ? calculate_sigpending+0x7b/0xa0
[   27.177626]  ? __pfx_kthread+0x10/0x10
[   27.177656]  ret_from_fork+0x116/0x1d0
[   27.177696]  ? __pfx_kthread+0x10/0x10
[   27.177736]  ret_from_fork_asm+0x1a/0x30
[   27.177779]  </TASK>
[   27.177793] 
[   27.185300] Allocated by task 313:
[   27.185491]  kasan_save_stack+0x45/0x70
[   27.185803]  kasan_save_track+0x18/0x40
[   27.185990]  kasan_save_alloc_info+0x3b/0x50
[   27.186186]  __kasan_kmalloc+0xb7/0xc0
[   27.186365]  __kmalloc_cache_noprof+0x189/0x420
[   27.186606]  kasan_atomics+0x95/0x310
[   27.186787]  kunit_try_run_case+0x1a5/0x480
[   27.186986]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.187242]  kthread+0x337/0x6f0
[   27.187395]  ret_from_fork+0x116/0x1d0
[   27.187608]  ret_from_fork_asm+0x1a/0x30
[   27.187782] 
[   27.187894] The buggy address belongs to the object at ffff888105926b00
[   27.187894]  which belongs to the cache kmalloc-64 of size 64
[   27.188344] The buggy address is located 0 bytes to the right of
[   27.188344]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.188906] 
[   27.189023] The buggy address belongs to the physical page:
[   27.189286] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.189589] flags: 0x200000000000000(node=0|zone=2)
[   27.189812] page_type: f5(slab)
[   27.189989] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.190293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.190639] page dumped because: kasan: bad access detected
[   27.190807] 
[   27.190875] Memory state around the buggy address:
[   27.191060]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.191374]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.191891] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.192103]                                      ^
[   27.192257]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.192576]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.193202] ==================================================================
[   26.810692] ==================================================================
[   26.811043] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   26.811368] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313
[   26.811918] 
[   26.812060] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.812128] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.812144] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.812182] Call Trace:
[   26.812203]  <TASK>
[   26.812223]  dump_stack_lvl+0x73/0xb0
[   26.812271]  print_report+0xd1/0x610
[   26.812301]  ? __virt_addr_valid+0x1db/0x2d0
[   26.812344]  ? kasan_atomics_helper+0x7c7/0x5450
[   26.812372]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.812413]  ? kasan_atomics_helper+0x7c7/0x5450
[   26.812442]  kasan_report+0x141/0x180
[   26.812471]  ? kasan_atomics_helper+0x7c7/0x5450
[   26.812516]  kasan_check_range+0x10c/0x1c0
[   26.812557]  __kasan_check_write+0x18/0x20
[   26.812641]  kasan_atomics_helper+0x7c7/0x5450
[   26.812671]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.812851]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.812884]  ? kasan_atomics+0x152/0x310
[   26.813013]  kasan_atomics+0x1dc/0x310
[   26.813044]  ? __pfx_kasan_atomics+0x10/0x10
[   26.813167]  ? __pfx_read_tsc+0x10/0x10
[   26.813194]  ? ktime_get_ts64+0x86/0x230
[   26.813228]  kunit_try_run_case+0x1a5/0x480
[   26.813260]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.813289]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.813320]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.813350]  ? __kthread_parkme+0x82/0x180
[   26.813377]  ? preempt_count_sub+0x50/0x80
[   26.813410]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.813441]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.813475]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.813508]  kthread+0x337/0x6f0
[   26.813546]  ? trace_preempt_on+0x20/0xc0
[   26.813578]  ? __pfx_kthread+0x10/0x10
[   26.813605]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.814021]  ? calculate_sigpending+0x7b/0xa0
[   26.814070]  ? __pfx_kthread+0x10/0x10
[   26.814099]  ret_from_fork+0x116/0x1d0
[   26.814126]  ? __pfx_kthread+0x10/0x10
[   26.814154]  ret_from_fork_asm+0x1a/0x30
[   26.814197]  </TASK>
[   26.814211] 
[   26.823037] Allocated by task 313:
[   26.823164]  kasan_save_stack+0x45/0x70
[   26.823376]  kasan_save_track+0x18/0x40
[   26.823597]  kasan_save_alloc_info+0x3b/0x50
[   26.823816]  __kasan_kmalloc+0xb7/0xc0
[   26.824009]  __kmalloc_cache_noprof+0x189/0x420
[   26.824193]  kasan_atomics+0x95/0x310
[   26.824367]  kunit_try_run_case+0x1a5/0x480
[   26.824674]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.825000]  kthread+0x337/0x6f0
[   26.825159]  ret_from_fork+0x116/0x1d0
[   26.825351]  ret_from_fork_asm+0x1a/0x30
[   26.825562] 
[   26.825689] The buggy address belongs to the object at ffff888105926b00
[   26.825689]  which belongs to the cache kmalloc-64 of size 64
[   26.826049] The buggy address is located 0 bytes to the right of
[   26.826049]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   26.826564] 
[   26.826730] The buggy address belongs to the physical page:
[   26.826993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   26.827359] flags: 0x200000000000000(node=0|zone=2)
[   26.827585] page_type: f5(slab)
[   26.827930] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.828291] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.828540] page dumped because: kasan: bad access detected
[   26.828718] 
[   26.828859] Memory state around the buggy address:
[   26.829253]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.829588]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.829991] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.830318]                                      ^
[   26.830538]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.830821]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.831271] ==================================================================
[   27.371169] ==================================================================
[   27.371661] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   27.372057] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.372771] 
[   27.373004] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.373076] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.373093] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.373118] Call Trace:
[   27.373163]  <TASK>
[   27.373182]  dump_stack_lvl+0x73/0xb0
[   27.373219]  print_report+0xd1/0x610
[   27.373250]  ? __virt_addr_valid+0x1db/0x2d0
[   27.373280]  ? kasan_atomics_helper+0x50d4/0x5450
[   27.373309]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.373343]  ? kasan_atomics_helper+0x50d4/0x5450
[   27.373372]  kasan_report+0x141/0x180
[   27.373402]  ? kasan_atomics_helper+0x50d4/0x5450
[   27.373437]  __asan_report_store8_noabort+0x1b/0x30
[   27.373469]  kasan_atomics_helper+0x50d4/0x5450
[   27.373500]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.373540]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.373573]  ? kasan_atomics+0x152/0x310
[   27.373608]  kasan_atomics+0x1dc/0x310
[   27.373646]  ? __pfx_kasan_atomics+0x10/0x10
[   27.373679]  ? __pfx_read_tsc+0x10/0x10
[   27.373707]  ? ktime_get_ts64+0x86/0x230
[   27.373740]  kunit_try_run_case+0x1a5/0x480
[   27.373770]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.373799]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.373829]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.373859]  ? __kthread_parkme+0x82/0x180
[   27.373887]  ? preempt_count_sub+0x50/0x80
[   27.373920]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.373951]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.373984]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.374018]  kthread+0x337/0x6f0
[   27.374044]  ? trace_preempt_on+0x20/0xc0
[   27.374074]  ? __pfx_kthread+0x10/0x10
[   27.374102]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.374134]  ? calculate_sigpending+0x7b/0xa0
[   27.374165]  ? __pfx_kthread+0x10/0x10
[   27.374193]  ret_from_fork+0x116/0x1d0
[   27.374218]  ? __pfx_kthread+0x10/0x10
[   27.374246]  ret_from_fork_asm+0x1a/0x30
[   27.374289]  </TASK>
[   27.374303] 
[   27.381615] Allocated by task 313:
[   27.381815]  kasan_save_stack+0x45/0x70
[   27.381962]  kasan_save_track+0x18/0x40
[   27.382103]  kasan_save_alloc_info+0x3b/0x50
[   27.382576]  __kasan_kmalloc+0xb7/0xc0
[   27.382776]  __kmalloc_cache_noprof+0x189/0x420
[   27.383004]  kasan_atomics+0x95/0x310
[   27.383205]  kunit_try_run_case+0x1a5/0x480
[   27.383378]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.383661]  kthread+0x337/0x6f0
[   27.383819]  ret_from_fork+0x116/0x1d0
[   27.384001]  ret_from_fork_asm+0x1a/0x30
[   27.384204] 
[   27.384302] The buggy address belongs to the object at ffff888105926b00
[   27.384302]  which belongs to the cache kmalloc-64 of size 64
[   27.384953] The buggy address is located 0 bytes to the right of
[   27.384953]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.385443] 
[   27.385517] The buggy address belongs to the physical page:
[   27.385699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.385990] flags: 0x200000000000000(node=0|zone=2)
[   27.386247] page_type: f5(slab)
[   27.386414] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.386769] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.387256] page dumped because: kasan: bad access detected
[   27.387428] 
[   27.387497] Memory state around the buggy address:
[   27.387662]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.387999]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.388345] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.388779]                                      ^
[   27.389023]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.389339]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.389591] ==================================================================
[   26.600786] ==================================================================
[   26.601081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   26.601367] Read of size 4 at addr ffff888105926b30 by task kunit_try_catch/313
[   26.601719] 
[   26.601896] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.601955] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.601971] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.601998] Call Trace:
[   26.602021]  <TASK>
[   26.602042]  dump_stack_lvl+0x73/0xb0
[   26.602078]  print_report+0xd1/0x610
[   26.602108]  ? __virt_addr_valid+0x1db/0x2d0
[   26.602138]  ? kasan_atomics_helper+0x4b88/0x5450
[   26.602167]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.602200]  ? kasan_atomics_helper+0x4b88/0x5450
[   26.602230]  kasan_report+0x141/0x180
[   26.602260]  ? kasan_atomics_helper+0x4b88/0x5450
[   26.602295]  __asan_report_load4_noabort+0x18/0x20
[   26.602326]  kasan_atomics_helper+0x4b88/0x5450
[   26.602356]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.602386]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.602418]  ? kasan_atomics+0x152/0x310
[   26.602452]  kasan_atomics+0x1dc/0x310
[   26.602489]  ? __pfx_kasan_atomics+0x10/0x10
[   26.602521]  ? __pfx_read_tsc+0x10/0x10
[   26.602562]  ? ktime_get_ts64+0x86/0x230
[   26.602595]  kunit_try_run_case+0x1a5/0x480
[   26.602627]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.602655]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.602685]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.602715]  ? __kthread_parkme+0x82/0x180
[   26.602741]  ? preempt_count_sub+0x50/0x80
[   26.602773]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.602861]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.602903]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.602937]  kthread+0x337/0x6f0
[   26.602964]  ? trace_preempt_on+0x20/0xc0
[   26.602995]  ? __pfx_kthread+0x10/0x10
[   26.603023]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.603055]  ? calculate_sigpending+0x7b/0xa0
[   26.603088]  ? __pfx_kthread+0x10/0x10
[   26.603118]  ret_from_fork+0x116/0x1d0
[   26.603144]  ? __pfx_kthread+0x10/0x10
[   26.603172]  ret_from_fork_asm+0x1a/0x30
[   26.603215]  </TASK>
[   26.603228] 
[   26.612498] Allocated by task 313:
[   26.612826]  kasan_save_stack+0x45/0x70
[   26.613031]  kasan_save_track+0x18/0x40
[   26.613213]  kasan_save_alloc_info+0x3b/0x50
[   26.613412]  __kasan_kmalloc+0xb7/0xc0
[   26.613630]  __kmalloc_cache_noprof+0x189/0x420
[   26.613839]  kasan_atomics+0x95/0x310
[   26.614008]  kunit_try_run_case+0x1a5/0x480
[   26.614200]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.614436]  kthread+0x337/0x6f0
[   26.615085]  ret_from_fork+0x116/0x1d0
[   26.615590]  ret_from_fork_asm+0x1a/0x30
[   26.615926] 
[   26.616007] The buggy address belongs to the object at ffff888105926b00
[   26.616007]  which belongs to the cache kmalloc-64 of size 64
[   26.616364] The buggy address is located 0 bytes to the right of
[   26.616364]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   26.617685] 
[   26.617792] The buggy address belongs to the physical page:
[   26.618007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   26.618305] flags: 0x200000000000000(node=0|zone=2)
[   26.618506] page_type: f5(slab)
[   26.618806] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.619115] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.619419] page dumped because: kasan: bad access detected
[   26.620180] 
[   26.620369] Memory state around the buggy address:
[   26.620824]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.621781]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.622238] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.622767]                                      ^
[   26.623277]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.624119]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.624559] ==================================================================
[   27.480197] ==================================================================
[   27.480959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   27.481323] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.481880] 
[   27.481999] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.482286] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.482305] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.482332] Call Trace:
[   27.482350]  <TASK>
[   27.482370]  dump_stack_lvl+0x73/0xb0
[   27.482405]  print_report+0xd1/0x610
[   27.482436]  ? __virt_addr_valid+0x1db/0x2d0
[   27.482466]  ? kasan_atomics_helper+0x177f/0x5450
[   27.482501]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.482546]  ? kasan_atomics_helper+0x177f/0x5450
[   27.482574]  kasan_report+0x141/0x180
[   27.482603]  ? kasan_atomics_helper+0x177f/0x5450
[   27.482649]  kasan_check_range+0x10c/0x1c0
[   27.482681]  __kasan_check_write+0x18/0x20
[   27.482710]  kasan_atomics_helper+0x177f/0x5450
[   27.482743]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.482774]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.482807]  ? kasan_atomics+0x152/0x310
[   27.482842]  kasan_atomics+0x1dc/0x310
[   27.482872]  ? __pfx_kasan_atomics+0x10/0x10
[   27.482904]  ? __pfx_read_tsc+0x10/0x10
[   27.482932]  ? ktime_get_ts64+0x86/0x230
[   27.482964]  kunit_try_run_case+0x1a5/0x480
[   27.482995]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.483023]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.483053]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.483082]  ? __kthread_parkme+0x82/0x180
[   27.483109]  ? preempt_count_sub+0x50/0x80
[   27.483141]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.483172]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.483206]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.483240]  kthread+0x337/0x6f0
[   27.483266]  ? trace_preempt_on+0x20/0xc0
[   27.483296]  ? __pfx_kthread+0x10/0x10
[   27.483324]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.483355]  ? calculate_sigpending+0x7b/0xa0
[   27.483386]  ? __pfx_kthread+0x10/0x10
[   27.483416]  ret_from_fork+0x116/0x1d0
[   27.483441]  ? __pfx_kthread+0x10/0x10
[   27.483469]  ret_from_fork_asm+0x1a/0x30
[   27.483511]  </TASK>
[   27.483525] 
[   27.493619] Allocated by task 313:
[   27.493825]  kasan_save_stack+0x45/0x70
[   27.494247]  kasan_save_track+0x18/0x40
[   27.494455]  kasan_save_alloc_info+0x3b/0x50
[   27.494868]  __kasan_kmalloc+0xb7/0xc0
[   27.495126]  __kmalloc_cache_noprof+0x189/0x420
[   27.495459]  kasan_atomics+0x95/0x310
[   27.495792]  kunit_try_run_case+0x1a5/0x480
[   27.496022]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.496389]  kthread+0x337/0x6f0
[   27.496579]  ret_from_fork+0x116/0x1d0
[   27.496912]  ret_from_fork_asm+0x1a/0x30
[   27.497094] 
[   27.497182] The buggy address belongs to the object at ffff888105926b00
[   27.497182]  which belongs to the cache kmalloc-64 of size 64
[   27.498002] The buggy address is located 0 bytes to the right of
[   27.498002]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.498673] 
[   27.498777] The buggy address belongs to the physical page:
[   27.499164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.499595] flags: 0x200000000000000(node=0|zone=2)
[   27.499878] page_type: f5(slab)
[   27.500148] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.500556] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.501078] page dumped because: kasan: bad access detected
[   27.501286] 
[   27.501513] Memory state around the buggy address:
[   27.501820]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.502177]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.502514] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.503075]                                      ^
[   27.503363]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.503800]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.504212] ==================================================================
[   26.770817] ==================================================================
[   26.771248] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   26.771641] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313
[   26.772002] 
[   26.772196] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.772252] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.772279] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.772304] Call Trace:
[   26.772322]  <TASK>
[   26.772350]  dump_stack_lvl+0x73/0xb0
[   26.772386]  print_report+0xd1/0x610
[   26.772414]  ? __virt_addr_valid+0x1db/0x2d0
[   26.772454]  ? kasan_atomics_helper+0x697/0x5450
[   26.772482]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.772537]  ? kasan_atomics_helper+0x697/0x5450
[   26.772566]  kasan_report+0x141/0x180
[   26.772651]  ? kasan_atomics_helper+0x697/0x5450
[   26.772688]  kasan_check_range+0x10c/0x1c0
[   26.772732]  __kasan_check_write+0x18/0x20
[   26.772762]  kasan_atomics_helper+0x697/0x5450
[   26.772792]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.772830]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.772863]  ? kasan_atomics+0x152/0x310
[   26.772909]  kasan_atomics+0x1dc/0x310
[   26.772939]  ? __pfx_kasan_atomics+0x10/0x10
[   26.772970]  ? __pfx_read_tsc+0x10/0x10
[   26.772998]  ? ktime_get_ts64+0x86/0x230
[   26.773030]  kunit_try_run_case+0x1a5/0x480
[   26.773061]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.773089]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.773126]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.773156]  ? __kthread_parkme+0x82/0x180
[   26.773193]  ? preempt_count_sub+0x50/0x80
[   26.773225]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.773255]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.773290]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.773323]  kthread+0x337/0x6f0
[   26.773350]  ? trace_preempt_on+0x20/0xc0
[   26.773380]  ? __pfx_kthread+0x10/0x10
[   26.773409]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.773441]  ? calculate_sigpending+0x7b/0xa0
[   26.773480]  ? __pfx_kthread+0x10/0x10
[   26.773510]  ret_from_fork+0x116/0x1d0
[   26.773552]  ? __pfx_kthread+0x10/0x10
[   26.773630]  ret_from_fork_asm+0x1a/0x30
[   26.773674]  </TASK>
[   26.773699] 
[   26.781769] Allocated by task 313:
[   26.781973]  kasan_save_stack+0x45/0x70
[   26.782179]  kasan_save_track+0x18/0x40
[   26.782372]  kasan_save_alloc_info+0x3b/0x50
[   26.782876]  __kasan_kmalloc+0xb7/0xc0
[   26.783033]  __kmalloc_cache_noprof+0x189/0x420
[   26.783262]  kasan_atomics+0x95/0x310
[   26.783454]  kunit_try_run_case+0x1a5/0x480
[   26.783769]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.783962]  kthread+0x337/0x6f0
[   26.784087]  ret_from_fork+0x116/0x1d0
[   26.784244]  ret_from_fork_asm+0x1a/0x30
[   26.784473] 
[   26.784578] The buggy address belongs to the object at ffff888105926b00
[   26.784578]  which belongs to the cache kmalloc-64 of size 64
[   26.785118] The buggy address is located 0 bytes to the right of
[   26.785118]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   26.785582] 
[   26.785748] The buggy address belongs to the physical page:
[   26.786005] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   26.786322] flags: 0x200000000000000(node=0|zone=2)
[   26.786593] page_type: f5(slab)
[   26.786782] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.787028] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.787346] page dumped because: kasan: bad access detected
[   26.787725] 
[   26.787842] Memory state around the buggy address:
[   26.788106]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.788354]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.788772] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.789079]                                      ^
[   26.789276]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.789594]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.790053] ==================================================================
[   27.601155] ==================================================================
[   27.601589] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   27.601932] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.602400] 
[   27.602518] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.602580] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.602595] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.602620] Call Trace:
[   27.602647]  <TASK>
[   27.602664]  dump_stack_lvl+0x73/0xb0
[   27.602697]  print_report+0xd1/0x610
[   27.602726]  ? __virt_addr_valid+0x1db/0x2d0
[   27.602757]  ? kasan_atomics_helper+0x1b22/0x5450
[   27.602785]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.602818]  ? kasan_atomics_helper+0x1b22/0x5450
[   27.602846]  kasan_report+0x141/0x180
[   27.602876]  ? kasan_atomics_helper+0x1b22/0x5450
[   27.602912]  kasan_check_range+0x10c/0x1c0
[   27.602942]  __kasan_check_write+0x18/0x20
[   27.602972]  kasan_atomics_helper+0x1b22/0x5450
[   27.603002]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.603030]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.603062]  ? kasan_atomics+0x152/0x310
[   27.603097]  kasan_atomics+0x1dc/0x310
[   27.603127]  ? __pfx_kasan_atomics+0x10/0x10
[   27.603158]  ? __pfx_read_tsc+0x10/0x10
