Date
May 12, 2025, 11:48 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.486628] ================================================================== [ 19.486678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 19.486730] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.486780] [ 19.486812] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.486898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.486928] Hardware name: linux,dummy-virt (DT) [ 19.486960] Call trace: [ 19.486985] show_stack+0x20/0x38 (C) [ 19.487037] dump_stack_lvl+0x8c/0xd0 [ 19.487100] print_report+0x118/0x608 [ 19.487150] kasan_report+0xdc/0x128 [ 19.487194] kasan_check_range+0x100/0x1a8 [ 19.487241] __kasan_check_write+0x20/0x30 [ 19.487289] kasan_atomics_helper+0x12d8/0x4858 [ 19.487337] kasan_atomics+0x198/0x2e0 [ 19.487382] kunit_try_run_case+0x170/0x3f0 [ 19.487429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.487482] kthread+0x328/0x630 [ 19.487527] ret_from_fork+0x10/0x20 [ 19.487576] [ 19.487597] Allocated by task 265: [ 19.487628] kasan_save_stack+0x3c/0x68 [ 19.487671] kasan_save_track+0x20/0x40 [ 19.487710] kasan_save_alloc_info+0x40/0x58 [ 19.487751] __kasan_kmalloc+0xd4/0xd8 [ 19.487789] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.487827] kasan_atomics+0xb8/0x2e0 [ 19.487864] kunit_try_run_case+0x170/0x3f0 [ 19.487903] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.487947] kthread+0x328/0x630 [ 19.487983] ret_from_fork+0x10/0x20 [ 19.488020] [ 19.488069] The buggy address belongs to the object at fff00000c788e780 [ 19.488069] which belongs to the cache kmalloc-64 of size 64 [ 19.488189] The buggy address is located 0 bytes to the right of [ 19.488189] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.488319] [ 19.488347] The buggy address belongs to the physical page: [ 19.488380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.488431] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.488478] page_type: f5(slab) [ 19.488516] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.488566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.488607] page dumped because: kasan: bad access detected [ 19.488639] [ 19.488660] Memory state around the buggy address: [ 19.488691] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.488734] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.488776] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.488813] ^ [ 19.488853] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.488934] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.489009] ================================================================== [ 19.469239] ================================================================== [ 19.469533] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 19.469727] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.469862] [ 19.469909] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.469999] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.470030] Hardware name: linux,dummy-virt (DT) [ 19.470074] Call trace: [ 19.470100] show_stack+0x20/0x38 (C) [ 19.470153] dump_stack_lvl+0x8c/0xd0 [ 19.470621] print_report+0x118/0x608 [ 19.470722] kasan_report+0xdc/0x128 [ 19.471098] kasan_check_range+0x100/0x1a8 [ 19.471385] __kasan_check_write+0x20/0x30 [ 19.471448] kasan_atomics_helper+0x11f8/0x4858 [ 19.471507] kasan_atomics+0x198/0x2e0 [ 19.471716] kunit_try_run_case+0x170/0x3f0 [ 19.471821] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.472009] kthread+0x328/0x630 [ 19.472192] ret_from_fork+0x10/0x20 [ 19.472341] [ 19.472367] Allocated by task 265: [ 19.472567] kasan_save_stack+0x3c/0x68 [ 19.472618] kasan_save_track+0x20/0x40 [ 19.472658] kasan_save_alloc_info+0x40/0x58 [ 19.472699] __kasan_kmalloc+0xd4/0xd8 [ 19.472737] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.472874] kasan_atomics+0xb8/0x2e0 [ 19.473155] kunit_try_run_case+0x170/0x3f0 [ 19.473284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.473465] kthread+0x328/0x630 [ 19.473676] ret_from_fork+0x10/0x20 [ 19.473865] [ 19.473982] The buggy address belongs to the object at fff00000c788e780 [ 19.473982] which belongs to the cache kmalloc-64 of size 64 [ 19.474486] The buggy address is located 0 bytes to the right of [ 19.474486] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.474561] [ 19.474597] The buggy address belongs to the physical page: [ 19.475061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.475523] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.475821] page_type: f5(slab) [ 19.475928] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.476242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.476291] page dumped because: kasan: bad access detected [ 19.476585] [ 19.476641] Memory state around the buggy address: [ 19.476680] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.477034] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.477095] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.477136] ^ [ 19.477176] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.478180] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.478550] ================================================================== [ 19.499668] ================================================================== [ 19.499734] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 19.499802] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.499879] [ 