[   27.603186]  ? ktime_get_ts64+0x86/0x230
[   27.603218]  kunit_try_run_case+0x1a5/0x480
[   27.603248]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.603276]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.603305]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.603335]  ? __kthread_parkme+0x82/0x180
[   27.603361]  ? preempt_count_sub+0x50/0x80
[   27.603394]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.603423]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.603457]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.603489]  kthread+0x337/0x6f0
[   27.603516]  ? trace_preempt_on+0x20/0xc0
[   27.603557]  ? __pfx_kthread+0x10/0x10
[   27.603584]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.603614]  ? calculate_sigpending+0x7b/0xa0
[   27.603656]  ? __pfx_kthread+0x10/0x10
[   27.603686]  ret_from_fork+0x116/0x1d0
[   27.603712]  ? __pfx_kthread+0x10/0x10
[   27.603740]  ret_from_fork_asm+0x1a/0x30
[   27.603782]  </TASK>
[   27.603795] 
[   27.610809] Allocated by task 313:
[   27.610951]  kasan_save_stack+0x45/0x70
[   27.611092]  kasan_save_track+0x18/0x40
[   27.611226]  kasan_save_alloc_info+0x3b/0x50
[   27.611376]  __kasan_kmalloc+0xb7/0xc0
[   27.611584]  __kmalloc_cache_noprof+0x189/0x420
[   27.611812]  kasan_atomics+0x95/0x310
[   27.612009]  kunit_try_run_case+0x1a5/0x480
[   27.612222]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.612487]  kthread+0x337/0x6f0
[   27.612669]  ret_from_fork+0x116/0x1d0
[   27.612863]  ret_from_fork_asm+0x1a/0x30
[   27.613067] 
[   27.613137] The buggy address belongs to the object at ffff888105926b00
[   27.613137]  which belongs to the cache kmalloc-64 of size 64
[   27.613491] The buggy address is located 0 bytes to the right of
[   27.613491]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.615088] 
[   27.615177] The buggy address belongs to the physical page:
[   27.615358] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.615649] flags: 0x200000000000000(node=0|zone=2)
[   27.615868] page_type: f5(slab)
[   27.616030] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.616343] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.617112] page dumped because: kasan: bad access detected
[   27.617436] 
[   27.617800] Memory state around the buggy address:
[   27.618242]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.618967]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.619418] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.620108]                                      ^
[   27.620473]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.621194]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.621609] ==================================================================
[   27.870098] ==================================================================
[   27.870712] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   27.871001] Read of size 8 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.871229] 
[   27.871310] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.871361] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.871377] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.871401] Call Trace:
[   27.871417]  <TASK>
[   27.871434]  dump_stack_lvl+0x73/0xb0
[   27.871468]  print_report+0xd1/0x610
[   27.871498]  ? __virt_addr_valid+0x1db/0x2d0
[   27.871527]  ? kasan_atomics_helper+0x4fa5/0x5450
[   27.871566]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.871620]  ? kasan_atomics_helper+0x4fa5/0x5450
[   27.871649]  kasan_report+0x141/0x180
[   27.871680]  ? kasan_atomics_helper+0x4fa5/0x5450
[   27.871715]  __asan_report_load8_noabort+0x18/0x20
[   27.871747]  kasan_atomics_helper+0x4fa5/0x5450
[   27.871777]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.871806]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.871838]  ? kasan_atomics+0x152/0x310
[   27.871874]  kasan_atomics+0x1dc/0x310
[   27.871904]  ? __pfx_kasan_atomics+0x10/0x10
[   27.871936]  ? __pfx_read_tsc+0x10/0x10
[   27.871964]  ? ktime_get_ts64+0x86/0x230
[   27.871997]  kunit_try_run_case+0x1a5/0x480
[   27.872027]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.872055]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.872084]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.872114]  ? __kthread_parkme+0x82/0x180
[   27.872142]  ? preempt_count_sub+0x50/0x80
[   27.872174]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.872205]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.872239]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.872273]  kthread+0x337/0x6f0
[   27.872299]  ? trace_preempt_on+0x20/0xc0
[   27.872329]  ? __pfx_kthread+0x10/0x10
[   27.872357]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.872389]  ? calculate_sigpending+0x7b/0xa0
[   27.872420]  ? __pfx_kthread+0x10/0x10
[   27.872449]  ret_from_fork+0x116/0x1d0
[   27.872475]  ? __pfx_kthread+0x10/0x10
[   27.872504]  ret_from_fork_asm+0x1a/0x30
[   27.872553]  </TASK>
[   27.872567] 
[   27.879575] Allocated by task 313:
[   27.879760]  kasan_save_stack+0x45/0x70
[   27.879952]  kasan_save_track+0x18/0x40
[   27.880124]  kasan_save_alloc_info+0x3b/0x50
[   27.880299]  __kasan_kmalloc+0xb7/0xc0
[   27.880485]  __kmalloc_cache_noprof+0x189/0x420
[   27.880720]  kasan_atomics+0x95/0x310
[   27.880900]  kunit_try_run_case+0x1a5/0x480
[   27.881068]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.881301]  kthread+0x337/0x6f0
[   27.881427]  ret_from_fork+0x116/0x1d0
[   27.881574]  ret_from_fork_asm+0x1a/0x30
[   27.881738] 
[   27.881808] The buggy address belongs to the object at ffff888105926b00
[   27.881808]  which belongs to the cache kmalloc-64 of size 64
[   27.882159] The buggy address is located 0 bytes to the right of
[   27.882159]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.882620] 
[   27.882712] The buggy address belongs to the physical page:
[   27.882963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.883314] flags: 0x200000000000000(node=0|zone=2)
[   27.883551] page_type: f5(slab)
[   27.883741] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.884077] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.884304] page dumped because: kasan: bad access detected
[   27.884475] 
[   27.884553] Memory state around the buggy address:
[   27.884730]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.884949]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.885164] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.885483]                                      ^
[   27.885740]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.886061]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.886374] ==================================================================
[   27.076207] ==================================================================
[   27.076873] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   27.077243] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.077827] 
[   27.077940] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.078015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.078031] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.078114] Call Trace:
[   27.078133]  <TASK>
[   27.078151]  dump_stack_lvl+0x73/0xb0
[   27.078189]  print_report+0xd1/0x610
[   27.078220]  ? __virt_addr_valid+0x1db/0x2d0
[   27.078251]  ? kasan_atomics_helper+0xf10/0x5450
[   27.078279]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.078312]  ? kasan_atomics_helper+0xf10/0x5450
[   27.078341]  kasan_report+0x141/0x180
[   27.078371]  ? kasan_atomics_helper+0xf10/0x5450
[   27.078406]  kasan_check_range+0x10c/0x1c0
[   27.078438]  __kasan_check_write+0x18/0x20
[   27.078468]  kasan_atomics_helper+0xf10/0x5450
[   27.078506]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.078546]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.078580]  ? kasan_atomics+0x152/0x310
[   27.078615]  kasan_atomics+0x1dc/0x310
[   27.078645]  ? __pfx_kasan_atomics+0x10/0x10
[   27.078677]  ? __pfx_read_tsc+0x10/0x10
[   27.078706]  ? ktime_get_ts64+0x86/0x230
[   27.078739]  kunit_try_run_case+0x1a5/0x480
[   27.078773]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.078802]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.078833]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.078864]  ? __kthread_parkme+0x82/0x180
[   27.078892]  ? preempt_count_sub+0x50/0x80
[   27.078924]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.078955]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.078990]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.079025]  kthread+0x337/0x6f0
[   27.079052]  ? trace_preempt_on+0x20/0xc0
[   27.079083]  ? __pfx_kthread+0x10/0x10
[   27.079111]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.079142]  ? calculate_sigpending+0x7b/0xa0
[   27.079174]  ? __pfx_kthread+0x10/0x10
[   27.079203]  ret_from_fork+0x116/0x1d0
[   27.079229]  ? __pfx_kthread+0x10/0x10
[   27.079258]  ret_from_fork_asm+0x1a/0x30
[   27.079301]  </TASK>
[   27.079315] 
[   27.086717] Allocated by task 313:
[   27.086896]  kasan_save_stack+0x45/0x70
[   27.087136]  kasan_save_track+0x18/0x40
[   27.087333]  kasan_save_alloc_info+0x3b/0x50
[   27.087568]  __kasan_kmalloc+0xb7/0xc0
[   27.087900]  __kmalloc_cache_noprof+0x189/0x420
[   27.088065]  kasan_atomics+0x95/0x310
[   27.088260]  kunit_try_run_case+0x1a5/0x480
[   27.088406]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.088671]  kthread+0x337/0x6f0
[   27.088856]  ret_from_fork+0x116/0x1d0
[   27.089072]  ret_from_fork_asm+0x1a/0x30
[   27.089259] 
[   27.089329] The buggy address belongs to the object at ffff888105926b00
[   27.089329]  which belongs to the cache kmalloc-64 of size 64
[   27.089979] The buggy address is located 0 bytes to the right of
[   27.089979]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.090422] 
[   27.090496] The buggy address belongs to the physical page:
[   27.090686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.091057] flags: 0x200000000000000(node=0|zone=2)
[   27.091320] page_type: f5(slab)
[   27.091512] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.091992] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.092312] page dumped because: kasan: bad access detected
[   27.092524] 
[   27.092604] Memory state around the buggy address:
[   27.092755]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.093097]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.093428] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.093819]                                      ^
[   27.094272]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.095323]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.095896] ==================================================================
[   27.680695] ==================================================================
[   27.681059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   27.681375] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.681745] 
[   27.681859] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.681914] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.681930] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.681956] Call Trace:
[   27.681977]  <TASK>
[   27.681998]  dump_stack_lvl+0x73/0xb0
[   27.682030]  print_report+0xd1/0x610
[   27.682060]  ? __virt_addr_valid+0x1db/0x2d0
[   27.682091]  ? kasan_atomics_helper+0x1d7a/0x5450
[   27.682119]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.682152]  ? kasan_atomics_helper+0x1d7a/0x5450
[   27.682180]  kasan_report+0x141/0x180
[   27.682209]  ? kasan_atomics_helper+0x1d7a/0x5450
[   27.682244]  kasan_check_range+0x10c/0x1c0
[   27.682275]  __kasan_check_write+0x18/0x20
[   27.682305]  kasan_atomics_helper+0x1d7a/0x5450
[   27.682335]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.682364]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.682397]  ? kasan_atomics+0x152/0x310
[   27.682435]  kasan_atomics+0x1dc/0x310
[   27.682465]  ? __pfx_kasan_atomics+0x10/0x10
[   27.682501]  ? __pfx_read_tsc+0x10/0x10
[   27.682542]  ? ktime_get_ts64+0x86/0x230
[   27.682574]  kunit_try_run_case+0x1a5/0x480
[   27.682603]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.682651]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.682681]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.682710]  ? __kthread_parkme+0x82/0x180
[   27.682737]  ? preempt_count_sub+0x50/0x80
[   27.682769]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.682799]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.682833]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.682867]  kthread+0x337/0x6f0
[   27.682893]  ? trace_preempt_on+0x20/0xc0
[   27.682923]  ? __pfx_kthread+0x10/0x10
[   27.682950]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.682982]  ? calculate_sigpending+0x7b/0xa0
[   27.683012]  ? __pfx_kthread+0x10/0x10
[   27.683041]  ret_from_fork+0x116/0x1d0
[   27.683066]  ? __pfx_kthread+0x10/0x10
[   27.683093]  ret_from_fork_asm+0x1a/0x30
[   27.683136]  </TASK>
[   27.683149] 
[   27.690949] Allocated by task 313:
[   27.691126]  kasan_save_stack+0x45/0x70
[   27.691333]  kasan_save_track+0x18/0x40
[   27.691521]  kasan_save_alloc_info+0x3b/0x50
[   27.691740]  __kasan_kmalloc+0xb7/0xc0
[   27.691939]  __kmalloc_cache_noprof+0x189/0x420
[   27.692156]  kasan_atomics+0x95/0x310
[   27.692290]  kunit_try_run_case+0x1a5/0x480
[   27.692436]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.692737]  kthread+0x337/0x6f0
[   27.692910]  ret_from_fork+0x116/0x1d0
[   27.693126]  ret_from_fork_asm+0x1a/0x30
[   27.693347] 
[   27.693464] The buggy address belongs to the object at ffff888105926b00
[   27.693464]  which belongs to the cache kmalloc-64 of size 64
[   27.693907] The buggy address is located 0 bytes to the right of
[   27.693907]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.694367] 
[   27.694463] The buggy address belongs to the physical page:
[   27.694906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.695248] flags: 0x200000000000000(node=0|zone=2)
[   27.695494] page_type: f5(slab)
[   27.695664] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.695979] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.696320] page dumped because: kasan: bad access detected
[   27.696549] 
[   27.696658] Memory state around the buggy address:
[   27.696860]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.697169]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.697462] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.697832]                                      ^
[   27.698028]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.698354]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.698693] ==================================================================
[   27.563073] ==================================================================
[   27.563812] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   27.564161] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.564396] 
[   27.564487] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.564571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.564587] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.564613] Call Trace:
[   27.564641]  <TASK>
[   27.564676]  dump_stack_lvl+0x73/0xb0
[   27.564728]  print_report+0xd1/0x610
[   27.564758]  ? __virt_addr_valid+0x1db/0x2d0
[   27.564788]  ? kasan_atomics_helper+0x19e3/0x5450
[   27.564817]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.564851]  ? kasan_atomics_helper+0x19e3/0x5450
[   27.564879]  kasan_report+0x141/0x180
[   27.564909]  ? kasan_atomics_helper+0x19e3/0x5450
[   27.564960]  kasan_check_range+0x10c/0x1c0
[   27.564991]  __kasan_check_write+0x18/0x20
[   27.565035]  kasan_atomics_helper+0x19e3/0x5450
[   27.565065]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.565095]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.565125]  ? kasan_atomics+0x152/0x310
[   27.565160]  kasan_atomics+0x1dc/0x310
[   27.565189]  ? __pfx_kasan_atomics+0x10/0x10
[   27.565221]  ? __pfx_read_tsc+0x10/0x10
[   27.565248]  ? ktime_get_ts64+0x86/0x230
[   27.565280]  kunit_try_run_case+0x1a5/0x480
[   27.565310]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.565356]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.565385]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.565415]  ? __kthread_parkme+0x82/0x180
[   27.565441]  ? preempt_count_sub+0x50/0x80
[   27.565473]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.565519]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.565576]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.565632]  kthread+0x337/0x6f0
[   27.565658]  ? trace_preempt_on+0x20/0xc0
[   27.565690]  ? __pfx_kthread+0x10/0x10
[   27.565717]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.565749]  ? calculate_sigpending+0x7b/0xa0
[   27.565780]  ? __pfx_kthread+0x10/0x10
[   27.565809]  ret_from_fork+0x116/0x1d0
[   27.565834]  ? __pfx_kthread+0x10/0x10
[   27.565863]  ret_from_fork_asm+0x1a/0x30
[   27.565922]  </TASK>
[   27.565936] 
[   27.573699] Allocated by task 313:
[   27.573866]  kasan_save_stack+0x45/0x70
[   27.574063]  kasan_save_track+0x18/0x40
[   27.574308]  kasan_save_alloc_info+0x3b/0x50
[   27.574469]  __kasan_kmalloc+0xb7/0xc0
[   27.574625]  __kmalloc_cache_noprof+0x189/0x420
[   27.574849]  kasan_atomics+0x95/0x310
[   27.575036]  kunit_try_run_case+0x1a5/0x480
[   27.575242]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.575504]  kthread+0x337/0x6f0
[   27.575702]  ret_from_fork+0x116/0x1d0
[   27.575890]  ret_from_fork_asm+0x1a/0x30
[   27.576087] 
[   27.576179] The buggy address belongs to the object at ffff888105926b00
[   27.576179]  which belongs to the cache kmalloc-64 of size 64
[   27.576581] The buggy address is located 0 bytes to the right of
[   27.576581]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.576935] 
[   27.577004] The buggy address belongs to the physical page:
[   27.577476] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.578137] flags: 0x200000000000000(node=0|zone=2)
[   27.578392] page_type: f5(slab)
[   27.578593] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.578980] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.579324] page dumped because: kasan: bad access detected
[   27.579576] 
[   27.579702] Memory state around the buggy address:
[   27.579858]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.580091]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.580432] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.580901]                                      ^
[   27.581082]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.581385]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.581711] ==================================================================
[   26.689967] ==================================================================
[   26.690312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   26.690731] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313
[   26.691083] 
[   26.691201] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.691268] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.691285] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.691323] Call Trace:
[   26.691345]  <TASK>
[   26.691364]  dump_stack_lvl+0x73/0xb0
[   26.691400]  print_report+0xd1/0x610
[   26.691440]  ? __virt_addr_valid+0x1db/0x2d0
[   26.691472]  ? kasan_atomics_helper+0x4a0/0x5450
[   26.691511]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.691561]  ? kasan_atomics_helper+0x4a0/0x5450
[   26.691648]  kasan_report+0x141/0x180
[   26.691680]  ? kasan_atomics_helper+0x4a0/0x5450
[   26.691729]  kasan_check_range+0x10c/0x1c0
[   26.691761]  __kasan_check_write+0x18/0x20
[   26.691792]  kasan_atomics_helper+0x4a0/0x5450
[   26.691823]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.691851]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.691884]  ? kasan_atomics+0x152/0x310
[   26.691919]  kasan_atomics+0x1dc/0x310
[   26.691948]  ? __pfx_kasan_atomics+0x10/0x10
[   26.691990]  ? __pfx_read_tsc+0x10/0x10
[   26.692020]  ? ktime_get_ts64+0x86/0x230
[   26.692063]  kunit_try_run_case+0x1a5/0x480
[   26.692094]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.692123]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.692162]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.692192]  ? __kthread_parkme+0x82/0x180
[   26.692230]  ? preempt_count_sub+0x50/0x80
[   26.692264]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.692295]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.692328]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.692361]  kthread+0x337/0x6f0
[   26.692388]  ? trace_preempt_on+0x20/0xc0
[   26.692419]  ? __pfx_kthread+0x10/0x10
[   26.692447]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.692479]  ? calculate_sigpending+0x7b/0xa0
[   26.692518]  ? __pfx_kthread+0x10/0x10
[   26.692567]  ret_from_fork+0x116/0x1d0
[   26.692637]  ? __pfx_kthread+0x10/0x10
[   26.692666]  ret_from_fork_asm+0x1a/0x30
[   26.692708]  </TASK>
[   26.692723] 
[   26.701328] Allocated by task 313:
[   26.701509]  kasan_save_stack+0x45/0x70
[   26.702064]  kasan_save_track+0x18/0x40
[   26.702250]  kasan_save_alloc_info+0x3b/0x50
[   26.702464]  __kasan_kmalloc+0xb7/0xc0
[   26.702768]  __kmalloc_cache_noprof+0x189/0x420
[   26.702930]  kasan_atomics+0x95/0x310
[   26.703077]  kunit_try_run_case+0x1a5/0x480
[   26.703521]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.703940]  kthread+0x337/0x6f0
[   26.704070]  ret_from_fork+0x116/0x1d0
[   26.704207]  ret_from_fork_asm+0x1a/0x30
[   26.704348] 
[   26.704442] The buggy address belongs to the object at ffff888105926b00
[   26.704442]  which belongs to the cache kmalloc-64 of size 64
[   26.705105] The buggy address is located 0 bytes to the right of
[   26.705105]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   26.705591] 
[   26.705662] The buggy address belongs to the physical page:
[   26.706000] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   26.706394] flags: 0x200000000000000(node=0|zone=2)
[   26.706795] page_type: f5(slab)
[   26.707082] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.707438] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.707835] page dumped because: kasan: bad access detected
[   26.708084] 
[   26.708200] Memory state around the buggy address:
[   26.708398]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.708779]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.709087] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.709305]                                      ^
[   26.709461]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.709804]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.710120] ==================================================================
[   27.455216] ==================================================================
[   27.455590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   27.455989] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.456226] 
[   27.456311] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.456365] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.456382] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.456405] Call Trace:
[   27.456423]  <TASK>
[   27.456441]  dump_stack_lvl+0x73/0xb0
[   27.456476]  print_report+0xd1/0x610
[   27.456505]  ? __virt_addr_valid+0x1db/0x2d0
[   27.456548]  ? kasan_atomics_helper+0x16e7/0x5450
[   27.456578]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.456612]  ? kasan_atomics_helper+0x16e7/0x5450
[   27.456653]  kasan_report+0x141/0x180
[   27.456683]  ? kasan_atomics_helper+0x16e7/0x5450
[   27.456718]  kasan_check_range+0x10c/0x1c0
[   27.456749]  __kasan_check_write+0x18/0x20
[   27.456780]  kasan_atomics_helper+0x16e7/0x5450
[   27.456810]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.456839]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.456871]  ? kasan_atomics+0x152/0x310
[   27.456906]  kasan_atomics+0x1dc/0x310
[   27.456936]  ? __pfx_kasan_atomics+0x10/0x10
[   27.456967]  ? __pfx_read_tsc+0x10/0x10
[   27.456995]  ? ktime_get_ts64+0x86/0x230
[   27.457027]  kunit_try_run_case+0x1a5/0x480
[   27.457568]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.457605]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.457650]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.457681]  ? __kthread_parkme+0x82/0x180
[   27.457708]  ? preempt_count_sub+0x50/0x80
[   27.457740]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.457771]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.457804]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.457839]  kthread+0x337/0x6f0
[   27.457865]  ? trace_preempt_on+0x20/0xc0
[   27.457895]  ? __pfx_kthread+0x10/0x10
[   27.457923]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.457955]  ? calculate_sigpending+0x7b/0xa0
[   27.457986]  ? __pfx_kthread+0x10/0x10
[   27.458015]  ret_from_fork+0x116/0x1d0
[   27.458041]  ? __pfx_kthread+0x10/0x10
[   27.458069]  ret_from_fork_asm+0x1a/0x30
[   27.458111]  </TASK>
[   27.458124] 
[   27.469578] Allocated by task 313:
[   27.469920]  kasan_save_stack+0x45/0x70
[   27.470123]  kasan_save_track+0x18/0x40
[   27.470305]  kasan_save_alloc_info+0x3b/0x50
[   27.470507]  __kasan_kmalloc+0xb7/0xc0
[   27.470731]  __kmalloc_cache_noprof+0x189/0x420
[   27.470893]  kasan_atomics+0x95/0x310
[   27.471124]  kunit_try_run_case+0x1a5/0x480
[   27.471338]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.471583]  kthread+0x337/0x6f0
[   27.471781]  ret_from_fork+0x116/0x1d0
[   27.471939]  ret_from_fork_asm+0x1a/0x30
[   27.472093] 
[   27.472188] The buggy address belongs to the object at ffff888105926b00
[   27.472188]  which belongs to the cache kmalloc-64 of size 64
[   27.472961] The buggy address is located 0 bytes to the right of
[   27.472961]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.473881] 
[   27.473981] The buggy address belongs to the physical page:
[   27.474378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.474917] flags: 0x200000000000000(node=0|zone=2)
[   27.475129] page_type: f5(slab)
[   27.475428] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.475895] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.476236] page dumped because: kasan: bad access detected
[   27.476481] 
[   27.476580] Memory state around the buggy address:
[   27.477079]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.477459]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.477942] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.478377]                                      ^
[   27.478593]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.479033]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.479344] ==================================================================
[   27.218231] ==================================================================
[   27.218564] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   27.218872] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.219201] 
[   27.219311] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.219363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.219380] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.219404] Call Trace:
[   27.219421]  <TASK>
[   27.219438]  dump_stack_lvl+0x73/0xb0
[   27.219471]  print_report+0xd1/0x610
[   27.219501]  ? __virt_addr_valid+0x1db/0x2d0
[   27.219543]  ? kasan_atomics_helper+0x1217/0x5450
[   27.219571]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.219605]  ? kasan_atomics_helper+0x1217/0x5450
[   27.219646]  kasan_report+0x141/0x180
[   27.219677]  ? kasan_atomics_helper+0x1217/0x5450
[   27.219712]  kasan_check_range+0x10c/0x1c0
[   27.219743]  __kasan_check_write+0x18/0x20
[   27.219772]  kasan_atomics_helper+0x1217/0x5450
[   27.219804]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.219833]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.219863]  ? kasan_atomics+0x152/0x310
[   27.219898]  kasan_atomics+0x1dc/0x310
[   27.219928]  ? __pfx_kasan_atomics+0x10/0x10
[   27.219959]  ? __pfx_read_tsc+0x10/0x10
[   27.219987]  ? ktime_get_ts64+0x86/0x230
[   27.220019]  kunit_try_run_case+0x1a5/0x480
[   27.220049]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.220078]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.220107]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.220138]  ? __kthread_parkme+0x82/0x180
[   27.220165]  ? preempt_count_sub+0x50/0x80
[   27.220197]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.220227]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.220261]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.220295]  kthread+0x337/0x6f0
[   27.220321]  ? trace_preempt_on+0x20/0xc0
[   27.220351]  ? __pfx_kthread+0x10/0x10
[   27.220379]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.220410]  ? calculate_sigpending+0x7b/0xa0
[   27.220440]  ? __pfx_kthread+0x10/0x10
[   27.220470]  ret_from_fork+0x116/0x1d0
[   27.220495]  ? __pfx_kthread+0x10/0x10
[   27.220523]  ret_from_fork_asm+0x1a/0x30
[   27.220574]  </TASK>
[   27.220588] 
[   27.228304] Allocated by task 313:
[   27.228489]  kasan_save_stack+0x45/0x70
[   27.228809]  kasan_save_track+0x18/0x40
[   27.228954]  kasan_save_alloc_info+0x3b/0x50
[   27.229154]  __kasan_kmalloc+0xb7/0xc0
[   27.229332]  __kmalloc_cache_noprof+0x189/0x420
[   27.230047]  kasan_atomics+0x95/0x310
[   27.230365]  kunit_try_run_case+0x1a5/0x480
[   27.230705]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.231163]  kthread+0x337/0x6f0
[   27.231447]  ret_from_fork+0x116/0x1d0
[   27.231767]  ret_from_fork_asm+0x1a/0x30
[   27.232153] 
[   27.232395] The buggy address belongs to the object at ffff888105926b00
[   27.232395]  which belongs to the cache kmalloc-64 of size 64
[   27.232970] The buggy address is located 0 bytes to the right of
[   27.232970]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.233469] 
[   27.233572] The buggy address belongs to the physical page:
[   27.234170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.234876] flags: 0x200000000000000(node=0|zone=2)
[   27.235326] page_type: f5(slab)
[   27.235581] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.236083] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.236415] page dumped because: kasan: bad access detected
[   27.236852] 
[   27.236940] Memory state around the buggy address:
[   27.237381]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.237889]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.238194] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.238492]                                      ^
[   27.238802]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.239095]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.239379] ==================================================================
[   27.408707] ==================================================================
[   27.408998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   27.409348] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.409680] 
[   27.409775] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.409829] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.409844] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.409878] Call Trace:
[   27.409895]  <TASK>
[   27.409913]  dump_stack_lvl+0x73/0xb0
[   27.409948]  print_report+0xd1/0x610
[   27.409978]  ? __virt_addr_valid+0x1db/0x2d0
[   27.410009]  ? kasan_atomics_helper+0x15b6/0x5450
[   27.410038]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.410083]  ? kasan_atomics_helper+0x15b6/0x5450
[   27.410113]  kasan_report+0x141/0x180
[   27.410142]  ? kasan_atomics_helper+0x15b6/0x5450
[   27.410190]  kasan_check_range+0x10c/0x1c0
[   27.410221]  __kasan_check_write+0x18/0x20
[   27.410251]  kasan_atomics_helper+0x15b6/0x5450
[   27.410282]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.410311]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.410344]  ? kasan_atomics+0x152/0x310
[   27.410379]  kasan_atomics+0x1dc/0x310
[   27.410408]  ? __pfx_kasan_atomics+0x10/0x10
[   27.410440]  ? __pfx_read_tsc+0x10/0x10
[   27.410469]  ? ktime_get_ts64+0x86/0x230
[   27.410509]  kunit_try_run_case+0x1a5/0x480
[   27.410559]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.410588]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.410641]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.410672]  ? __kthread_parkme+0x82/0x180
[   27.410700]  ? preempt_count_sub+0x50/0x80
[   27.410732]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.410771]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.410806]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.410850]  kthread+0x337/0x6f0
[   27.410876]  ? trace_preempt_on+0x20/0xc0
[   27.410915]  ? __pfx_kthread+0x10/0x10
[   27.410943]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.410985]  ? calculate_sigpending+0x7b/0xa0
[   27.411018]  ? __pfx_kthread+0x10/0x10
[   27.411047]  ret_from_fork+0x116/0x1d0
[   27.411082]  ? __pfx_kthread+0x10/0x10
[   27.411111]  ret_from_fork_asm+0x1a/0x30
[   27.411164]  </TASK>
[   27.411178] 
[   27.419089] Allocated by task 313:
[   27.419285]  kasan_save_stack+0x45/0x70
[   27.419487]  kasan_save_track+0x18/0x40
[   27.419708]  kasan_save_alloc_info+0x3b/0x50
[   27.419911]  __kasan_kmalloc+0xb7/0xc0
[   27.420102]  __kmalloc_cache_noprof+0x189/0x420
[   27.420265]  kasan_atomics+0x95/0x310
[   27.420402]  kunit_try_run_case+0x1a5/0x480
[   27.420561]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.420742]  kthread+0x337/0x6f0
[   27.420864]  ret_from_fork+0x116/0x1d0
[   27.421028]  ret_from_fork_asm+0x1a/0x30
[   27.421258] 
[   27.421352] The buggy address belongs to the object at ffff888105926b00
[   27.421352]  which belongs to the cache kmalloc-64 of size 64
[   27.422110] The buggy address is located 0 bytes to the right of
[   27.422110]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.423022] 
[   27.423104] The buggy address belongs to the physical page:
[   27.423282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.423535] flags: 0x200000000000000(node=0|zone=2)
[   27.423700] page_type: f5(slab)
[   27.423912] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.424259] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.424640] page dumped because: kasan: bad access detected
[   27.424905] 
[   27.425001] Memory state around the buggy address:
[   27.425233]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.425519]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.427014] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.427623]                                      ^
[   27.427930]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.428287]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.428687] ==================================================================
[   27.193770] ==================================================================
[   27.194112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   27.194423] Read of size 4 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.194657] 
[   27.196636] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.196697] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.196716] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.196741] Call Trace:
[   27.196761]  <TASK>
[   27.196779]  dump_stack_lvl+0x73/0xb0
[   27.196816]  print_report+0xd1/0x610
[   27.196846]  ? __virt_addr_valid+0x1db/0x2d0
[   27.196878]  ? kasan_atomics_helper+0x4a02/0x5450
[   27.196908]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.196942]  ? kasan_atomics_helper+0x4a02/0x5450
[   27.196971]  kasan_report+0x141/0x180
[   27.197001]  ? kasan_atomics_helper+0x4a02/0x5450
[   27.197038]  __asan_report_load4_noabort+0x18/0x20
[   27.197069]  kasan_atomics_helper+0x4a02/0x5450
[   27.197099]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.197129]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.197161]  ? kasan_atomics+0x152/0x310
[   27.197195]  kasan_atomics+0x1dc/0x310
[   27.197225]  ? __pfx_kasan_atomics+0x10/0x10
[   27.197257]  ? __pfx_read_tsc+0x10/0x10
[   27.197286]  ? ktime_get_ts64+0x86/0x230
[   27.197317]  kunit_try_run_case+0x1a5/0x480
[   27.197348]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.197376]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.197406]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.197435]  ? __kthread_parkme+0x82/0x180
[   27.197463]  ? preempt_count_sub+0x50/0x80
[   27.197495]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.197540]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.197575]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.197610]  kthread+0x337/0x6f0
[   27.197649]  ? trace_preempt_on+0x20/0xc0
[   27.197681]  ? __pfx_kthread+0x10/0x10
[   27.197708]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.197740]  ? calculate_sigpending+0x7b/0xa0
[   27.197772]  ? __pfx_kthread+0x10/0x10
[   27.197801]  ret_from_fork+0x116/0x1d0
[   27.197827]  ? __pfx_kthread+0x10/0x10
[   27.197855]  ret_from_fork_asm+0x1a/0x30
[   27.197896]  </TASK>
[   27.197911] 
[   27.209589] Allocated by task 313:
[   27.209889]  kasan_save_stack+0x45/0x70
[   27.210104]  kasan_save_track+0x18/0x40
[   27.210290]  kasan_save_alloc_info+0x3b/0x50
[   27.210492]  __kasan_kmalloc+0xb7/0xc0
[   27.210683]  __kmalloc_cache_noprof+0x189/0x420
[   27.210842]  kasan_atomics+0x95/0x310
[   27.211131]  kunit_try_run_case+0x1a5/0x480
[   27.211327]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.211556]  kthread+0x337/0x6f0
[   27.211859]  ret_from_fork+0x116/0x1d0
[   27.212024]  ret_from_fork_asm+0x1a/0x30
[   27.212213] 
[   27.212285] The buggy address belongs to the object at ffff888105926b00
[   27.212285]  which belongs to the cache kmalloc-64 of size 64
[   27.212786] The buggy address is located 0 bytes to the right of
[   27.212786]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.213271] 
[   27.213371] The buggy address belongs to the physical page:
[   27.213613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.213909] flags: 0x200000000000000(node=0|zone=2)
[   27.214145] page_type: f5(slab)
[   27.214297] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.214602] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.214930] page dumped because: kasan: bad access detected
[   27.215148] 
[   27.215218] Memory state around the buggy address:
[   27.215373]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.215677]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.216010] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.216225]                                      ^
[   27.216428]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.216942]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.217224] ==================================================================
[   27.330804] ==================================================================
[   27.331426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   27.331852] Read of size 8 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.332141] 
[   27.332271] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.332324] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.332341] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.332365] Call Trace:
[   27.332381]  <TASK>
[   27.332409]  dump_stack_lvl+0x73/0xb0
[   27.332443]  print_report+0xd1/0x610
[   27.332486]  ? __virt_addr_valid+0x1db/0x2d0
[   27.332517]  ? kasan_atomics_helper+0x4eae/0x5450
[   27.332556]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.332597]  ? kasan_atomics_helper+0x4eae/0x5450
[   27.332626]  kasan_report+0x141/0x180
[   27.332675]  ? kasan_atomics_helper+0x4eae/0x5450
[   27.332710]  __asan_report_load8_noabort+0x18/0x20
[   27.332741]  kasan_atomics_helper+0x4eae/0x5450
[   27.332782]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.332811]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.332855]  ? kasan_atomics+0x152/0x310
[   27.332890]  kasan_atomics+0x1dc/0x310
[   27.332929]  ? __pfx_kasan_atomics+0x10/0x10
[   27.332961]  ? __pfx_read_tsc+0x10/0x10
[   27.332999]  ? ktime_get_ts64+0x86/0x230
[   27.333032]  kunit_try_run_case+0x1a5/0x480
[   27.333072]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.333100]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.333130]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.333170]  ? __kthread_parkme+0x82/0x180
[   27.333198]  ? preempt_count_sub+0x50/0x80
[   27.333239]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.333270]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.333313]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.333347]  kthread+0x337/0x6f0
[   27.333373]  ? trace_preempt_on+0x20/0xc0
[   27.333413]  ? __pfx_kthread+0x10/0x10
[   27.333441]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.333483]  ? calculate_sigpending+0x7b/0xa0
[   27.333515]  ? __pfx_kthread+0x10/0x10
[   27.333554]  ret_from_fork+0x116/0x1d0
[   27.333580]  ? __pfx_kthread+0x10/0x10
[   27.333608]  ret_from_fork_asm+0x1a/0x30
[   27.333670]  </TASK>
[   27.333685] 
[   27.341095] Allocated by task 313:
[   27.341339]  kasan_save_stack+0x45/0x70
[   27.341736]  kasan_save_track+0x18/0x40
[   27.342006]  kasan_save_alloc_info+0x3b/0x50
[   27.342232]  __kasan_kmalloc+0xb7/0xc0
[   27.342426]  __kmalloc_cache_noprof+0x189/0x420
[   27.342649]  kasan_atomics+0x95/0x310
[   27.342862]  kunit_try_run_case+0x1a5/0x480
[   27.343058]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.343300]  kthread+0x337/0x6f0
[   27.343496]  ret_from_fork+0x116/0x1d0
[   27.343720]  ret_from_fork_asm+0x1a/0x30
[   27.343928] 
[   27.344003] The buggy address belongs to the object at ffff888105926b00
[   27.344003]  which belongs to the cache kmalloc-64 of size 64
[   27.344481] The buggy address is located 0 bytes to the right of
[   27.344481]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.345061] 
[   27.345136] The buggy address belongs to the physical page:
[   27.345309] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.345563] flags: 0x200000000000000(node=0|zone=2)
[   27.345793] page_type: f5(slab)
[   27.345970] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.346333] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.346683] page dumped because: kasan: bad access detected
[   27.346938] 
[   27.347106] Memory state around the buggy address:
[   27.347328]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.347554]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.348130] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.348442]                                      ^
[   27.348706]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.348923]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.349184] ==================================================================
[   27.267277] ==================================================================
[   27.267760] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   27.268130] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.268425] 
[   27.268540] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.268596] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.268611] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.268638] Call Trace:
[   27.268657]  <TASK>
[   27.268675]  dump_stack_lvl+0x73/0xb0
[   27.268709]  print_report+0xd1/0x610
[   27.268739]  ? __virt_addr_valid+0x1db/0x2d0
[   27.268769]  ? kasan_atomics_helper+0x12e6/0x5450
[   27.268807]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.268839]  ? kasan_atomics_helper+0x12e6/0x5450
[   27.268868]  kasan_report+0x141/0x180
[   27.268898]  ? kasan_atomics_helper+0x12e6/0x5450
[   27.268933]  kasan_check_range+0x10c/0x1c0
[   27.268963]  __kasan_check_write+0x18/0x20
[   27.268993]  kasan_atomics_helper+0x12e6/0x5450
[   27.269023]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.269052]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.269084]  ? kasan_atomics+0x152/0x310
[   27.269120]  kasan_atomics+0x1dc/0x310
[   27.269149]  ? __pfx_kasan_atomics+0x10/0x10
[   27.269183]  ? __pfx_read_tsc+0x10/0x10
[   27.269211]  ? ktime_get_ts64+0x86/0x230
[   27.269243]  kunit_try_run_case+0x1a5/0x480
[   27.269274]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.269302]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.269331]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.269361]  ? __kthread_parkme+0x82/0x180
[   27.269388]  ? preempt_count_sub+0x50/0x80
[   27.269420]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.269450]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.269484]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.269517]  kthread+0x337/0x6f0
[   27.269555]  ? trace_preempt_on+0x20/0xc0
[   27.269584]  ? __pfx_kthread+0x10/0x10
[   27.269612]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.269653]  ? calculate_sigpending+0x7b/0xa0
[   27.269684]  ? __pfx_kthread+0x10/0x10
[   27.269714]  ret_from_fork+0x116/0x1d0
[   27.269739]  ? __pfx_kthread+0x10/0x10
[   27.269767]  ret_from_fork_asm+0x1a/0x30
[   27.269809]  </TASK>
[   27.269823] 
[   27.276843] Allocated by task 313:
[   27.277024]  kasan_save_stack+0x45/0x70
[   27.277234]  kasan_save_track+0x18/0x40
[   27.277430]  kasan_save_alloc_info+0x3b/0x50
[   27.277709]  __kasan_kmalloc+0xb7/0xc0
[   27.277891]  __kmalloc_cache_noprof+0x189/0x420
[   27.278128]  kasan_atomics+0x95/0x310
[   27.278276]  kunit_try_run_case+0x1a5/0x480
[   27.278425]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.278662]  kthread+0x337/0x6f0
[   27.278832]  ret_from_fork+0x116/0x1d0
[   27.279026]  ret_from_fork_asm+0x1a/0x30
[   27.279331] 
[   27.279437] The buggy address belongs to the object at ffff888105926b00
[   27.279437]  which belongs to the cache kmalloc-64 of size 64
[   27.279888] The buggy address is located 0 bytes to the right of
[   27.279888]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.280407] 
[   27.280505] The buggy address belongs to the physical page:
[   27.280857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.281172] flags: 0x200000000000000(node=0|zone=2)
[   27.281358] page_type: f5(slab)
[   27.281478] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.281815] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.282192] page dumped because: kasan: bad access detected
[   27.282385] 
[   27.282453] Memory state around the buggy address:
[   27.282744]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.283033]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.283312] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.283609]                                      ^