19.499939] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.500080] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.500112] Hardware name: linux,dummy-virt (DT) [ 19.500144] Call trace: [ 19.500194] show_stack+0x20/0x38 (C) [ 19.500290] dump_stack_lvl+0x8c/0xd0 [ 19.500386] print_report+0x118/0x608 [ 19.500479] kasan_report+0xdc/0x128 [ 19.500571] kasan_check_range+0x100/0x1a8 [ 19.500617] __kasan_check_write+0x20/0x30 [ 19.500670] kasan_atomics_helper+0x1414/0x4858 [ 19.500768] kasan_atomics+0x198/0x2e0 [ 19.500858] kunit_try_run_case+0x170/0x3f0 [ 19.500947] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.500998] kthread+0x328/0x630 [ 19.501088] ret_from_fork+0x10/0x20 [ 19.501193] [ 19.501215] Allocated by task 265: [ 19.501246] kasan_save_stack+0x3c/0x68 [ 19.501288] kasan_save_track+0x20/0x40 [ 19.501328] kasan_save_alloc_info+0x40/0x58 [ 19.501367] __kasan_kmalloc+0xd4/0xd8 [ 19.501402] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.501442] kasan_atomics+0xb8/0x2e0 [ 19.501478] kunit_try_run_case+0x170/0x3f0 [ 19.501515] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.501557] kthread+0x328/0x630 [ 19.501593] ret_from_fork+0x10/0x20 [ 19.501628] [ 19.501651] The buggy address belongs to the object at fff00000c788e780 [ 19.501651] which belongs to the cache kmalloc-64 of size 64 [ 19.501707] The buggy address is located 0 bytes to the right of [ 19.501707] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.501769] [ 19.501790] The buggy address belongs to the physical page: [ 19.501823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.501871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.501927] page_type: f5(slab) [ 19.501966] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.502031] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.502082] page dumped because: kasan: bad access detected [ 19.502116] [ 19.502136] Memory state around the buggy address: [ 19.502170] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.502211] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.502253] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.502291] ^ [ 19.502325] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.502367] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.502404] ================================================================== [ 19.523112] ================================================================== [ 19.523171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 19.523228] Read of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.523310] [ 19.523350] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.523802] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.523857] Hardware name: linux,dummy-virt (DT) [ 19.523902] Call trace: [ 19.523929] show_stack+0x20/0x38 (C) [ 19.523992] dump_stack_lvl+0x8c/0xd0 [ 19.524064] print_report+0x118/0x608 [ 19.524116] kasan_report+0xdc/0x128 [ 19.524168] __asan_report_load8_noabort+0x20/0x30 [ 19.524220] kasan_atomics_helper+0x3db0/0x4858 [ 19.524267] kasan_atomics+0x198/0x2e0 [ 19.524945] kunit_try_run_case+0x170/0x3f0 [ 19.525050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.525111] kthread+0x328/0x630 [ 19.525158] ret_from_fork+0x10/0x20 [ 19.525251] [ 19.525278] Allocated by task 265: [ 19.525326] kasan_save_stack+0x3c/0x68 [ 19.525372] kasan_save_track+0x20/0x40 [ 19.525422] kasan_save_alloc_info+0x40/0x58 [ 19.525465] __kasan_kmalloc+0xd4/0xd8 [ 19.525502] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.525540] kasan_atomics+0xb8/0x2e0 [ 19.525577] kunit_try_run_case+0x170/0x3f0 [ 19.525614] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.525657] kthread+0x328/0x630 [ 19.525692] ret_from_fork+0x10/0x20 [ 19.525729] [ 19.525749] The buggy address belongs to the object at fff00000c788e780 [ 19.525749] which belongs to the cache kmalloc-64 of size 64 [ 19.525929] The buggy address is located 0 bytes to the right of [ 19.525929] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.526004] [ 19.526030] The buggy address belongs to the physical page: [ 19.526088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.526147] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.526198] page_type: f5(slab) [ 19.526238] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.526290] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.526333] page dumped because: kasan: bad access detected [ 19.526374] [ 19.526409] Memory state around the buggy address: [ 19.526456] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.526506] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.526551] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.526600] ^ [ 19.526638] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.526682] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.526722] ================================================================== [ 19.445451] ================================================================== [ 19.445515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 19.445572] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.445841] [ 19.445934] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.446093] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.446165] Hardware name: linux,dummy-virt (DT) [ 19.446201] Call trace: [ 19.446227] show_stack+0x20/0x38 (C) [ 19.446281] dump_stack_lvl+0x8c/0xd0 [ 19.446331] print_report+0x118/0x608 [ 19.446376] kasan_report+0xdc/0x128 [ 19.446419] kasan_check_range+0x100/0x1a8 [ 19.446467] __kasan_check_write+0x20/0x30 [ 19.446515] kasan_atomics_helper+0x10c0/0x4858 [ 19.448074] kasan_atomics+0x198/0x2e0 [ 19.448398] kunit_try_run_case+0x170/0x3f0 [ 19.448515] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.448638] kthread+0x328/0x630 [ 19.448751] ret_from_fork+0x10/0x20 [ 19.448838] [ 19.448861] Allocated by task 265: [ 19.448894] kasan_save_stack+0x3c/0x68 [ 19.448979] kasan_save_track+0x20/0x40 [ 19.449078] kasan_save_alloc_info+0x40/0x58 [ 19.449124] __kasan_kmalloc+0xd4/0xd8 [ 19.449162] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.449202] kasan_atomics+0xb8/0x2e0 [ 19.449264] kunit_try_run_case+0x170/0x3f0 [ 19.449342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.449385] kthread+0x328/0x630 [ 19.450071] ret_from_fork+0x10/0x20 [ 19.450142] [ 19.450210] The buggy address belongs to the object at fff00000c788e780 [ 19.450210] which belongs to the cache kmalloc-64 of size 64 [ 19.450363] The buggy address is located 0 bytes to the right of [ 19.450363] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.450536] [ 19.450561] The buggy address belongs to the physical page: [ 19.450606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.450716] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.450770] page_type: f5(slab) [ 19.450811] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.450876] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.450933] page dumped because: kasan: bad access detected [ 19.451174] [ 19.451225] Memory state around the buggy address: [ 19.451267] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.451315] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.451657] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.451842] ^ [ 19.451897] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.451942] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.452134] ================================================================== [ 19.439705] ================================================================== [ 19.439884] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 19.439943] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.439995] [ 19.440028] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.440125] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.440155] Hardware name: linux,dummy-virt (DT) [ 19.440186] Call trace: [ 19.440210] show_stack+0x20/0x38 (C) [ 19.440263] dump_stack_lvl+0x8c/0xd0 [ 19.440311] print_report+0x118/0x608 [ 19.440356] kasan_report+0xdc/0x128 [ 19.440402] kasan_check_range+0x100/0x1a8 [ 19.440449] __kasan_check_write+0x20/0x30 [ 19.440496] kasan_atomics_helper+0x1058/0x4858 [ 19.440542] kasan_atomics+0x198/0x2e0 [ 19.440586] kunit_try_run_case+0x170/0x3f0 [ 19.440633] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.440683] kthread+0x328/0x630 [ 19.440727] ret_from_fork+0x10/0x20 [ 19.440774] [ 19.440794] Allocated by task 265: [ 19.441936] kasan_save_stack+0x3c/0x68 [ 19.442001] kasan_save_track+0x20/0x40 [ 19.442118] kasan_save_alloc_info+0x40/0x58 [ 19.442194] __kasan_kmalloc+0xd4/0xd8 [ 19.442277] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.442322] kasan_atomics+0xb8/0x2e0 [ 19.442360] kunit_try_run_case+0x170/0x3f0 [ 19.442399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.442442] kthread+0x328/0x630 [ 19.442479] ret_from_fork+0x10/0x20 [ 19.442539] [ 19.442569] The buggy address belongs to the object at fff00000c788e780 [ 19.442569] which belongs to the cache kmalloc-64 of size 64 [ 19.442726] The buggy address is located 0 bytes to the right of [ 19.442726] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.442822] [ 19.442892] The buggy address belongs to the physical page: [ 19.442964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.443068] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.443131] page_type: f5(slab) [ 19.443187] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.443245] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.443287] page dumped because: kasan: bad access detected [ 19.443322] [ 19.443343] Memory state around the buggy address: [ 19.443378] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.443754] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.443820] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.444008] ^ [ 19.444215] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.444434] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.444526] ================================================================== [ 19.479662] ================================================================== [ 19.479725] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 19.479785] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.479835] [ 19.479868] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.479953] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.479983] Hardware name: linux,dummy-virt (DT) [ 19.480014] Call trace: [ 19.480038] show_stack+0x20/0x38 (C) [ 19.482151] dump_stack_lvl+0x8c/0xd0 [ 19.482205] print_report+0x118/0x608 [ 19.482255] kasan_report+0xdc/0x128 [ 19.482299] kasan_check_range+0x100/0x1a8 [ 19.482346] __kasan_check_write+0x20/0x30 [ 19.482394] kasan_atomics_helper+0x126c/0x4858 [ 19.482442] kasan_atomics+0x198/0x2e0 [ 19.482487] kunit_try_run_case+0x170/0x3f0 [ 19.482535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.482597] kthread+0x328/0x630 [ 19.482647] ret_from_fork+0x10/0x20 [ 19.482698] [ 19.482720] Allocated by task 265: [ 19.484357] kasan_save_stack+0x3c/0x68 [ 19.484422] kasan_save_track+0x20/0x40 [ 19.484463] kasan_save_alloc_info+0x40/0x58 [ 19.484556] __kasan_kmalloc+0xd4/0xd8 [ 19.485059] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.485103] kasan_atomics+0xb8/0x2e0 [ 19.485143] kunit_try_run_case+0x170/0x3f0 [ 19.485181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.485236] kthread+0x328/0x630 [ 19.485273] ret_from_fork+0x10/0x20 [ 19.485309] [ 19.485369] The buggy address belongs to the object at fff00000c788e780 [ 19.485369] which belongs to the cache kmalloc-64 of size 64 [ 19.485439] The buggy address is located 0 bytes to the right of [ 19.485439] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.485562] [ 19.485586] The buggy address belongs to the physical page: [ 19.485619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.485670] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.485758] page_type: f5(slab) [ 19.485831] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.485885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.485927] page dumped because: kasan: bad access detected [ 19.485959] [ 19.485980] Memory state around the buggy address: [ 19.486025] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.486088] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.486133] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.486171] ^ [ 19.486207] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.486249] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.486297] ================================================================== [ 19.560665] ================================================================== [ 19.561104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 19.561177] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.561232] [ 19.561434] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.561720] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.561788] Hardware name: linux,dummy-virt (DT) [ 19.561822] Call trace: [ 19.561848] show_stack+0x20/0x38 (C) [ 19.561914] dump_stack_lvl+0x8c/0xd0 [ 19.561966] print_report+0x118/0x608 [ 19.562011] kasan_report+0xdc/0x128 [ 19.562068] kasan_check_range+0x100/0x1a8 [ 19.562119] __kasan_check_write+0x20/0x30 [ 19.562168] kasan_atomics_helper+0x17ec/0x4858 [ 19.562214] kasan_atomics+0x198/0x2e0 [ 19.562257] kunit_try_run_case+0x170/0x3f0 [ 19.562304] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.562356] kthread+0x328/0x630 [ 19.562401] ret_from_fork+0x10/0x20 [ 19.562449] [ 19.562470] Allocated by task 265: [ 19.563254] kasan_save_stack+0x3c/0x68 [ 19.563320] kasan_save_track+0x20/0x40 [ 19.563361] kasan_save_alloc_info+0x40/0x58 [ 19.563411] __kasan_kmalloc+0xd4/0xd8 [ 19.563452] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.563745] kasan_atomics+0xb8/0x2e0 [ 19.563951] kunit_try_run_case+0x170/0x3f0 [ 19.564019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.564078] kthread+0x328/0x630 [ 19.564127] ret_from_fork+0x10/0x20 [ 19.564167] [ 19.564297] The buggy address belongs to the object at fff00000c788e780 [ 19.564297] which belongs to the cache kmalloc-64 of size 64 [ 19.564496] The buggy address is located 0 bytes to the right of [ 19.564496] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.564684] [ 19.564711] The buggy address belongs to the physical page: [ 19.564747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.564923] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.565009] page_type: f5(slab) [ 19.565063] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.565118] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.565158] page dumped because: kasan: bad access detected [ 19.565193] [ 19.565214] Memory state around the buggy address: [ 19.565248] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.565597] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.565850] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.566055] ^ [ 19.566104] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.566161] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.566204] ================================================================== [ 19.339787] ================================================================== [ 19.339854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 19.339915] Write of size 4 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.339966] [ 19.339999] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.340098] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.340129] Hardware name: linux,dummy-virt (DT) [ 19.340161] Call trace: [ 19.340187] show_stack+0x20/0x38 (C) [ 19.340238] dump_stack_lvl+0x8c/0xd0 [ 19.340286] print_report+0x118/0x608 [ 19.340349] kasan_report+0xdc/0x128 [ 19.340580] kasan_check_range+0x100/0x1a8 [ 19.340923] __kasan_check_write+0x20/0x30 [ 19.340983] kasan_atomics_helper+0xa6c/0x4858 [ 19.341194] kasan_atomics+0x198/0x2e0 [ 19.341342] kunit_try_run_case+0x170/0x3f0 [ 19.341399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.341462] kthread+0x328/0x630 [ 19.341512] ret_from_fork+0x10/0x20 [ 19.341563] [ 19.341584] Allocated by task 265: [ 19.341616] kasan_save_stack+0x3c/0x68 [ 19.341658] kasan_save_track+0x20/0x40 [ 19.341700] kasan_save_alloc_info+0x40/0x58 [ 19.341740] __kasan_kmalloc+0xd4/0xd8 [ 19.341777] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.341816] kasan_atomics+0xb8/0x2e0 [ 19.341852] kunit_try_run_case+0x170/0x3f0 [ 19.341889] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.342221] kthread+0x328/0x630 [ 19.342541] ret_from_fork+0x10/0x20 [ 19.342588] [ 19.342614] The buggy address belongs to the object at fff00000c788e780 [ 19.342614] which belongs to the cache kmalloc-64 of size 64 [ 19.342681] The buggy address is located 0 bytes to the right of [ 19.342681] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.342972] [ 19.343008] The buggy address belongs to the physical page: [ 19.343051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.343167] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.343271] page_type: f5(slab) [ 19.343503] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.343593] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.343678] page dumped because: kasan: bad access detected [ 19.343721] [ 19.343743] Memory state around the buggy address: [ 19.343879] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.344126] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.344298] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.344381] ^ [ 19.344565] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.344768] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.344850] ================================================================== [ 19.505225] ================================================================== [ 19.505267] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 19.505313] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.505360] [ 19.505394] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.505566] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.505601] Hardware name: linux,dummy-virt (DT) [ 19.505633] Call trace: [ 19.505657] show_stack+0x20/0x38 (C) [ 19.505711] dump_stack_lvl+0x8c/0xd0 [ 19.505813] print_report+0x118/0x608 [ 19.506171] kasan_report+0xdc/0x128 [ 19.506277] kasan_check_range+0x100/0x1a8 [ 19.506663] __kasan_check_write+0x20/0x30 [ 19.506985] kasan_atomics_helper+0x14e4/0x4858 [ 19.507135] kasan_atomics+0x198/0x2e0 [ 19.507195] kunit_try_run_case+0x170/0x3f0 [ 19.507245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.507470] kthread+0x328/0x630 [ 19.507540] ret_from_fork+0x10/0x20 [ 19.507704] [ 19.507740] Allocated by task 265: [ 19.507785] kasan_save_stack+0x3c/0x68 [ 19.507834] kasan_save_track+0x20/0x40 [ 19.508028] kasan_save_alloc_info+0x40/0x58 [ 19.508095] __kasan_kmalloc+0xd4/0xd8 [ 19.508147] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.508291] kasan_atomics+0xb8/0x2e0 [ 19.508356] kunit_try_run_case+0x170/0x3f0 [ 19.508401] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.508460] kthread+0x328/0x630 [ 19.508510] ret_from_fork+0x10/0x20 [ 19.508551] [ 19.508724] The buggy address belongs to the object at fff00000c788e780 [ 19.508724] which belongs to the cache kmalloc-64 of size 64 [ 19.508897] The buggy address is located 0 bytes to the right of [ 19.508897] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.509515] [ 19.509591] The buggy address belongs to the physical page: [ 19.509649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.509723] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.509775] page_type: f5(slab) [ 19.509823] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.509924] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.509969] page dumped because: kasan: bad access detected [ 19.510004] [ 19.510025] Memory state around the buggy address: [ 19.510070] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.510114] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.510375] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.510430] ^ [ 19.510471] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.510515] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.510554] ================================================================== [ 19.539510] ================================================================== [ 19.539610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 19.539772] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.540079] [ 19.540115] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.540213] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.540284] Hardware name: linux,dummy-virt (DT) [ 19.540379] Call trace: [ 19.540441] show_stack+0x20/0x38 (C) [ 19.540583] dump_stack_lvl+0x8c/0xd0 [ 19.540722] print_report+0x118/0x608 [ 19.541071] kasan_report+0xdc/0x128 [ 19.541250] kasan_check_range+0x100/0x1a8 [ 19.541308] __kasan_check_write+0x20/0x30 [ 19.541356] kasan_atomics_helper+0x16d0/0x4858 [ 19.541405] kasan_atomics+0x198/0x2e0 [ 19.541450] kunit_try_run_case+0x170/0x3f0 [ 19.541503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.541607] kthread+0x328/0x630 [ 19.541694] ret_from_fork+0x10/0x20 [ 19.541788] [ 19.541841] Allocated by task 265: [ 19.541873] kasan_save_stack+0x3c/0x68 [ 19.541933] kasan_save_track+0x20/0x40 [ 19.541975] kasan_save_alloc_info+0x40/0x58 [ 19.542031] __kasan_kmalloc+0xd4/0xd8 [ 19.542081] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.542121] kasan_atomics+0xb8/0x2e0 [ 19.542392] kunit_try_run_case+0x170/0x3f0 [ 19.542573] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.542626] kthread+0x328/0x630 [ 19.542741] ret_from_fork+0x10/0x20 [ 19.542904] [ 19.542929] The buggy address belongs to the object at fff00000c788e780 [ 19.542929] which belongs to the cache kmalloc-64 of size 64 [ 19.543097] The buggy address is located 0 bytes to the right of [ 19.543097] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.543169] [ 