[   27.283796]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.284100]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.284315] ==================================================================
[   26.969320] ==================================================================
[   26.969690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   26.969969] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313
[   26.970294] 
[   26.970402] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.970454] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.970469] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.970500] Call Trace:
[   26.970517]  <TASK>
[   26.970544]  dump_stack_lvl+0x73/0xb0
[   26.970579]  print_report+0xd1/0x610
[   26.970608]  ? __virt_addr_valid+0x1db/0x2d0
[   26.970639]  ? kasan_atomics_helper+0xc70/0x5450
[   26.970667]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.970700]  ? kasan_atomics_helper+0xc70/0x5450
[   26.970728]  kasan_report+0x141/0x180
[   26.970758]  ? kasan_atomics_helper+0xc70/0x5450
[   26.970804]  kasan_check_range+0x10c/0x1c0
[   26.970835]  __kasan_check_write+0x18/0x20
[   26.970865]  kasan_atomics_helper+0xc70/0x5450
[   26.970918]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.970947]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.970979]  ? kasan_atomics+0x152/0x310
[   26.971014]  kasan_atomics+0x1dc/0x310
[   26.971061]  ? __pfx_kasan_atomics+0x10/0x10
[   26.971093]  ? __pfx_read_tsc+0x10/0x10
[   26.971120]  ? ktime_get_ts64+0x86/0x230
[   26.971154]  kunit_try_run_case+0x1a5/0x480
[   26.971184]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.971227]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.971257]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.971287]  ? __kthread_parkme+0x82/0x180
[   26.971314]  ? preempt_count_sub+0x50/0x80
[   26.971346]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.971376]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.971409]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.971461]  kthread+0x337/0x6f0
[   26.971487]  ? trace_preempt_on+0x20/0xc0
[   26.971517]  ? __pfx_kthread+0x10/0x10
[   26.971556]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.971587]  ? calculate_sigpending+0x7b/0xa0
[   26.971644]  ? __pfx_kthread+0x10/0x10
[   26.971674]  ret_from_fork+0x116/0x1d0
[   26.971699]  ? __pfx_kthread+0x10/0x10
[   26.971727]  ret_from_fork_asm+0x1a/0x30
[   26.971770]  </TASK>
[   26.971783] 
[   26.979082] Allocated by task 313:
[   26.979260]  kasan_save_stack+0x45/0x70
[   26.979464]  kasan_save_track+0x18/0x40
[   26.979778]  kasan_save_alloc_info+0x3b/0x50
[   26.979962]  __kasan_kmalloc+0xb7/0xc0
[   26.980116]  __kmalloc_cache_noprof+0x189/0x420
[   26.980336]  kasan_atomics+0x95/0x310
[   26.980514]  kunit_try_run_case+0x1a5/0x480
[   26.980812]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.981057]  kthread+0x337/0x6f0
[   26.981209]  ret_from_fork+0x116/0x1d0
[   26.981421]  ret_from_fork_asm+0x1a/0x30
[   26.981614] 
[   26.981713] The buggy address belongs to the object at ffff888105926b00
[   26.981713]  which belongs to the cache kmalloc-64 of size 64
[   26.982187] The buggy address is located 0 bytes to the right of
[   26.982187]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   26.982664] 
[   26.982775] The buggy address belongs to the physical page:
[   26.983063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   26.983486] flags: 0x200000000000000(node=0|zone=2)
[   26.983833] page_type: f5(slab)
[   26.984126] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.984458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.984692] page dumped because: kasan: bad access detected
[   26.984858] 
[   26.984924] Memory state around the buggy address:
[   26.985074]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.985284]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.985786] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.986104]                                      ^
[   26.986351]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.986743]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.987096] ==================================================================
[   26.918883] ==================================================================
[   26.919239] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   26.919843] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313
[   26.920171] 
[   26.920290] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.920354] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.920370] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.920395] Call Trace:
[   26.920423]  <TASK>
[   26.920442]  dump_stack_lvl+0x73/0xb0
[   26.920478]  print_report+0xd1/0x610
[   26.920507]  ? __virt_addr_valid+0x1db/0x2d0
[   26.920549]  ? kasan_atomics_helper+0xac7/0x5450
[   26.920587]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.920631]  ? kasan_atomics_helper+0xac7/0x5450
[   26.920661]  kasan_report+0x141/0x180
[   26.920700]  ? kasan_atomics_helper+0xac7/0x5450
[   26.920735]  kasan_check_range+0x10c/0x1c0
[   26.920776]  __kasan_check_write+0x18/0x20
[   26.920807]  kasan_atomics_helper+0xac7/0x5450
[   26.920836]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.920875]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.920911]  ? kasan_atomics+0x152/0x310
[   26.920958]  kasan_atomics+0x1dc/0x310
[   26.920987]  ? __pfx_kasan_atomics+0x10/0x10
[   26.921029]  ? __pfx_read_tsc+0x10/0x10
[   26.921061]  ? ktime_get_ts64+0x86/0x230
[   26.921104]  kunit_try_run_case+0x1a5/0x480
[   26.921137]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.921166]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.921197]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.921230]  ? __kthread_parkme+0x82/0x180
[   26.921258]  ? preempt_count_sub+0x50/0x80
[   26.921290]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.921323]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.921358]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.921393]  kthread+0x337/0x6f0
[   26.921419]  ? trace_preempt_on+0x20/0xc0
[   26.921460]  ? __pfx_kthread+0x10/0x10
[   26.921488]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.921539]  ? calculate_sigpending+0x7b/0xa0
[   26.921571]  ? __pfx_kthread+0x10/0x10
[   26.921600]  ret_from_fork+0x116/0x1d0
[   26.921635]  ? __pfx_kthread+0x10/0x10
[   26.921672]  ret_from_fork_asm+0x1a/0x30
[   26.921726]  </TASK>
[   26.921740] 
[   26.929412] Allocated by task 313:
[   26.929620]  kasan_save_stack+0x45/0x70
[   26.929824]  kasan_save_track+0x18/0x40
[   26.929997]  kasan_save_alloc_info+0x3b/0x50
[   26.930219]  __kasan_kmalloc+0xb7/0xc0
[   26.930426]  __kmalloc_cache_noprof+0x189/0x420
[   26.930644]  kasan_atomics+0x95/0x310
[   26.930851]  kunit_try_run_case+0x1a5/0x480
[   26.931064]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.931248]  kthread+0x337/0x6f0
[   26.931500]  ret_from_fork+0x116/0x1d0
[   26.931708]  ret_from_fork_asm+0x1a/0x30
[   26.932029] 
[   26.932117] The buggy address belongs to the object at ffff888105926b00
[   26.932117]  which belongs to the cache kmalloc-64 of size 64
[   26.932575] The buggy address is located 0 bytes to the right of
[   26.932575]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   26.933110] 
[   26.933200] The buggy address belongs to the physical page:
[   26.933460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   26.933868] flags: 0x200000000000000(node=0|zone=2)
[   26.934096] page_type: f5(slab)
[   26.934274] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.934628] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.934956] page dumped because: kasan: bad access detected
[   26.935196] 
[   26.935292] Memory state around the buggy address:
[   26.935501]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.935741]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.938313] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.939384]                                      ^
[   26.940160]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.941226]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.941952] ==================================================================
[   27.887020] ==================================================================
[   27.887368] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   27.887856] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.888196] 
[   27.888310] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.888363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.888379] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.888403] Call Trace:
[   27.888418]  <TASK>
[   27.888435]  dump_stack_lvl+0x73/0xb0
[   27.888469]  print_report+0xd1/0x610
[   27.888499]  ? __virt_addr_valid+0x1db/0x2d0
[   27.888539]  ? kasan_atomics_helper+0x224c/0x5450
[   27.888568]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.888621]  ? kasan_atomics_helper+0x224c/0x5450
[   27.888651]  kasan_report+0x141/0x180
[   27.888680]  ? kasan_atomics_helper+0x224c/0x5450
[   27.888716]  kasan_check_range+0x10c/0x1c0
[   27.888747]  __kasan_check_write+0x18/0x20
[   27.888778]  kasan_atomics_helper+0x224c/0x5450
[   27.888808]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.888838]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.888870]  ? kasan_atomics+0x152/0x310
[   27.888906]  kasan_atomics+0x1dc/0x310
[   27.888936]  ? __pfx_kasan_atomics+0x10/0x10
[   27.888968]  ? __pfx_read_tsc+0x10/0x10
[   27.888997]  ? ktime_get_ts64+0x86/0x230
[   27.889029]  kunit_try_run_case+0x1a5/0x480
[   27.889059]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.889088]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.889117]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.889148]  ? __kthread_parkme+0x82/0x180
[   27.889176]  ? preempt_count_sub+0x50/0x80
[   27.889208]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.889239]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.889273]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.889306]  kthread+0x337/0x6f0
[   27.889333]  ? trace_preempt_on+0x20/0xc0
[   27.889363]  ? __pfx_kthread+0x10/0x10
[   27.889392]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.889423]  ? calculate_sigpending+0x7b/0xa0
[   27.889454]  ? __pfx_kthread+0x10/0x10
[   27.889484]  ret_from_fork+0x116/0x1d0
[   27.889511]  ? __pfx_kthread+0x10/0x10
[   27.889546]  ret_from_fork_asm+0x1a/0x30
[   27.889619]  </TASK>
[   27.889633] 
[   27.896575] Allocated by task 313:
[   27.896770]  kasan_save_stack+0x45/0x70
[   27.896971]  kasan_save_track+0x18/0x40
[   27.897167]  kasan_save_alloc_info+0x3b/0x50
[   27.897381]  __kasan_kmalloc+0xb7/0xc0
[   27.897547]  __kmalloc_cache_noprof+0x189/0x420
[   27.897731]  kasan_atomics+0x95/0x310
[   27.897871]  kunit_try_run_case+0x1a5/0x480
[   27.898021]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.898202]  kthread+0x337/0x6f0
[   27.898372]  ret_from_fork+0x116/0x1d0
[   27.898577]  ret_from_fork_asm+0x1a/0x30
[   27.898795] 
[   27.898891] The buggy address belongs to the object at ffff888105926b00
[   27.898891]  which belongs to the cache kmalloc-64 of size 64
[   27.899433] The buggy address is located 0 bytes to the right of
[   27.899433]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.900015] 
[   27.900110] The buggy address belongs to the physical page:
[   27.900319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.900572] flags: 0x200000000000000(node=0|zone=2)
[   27.900754] page_type: f5(slab)
[   27.900874] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.901109] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.901335] page dumped because: kasan: bad access detected
[   27.901579] 
[   27.901698] Memory state around the buggy address:
[   27.901920]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.902229]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.902548] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.902886]                                      ^
[   27.903112]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.903426]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.903732] ==================================================================
[   26.900155] ==================================================================
[   26.900454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   26.900915] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313
[   26.901242] 
[   26.901344] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.901405] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.901421] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.901446] Call Trace:
[   26.901473]  <TASK>
[   26.901492]  dump_stack_lvl+0x73/0xb0
[   26.901536]  print_report+0xd1/0x610
[   26.901566]  ? __virt_addr_valid+0x1db/0x2d0
[   26.901690]  ? kasan_atomics_helper+0xa2b/0x5450
[   26.901718]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.901752]  ? kasan_atomics_helper+0xa2b/0x5450
[   26.901901]  kasan_report+0x141/0x180
[   26.901933]  ? kasan_atomics_helper+0xa2b/0x5450
[   26.902039]  kasan_check_range+0x10c/0x1c0
[   26.902070]  __kasan_check_write+0x18/0x20
[   26.902101]  kasan_atomics_helper+0xa2b/0x5450
[   26.902131]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.902161]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.902193]  ? kasan_atomics+0x152/0x310
[   26.902228]  kasan_atomics+0x1dc/0x310
[   26.902257]  ? __pfx_kasan_atomics+0x10/0x10
[   26.902289]  ? __pfx_read_tsc+0x10/0x10
[   26.902318]  ? ktime_get_ts64+0x86/0x230
[   26.902350]  kunit_try_run_case+0x1a5/0x480
[   26.902381]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.902409]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.902438]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.902468]  ? __kthread_parkme+0x82/0x180
[   26.902500]  ? preempt_count_sub+0x50/0x80
[   26.902543]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.902575]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.902608]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.902653]  kthread+0x337/0x6f0
[   26.902680]  ? trace_preempt_on+0x20/0xc0
[   26.902711]  ? __pfx_kthread+0x10/0x10
[   26.902739]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.902772]  ? calculate_sigpending+0x7b/0xa0
[   26.902803]  ? __pfx_kthread+0x10/0x10
[   26.902832]  ret_from_fork+0x116/0x1d0
[   26.902858]  ? __pfx_kthread+0x10/0x10
[   26.902886]  ret_from_fork_asm+0x1a/0x30
[   26.902929]  </TASK>
[   26.902943] 
[   26.910429] Allocated by task 313:
[   26.910635]  kasan_save_stack+0x45/0x70
[   26.910866]  kasan_save_track+0x18/0x40
[   26.911091]  kasan_save_alloc_info+0x3b/0x50
[   26.911331]  __kasan_kmalloc+0xb7/0xc0
[   26.911539]  __kmalloc_cache_noprof+0x189/0x420
[   26.911821]  kasan_atomics+0x95/0x310
[   26.911958]  kunit_try_run_case+0x1a5/0x480
[   26.912205]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.912445]  kthread+0x337/0x6f0
[   26.912582]  ret_from_fork+0x116/0x1d0
[   26.912723]  ret_from_fork_asm+0x1a/0x30
[   26.912867] 
[   26.912938] The buggy address belongs to the object at ffff888105926b00
[   26.912938]  which belongs to the cache kmalloc-64 of size 64
[   26.913541] The buggy address is located 0 bytes to the right of
[   26.913541]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   26.914086] 
[   26.914179] The buggy address belongs to the physical page:
[   26.914378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   26.914632] flags: 0x200000000000000(node=0|zone=2)
[   26.914885] page_type: f5(slab)
[   26.915055] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.915476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.915851] page dumped because: kasan: bad access detected
[   26.916102] 
[   26.916196] Memory state around the buggy address:
[   26.916403]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.916652]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.917032] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.917347]                                      ^
[   26.917503]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.917981]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.918276] ==================================================================
[   26.710541] ==================================================================
[   26.711244] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   26.711598] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313
[   26.712107] 
[   26.712236] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.712300] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.712316] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.712341] Call Trace:
[   26.712368]  <TASK>
[   26.712385]  dump_stack_lvl+0x73/0xb0
[   26.712420]  print_report+0xd1/0x610
[   26.712450]  ? __virt_addr_valid+0x1db/0x2d0
[   26.712481]  ? kasan_atomics_helper+0x4b3a/0x5450
[   26.712508]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.712554]  ? kasan_atomics_helper+0x4b3a/0x5450
[   26.712583]  kasan_report+0x141/0x180
[   26.712612]  ? kasan_atomics_helper+0x4b3a/0x5450
[   26.712649]  __asan_report_store4_noabort+0x1b/0x30
[   26.712737]  kasan_atomics_helper+0x4b3a/0x5450
[   26.712769]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.712809]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.712841]  ? kasan_atomics+0x152/0x310
[   26.712896]  kasan_atomics+0x1dc/0x310
[   26.712926]  ? __pfx_kasan_atomics+0x10/0x10
[   26.712958]  ? __pfx_read_tsc+0x10/0x10
[   26.712996]  ? ktime_get_ts64+0x86/0x230
[   26.713029]  kunit_try_run_case+0x1a5/0x480
[   26.713059]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.713087]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.713118]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.713147]  ? __kthread_parkme+0x82/0x180
[   26.713174]  ? preempt_count_sub+0x50/0x80
[   26.713206]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.713235]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.713269]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.713302]  kthread+0x337/0x6f0
[   26.713329]  ? trace_preempt_on+0x20/0xc0
[   26.713360]  ? __pfx_kthread+0x10/0x10
[   26.713388]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.713418]  ? calculate_sigpending+0x7b/0xa0
[   26.713459]  ? __pfx_kthread+0x10/0x10
[   26.713489]  ret_from_fork+0x116/0x1d0
[   26.713536]  ? __pfx_kthread+0x10/0x10
[   26.713564]  ret_from_fork_asm+0x1a/0x30
[   26.713607]  </TASK>
[   26.713620] 
[   26.721699] Allocated by task 313:
[   26.721883]  kasan_save_stack+0x45/0x70
[   26.722180]  kasan_save_track+0x18/0x40
[   26.722405]  kasan_save_alloc_info+0x3b/0x50
[   26.722581]  __kasan_kmalloc+0xb7/0xc0
[   26.722720]  __kmalloc_cache_noprof+0x189/0x420
[   26.723038]  kasan_atomics+0x95/0x310
[   26.723391]  kunit_try_run_case+0x1a5/0x480
[   26.723624]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.723934]  kthread+0x337/0x6f0
[   26.724100]  ret_from_fork+0x116/0x1d0
[   26.724309]  ret_from_fork_asm+0x1a/0x30
[   26.724524] 
[   26.724687] The buggy address belongs to the object at ffff888105926b00
[   26.724687]  which belongs to the cache kmalloc-64 of size 64
[   26.725187] The buggy address is located 0 bytes to the right of
[   26.725187]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   26.725583] 
[   26.725806] The buggy address belongs to the physical page:
[   26.726115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   26.726467] flags: 0x200000000000000(node=0|zone=2)
[   26.726867] page_type: f5(slab)
[   26.727035] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.727271] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.727621] page dumped because: kasan: bad access detected
[   26.727878] 
[   26.728160] Memory state around the buggy address:
[   26.728421]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.728805]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.729128] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.729438]                                      ^
[   26.729741]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.730069]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.730380] ==================================================================
[   27.544338] ==================================================================
[   27.544872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   27.545205] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.545514] 
[   27.545605] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.545668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.545684] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.545708] Call Trace:
[   27.545723]  <TASK>
[   27.545740]  dump_stack_lvl+0x73/0xb0
[   27.545799]  print_report+0xd1/0x610
[   27.545830]  ? __virt_addr_valid+0x1db/0x2d0
[   27.545860]  ? kasan_atomics_helper+0x194a/0x5450
[   27.545887]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.545920]  ? kasan_atomics_helper+0x194a/0x5450
[   27.545949]  kasan_report+0x141/0x180
[   27.545978]  ? kasan_atomics_helper+0x194a/0x5450
[   27.546014]  kasan_check_range+0x10c/0x1c0
[   27.546044]  __kasan_check_write+0x18/0x20
[   27.546074]  kasan_atomics_helper+0x194a/0x5450
[   27.546103]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.546132]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.546164]  ? kasan_atomics+0x152/0x310
[   27.546198]  kasan_atomics+0x1dc/0x310
[   27.546247]  ? __pfx_kasan_atomics+0x10/0x10
[   27.546278]  ? __pfx_read_tsc+0x10/0x10
[   27.546322]  ? ktime_get_ts64+0x86/0x230
[   27.546367]  kunit_try_run_case+0x1a5/0x480
[   27.546412]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.546452]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.546511]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.546567]  ? __kthread_parkme+0x82/0x180
[   27.546596]  ? preempt_count_sub+0x50/0x80
[   27.546642]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.546674]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.546709]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.546742]  kthread+0x337/0x6f0
[   27.546769]  ? trace_preempt_on+0x20/0xc0
[   27.546799]  ? __pfx_kthread+0x10/0x10
[   27.546827]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.546859]  ? calculate_sigpending+0x7b/0xa0
[   27.546889]  ? __pfx_kthread+0x10/0x10
[   27.546919]  ret_from_fork+0x116/0x1d0
[   27.546944]  ? __pfx_kthread+0x10/0x10
[   27.546972]  ret_from_fork_asm+0x1a/0x30
[   27.547014]  </TASK>
[   27.547028] 
[   27.554895] Allocated by task 313:
[   27.555067]  kasan_save_stack+0x45/0x70
[   27.555224]  kasan_save_track+0x18/0x40
[   27.555385]  kasan_save_alloc_info+0x3b/0x50
[   27.555634]  __kasan_kmalloc+0xb7/0xc0
[   27.555822]  __kmalloc_cache_noprof+0x189/0x420
[   27.556036]  kasan_atomics+0x95/0x310
[   27.556237]  kunit_try_run_case+0x1a5/0x480
[   27.556441]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.556701]  kthread+0x337/0x6f0
[   27.556862]  ret_from_fork+0x116/0x1d0
[   27.557069]  ret_from_fork_asm+0x1a/0x30
[   27.557248] 
[   27.557361] The buggy address belongs to the object at ffff888105926b00
[   27.557361]  which belongs to the cache kmalloc-64 of size 64
[   27.557841] The buggy address is located 0 bytes to the right of
[   27.557841]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.558398] 
[   27.558495] The buggy address belongs to the physical page:
[   27.558752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.559069] flags: 0x200000000000000(node=0|zone=2)
[   27.559337] page_type: f5(slab)
[   27.559557] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.559896] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.560230] page dumped because: kasan: bad access detected
[   27.560479] 
[   27.560593] Memory state around the buggy address:
[   27.560815]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.561028]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.561239] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.561481]                                      ^
[   27.561822]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.562166]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.562489] ==================================================================
[   27.766709] ==================================================================
[   27.767089] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   27.767460] Read of size 8 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.767837] 
[   27.767952] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.768015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.768031] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.768068] Call Trace:
[   27.768088]  <TASK>
[   27.768106]  dump_stack_lvl+0x73/0xb0
[   27.768150]  print_report+0xd1/0x610
[   27.768181]  ? __virt_addr_valid+0x1db/0x2d0
[   27.768211]  ? kasan_atomics_helper+0x4f71/0x5450
[   27.768250]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.768284]  ? kasan_atomics_helper+0x4f71/0x5450
[   27.768314]  kasan_report+0x141/0x180
[   27.768344]  ? kasan_atomics_helper+0x4f71/0x5450
[   27.768380]  __asan_report_load8_noabort+0x18/0x20
[   27.768411]  kasan_atomics_helper+0x4f71/0x5450
[   27.768442]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.768471]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.768502]  ? kasan_atomics+0x152/0x310
[   27.768552]  kasan_atomics+0x1dc/0x310
[   27.768582]  ? __pfx_kasan_atomics+0x10/0x10
[   27.768639]  ? __pfx_read_tsc+0x10/0x10
[   27.768669]  ? ktime_get_ts64+0x86/0x230
[   27.768703]  kunit_try_run_case+0x1a5/0x480
[   27.768744]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.768772]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.768811]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.768841]  ? __kthread_parkme+0x82/0x180
[   27.768869]  ? preempt_count_sub+0x50/0x80
[   27.768901]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.768933]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.768966]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.769000]  kthread+0x337/0x6f0
[   27.769027]  ? trace_preempt_on+0x20/0xc0
[   27.769057]  ? __pfx_kthread+0x10/0x10
[   27.769094]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.769126]  ? calculate_sigpending+0x7b/0xa0
[   27.769157]  ? __pfx_kthread+0x10/0x10
[   27.769197]  ret_from_fork+0x116/0x1d0
[   27.769224]  ? __pfx_kthread+0x10/0x10
[   27.769263]  ret_from_fork_asm+0x1a/0x30
[   27.769305]  </TASK>
[   27.769330] 
[   27.776504] Allocated by task 313:
[   27.776737]  kasan_save_stack+0x45/0x70
[   27.776941]  kasan_save_track+0x18/0x40
[   27.777153]  kasan_save_alloc_info+0x3b/0x50
[   27.777381]  __kasan_kmalloc+0xb7/0xc0
[   27.777585]  __kmalloc_cache_noprof+0x189/0x420
[   27.777804]  kasan_atomics+0x95/0x310
[   27.777945]  kunit_try_run_case+0x1a5/0x480
[   27.778092]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.778377]  kthread+0x337/0x6f0
[   27.778588]  ret_from_fork+0x116/0x1d0
[   27.778801]  ret_from_fork_asm+0x1a/0x30
[   27.779025] 
[   27.779123] The buggy address belongs to the object at ffff888105926b00
[   27.779123]  which belongs to the cache kmalloc-64 of size 64
[   27.779638] The buggy address is located 0 bytes to the right of
[   27.779638]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.780158] 
[   27.780276] The buggy address belongs to the physical page:
[   27.780504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.780865] flags: 0x200000000000000(node=0|zone=2)
[   27.781086] page_type: f5(slab)
[   27.781207] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.781444] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.781708] page dumped because: kasan: bad access detected
[   27.781988] 
[   27.782080] Memory state around the buggy address:
[   27.782301]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.782655]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.782960] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.783174]                                      ^
[   27.783331]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.783556]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.783927] ==================================================================
[   26.853001] ==================================================================
[   26.853321] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   26.853737] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313
[   26.854084] 
[   26.854258] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.854328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.854346] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.854371] Call Trace:
[   26.854421]  <TASK>
[   26.854441]  dump_stack_lvl+0x73/0xb0
[   26.854495]  print_report+0xd1/0x610
[   26.854536]  ? __virt_addr_valid+0x1db/0x2d0
[   26.854566]  ? kasan_atomics_helper+0x8f9/0x5450
[   26.854636]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.854670]  ? kasan_atomics_helper+0x8f9/0x5450
[   26.854698]  kasan_report+0x141/0x180
[   26.854763]  ? kasan_atomics_helper+0x8f9/0x5450
[   26.854810]  kasan_check_range+0x10c/0x1c0
[   26.854842]  __kasan_check_write+0x18/0x20
[   26.854873]  kasan_atomics_helper+0x8f9/0x5450
[   26.854904]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.854934]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.854995]  ? kasan_atomics+0x152/0x310
[   26.855040]  kasan_atomics+0x1dc/0x310
[   26.855071]  ? __pfx_kasan_atomics+0x10/0x10
[   26.855103]  ? __pfx_read_tsc+0x10/0x10
[   26.855131]  ? ktime_get_ts64+0x86/0x230
[   26.855165]  kunit_try_run_case+0x1a5/0x480
[   26.855194]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.855222]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.855252]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.855282]  ? __kthread_parkme+0x82/0x180
[   26.855310]  ? preempt_count_sub+0x50/0x80
[   26.855341]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.855371]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.855404]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.855438]  kthread+0x337/0x6f0
[   26.855464]  ? trace_preempt_on+0x20/0xc0
[   26.855494]  ? __pfx_kthread+0x10/0x10
[   26.855521]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.855564]  ? calculate_sigpending+0x7b/0xa0
[   26.855640]  ? __pfx_kthread+0x10/0x10
[   26.855669]  ret_from_fork+0x116/0x1d0
[   26.855696]  ? __pfx_kthread+0x10/0x10
[   26.855724]  ret_from_fork_asm+0x1a/0x30
[   26.855766]  </TASK>
[   26.855780] 
[   26.864346] Allocated by task 313:
[   26.864479]  kasan_save_stack+0x45/0x70
[   26.864938]  kasan_save_track+0x18/0x40
[   26.865127]  kasan_save_alloc_info+0x3b/0x50
[   26.865320]  __kasan_kmalloc+0xb7/0xc0
[   26.865484]  __kmalloc_cache_noprof+0x189/0x420
[   26.866306]  kasan_atomics+0x95/0x310
[   26.866466]  kunit_try_run_case+0x1a5/0x480
[   26.866803]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.867360]  kthread+0x337/0x6f0
[   26.867914]  ret_from_fork+0x116/0x1d0
[   26.868136]  ret_from_fork_asm+0x1a/0x30
[   26.868323] 
[   26.868410] The buggy address belongs to the object at ffff888105926b00
[   26.868410]  which belongs to the cache kmalloc-64 of size 64
[   26.869571] The buggy address is located 0 bytes to the right of
[   26.869571]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   26.870705] 
[   26.870895] The buggy address belongs to the physical page:
[   26.871397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   26.872040] flags: 0x200000000000000(node=0|zone=2)
[   26.872407] page_type: f5(slab)
[   26.872763] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.873103] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.873411] page dumped because: kasan: bad access detected
[   26.873767] 
[   26.873857] Memory state around the buggy address:
[   26.874064]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.874359]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.875213] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.876168]                                      ^
[   26.876540]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.877117]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.877763] ==================================================================
[   26.570021] ==================================================================
[   26.570339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   26.570698] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313
[   26.571165] 
[   26.571264] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.571339] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.571353] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.571377] Call Trace:
[   26.571391]  <TASK>
[   26.571410]  dump_stack_lvl+0x73/0xb0
[   26.571444]  print_report+0xd1/0x610
[   26.571493]  ? __virt_addr_valid+0x1db/0x2d0
[   26.571524]  ? kasan_atomics_helper+0x4ba2/0x5450
[   26.571562]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.571867]  ? kasan_atomics_helper+0x4ba2/0x5450
[   26.571897]  kasan_report+0x141/0x180
[   26.571926]  ? kasan_atomics_helper+0x4ba2/0x5450
[   26.571960]  __asan_report_store4_noabort+0x1b/0x30
[   26.572010]  kasan_atomics_helper+0x4ba2/0x5450
[   26.572039]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.572067]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.572099]  ? kasan_atomics+0x152/0x310
[   26.572132]  kasan_atomics+0x1dc/0x310
[   26.572161]  ? __pfx_kasan_atomics+0x10/0x10
[   26.572191]  ? __pfx_read_tsc+0x10/0x10
[   26.572219]  ? ktime_get_ts64+0x86/0x230
[   26.572251]  kunit_try_run_case+0x1a5/0x480
[   26.572281]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.572308]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.572357]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.572386]  ? __kthread_parkme+0x82/0x180
[   26.572413]  ? preempt_count_sub+0x50/0x80
[   26.572443]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.572472]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.572505]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.572550]  kthread+0x337/0x6f0
[   26.572575]  ? trace_preempt_on+0x20/0xc0
[   26.572607]  ? __pfx_kthread+0x10/0x10
[   26.572633]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.572664]  ? calculate_sigpending+0x7b/0xa0
[   26.572695]  ? __pfx_kthread+0x10/0x10
[   26.572722]  ret_from_fork+0x116/0x1d0
[   26.572748]  ? __pfx_kthread+0x10/0x10
[   26.572774]  ret_from_fork_asm+0x1a/0x30
[   26.572815]  </TASK>
[   26.572828] 
[   26.585958] Allocated by task 313:
[   26.586298]  kasan_save_stack+0x45/0x70
[   26.586669]  kasan_save_track+0x18/0x40
[   26.587257]  kasan_save_alloc_info+0x3b/0x50
[   26.587690]  __kasan_kmalloc+0xb7/0xc0
[   26.588138]  __kmalloc_cache_noprof+0x189/0x420
[   26.588549]  kasan_atomics+0x95/0x310
[   26.588961]  kunit_try_run_case+0x1a5/0x480
[   26.589349]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.589871]  kthread+0x337/0x6f0
[   26.590171]  ret_from_fork+0x116/0x1d0
[   26.590540]  ret_from_fork_asm+0x1a/0x30
[   26.590938] 
[   26.591095] The buggy address belongs to the object at ffff888105926b00
[   26.591095]  which belongs to the cache kmalloc-64 of size 64
[   26.592004] The buggy address is located 0 bytes to the right of
[   26.592004]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   26.592962] 
[   26.593131] The buggy address belongs to the physical page:
[   26.593629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   26.593988] flags: 0x200000000000000(node=0|zone=2)
[   26.594155] page_type: f5(slab)
[   26.594278] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.594521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.595289] page dumped because: kasan: bad access detected
[   26.595828] 
[   26.595984] Memory state around the buggy address:
[   26.596394]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.597484]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.598234] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.598650]                                      ^
[   26.599163]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.599671]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.600294] ==================================================================
[   26.878460] ==================================================================
[   26.879056] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   26.879375] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313
[   26.879813] 
[   26.879917] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.879970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.879987] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.880011] Call Trace:
[   26.880028]  <TASK>
[   26.880046]  dump_stack_lvl+0x73/0xb0
[   26.880080]  print_report+0xd1/0x610
[   26.880110]  ? __virt_addr_valid+0x1db/0x2d0
[   26.880141]  ? kasan_atomics_helper+0x992/0x5450
[   26.880169]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.880202]  ? kasan_atomics_helper+0x992/0x5450
[   26.880232]  kasan_report+0x141/0x180
[   26.880262]  ? kasan_atomics_helper+0x992/0x5450
[   26.880297]  kasan_check_range+0x10c/0x1c0
[   26.880328]  __kasan_check_write+0x18/0x20
[   26.880359]  kasan_atomics_helper+0x992/0x5450
[   26.880390]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.880419]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.880453]  ? kasan_atomics+0x152/0x310
[   26.880488]  kasan_atomics+0x1dc/0x310
[   26.880518]  ? __pfx_kasan_atomics+0x10/0x10
[   26.880611]  ? __pfx_read_tsc+0x10/0x10
[   26.880640]  ? ktime_get_ts64+0x86/0x230
[   26.880673]  kunit_try_run_case+0x1a5/0x480
[   26.880704]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.880732]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.880762]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.880792]  ? __kthread_parkme+0x82/0x180
[   26.880820]  ? preempt_count_sub+0x50/0x80
[   26.880852]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.880883]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.880916]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.880950]  kthread+0x337/0x6f0
[   26.880977]  ? trace_preempt_on+0x20/0xc0
[   26.881007]  ? __pfx_kthread+0x10/0x10
[   26.881051]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.881094]  ? calculate_sigpending+0x7b/0xa0
[   26.881125]  ? __pfx_kthread+0x10/0x10
[   26.881167]  ret_from_fork+0x116/0x1d0
[   26.881193]  ? __pfx_kthread+0x10/0x10
[   26.881221]  ret_from_fork_asm+0x1a/0x30
[   26.881263]  </TASK>
[   26.881278] 
[   26.889270] Allocated by task 313:
[   26.889480]  kasan_save_stack+0x45/0x70
[   26.889689]  kasan_save_track+0x18/0x40
[   26.889886]  kasan_save_alloc_info+0x3b/0x50
[   26.890117]  __kasan_kmalloc+0xb7/0xc0
[   26.890400]  __kmalloc_cache_noprof+0x189/0x420
[   26.890583]  kasan_atomics+0x95/0x310
[   26.890958]  kunit_try_run_case+0x1a5/0x480
[   26.891175]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.891433]  kthread+0x337/0x6f0
[   26.891696]  ret_from_fork+0x116/0x1d0
[   26.891882]  ret_from_fork_asm+0x1a/0x30
[   26.892031] 
[   26.892103] The buggy address belongs to the object at ffff888105926b00
[   26.892103]  which belongs to the cache kmalloc-64 of size 64
[   26.892550] The buggy address is located 0 bytes to the right of
[   26.892550]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   26.893303] 
[   26.893490] The buggy address belongs to the physical page:
[   26.893771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   26.894026] flags: 0x200000000000000(node=0|zone=2)
[   26.894263] page_type: f5(slab)
[   26.894460] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.894999] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.895330] page dumped because: kasan: bad access detected
[   26.895585] 
[   26.895690] Memory state around the buggy address:
[   26.896033]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.896262]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.896643] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.897126]                                      ^
[   26.897301]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.897518]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.898133] ==================================================================
[   27.023987] ==================================================================
[   27.024515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   27.024768] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.025319] 
[   27.025444] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.025499] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.025515] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.025550] Call Trace:
[   27.025568]  <TASK>
[   27.025585]  dump_stack_lvl+0x73/0xb0
[   27.025619]  print_report+0xd1/0x610
[   27.025651]  ? __virt_addr_valid+0x1db/0x2d0
[   27.025682]  ? kasan_atomics_helper+0xde0/0x5450
[   27.025736]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.025771]  ? kasan_atomics_helper+0xde0/0x5450
[   27.025801]  kasan_report+0x141/0x180
[   27.025849]  ? kasan_atomics_helper+0xde0/0x5450
[   27.025885]  kasan_check_range+0x10c/0x1c0
[   27.025932]  __kasan_check_write+0x18/0x20
[   27.025968]  kasan_atomics_helper+0xde0/0x5450
[   27.026016]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.026046]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.026095]  ? kasan_atomics+0x152/0x310
[   27.026130]  kasan_atomics+0x1dc/0x310
[   27.026160]  ? __pfx_kasan_atomics+0x10/0x10
[   27.026192]  ? __pfx_read_tsc+0x10/0x10
[   27.026221]  ? ktime_get_ts64+0x86/0x230
[   27.026272]  kunit_try_run_case+0x1a5/0x480
[   27.026303]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.026331]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.026360]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.026408]  ? __kthread_parkme+0x82/0x180
[   27.026435]  ? preempt_count_sub+0x50/0x80
[   27.026468]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.026502]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.026546]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.026598]  kthread+0x337/0x6f0
[   27.026632]  ? trace_preempt_on+0x20/0xc0
[   27.026661]  ? __pfx_kthread+0x10/0x10
[   27.026689]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.026720]  ? calculate_sigpending+0x7b/0xa0
[   27.026766]  ? __pfx_kthread+0x10/0x10
[   27.026810]  ret_from_fork+0x116/0x1d0
[   27.026861]  ? __pfx_kthread+0x10/0x10
[   27.026903]  ret_from_fork_asm+0x1a/0x30
[   27.026970]  </TASK>
[   27.026997] 
[   27.040925] Allocated by task 313:
[   27.041061]  kasan_save_stack+0x45/0x70
[   27.041210]  kasan_save_track+0x18/0x40
[   27.041345]  kasan_save_alloc_info+0x3b/0x50
[   27.041496]  __kasan_kmalloc+0xb7/0xc0
[   27.041801]  __kmalloc_cache_noprof+0x189/0x420
[   27.042305]  kasan_atomics+0x95/0x310
[   27.042588]  kunit_try_run_case+0x1a5/0x480
[   27.042835]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.043086]  kthread+0x337/0x6f0
[   27.043425]  ret_from_fork+0x116/0x1d0
[   27.043712]  ret_from_fork_asm+0x1a/0x30
[   27.044043] 
[   27.044282] The buggy address belongs to the object at ffff888105926b00
[   27.044282]  which belongs to the cache kmalloc-64 of size 64
[   27.044941] The buggy address is located 0 bytes to the right of
[   27.044941]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.045592] 
[   27.045725] The buggy address belongs to the physical page:
[   27.046155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.046508] flags: 0x200000000000000(node=0|zone=2)
[   27.046909] page_type: f5(slab)
[   27.047175] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.047493] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.048078] page dumped because: kasan: bad access detected
[   27.048389] 
[   27.048514] Memory state around the buggy address:
[   27.048906]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.049225]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.049693] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.050092]                                      ^
[   27.050408]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.050863]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.051145] ==================================================================
[   26.831701] ==================================================================
[   26.832225] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   26.832658] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313
[   26.833019] 
[   26.833123] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.833179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.833195] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.833222] Call Trace:
[   26.833276]  <TASK>
[   26.833294]  dump_stack_lvl+0x73/0xb0
[   26.833343]  print_report+0xd1/0x610
[   26.833402]  ? __virt_addr_valid+0x1db/0x2d0
[   26.833434]  ? kasan_atomics_helper+0x860/0x5450
[   26.833473]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.833506]  ? kasan_atomics_helper+0x860/0x5450
[   26.833544]  kasan_report+0x141/0x180
[   26.833611]  ? kasan_atomics_helper+0x860/0x5450
[   26.833683]  kasan_check_range+0x10c/0x1c0
[   26.833715]  __kasan_check_write+0x18/0x20
[   26.833756]  kasan_atomics_helper+0x860/0x5450
[   26.833786]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.833815]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.833849]  ? kasan_atomics+0x152/0x310
[   26.833883]  kasan_atomics+0x1dc/0x310
[   26.833943]  ? __pfx_kasan_atomics+0x10/0x10
[   26.833975]  ? __pfx_read_tsc+0x10/0x10
[   26.834014]  ? ktime_get_ts64+0x86/0x230
[   26.834048]  kunit_try_run_case+0x1a5/0x480
[   26.834079]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.834107]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.834137]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.834167]  ? __kthread_parkme+0x82/0x180
[   26.834194]  ? preempt_count_sub+0x50/0x80
[   26.834226]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.834257]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.834290]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.834324]  kthread+0x337/0x6f0
[   26.834350]  ? trace_preempt_on+0x20/0xc0
[   26.834382]  ? __pfx_kthread+0x10/0x10
[   26.834411]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.834442]  ? calculate_sigpending+0x7b/0xa0
[   26.834480]  ? __pfx_kthread+0x10/0x10
[   26.834509]  ret_from_fork+0x116/0x1d0
[   26.834544]  ? __pfx_kthread+0x10/0x10
[   26.834571]  ret_from_fork_asm+0x1a/0x30
[   26.834662]  </TASK>
[   26.834676] 
[   26.843581] Allocated by task 313:
[   26.843859]  kasan_save_stack+0x45/0x70