19.543192] The buggy address belongs to the physical page: [ 19.543225] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.543277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.543324] page_type: f5(slab) [ 19.543484] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.543538] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.543583] page dumped because: kasan: bad access detected [ 19.543624] [ 19.543671] Memory state around the buggy address: [ 19.543740] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.543816] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.544137] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.544266] ^ [ 19.544353] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.544409] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.544449] ================================================================== [ 19.400528] ================================================================== [ 19.400580] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 19.400822] Read of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.400881] [ 19.400917] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.401384] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.401438] Hardware name: linux,dummy-virt (DT) [ 19.401475] Call trace: [ 19.401717] show_stack+0x20/0x38 (C) [ 19.401869] dump_stack_lvl+0x8c/0xd0 [ 19.402247] print_report+0x118/0x608 [ 19.402309] kasan_report+0xdc/0x128 [ 19.402468] kasan_check_range+0x100/0x1a8 [ 19.402548] __kasan_check_read+0x20/0x30 [ 19.402609] kasan_atomics_helper+0xdd4/0x4858 [ 19.402659] kasan_atomics+0x198/0x2e0 [ 19.402704] kunit_try_run_case+0x170/0x3f0 [ 19.402753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.402804] kthread+0x328/0x630 [ 19.402915] ret_from_fork+0x10/0x20 [ 19.403024] [ 19.403101] Allocated by task 265: [ 19.403137] kasan_save_stack+0x3c/0x68 [ 19.403244] kasan_save_track+0x20/0x40 [ 19.403294] kasan_save_alloc_info+0x40/0x58 [ 19.403351] __kasan_kmalloc+0xd4/0xd8 [ 19.403389] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.403428] kasan_atomics+0xb8/0x2e0 [ 19.403510] kunit_try_run_case+0x170/0x3f0 [ 19.403575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.403617] kthread+0x328/0x630 [ 19.403652] ret_from_fork+0x10/0x20 [ 19.403695] [ 19.403743] The buggy address belongs to the object at fff00000c788e780 [ 19.403743] which belongs to the cache kmalloc-64 of size 64 [ 19.403832] The buggy address is located 0 bytes to the right of [ 19.403832] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.403917] [ 19.403984] The buggy address belongs to the physical page: [ 19.404023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.404085] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.404157] page_type: f5(slab) [ 19.404216] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.404269] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.404311] page dumped because: kasan: bad access detected [ 19.404345] [ 19.404365] Memory state around the buggy address: [ 19.404399] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.404444] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.404486] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.404555] ^ [ 19.404635] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.404686] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.404773] ================================================================== [ 19.395176] ================================================================== [ 19.395237] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 19.395322] Read of size 4 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.395380] [ 19.395412] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.395496] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.395704] Hardware name: linux,dummy-virt (DT) [ 19.395791] Call trace: [ 19.395833] show_stack+0x20/0x38 (C) [ 19.395905] dump_stack_lvl+0x8c/0xd0 [ 19.396087] print_report+0x118/0x608 [ 19.396330] kasan_report+0xdc/0x128 [ 19.396383] __asan_report_load4_noabort+0x20/0x30 [ 19.396606] kasan_atomics_helper+0x3e04/0x4858 [ 19.396689] kasan_atomics+0x198/0x2e0 [ 19.396788] kunit_try_run_case+0x170/0x3f0 [ 19.396838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.396890] kthread+0x328/0x630 [ 19.396936] ret_from_fork+0x10/0x20 [ 19.396984] [ 19.397011] Allocated by task 265: [ 19.397314] kasan_save_stack+0x3c/0x68 [ 19.397452] kasan_save_track+0x20/0x40 [ 19.397501] kasan_save_alloc_info+0x40/0x58 [ 19.397543] __kasan_kmalloc+0xd4/0xd8 [ 19.397581] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.397722] kasan_atomics+0xb8/0x2e0 [ 19.397769] kunit_try_run_case+0x170/0x3f0 [ 19.397811] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.397853] kthread+0x328/0x630 [ 19.397914] ret_from_fork+0x10/0x20 [ 19.397956] [ 19.398066] The buggy address belongs to the object at fff00000c788e780 [ 19.398066] which belongs to the cache kmalloc-64 of size 64 [ 19.398141] The buggy address is located 0 bytes to the right of [ 19.398141] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.398206] [ 19.398231] The buggy address belongs to the physical page: [ 19.398277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.398335] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.398401] page_type: f5(slab) [ 19.398441] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.398508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.398676] page