[   26.844073]  kasan_save_track+0x18/0x40
[   26.844239]  kasan_save_alloc_info+0x3b/0x50
[   26.844439]  __kasan_kmalloc+0xb7/0xc0
[   26.844734]  __kmalloc_cache_noprof+0x189/0x420
[   26.844902]  kasan_atomics+0x95/0x310
[   26.845096]  kunit_try_run_case+0x1a5/0x480
[   26.845357]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.845789]  kthread+0x337/0x6f0
[   26.845950]  ret_from_fork+0x116/0x1d0
[   26.846090]  ret_from_fork_asm+0x1a/0x30
[   26.846296] 
[   26.846391] The buggy address belongs to the object at ffff888105926b00
[   26.846391]  which belongs to the cache kmalloc-64 of size 64
[   26.847154] The buggy address is located 0 bytes to the right of
[   26.847154]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   26.847559] 
[   26.847895] The buggy address belongs to the physical page:
[   26.848227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   26.848591] flags: 0x200000000000000(node=0|zone=2)
[   26.848779] page_type: f5(slab)
[   26.848944] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.849283] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.849585] page dumped because: kasan: bad access detected
[   26.849904] 
[   26.849980] Memory state around the buggy address:
[   26.850161]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.850484]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.850921] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.851263]                                      ^
[   26.851437]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.852019]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.852330] ==================================================================
[   26.943422] ==================================================================
[   26.944240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   26.944496] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313
[   26.945230] 
[   26.945337] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.945396] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.945413] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.945439] Call Trace:
[   26.945461]  <TASK>
[   26.945484]  dump_stack_lvl+0x73/0xb0
[   26.945523]  print_report+0xd1/0x610
[   26.945565]  ? __virt_addr_valid+0x1db/0x2d0
[   26.945603]  ? kasan_atomics_helper+0xb6a/0x5450
[   26.945880]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.945917]  ? kasan_atomics_helper+0xb6a/0x5450
[   26.945947]  kasan_report+0x141/0x180
[   26.945979]  ? kasan_atomics_helper+0xb6a/0x5450
[   26.946014]  kasan_check_range+0x10c/0x1c0
[   26.946047]  __kasan_check_write+0x18/0x20
[   26.946076]  kasan_atomics_helper+0xb6a/0x5450
[   26.946105]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.946135]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.946167]  ? kasan_atomics+0x152/0x310
[   26.946201]  kasan_atomics+0x1dc/0x310
[   26.946232]  ? __pfx_kasan_atomics+0x10/0x10
[   26.946264]  ? __pfx_read_tsc+0x10/0x10
[   26.946292]  ? ktime_get_ts64+0x86/0x230
[   26.946325]  kunit_try_run_case+0x1a5/0x480
[   26.946356]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.946384]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.946414]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.946444]  ? __kthread_parkme+0x82/0x180
[   26.946477]  ? preempt_count_sub+0x50/0x80
[   26.946509]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.946553]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.946586]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.946634]  kthread+0x337/0x6f0
[   26.946661]  ? trace_preempt_on+0x20/0xc0
[   26.946692]  ? __pfx_kthread+0x10/0x10
[   26.946720]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.946752]  ? calculate_sigpending+0x7b/0xa0
[   26.946784]  ? __pfx_kthread+0x10/0x10
[   26.946813]  ret_from_fork+0x116/0x1d0
[   26.946839]  ? __pfx_kthread+0x10/0x10
[   26.946867]  ret_from_fork_asm+0x1a/0x30
[   26.946911]  </TASK>
[   26.946926] 
[   26.960619] Allocated by task 313:
[   26.961050]  kasan_save_stack+0x45/0x70
[   26.961206]  kasan_save_track+0x18/0x40
[   26.961343]  kasan_save_alloc_info+0x3b/0x50
[   26.961492]  __kasan_kmalloc+0xb7/0xc0
[   26.961681]  __kmalloc_cache_noprof+0x189/0x420
[   26.961948]  kasan_atomics+0x95/0x310
[   26.962134]  kunit_try_run_case+0x1a5/0x480
[   26.962341]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.962540]  kthread+0x337/0x6f0
[   26.962722]  ret_from_fork+0x116/0x1d0
[   26.963083]  ret_from_fork_asm+0x1a/0x30
[   26.963236] 
[   26.963333] The buggy address belongs to the object at ffff888105926b00
[   26.963333]  which belongs to the cache kmalloc-64 of size 64
[   26.963864] The buggy address is located 0 bytes to the right of
[   26.963864]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   26.964360] 
[   26.964430] The buggy address belongs to the physical page:
[   26.964609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   26.965067] flags: 0x200000000000000(node=0|zone=2)
[   26.965333] page_type: f5(slab)
[   26.965545] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.965911] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.966210] page dumped because: kasan: bad access detected
[   26.966382] 
[   26.966480] Memory state around the buggy address:
[   26.966728]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.967069]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.967391] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.967763]                                      ^
[   26.967963]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.968171]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.968482] ==================================================================
[   27.643787] ==================================================================
[   27.644131] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   27.644467] Read of size 8 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.644792] 
[   27.644893] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.644945] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.644961] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.644986] Call Trace:
[   27.645001]  <TASK>
[   27.645019]  dump_stack_lvl+0x73/0xb0
[   27.645051]  print_report+0xd1/0x610
[   27.645079]  ? __virt_addr_valid+0x1db/0x2d0
[   27.645110]  ? kasan_atomics_helper+0x4f30/0x5450
[   27.645137]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.645170]  ? kasan_atomics_helper+0x4f30/0x5450
[   27.645199]  kasan_report+0x141/0x180
[   27.645229]  ? kasan_atomics_helper+0x4f30/0x5450
[   27.645264]  __asan_report_load8_noabort+0x18/0x20
[   27.645295]  kasan_atomics_helper+0x4f30/0x5450
[   27.645324]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.645353]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.645385]  ? kasan_atomics+0x152/0x310
[   27.645420]  kasan_atomics+0x1dc/0x310
[   27.645451]  ? __pfx_kasan_atomics+0x10/0x10
[   27.645481]  ? __pfx_read_tsc+0x10/0x10
[   27.645509]  ? ktime_get_ts64+0x86/0x230
[   27.645554]  kunit_try_run_case+0x1a5/0x480
[   27.645584]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.645612]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.645642]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.645671]  ? __kthread_parkme+0x82/0x180
[   27.645698]  ? preempt_count_sub+0x50/0x80
[   27.645730]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.645759]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.645793]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.645826]  kthread+0x337/0x6f0
[   27.645852]  ? trace_preempt_on+0x20/0xc0
[   27.645882]  ? __pfx_kthread+0x10/0x10
[   27.645910]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.645941]  ? calculate_sigpending+0x7b/0xa0
[   27.645971]  ? __pfx_kthread+0x10/0x10
[   27.645999]  ret_from_fork+0x116/0x1d0
[   27.646025]  ? __pfx_kthread+0x10/0x10
[   27.646053]  ret_from_fork_asm+0x1a/0x30
[   27.646094]  </TASK>
[   27.646107] 
[   27.653337] Allocated by task 313:
[   27.653496]  kasan_save_stack+0x45/0x70
[   27.653718]  kasan_save_track+0x18/0x40
[   27.653904]  kasan_save_alloc_info+0x3b/0x50
[   27.654090]  __kasan_kmalloc+0xb7/0xc0
[   27.654225]  __kmalloc_cache_noprof+0x189/0x420
[   27.654382]  kasan_atomics+0x95/0x310
[   27.654541]  kunit_try_run_case+0x1a5/0x480
[   27.654814]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.655075]  kthread+0x337/0x6f0
[   27.655244]  ret_from_fork+0x116/0x1d0
[   27.655403]  ret_from_fork_asm+0x1a/0x30
[   27.655552] 
[   27.655623] The buggy address belongs to the object at ffff888105926b00
[   27.655623]  which belongs to the cache kmalloc-64 of size 64
[   27.656165] The buggy address is located 0 bytes to the right of
[   27.656165]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.656677] 
[   27.656771] The buggy address belongs to the physical page:
[   27.657005] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.657284] flags: 0x200000000000000(node=0|zone=2)
[   27.657506] page_type: f5(slab)
[   27.657659] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.658000] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.658240] page dumped because: kasan: bad access detected
[   27.658497] 
[   27.658579] Memory state around the buggy address:
[   27.658868]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.659139]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.659364] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.659911]                                      ^
[   27.660123]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.660410]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.660765] ==================================================================
[   26.790559] ==================================================================
[   26.790965] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   26.791277] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313
[   26.791720] 
[   26.791818] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.791877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.791893] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.791921] Call Trace:
[   26.791937]  <TASK>
[   26.791953]  dump_stack_lvl+0x73/0xb0
[   26.791997]  print_report+0xd1/0x610
[   26.792027]  ? __virt_addr_valid+0x1db/0x2d0
[   26.792058]  ? kasan_atomics_helper+0x72f/0x5450
[   26.792088]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.792135]  ? kasan_atomics_helper+0x72f/0x5450
[   26.792165]  kasan_report+0x141/0x180
[   26.792195]  ? kasan_atomics_helper+0x72f/0x5450
[   26.792243]  kasan_check_range+0x10c/0x1c0
[   26.792275]  __kasan_check_write+0x18/0x20
[   26.792306]  kasan_atomics_helper+0x72f/0x5450
[   26.792338]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.792369]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.792401]  ? kasan_atomics+0x152/0x310
[   26.792437]  kasan_atomics+0x1dc/0x310
[   26.792467]  ? __pfx_kasan_atomics+0x10/0x10
[   26.792507]  ? __pfx_read_tsc+0x10/0x10
[   26.792552]  ? ktime_get_ts64+0x86/0x230
[   26.792638]  kunit_try_run_case+0x1a5/0x480
[   26.792671]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.792701]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.792733]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.792764]  ? __kthread_parkme+0x82/0x180
[   26.792792]  ? preempt_count_sub+0x50/0x80
[   26.792825]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.792857]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.792891]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.792927]  kthread+0x337/0x6f0
[   26.792953]  ? trace_preempt_on+0x20/0xc0
[   26.792984]  ? __pfx_kthread+0x10/0x10
[   26.793013]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.793045]  ? calculate_sigpending+0x7b/0xa0
[   26.793075]  ? __pfx_kthread+0x10/0x10
[   26.793106]  ret_from_fork+0x116/0x1d0
[   26.793133]  ? __pfx_kthread+0x10/0x10
[   26.793171]  ret_from_fork_asm+0x1a/0x30
[   26.793214]  </TASK>
[   26.793228] 
[   26.801468] Allocated by task 313:
[   26.801771]  kasan_save_stack+0x45/0x70
[   26.801982]  kasan_save_track+0x18/0x40
[   26.802127]  kasan_save_alloc_info+0x3b/0x50
[   26.802280]  __kasan_kmalloc+0xb7/0xc0
[   26.802488]  __kmalloc_cache_noprof+0x189/0x420
[   26.802733]  kasan_atomics+0x95/0x310
[   26.802930]  kunit_try_run_case+0x1a5/0x480
[   26.803291]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.803482]  kthread+0x337/0x6f0
[   26.803788]  ret_from_fork+0x116/0x1d0
[   26.803980]  ret_from_fork_asm+0x1a/0x30
[   26.804241] 
[   26.804346] The buggy address belongs to the object at ffff888105926b00
[   26.804346]  which belongs to the cache kmalloc-64 of size 64
[   26.804942] The buggy address is located 0 bytes to the right of
[   26.804942]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   26.805491] 
[   26.805597] The buggy address belongs to the physical page:
[   26.806163] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   26.806461] flags: 0x200000000000000(node=0|zone=2)
[   26.806782] page_type: f5(slab)
[   26.807014] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.807338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.807790] page dumped because: kasan: bad access detected
[   26.808077] 
[   26.808199] Memory state around the buggy address:
[   26.808381]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.808777]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.809073] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.809293]                                      ^
[   26.809452]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.809786]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.810128] ==================================================================
[   27.134578] ==================================================================
[   27.135103] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   27.135492] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.135739] 
[   27.135825] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.135890] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.135907] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.135933] Call Trace:
[   27.135949]  <TASK>
[   27.135967]  dump_stack_lvl+0x73/0xb0
[   27.136070]  print_report+0xd1/0x610
[   27.136129]  ? __virt_addr_valid+0x1db/0x2d0
[   27.136185]  ? kasan_atomics_helper+0x1079/0x5450
[   27.136241]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.136274]  ? kasan_atomics_helper+0x1079/0x5450
[   27.136304]  kasan_report+0x141/0x180
[   27.136334]  ? kasan_atomics_helper+0x1079/0x5450
[   27.136369]  kasan_check_range+0x10c/0x1c0
[   27.136400]  __kasan_check_write+0x18/0x20
[   27.136431]  kasan_atomics_helper+0x1079/0x5450
[   27.136461]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.136491]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.136558]  ? kasan_atomics+0x152/0x310
[   27.136595]  kasan_atomics+0x1dc/0x310
[   27.136635]  ? __pfx_kasan_atomics+0x10/0x10
[   27.136668]  ? __pfx_read_tsc+0x10/0x10
[   27.136696]  ? ktime_get_ts64+0x86/0x230
[   27.136730]  kunit_try_run_case+0x1a5/0x480
[   27.136761]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.136822]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.136854]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.136884]  ? __kthread_parkme+0x82/0x180
[   27.136911]  ? preempt_count_sub+0x50/0x80
[   27.136974]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.137005]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.137039]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.137104]  kthread+0x337/0x6f0
[   27.137134]  ? trace_preempt_on+0x20/0xc0
[   27.137165]  ? __pfx_kthread+0x10/0x10
[   27.137192]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.137255]  ? calculate_sigpending+0x7b/0xa0
[   27.137287]  ? __pfx_kthread+0x10/0x10
[   27.137318]  ret_from_fork+0x116/0x1d0
[   27.137373]  ? __pfx_kthread+0x10/0x10
[   27.137403]  ret_from_fork_asm+0x1a/0x30
[   27.137444]  </TASK>
[   27.137458] 
[   27.145080] Allocated by task 313:
[   27.145242]  kasan_save_stack+0x45/0x70
[   27.145390]  kasan_save_track+0x18/0x40
[   27.145540]  kasan_save_alloc_info+0x3b/0x50
[   27.145893]  __kasan_kmalloc+0xb7/0xc0
[   27.146131]  __kmalloc_cache_noprof+0x189/0x420
[   27.146385]  kasan_atomics+0x95/0x310
[   27.146596]  kunit_try_run_case+0x1a5/0x480
[   27.146826]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.147067]  kthread+0x337/0x6f0
[   27.147191]  ret_from_fork+0x116/0x1d0
[   27.147325]  ret_from_fork_asm+0x1a/0x30
[   27.147471] 
[   27.147578] The buggy address belongs to the object at ffff888105926b00
[   27.147578]  which belongs to the cache kmalloc-64 of size 64
[   27.148146] The buggy address is located 0 bytes to the right of
[   27.148146]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.148738] 
[   27.148835] The buggy address belongs to the physical page:
[   27.149092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.149473] flags: 0x200000000000000(node=0|zone=2)
[   27.149768] page_type: f5(slab)
[   27.149935] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.150288] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.150615] page dumped because: kasan: bad access detected
[   27.150889] 
[   27.150995] Memory state around the buggy address:
[   27.151199]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.151552]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.151901] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.152198]                                      ^
[   27.152413]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.152634]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.152839] ==================================================================
[   26.987746] ==================================================================
[   26.988111] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   26.988393] Read of size 4 at addr ffff888105926b30 by task kunit_try_catch/313
[   26.988621] 
[   26.988714] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.988787] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.988804] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.988828] Call Trace:
[   26.988844]  <TASK>
[   26.988878]  dump_stack_lvl+0x73/0xb0
[   26.988914]  print_report+0xd1/0x610
[   26.988944]  ? __virt_addr_valid+0x1db/0x2d0
[   26.988975]  ? kasan_atomics_helper+0x4a84/0x5450
[   26.989003]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.989035]  ? kasan_atomics_helper+0x4a84/0x5450
[   26.989065]  kasan_report+0x141/0x180
[   26.989094]  ? kasan_atomics_helper+0x4a84/0x5450
[   26.989147]  __asan_report_load4_noabort+0x18/0x20
[   26.989178]  kasan_atomics_helper+0x4a84/0x5450
[   26.989208]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.989236]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.989268]  ? kasan_atomics+0x152/0x310
[   26.989304]  kasan_atomics+0x1dc/0x310
[   26.989333]  ? __pfx_kasan_atomics+0x10/0x10
[   26.989364]  ? __pfx_read_tsc+0x10/0x10
[   26.989392]  ? ktime_get_ts64+0x86/0x230
[   26.989424]  kunit_try_run_case+0x1a5/0x480
[   26.989454]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.989483]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.989514]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.989553]  ? __kthread_parkme+0x82/0x180
[   26.989581]  ? preempt_count_sub+0x50/0x80
[   26.989613]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.989662]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.989696]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.989728]  kthread+0x337/0x6f0
[   26.989754]  ? trace_preempt_on+0x20/0xc0
[   26.989785]  ? __pfx_kthread+0x10/0x10
[   26.989813]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.989843]  ? calculate_sigpending+0x7b/0xa0
[   26.989876]  ? __pfx_kthread+0x10/0x10
[   26.989905]  ret_from_fork+0x116/0x1d0
[   26.989931]  ? __pfx_kthread+0x10/0x10
[   26.989959]  ret_from_fork_asm+0x1a/0x30
[   26.990002]  </TASK>
[   26.990016] 
[   26.997458] Allocated by task 313:
[   26.997621]  kasan_save_stack+0x45/0x70
[   26.997844]  kasan_save_track+0x18/0x40
[   26.997997]  kasan_save_alloc_info+0x3b/0x50
[   26.998216]  __kasan_kmalloc+0xb7/0xc0
[   26.998424]  __kmalloc_cache_noprof+0x189/0x420
[   26.998628]  kasan_atomics+0x95/0x310
[   26.998834]  kunit_try_run_case+0x1a5/0x480
[   26.999035]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.999245]  kthread+0x337/0x6f0
[   26.999430]  ret_from_fork+0x116/0x1d0
[   26.999652]  ret_from_fork_asm+0x1a/0x30
[   26.999803] 
[   26.999897] The buggy address belongs to the object at ffff888105926b00
[   26.999897]  which belongs to the cache kmalloc-64 of size 64
[   27.000412] The buggy address is located 0 bytes to the right of
[   27.000412]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.001010] 
[   27.001106] The buggy address belongs to the physical page:
[   27.001315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.001594] flags: 0x200000000000000(node=0|zone=2)
[   27.001858] page_type: f5(slab)
[   27.002043] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.002382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.002722] page dumped because: kasan: bad access detected
[   27.002970] 
[   27.003061] Memory state around the buggy address:
[   27.003246]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.003514]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.003979] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.004350]                                      ^
[   27.004585]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.004899]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.005226] ==================================================================
[   27.504977] ==================================================================
[   27.505600] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   27.505963] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.506440] 
[   27.506806] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.506885] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.506902] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.506929] Call Trace:
[   27.506946]  <TASK>
[   27.506966]  dump_stack_lvl+0x73/0xb0
[   27.507002]  print_report+0xd1/0x610
[   27.507033]  ? __virt_addr_valid+0x1db/0x2d0
[   27.507063]  ? kasan_atomics_helper+0x1818/0x5450
[   27.507092]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.507125]  ? kasan_atomics_helper+0x1818/0x5450
[   27.507154]  kasan_report+0x141/0x180
[   27.507183]  ? kasan_atomics_helper+0x1818/0x5450
[   27.507219]  kasan_check_range+0x10c/0x1c0
[   27.507250]  __kasan_check_write+0x18/0x20
[   27.507280]  kasan_atomics_helper+0x1818/0x5450
[   27.507311]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.507342]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.507373]  ? kasan_atomics+0x152/0x310
[   27.507409]  kasan_atomics+0x1dc/0x310
[   27.507438]  ? __pfx_kasan_atomics+0x10/0x10
[   27.507469]  ? __pfx_read_tsc+0x10/0x10
[   27.507497]  ? ktime_get_ts64+0x86/0x230
[   27.507540]  kunit_try_run_case+0x1a5/0x480
[   27.507571]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.507598]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.507638]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.507668]  ? __kthread_parkme+0x82/0x180