dumped because: kasan: bad access detected [ 19.398758] [ 19.399279] Memory state around the buggy address: [ 19.399339] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.399474] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.399523] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.399562] ^ [ 19.399598] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.400018] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.400133] ================================================================== [ 19.415168] ================================================================== [ 19.415279] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 19.415340] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.415442] [ 19.415507] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.415660] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.415690] Hardware name: linux,dummy-virt (DT) [ 19.415722] Call trace: [ 19.415747] show_stack+0x20/0x38 (C) [ 19.415797] dump_stack_lvl+0x8c/0xd0 [ 19.415847] print_report+0x118/0x608 [ 19.415893] kasan_report+0xdc/0x128 [ 19.415938] __asan_report_store8_noabort+0x20/0x30 [ 19.415989] kasan_atomics_helper+0x3e5c/0x4858 [ 19.416036] kasan_atomics+0x198/0x2e0 [ 19.416093] kunit_try_run_case+0x170/0x3f0 [ 19.416141] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.416194] kthread+0x328/0x630 [ 19.416238] ret_from_fork+0x10/0x20 [ 19.416286] [ 19.416307] Allocated by task 265: [ 19.416337] kasan_save_stack+0x3c/0x68 [ 19.416381] kasan_save_track+0x20/0x40 [ 19.416419] kasan_save_alloc_info+0x40/0x58 [ 19.416459] __kasan_kmalloc+0xd4/0xd8 [ 19.416495] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.416533] kasan_atomics+0xb8/0x2e0 [ 19.416569] kunit_try_run_case+0x170/0x3f0 [ 19.416612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.416714] kthread+0x328/0x630 [ 19.416757] ret_from_fork+0x10/0x20 [ 19.416794] [ 19.416815] The buggy address belongs to the object at fff00000c788e780 [ 19.416815] which belongs to the cache kmalloc-64 of size 64 [ 19.416871] The buggy address is located 0 bytes to the right of [ 19.416871] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.416938] [ 19.416969] The buggy address belongs to the physical page: [ 19.417001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.417204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.417259] page_type: f5(slab) [ 19.417300] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.417354] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.417394] page dumped because: kasan: bad access detected [ 19.417427] [ 19.417446] Memory state around the buggy address: [ 19.417478] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.417523] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.417565] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.417603] ^ [ 19.417635] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.417677] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.417715] ================================================================== [ 19.502621] ================================================================== [ 19.502669] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 19.502717] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.502789] [ 19.502822] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.502904] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.502933] Hardware name: linux,dummy-virt (DT) [ 19.502965] Call trace: [ 19.502988] show_stack+0x20/0x38 (C) [ 19.503036] dump_stack_lvl+0x8c/0xd0 [ 19.503099] print_report+0x118/0x608 [ 19.503156] kasan_report+0xdc/0x128 [ 19.503250] kasan_check_range+0x100/0x1a8 [ 19.503299] __kasan_check_write+0x20/0x30 [ 19.503347] kasan_atomics_helper+0x147c/0x4858 [ 19.503394] kasan_atomics+0x198/0x2e0 [ 19.503450] kunit_try_run_case+0x170/0x3f0 [ 19.503497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.503548] kthread+0x328/0x630 [ 19.503608] ret_from_fork+0x10/0x20 [ 19.503663] [ 19.503685] Allocated by task 265: [ 19.503716] kasan_save_stack+0x3c/0x68 [ 19.503758] kasan_save_track+0x20/0x40 [ 19.503832] kasan_save_alloc_info+0x40/0x58 [ 19.503911] __kasan_kmalloc+0xd4/0xd8 [ 19.503958] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.504049] kasan_atomics+0xb8/0x2e0 [ 19.504092] kunit_try_run_case+0x170/0x3f0 [ 19.504130] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.504174] kthread+0x328/0x630 [ 19.504219] ret_from_fork+0x10/0x20 [ 19.504260] [ 19.504283] The buggy address belongs to the object at fff00000c788e780 [ 19.504283] which belongs to the cache kmalloc-64 of size 64 [ 19.504356] The buggy address is located 0 bytes to the right of [ 19.504356] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.504419] [ 19.504455] The buggy address belongs to the physical page: [ 19.504502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.504550] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.504598] page_type: f5(slab) [ 19.504635] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.504703] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.504745] page dumped because: kasan: bad access detected [ 19.504778] [ 19.504798] Memory state around the buggy address: [ 19.504871] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.504918] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.504961] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.505000] ^ [ 