[   27.507696]  ? preempt_count_sub+0x50/0x80
[   27.507728]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.507759]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.507792]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.507825]  kthread+0x337/0x6f0
[   27.507852]  ? trace_preempt_on+0x20/0xc0
[   27.507882]  ? __pfx_kthread+0x10/0x10
[   27.507910]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.507942]  ? calculate_sigpending+0x7b/0xa0
[   27.507974]  ? __pfx_kthread+0x10/0x10
[   27.508003]  ret_from_fork+0x116/0x1d0
[   27.508028]  ? __pfx_kthread+0x10/0x10
[   27.508057]  ret_from_fork_asm+0x1a/0x30
[   27.508099]  </TASK>
[   27.508112] 
[   27.517120] Allocated by task 313:
[   27.517287]  kasan_save_stack+0x45/0x70
[   27.517485]  kasan_save_track+0x18/0x40
[   27.517690]  kasan_save_alloc_info+0x3b/0x50
[   27.517896]  __kasan_kmalloc+0xb7/0xc0
[   27.518086]  __kmalloc_cache_noprof+0x189/0x420
[   27.518292]  kasan_atomics+0x95/0x310
[   27.518512]  kunit_try_run_case+0x1a5/0x480
[   27.518747]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.519016]  kthread+0x337/0x6f0
[   27.519184]  ret_from_fork+0x116/0x1d0
[   27.519388]  ret_from_fork_asm+0x1a/0x30
[   27.519538] 
[   27.519640] The buggy address belongs to the object at ffff888105926b00
[   27.519640]  which belongs to the cache kmalloc-64 of size 64
[   27.520188] The buggy address is located 0 bytes to the right of
[   27.520188]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.520749] 
[   27.520827] The buggy address belongs to the physical page:
[   27.521072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.521390] flags: 0x200000000000000(node=0|zone=2)
[   27.521642] page_type: f5(slab)
[   27.521814] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.522142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.522457] page dumped because: kasan: bad access detected
[   27.522718] 
[   27.522890] Memory state around the buggy address:
[   27.523110]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.523409]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.523755] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.524018]                                      ^
[   27.524212]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.524526]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.524883] ==================================================================
[   26.645217] ==================================================================
[   26.645577] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   26.646024] Read of size 4 at addr ffff888105926b30 by task kunit_try_catch/313
[   26.646358] 
[   26.646465] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.646522] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.646549] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.646574] Call Trace:
[   26.646604]  <TASK>
[   26.646622]  dump_stack_lvl+0x73/0xb0
[   26.646656]  print_report+0xd1/0x610
[   26.646686]  ? __virt_addr_valid+0x1db/0x2d0
[   26.646716]  ? kasan_atomics_helper+0x3df/0x5450
[   26.646743]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.646777]  ? kasan_atomics_helper+0x3df/0x5450
[   26.646806]  kasan_report+0x141/0x180
[   26.646836]  ? kasan_atomics_helper+0x3df/0x5450
[   26.646872]  kasan_check_range+0x10c/0x1c0
[   26.646903]  __kasan_check_read+0x15/0x20
[   26.646932]  kasan_atomics_helper+0x3df/0x5450
[   26.646962]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.646992]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.647025]  ? kasan_atomics+0x152/0x310
[   26.647060]  kasan_atomics+0x1dc/0x310
[   26.647090]  ? __pfx_kasan_atomics+0x10/0x10
[   26.647122]  ? __pfx_read_tsc+0x10/0x10
[   26.647148]  ? ktime_get_ts64+0x86/0x230
[   26.647181]  kunit_try_run_case+0x1a5/0x480
[   26.647211]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.647240]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.647270]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.647300]  ? __kthread_parkme+0x82/0x180
[   26.647326]  ? preempt_count_sub+0x50/0x80
[   26.647358]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.647389]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.647422]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.647455]  kthread+0x337/0x6f0
[   26.647482]  ? trace_preempt_on+0x20/0xc0
[   26.647511]  ? __pfx_kthread+0x10/0x10
[   26.647551]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.647582]  ? calculate_sigpending+0x7b/0xa0
[   26.647614]  ? __pfx_kthread+0x10/0x10
[   26.647642]  ret_from_fork+0x116/0x1d0
[   26.647668]  ? __pfx_kthread+0x10/0x10
[   26.647696]  ret_from_fork_asm+0x1a/0x30
[   26.647738]  </TASK>
[   26.647752] 
[   26.655829] Allocated by task 313:
[   26.656066]  kasan_save_stack+0x45/0x70
[   26.656272]  kasan_save_track+0x18/0x40
[   26.656467]  kasan_save_alloc_info+0x3b/0x50
[   26.656692]  __kasan_kmalloc+0xb7/0xc0
[   26.657001]  __kmalloc_cache_noprof+0x189/0x420
[   26.657177]  kasan_atomics+0x95/0x310
[   26.657369]  kunit_try_run_case+0x1a5/0x480
[   26.657628]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.658046]  kthread+0x337/0x6f0
[   26.658224]  ret_from_fork+0x116/0x1d0
[   26.658426]  ret_from_fork_asm+0x1a/0x30
[   26.658734] 
[   26.658842] The buggy address belongs to the object at ffff888105926b00
[   26.658842]  which belongs to the cache kmalloc-64 of size 64
[   26.659266] The buggy address is located 0 bytes to the right of
[   26.659266]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   26.659730] 
[   26.659824] The buggy address belongs to the physical page:
[   26.660075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   26.660424] flags: 0x200000000000000(node=0|zone=2)
[   26.660750] page_type: f5(slab)
[   26.660875] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.661160] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.661614] page dumped because: kasan: bad access detected
[   26.661893] 
[   26.661991] Memory state around the buggy address:
[   26.662180]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.662486]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.662886] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.663210]                                      ^
[   26.663425]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.663901]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.664242] ==================================================================
[   27.350264] ==================================================================
[   27.350641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   27.350964] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.351250] 
[   27.351383] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.351436] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.351451] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.351476] Call Trace:
[   27.351504]  <TASK>
[   27.351521]  dump_stack_lvl+0x73/0xb0
[   27.351573]  print_report+0xd1/0x610
[   27.351605]  ? __virt_addr_valid+0x1db/0x2d0
[   27.351645]  ? kasan_atomics_helper+0x1467/0x5450
[   27.351674]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.351709]  ? kasan_atomics_helper+0x1467/0x5450
[   27.351739]  kasan_report+0x141/0x180
[   27.351769]  ? kasan_atomics_helper+0x1467/0x5450
[   27.351805]  kasan_check_range+0x10c/0x1c0
[   27.351836]  __kasan_check_write+0x18/0x20
[   27.351867]  kasan_atomics_helper+0x1467/0x5450
[   27.351897]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.351927]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.351959]  ? kasan_atomics+0x152/0x310
[   27.351994]  kasan_atomics+0x1dc/0x310
[   27.352033]  ? __pfx_kasan_atomics+0x10/0x10
[   27.352066]  ? __pfx_read_tsc+0x10/0x10
[   27.352104]  ? ktime_get_ts64+0x86/0x230
[   27.352137]  kunit_try_run_case+0x1a5/0x480
[   27.352168]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.352196]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.352225]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.352255]  ? __kthread_parkme+0x82/0x180
[   27.352283]  ? preempt_count_sub+0x50/0x80
[   27.352314]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.352345]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.352379]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.352412]  kthread+0x337/0x6f0
[   27.352439]  ? trace_preempt_on+0x20/0xc0
[   27.352469]  ? __pfx_kthread+0x10/0x10
[   27.352497]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.352545]  ? calculate_sigpending+0x7b/0xa0
[   27.352576]  ? __pfx_kthread+0x10/0x10
[   27.352617]  ret_from_fork+0x116/0x1d0
[   27.352651]  ? __pfx_kthread+0x10/0x10
[   27.352680]  ret_from_fork_asm+0x1a/0x30
[   27.352731]  </TASK>
[   27.352745] 
[   27.360467] Allocated by task 313:
[   27.360643]  kasan_save_stack+0x45/0x70
[   27.360863]  kasan_save_track+0x18/0x40
[   27.361057]  kasan_save_alloc_info+0x3b/0x50
[   27.361286]  __kasan_kmalloc+0xb7/0xc0
[   27.361424]  __kmalloc_cache_noprof+0x189/0x420
[   27.361595]  kasan_atomics+0x95/0x310
[   27.361783]  kunit_try_run_case+0x1a5/0x480
[   27.362097]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.362332]  kthread+0x337/0x6f0
[   27.362455]  ret_from_fork+0x116/0x1d0
[   27.362609]  ret_from_fork_asm+0x1a/0x30
[   27.362999] 
[   27.363102] The buggy address belongs to the object at ffff888105926b00
[   27.363102]  which belongs to the cache kmalloc-64 of size 64
[   27.363584] The buggy address is located 0 bytes to the right of
[   27.363584]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.364081] 
[   27.364165] The buggy address belongs to the physical page:
[   27.364398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.365608] flags: 0x200000000000000(node=0|zone=2)
[   27.365786] page_type: f5(slab)
[   27.366201] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.366754] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.367064] page dumped because: kasan: bad access detected
[   27.367298] 
[   27.367388] Memory state around the buggy address:
[   27.367856]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.368476]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.368803] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.369095]                                      ^
[   27.369302]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.369597]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.369881] ==================================================================
[   27.005767] ==================================================================
[   27.006106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   27.006487] Write of size 4 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.006731] 
[   27.006817] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.006867] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.006883] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.006908] Call Trace:
[   27.006927]  <TASK>
[   27.006945]  dump_stack_lvl+0x73/0xb0
[   27.006979]  print_report+0xd1/0x610
[   27.007008]  ? __virt_addr_valid+0x1db/0x2d0
[   27.007037]  ? kasan_atomics_helper+0xd47/0x5450
[   27.007065]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.007098]  ? kasan_atomics_helper+0xd47/0x5450
[   27.007126]  kasan_report+0x141/0x180
[   27.007155]  ? kasan_atomics_helper+0xd47/0x5450
[   27.007189]  kasan_check_range+0x10c/0x1c0
[   27.007220]  __kasan_check_write+0x18/0x20
[   27.007276]  kasan_atomics_helper+0xd47/0x5450
[   27.007309]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.007338]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.007369]  ? kasan_atomics+0x152/0x310
[   27.007404]  kasan_atomics+0x1dc/0x310
[   27.007433]  ? __pfx_kasan_atomics+0x10/0x10
[   27.007464]  ? __pfx_read_tsc+0x10/0x10
[   27.007493]  ? ktime_get_ts64+0x86/0x230
[   27.007524]  kunit_try_run_case+0x1a5/0x480
[   27.007566]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.007594]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.007638]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.007668]  ? __kthread_parkme+0x82/0x180
[   27.007694]  ? preempt_count_sub+0x50/0x80
[   27.007726]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.007757]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.007790]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.007824]  kthread+0x337/0x6f0
[   27.007849]  ? trace_preempt_on+0x20/0xc0
[   27.007880]  ? __pfx_kthread+0x10/0x10
[   27.007907]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.007939]  ? calculate_sigpending+0x7b/0xa0
[   27.007970]  ? __pfx_kthread+0x10/0x10
[   27.007999]  ret_from_fork+0x116/0x1d0
[   27.008025]  ? __pfx_kthread+0x10/0x10
[   27.008052]  ret_from_fork_asm+0x1a/0x30
[   27.008094]  </TASK>
[   27.008107] 
[   27.015693] Allocated by task 313:
[   27.015833]  kasan_save_stack+0x45/0x70
[   27.016058]  kasan_save_track+0x18/0x40
[   27.016233]  kasan_save_alloc_info+0x3b/0x50
[   27.016445]  __kasan_kmalloc+0xb7/0xc0
[   27.016659]  __kmalloc_cache_noprof+0x189/0x420
[   27.016880]  kasan_atomics+0x95/0x310
[   27.017060]  kunit_try_run_case+0x1a5/0x480
[   27.017294]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.017563]  kthread+0x337/0x6f0
[   27.017744]  ret_from_fork+0x116/0x1d0
[   27.017929]  ret_from_fork_asm+0x1a/0x30
[   27.018148] 
[   27.018217] The buggy address belongs to the object at ffff888105926b00
[   27.018217]  which belongs to the cache kmalloc-64 of size 64
[   27.018763] The buggy address is located 0 bytes to the right of
[   27.018763]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.019276] 
[   27.019379] The buggy address belongs to the physical page:
[   27.019611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.019951] flags: 0x200000000000000(node=0|zone=2)
[   27.020161] page_type: f5(slab)
[   27.020322] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.020685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.020971] page dumped because: kasan: bad access detected
[   27.021214] 
[   27.021297] Memory state around the buggy address:
[   27.021448]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.021737]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.022065] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.022371]                                      ^
[   27.022619]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.022987]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.023416] ==================================================================
[   27.525337] ==================================================================
[   27.525867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   27.526189] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.526544] 
[   27.526656] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.526748] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.526776] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.526802] Call Trace:
[   27.526823]  <TASK>
[   27.526840]  dump_stack_lvl+0x73/0xb0
[   27.526876]  print_report+0xd1/0x610
[   27.526905]  ? __virt_addr_valid+0x1db/0x2d0
[   27.526938]  ? kasan_atomics_helper+0x18b1/0x5450
[   27.526966]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.526999]  ? kasan_atomics_helper+0x18b1/0x5450
[   27.527029]  kasan_report+0x141/0x180
[   27.527058]  ? kasan_atomics_helper+0x18b1/0x5450
[   27.527093]  kasan_check_range+0x10c/0x1c0
[   27.527125]  __kasan_check_write+0x18/0x20
[   27.527154]  kasan_atomics_helper+0x18b1/0x5450
[   27.527184]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.527212]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.527244]  ? kasan_atomics+0x152/0x310
[   27.527286]  kasan_atomics+0x1dc/0x310
[   27.527316]  ? __pfx_kasan_atomics+0x10/0x10
[   27.527348]  ? __pfx_read_tsc+0x10/0x10
[   27.527378]  ? ktime_get_ts64+0x86/0x230
[   27.527412]  kunit_try_run_case+0x1a5/0x480
[   27.527442]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.527470]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.527499]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.527540]  ? __kthread_parkme+0x82/0x180
[   27.527569]  ? preempt_count_sub+0x50/0x80
[   27.527600]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.527638]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.527672]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.527725]  kthread+0x337/0x6f0
[   27.527753]  ? trace_preempt_on+0x20/0xc0
[   27.527797]  ? __pfx_kthread+0x10/0x10
[   27.527826]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.527858]  ? calculate_sigpending+0x7b/0xa0
[   27.527889]  ? __pfx_kthread+0x10/0x10
[   27.527920]  ret_from_fork+0x116/0x1d0
[   27.527946]  ? __pfx_kthread+0x10/0x10
[   27.527973]  ret_from_fork_asm+0x1a/0x30
[   27.528016]  </TASK>
[   27.528029] 
[   27.535602] Allocated by task 313:
[   27.535781]  kasan_save_stack+0x45/0x70
[   27.536003]  kasan_save_track+0x18/0x40
[   27.536182]  kasan_save_alloc_info+0x3b/0x50
[   27.536429]  __kasan_kmalloc+0xb7/0xc0
[   27.536701]  __kmalloc_cache_noprof+0x189/0x420
[   27.536935]  kasan_atomics+0x95/0x310
[   27.537130]  kunit_try_run_case+0x1a5/0x480
[   27.537329]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.537504]  kthread+0x337/0x6f0
[   27.537683]  ret_from_fork+0x116/0x1d0
[   27.537879]  ret_from_fork_asm+0x1a/0x30
[   27.538103] 
[   27.538214] The buggy address belongs to the object at ffff888105926b00
[   27.538214]  which belongs to the cache kmalloc-64 of size 64
[   27.538918] The buggy address is located 0 bytes to the right of
[   27.538918]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.539305] 
[   27.539372] The buggy address belongs to the physical page:
[   27.539639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.540151] flags: 0x200000000000000(node=0|zone=2)
[   27.540392] page_type: f5(slab)
[   27.540563] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.541010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.541289] page dumped because: kasan: bad access detected
[   27.541575] 
[   27.541698] Memory state around the buggy address:
[   27.541912]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.542160]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.542455] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.542795]                                      ^
[   27.543015]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.543386]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.543777] ==================================================================
[   27.747982] ==================================================================
[   27.748688] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   27.749173] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.749655] 
[   27.749828] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.749892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.749908] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.749933] Call Trace:
[   27.749950]  <TASK>
[   27.749981]  dump_stack_lvl+0x73/0xb0
[   27.750016]  print_report+0xd1/0x610
[   27.750047]  ? __virt_addr_valid+0x1db/0x2d0
[   27.750087]  ? kasan_atomics_helper+0x1f43/0x5450
[   27.750116]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.750160]  ? kasan_atomics_helper+0x1f43/0x5450
[   27.750189]  kasan_report+0x141/0x180
[   27.750219]  ? kasan_atomics_helper+0x1f43/0x5450
[   27.750255]  kasan_check_range+0x10c/0x1c0
[   27.750286]  __kasan_check_write+0x18/0x20
[   27.750317]  kasan_atomics_helper+0x1f43/0x5450
[   27.750347]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.750376]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.750409]  ? kasan_atomics+0x152/0x310
[   27.750445]  kasan_atomics+0x1dc/0x310
[   27.750479]  ? __pfx_kasan_atomics+0x10/0x10
[   27.750510]  ? __pfx_read_tsc+0x10/0x10
[   27.750547]  ? ktime_get_ts64+0x86/0x230
[   27.750579]  kunit_try_run_case+0x1a5/0x480
[   27.750629]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.750659]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.750689]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.750717]  ? __kthread_parkme+0x82/0x180
[   27.750745]  ? preempt_count_sub+0x50/0x80
[   27.750777]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.750807]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.750840]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.750874]  kthread+0x337/0x6f0
[   27.750901]  ? trace_preempt_on+0x20/0xc0
[   27.750932]  ? __pfx_kthread+0x10/0x10
[   27.750960]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.750991]  ? calculate_sigpending+0x7b/0xa0
[   27.751022]  ? __pfx_kthread+0x10/0x10
[   27.751051]  ret_from_fork+0x116/0x1d0
[   27.751076]  ? __pfx_kthread+0x10/0x10
[   27.751104]  ret_from_fork_asm+0x1a/0x30
[   27.751146]  </TASK>
[   27.751159] 
[   27.758367] Allocated by task 313:
[   27.758580]  kasan_save_stack+0x45/0x70
[   27.758799]  kasan_save_track+0x18/0x40
[   27.759023]  kasan_save_alloc_info+0x3b/0x50
[   27.759181]  __kasan_kmalloc+0xb7/0xc0
[   27.759317]  __kmalloc_cache_noprof+0x189/0x420
[   27.759475]  kasan_atomics+0x95/0x310
[   27.759675]  kunit_try_run_case+0x1a5/0x480
[   27.759915]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.760204]  kthread+0x337/0x6f0
[   27.760396]  ret_from_fork+0x116/0x1d0
[   27.760643]  ret_from_fork_asm+0x1a/0x30
[   27.760877] 
[   27.760974] The buggy address belongs to the object at ffff888105926b00
[   27.760974]  which belongs to the cache kmalloc-64 of size 64
[   27.761536] The buggy address is located 0 bytes to the right of
[   27.761536]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.762087] 
[   27.762184] The buggy address belongs to the physical page:
[   27.762458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.762839] flags: 0x200000000000000(node=0|zone=2)
[   27.763070] page_type: f5(slab)
[   27.763241] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.763551] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.763787] page dumped because: kasan: bad access detected
[   27.763959] 
[   27.764027] Memory state around the buggy address:
[   27.764208]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.764553]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.764898] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.765212]                                      ^
[   27.765434]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.765789]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.766052] ==================================================================
[   27.818991] ==================================================================
[   27.819458] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   27.819831] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.820132] 
[   27.820237] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.820289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.820304] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.820330] Call Trace:
[   27.820345]  <TASK>
[   27.820363]  dump_stack_lvl+0x73/0xb0
[   27.820396]  print_report+0xd1/0x610
[   27.820425]  ? __virt_addr_valid+0x1db/0x2d0
[   27.820455]  ? kasan_atomics_helper+0x20c8/0x5450
[   27.820485]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.820519]  ? kasan_atomics_helper+0x20c8/0x5450
[   27.820559]  kasan_report+0x141/0x180
[   27.820589]  ? kasan_atomics_helper+0x20c8/0x5450
[   27.820644]  kasan_check_range+0x10c/0x1c0
[   27.820676]  __kasan_check_write+0x18/0x20
[   27.820707]  kasan_atomics_helper+0x20c8/0x5450
[   27.820737]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.820767]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.820801]  ? kasan_atomics+0x152/0x310
[   27.820835]  kasan_atomics+0x1dc/0x310
[   27.820865]  ? __pfx_kasan_atomics+0x10/0x10
[   27.820899]  ? __pfx_read_tsc+0x10/0x10
[   27.820928]  ? ktime_get_ts64+0x86/0x230
[   27.820960]  kunit_try_run_case+0x1a5/0x480
[   27.820991]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.821020]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.821050]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.821080]  ? __kthread_parkme+0x82/0x180
[   27.821108]  ? preempt_count_sub+0x50/0x80
[   27.821140]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.821170]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.821204]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.821238]  kthread+0x337/0x6f0
[   27.821265]  ? trace_preempt_on+0x20/0xc0
[   27.821296]  ? __pfx_kthread+0x10/0x10
[   27.821323]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.821354]  ? calculate_sigpending+0x7b/0xa0
[   27.821385]  ? __pfx_kthread+0x10/0x10
[   27.821414]  ret_from_fork+0x116/0x1d0
[   27.821439]  ? __pfx_kthread+0x10/0x10
[   27.821467]  ret_from_fork_asm+0x1a/0x30
[   27.821510]  </TASK>
[   27.821523] 
[   27.828347] Allocated by task 313:
[   27.828472]  kasan_save_stack+0x45/0x70
[   27.828703]  kasan_save_track+0x18/0x40
[   27.828900]  kasan_save_alloc_info+0x3b/0x50
[   27.829114]  __kasan_kmalloc+0xb7/0xc0
[   27.829302]  __kmalloc_cache_noprof+0x189/0x420
[   27.829524]  kasan_atomics+0x95/0x310
[   27.829749]  kunit_try_run_case+0x1a5/0x480
[   27.829965]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.830219]  kthread+0x337/0x6f0
[   27.830391]  ret_from_fork+0x116/0x1d0
[   27.830621]  ret_from_fork_asm+0x1a/0x30
[   27.830825] 
[   27.830918] The buggy address belongs to the object at ffff888105926b00
[   27.830918]  which belongs to the cache kmalloc-64 of size 64
[   27.831334] The buggy address is located 0 bytes to the right of
[   27.831334]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.831730] 
[   27.831801] The buggy address belongs to the physical page:
[   27.832018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.832377] flags: 0x200000000000000(node=0|zone=2)
[   27.832654] page_type: f5(slab)
[   27.832828] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.833170] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.833511] page dumped because: kasan: bad access detected
[   27.833795] 
[   27.833889] Memory state around the buggy address:
[   27.834109]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.834331]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.834691] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.834986]                                      ^
[   27.835175]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.835458]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.835780] ==================================================================
[   27.153331] ==================================================================
[   27.153679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   27.154012] Read of size 4 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.154614] 
[   27.154720] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.154772] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.154787] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.154811] Call Trace:
[   27.154828]  <TASK>
[   27.154846]  dump_stack_lvl+0x73/0xb0
[   27.154880]  print_report+0xd1/0x610
[   27.154910]  ? __virt_addr_valid+0x1db/0x2d0
[   27.154942]  ? kasan_atomics_helper+0x4a1c/0x5450
[   27.154972]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.155005]  ? kasan_atomics_helper+0x4a1c/0x5450
[   27.155034]  kasan_report+0x141/0x180
[   27.155064]  ? kasan_atomics_helper+0x4a1c/0x5450
[   27.155099]  __asan_report_load4_noabort+0x18/0x20
[   27.155131]  kasan_atomics_helper+0x4a1c/0x5450
[   27.155162]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.155235]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.155270]  ? kasan_atomics+0x152/0x310
[   27.155305]  kasan_atomics+0x1dc/0x310
[   27.155336]  ? __pfx_kasan_atomics+0x10/0x10
[   27.155401]  ? __pfx_read_tsc+0x10/0x10
[   27.155430]  ? ktime_get_ts64+0x86/0x230
[   27.155463]  kunit_try_run_case+0x1a5/0x480
[   27.155524]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.155566]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.155597]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.155637]  ? __kthread_parkme+0x82/0x180
[   27.155664]  ? preempt_count_sub+0x50/0x80
[   27.155730]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.155761]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.155795]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.155860]  kthread+0x337/0x6f0
[   27.155887]  ? trace_preempt_on+0x20/0xc0
[   27.155919]  ? __pfx_kthread+0x10/0x10
[   27.155948]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.156010]  ? calculate_sigpending+0x7b/0xa0
[   27.156043]  ? __pfx_kthread+0x10/0x10
[   27.156072]  ret_from_fork+0x116/0x1d0
[   27.156099]  ? __pfx_kthread+0x10/0x10
[   27.156159]  ret_from_fork_asm+0x1a/0x30
[   27.156203]  </TASK>
[   27.156217] 
[   27.166550] Allocated by task 313:
[   27.166849]  kasan_save_stack+0x45/0x70
[   27.167057]  kasan_save_track+0x18/0x40
[   27.167268]  kasan_save_alloc_info+0x3b/0x50
[   27.167482]  __kasan_kmalloc+0xb7/0xc0
[   27.167657]  __kmalloc_cache_noprof+0x189/0x420
[   27.167813]  kasan_atomics+0x95/0x310
[   27.167989]  kunit_try_run_case+0x1a5/0x480
[   27.168195]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.168456]  kthread+0x337/0x6f0
[   27.168673]  ret_from_fork+0x116/0x1d0
[   27.168865]  ret_from_fork_asm+0x1a/0x30
[   27.169063] 
[   27.169142] The buggy address belongs to the object at ffff888105926b00
[   27.169142]  which belongs to the cache kmalloc-64 of size 64
[   27.169629] The buggy address is located 0 bytes to the right of
[   27.169629]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.170145] 
[   27.170233] The buggy address belongs to the physical page:
[   27.170494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.171074] flags: 0x200000000000000(node=0|zone=2)
[   27.171316] page_type: f5(slab)
[   27.171489] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.171862] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.172143] page dumped because: kasan: bad access detected
[   27.172310] 
[   27.172385] Memory state around the buggy address:
[   27.172636]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.172990]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.173338] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.173676]                                      ^
[   27.173854]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.174153]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.174456] ==================================================================
[   27.582290] ==================================================================
[   27.582635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   27.582975] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.583342] 
[   27.583457] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.583509] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.583524] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.583558] Call Trace:
[   27.583573]  <TASK>
[   27.583590]  dump_stack_lvl+0x73/0xb0
[   27.583625]  print_report+0xd1/0x610
[   27.583654]  ? __virt_addr_valid+0x1db/0x2d0
[   27.583685]  ? kasan_atomics_helper+0x1a7f/0x5450
[   27.583721]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.583754]  ? kasan_atomics_helper+0x1a7f/0x5450
[   27.583783]  kasan_report+0x141/0x180
[   27.583836]  ? kasan_atomics_helper+0x1a7f/0x5450
[   27.583885]  kasan_check_range+0x10c/0x1c0
[   27.583930]  __kasan_check_write+0x18/0x20
[   27.583972]  kasan_atomics_helper+0x1a7f/0x5450
[   27.584029]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.584072]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.584130]  ? kasan_atomics+0x152/0x310
[   27.584190]  kasan_atomics+0x1dc/0x310
[   27.584246]  ? __pfx_kasan_atomics+0x10/0x10
[   27.584291]  ? __pfx_read_tsc+0x10/0x10
[   27.584345]  ? ktime_get_ts64+0x86/0x230
[   27.584405]  kunit_try_run_case+0x1a5/0x480
[   27.584461]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.584504]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.584542]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.584573]  ? __kthread_parkme+0x82/0x180
[   27.584600]  ? preempt_count_sub+0x50/0x80
[   27.584632]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.584662]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.584695]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.584728]  kthread+0x337/0x6f0
[   27.584754]  ? trace_preempt_on+0x20/0xc0
[   27.584785]  ? __pfx_kthread+0x10/0x10
[   27.584814]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.584845]  ? calculate_sigpending+0x7b/0xa0
[   27.584878]  ? __pfx_kthread+0x10/0x10
[   27.584907]  ret_from_fork+0x116/0x1d0
[   27.584932]  ? __pfx_kthread+0x10/0x10
[   27.584960]  ret_from_fork_asm+0x1a/0x30
[   27.585003]  </TASK>
[   27.585016] 
[   27.592820] Allocated by task 313:
[   27.592979]  kasan_save_stack+0x45/0x70
[   27.593197]  kasan_save_track+0x18/0x40
[   27.593416]  kasan_save_alloc_info+0x3b/0x50
[   27.593733]  __kasan_kmalloc+0xb7/0xc0
[   27.593928]  __kmalloc_cache_noprof+0x189/0x420
[   27.594114]  kasan_atomics+0x95/0x310
[   27.594282]  kunit_try_run_case+0x1a5/0x480
[   27.594455]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.594721]  kthread+0x337/0x6f0
[   27.594925]  ret_from_fork+0x116/0x1d0
[   27.595136]  ret_from_fork_asm+0x1a/0x30
[   27.595339] 
[   27.595425] The buggy address belongs to the object at ffff888105926b00
[   27.595425]  which belongs to the cache kmalloc-64 of size 64
[   27.596059] The buggy address is located 0 bytes to the right of
[   27.596059]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.596505] 
[   27.596596] The buggy address belongs to the physical page:
[   27.596822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.597074] flags: 0x200000000000000(node=0|zone=2)
[   27.597232] page_type: f5(slab)
[   27.597351] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.597586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.598086] page dumped because: kasan: bad access detected
[   27.598333] 
[   27.598424] Memory state around the buggy address:
[   27.598745]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.599104]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.599350] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.599580]                                      ^
[   27.600063]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.600335]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.600609] ==================================================================
[   27.699279] ==================================================================
[   27.699685] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   27.699995] Write of size 8 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.700277] 
[   27.700359] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.700411] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.700427] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.700452] Call Trace:
[   27.700469]  <TASK>
[   27.700487]  dump_stack_lvl+0x73/0xb0
[   27.700521]  print_report+0xd1/0x610
[   27.700562]  ? __virt_addr_valid+0x1db/0x2d0
[   27.700592]  ? kasan_atomics_helper+0x1e12/0x5450
[   27.700620]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.700654]  ? kasan_atomics_helper+0x1e12/0x5450
[   27.700684]  kasan_report+0x141/0x180
[   27.700715]  ? kasan_atomics_helper+0x1e12/0x5450
[   27.700750]  kasan_check_range+0x10c/0x1c0
[   27.700781]  __kasan_check_write+0x18/0x20
[   27.700811]  kasan_atomics_helper+0x1e12/0x5450
[   27.700841]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.700870]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.700901]  ? kasan_atomics+0x152/0x310
[   27.700936]  kasan_atomics+0x1dc/0x310
[   27.700965]  ? __pfx_kasan_atomics+0x10/0x10
[   27.700997]  ? __pfx_read_tsc+0x10/0x10
[   27.701025]  ? ktime_get_ts64+0x86/0x230
[   27.701057]  kunit_try_run_case+0x1a5/0x480
[   27.701086]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.701115]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.701143]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.701172]  ? __kthread_parkme+0x82/0x180
[   27.701200]  ? preempt_count_sub+0x50/0x80
[   27.701232]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.701261]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.701294]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.701327]  kthread+0x337/0x6f0
[   27.701353]  ? trace_preempt_on+0x20/0xc0
[   27.701383]  ? __pfx_kthread+0x10/0x10
[   27.701411]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.701443]  ? calculate_sigpending+0x7b/0xa0
[   27.701473]  ? __pfx_kthread+0x10/0x10
[   27.701502]  ret_from_fork+0x116/0x1d0
[   27.701536]  ? __pfx_kthread+0x10/0x10
[   27.701565]  ret_from_fork_asm+0x1a/0x30
[   27.701606]  </TASK>
[   27.701619] 
[   27.708544] Allocated by task 313:
[   27.708670]  kasan_save_stack+0x45/0x70
[   27.708814]  kasan_save_track+0x18/0x40
[   27.708975]  kasan_save_alloc_info+0x3b/0x50
[   27.709190]  __kasan_kmalloc+0xb7/0xc0
[   27.709384]  __kmalloc_cache_noprof+0x189/0x420
[   27.709613]  kasan_atomics+0x95/0x310
[   27.709802]  kunit_try_run_case+0x1a5/0x480
[   27.710017]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.710272]  kthread+0x337/0x6f0
[   27.710566]  ret_from_fork+0x116/0x1d0
[   27.710779]  ret_from_fork_asm+0x1a/0x30
[   27.710925] 
[   27.710996] The buggy address belongs to the object at ffff888105926b00
[   27.710996]  which belongs to the cache kmalloc-64 of size 64
[   27.711347] The buggy address is located 0 bytes to the right of
[   27.711347]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.712254] 
[   27.712348] The buggy address belongs to the physical page:
[   27.712612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.712976] flags: 0x200000000000000(node=0|zone=2)
[   27.713176] page_type: f5(slab)
[   27.713316] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.713648] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.713948] page dumped because: kasan: bad access detected
[   27.714159] 
[   27.714249] Memory state around the buggy address:
[   27.714441]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.714775]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.715057] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.715297]                                      ^
[   27.715452]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.715921]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.716205] ==================================================================
[   27.240449] ==================================================================
[   27.241093] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   27.241699] Read of size 4 at addr ffff888105926b30 by task kunit_try_catch/313
[   27.242134] 
[   27.242347] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   27.242406] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.242422] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.242456] Call Trace:
[   27.242480]  <TASK>
[   27.242498]  dump_stack_lvl+0x73/0xb0
[   27.242548]  print_report+0xd1/0x610
[   27.242579]  ? __virt_addr_valid+0x1db/0x2d0
[   27.242613]  ? kasan_atomics_helper+0x49e8/0x5450
[   27.242644]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.242676]  ? kasan_atomics_helper+0x49e8/0x5450
[   27.242707]  kasan_report+0x141/0x180
[   27.242736]  ? kasan_atomics_helper+0x49e8/0x5450
[   27.242771]  __asan_report_load4_noabort+0x18/0x20
[   27.242803]  kasan_atomics_helper+0x49e8/0x5450
[   27.242832]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.242862]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.242895]  ? kasan_atomics+0x152/0x310
[   27.242929]  kasan_atomics+0x1dc/0x310
[   27.242959]  ? __pfx_kasan_atomics+0x10/0x10
[   27.242990]  ? __pfx_read_tsc+0x10/0x10
[   27.243018]  ? ktime_get_ts64+0x86/0x230
[   27.243051]  kunit_try_run_case+0x1a5/0x480
[   27.243083]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.243112]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.243143]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.243174]  ? __kthread_parkme+0x82/0x180
[   27.243202]  ? preempt_count_sub+0x50/0x80
[   27.243235]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.243266]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.243299]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.243333]  kthread+0x337/0x6f0
[   27.243360]  ? trace_preempt_on+0x20/0xc0
[   27.243390]  ? __pfx_kthread+0x10/0x10
[   27.243419]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.243451]  ? calculate_sigpending+0x7b/0xa0
[   27.243482]  ? __pfx_kthread+0x10/0x10
[   27.243512]  ret_from_fork+0x116/0x1d0
[   27.243651]  ? __pfx_kthread+0x10/0x10
[   27.243686]  ret_from_fork_asm+0x1a/0x30
[   27.243731]  </TASK>
[   27.243746] 
[   27.255233] Allocated by task 313:
[   27.255517]  kasan_save_stack+0x45/0x70
[   27.255918]  kasan_save_track+0x18/0x40
[   27.256216]  kasan_save_alloc_info+0x3b/0x50
[   27.256438]  __kasan_kmalloc+0xb7/0xc0
[   27.256661]  __kmalloc_cache_noprof+0x189/0x420
[   27.256885]  kasan_atomics+0x95/0x310
[   27.257062]  kunit_try_run_case+0x1a5/0x480
[   27.257259]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.257485]  kthread+0x337/0x6f0
[   27.257981]  ret_from_fork+0x116/0x1d0
[   27.258292]  ret_from_fork_asm+0x1a/0x30
[   27.258614] 
[   27.258838] The buggy address belongs to the object at ffff888105926b00
[   27.258838]  which belongs to the cache kmalloc-64 of size 64
[   27.259702] The buggy address is located 0 bytes to the right of
[   27.259702]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   27.260520] 
[   27.260635] The buggy address belongs to the physical page:
[   27.260879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   27.261210] flags: 0x200000000000000(node=0|zone=2)
[   27.261425] page_type: f5(slab)
[   27.261584] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.261896] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.262201] page dumped because: kasan: bad access detected
[   27.262430] 
[   27.262517] Memory state around the buggy address:
[   27.263212]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.263665]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.264158] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.264660]                                      ^
[   27.265081]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.265574]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.266066] ==================================================================
[   26.664713] ==================================================================
[   26.665054] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   26.665393] Read of size 4 at addr ffff888105926b30 by task kunit_try_catch/313
[   26.665838] 
[   26.665932] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   26.665997] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.666014] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.666039] Call Trace:
[   26.666067]  <TASK>
[   26.666085]  dump_stack_lvl+0x73/0xb0
[   26.666120]  print_report+0xd1/0x610
[   26.666150]  ? __virt_addr_valid+0x1db/0x2d0
[   26.666181]  ? kasan_atomics_helper+0x4b54/0x5450
[   26.666209]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.666242]  ? kasan_atomics_helper+0x4b54/0x5450
[   26.666271]  kasan_report+0x141/0x180
[   26.666301]  ? kasan_atomics_helper+0x4b54/0x5450
[   26.666344]  __asan_report_load4_noabort+0x18/0x20
[   26.666376]  kasan_atomics_helper+0x4b54/0x5450
[   26.666417]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.666447]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.666486]  ? kasan_atomics+0x152/0x310
[   26.666521]  kasan_atomics+0x1dc/0x310
[   26.666560]  ? __pfx_kasan_atomics+0x10/0x10
[   26.666591]  ? __pfx_read_tsc+0x10/0x10
[   26.666619]  ? ktime_get_ts64+0x86/0x230
[   26.666651]  kunit_try_run_case+0x1a5/0x480
[   26.666681]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.666711]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.666740]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.666770]  ? __kthread_parkme+0x82/0x180
[   26.666798]  ? preempt_count_sub+0x50/0x80
[   26.666829]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.666919]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.666953]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.666988]  kthread+0x337/0x6f0
[   26.667014]  ? trace_preempt_on+0x20/0xc0
[   26.667045]  ? __pfx_kthread+0x10/0x10
[   26.667073]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.667104]  ? calculate_sigpending+0x7b/0xa0
[   26.667137]  ? __pfx_kthread+0x10/0x10
[   26.667166]  ret_from_fork+0x116/0x1d0
[   26.667191]  ? __pfx_kthread+0x10/0x10
[   26.667219]  ret_from_fork_asm+0x1a/0x30
[   26.667261]  </TASK>
[   26.667275] 
[   26.677995] Allocated by task 313:
[   26.678145]  kasan_save_stack+0x45/0x70
[   26.678303]  kasan_save_track+0x18/0x40
[   26.678444]  kasan_save_alloc_info+0x3b/0x50
[   26.678620]  __kasan_kmalloc+0xb7/0xc0
[   26.678758]  __kmalloc_cache_noprof+0x189/0x420
[   26.678920]  kasan_atomics+0x95/0x310
[   26.679056]  kunit_try_run_case+0x1a5/0x480
[   26.679205]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.679389]  kthread+0x337/0x6f0
[   26.679513]  ret_from_fork+0x116/0x1d0
[   26.681437]  ret_from_fork_asm+0x1a/0x30
[   26.682047] 
[   26.682557] The buggy address belongs to the object at ffff888105926b00
[   26.682557]  which belongs to the cache kmalloc-64 of size 64
[   26.684047] The buggy address is located 0 bytes to the right of
[   26.684047]  allocated 48-byte region [ffff888105926b00, ffff888105926b30)
[   26.684649] 
[   26.684756] The buggy address belongs to the physical page:
[   26.685016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   26.685375] flags: 0x200000000000000(node=0|zone=2)
[   26.685715] page_type: f5(slab)
[   26.685875] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.686215] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.686572] page dumped because: kasan: bad access detected
[   26.686843] 
[   26.687135] Memory state around the buggy address:
[   26.687378]  ffff888105926a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.687821]  ffff888105926a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.688104] >ffff888105926b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.688418]                                      ^
[   26.688745]  ffff888105926b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.689013]  ffff888105926c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.689363] ==================================================================