19.505035] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.505088] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.505127] ================================================================== [ 19.512720] ================================================================== [ 19.512788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 19.512848] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.512899] [ 19.512933] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.513055] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.513088] Hardware name: linux,dummy-virt (DT) [ 19.513122] Call trace: [ 19.513147] show_stack+0x20/0x38 (C) [ 19.513196] dump_stack_lvl+0x8c/0xd0 [ 19.513248] print_report+0x118/0x608 [ 19.513292] kasan_report+0xdc/0x128 [ 19.513335] kasan_check_range+0x100/0x1a8 [ 19.513382] __kasan_check_write+0x20/0x30 [ 19.513429] kasan_atomics_helper+0x154c/0x4858 [ 19.513476] kasan_atomics+0x198/0x2e0 [ 19.513521] kunit_try_run_case+0x170/0x3f0 [ 19.513569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.513620] kthread+0x328/0x630 [ 19.513664] ret_from_fork+0x10/0x20 [ 19.513712] [ 19.513733] Allocated by task 265: [ 19.513859] kasan_save_stack+0x3c/0x68 [ 19.513996] kasan_save_track+0x20/0x40 [ 19.514073] kasan_save_alloc_info+0x40/0x58 [ 19.514118] __kasan_kmalloc+0xd4/0xd8 [ 19.514155] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.514195] kasan_atomics+0xb8/0x2e0 [ 19.514232] kunit_try_run_case+0x170/0x3f0 [ 19.514582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.514636] kthread+0x328/0x630 [ 19.514675] ret_from_fork+0x10/0x20 [ 19.514712] [ 19.514738] The buggy address belongs to the object at fff00000c788e780 [ 19.514738] which belongs to the cache kmalloc-64 of size 64 [ 19.514795] The buggy address is located 0 bytes to the right of [ 19.514795] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.514858] [ 19.514880] The buggy address belongs to the physical page: [ 19.514914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.514964] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.515014] page_type: f5(slab) [ 19.515064] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.515120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.515161] page dumped because: kasan: bad access detected [ 19.515196] [ 19.515216] Memory state around the buggy address: [ 19.515252] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.515295] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.515400] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.515460] ^ [ 19.515546] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.515899] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.516345] ================================================================== [ 19.345247] ================================================================== [ 19.345300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 19.345357] Write of size 4 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.345408] [ 19.345439] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.345524] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.345553] Hardware name: linux,dummy-virt (DT) [ 19.345587] Call trace: [ 19.345613] show_stack+0x20/0x38 (C) [ 19.345663] dump_stack_lvl+0x8c/0xd0 [ 19.345713] print_report+0x118/0x608 [ 19.345758] kasan_report+0xdc/0x128 [ 19.345803] kasan_check_range+0x100/0x1a8 [ 19.345851] __kasan_check_write+0x20/0x30 [ 19.345908] kasan_atomics_helper+0xad4/0x4858 [ 19.345956] kasan_atomics+0x198/0x2e0 [ 19.346000] kunit_try_run_case+0x170/0x3f0 [ 19.346057] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.346113] kthread+0x328/0x630 [ 19.346158] ret_from_fork+0x10/0x20 [ 19.346205] [ 19.346308] Allocated by task 265: [ 19.346402] kasan_save_stack+0x3c/0x68 [ 19.346449] kasan_save_track+0x20/0x40 [ 19.346487] kasan_save_alloc_info+0x40/0x58 [ 19.346529] __kasan_kmalloc+0xd4/0xd8 [ 19.346579] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.346661] kasan_atomics+0xb8/0x2e0 [ 19.346705] kunit_try_run_case+0x170/0x3f0 [ 19.346743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.347079] [ 19.347104] The buggy address belongs to the physical page: [ 19.347137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.347202] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.347255] page_type: f5(slab) [ 19.347296] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.347348] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.347390] page dumped because: kasan: bad access detected [ 19.347423] [ 19.347445] Memory state around the buggy address: [ 19.347479] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.347523] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.347565] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.347603] ^ [ 19.347637] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.347679] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.348205] ================================================================== [ 19.452846] ================================================================== [ 19.452907] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 19.452966] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.453017] [ 19.453063] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.453151] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.453180] Hardware name: linux,dummy-virt (DT) [ 19.453212] Call trace: [ 19.453237] show_stack+0x20/0x38 (C) [ 19.453287] dump_stack_lvl+0x8c/0xd0 [ 19.453334] print_report+0x118/0x608 [ 19.453380] kasan_report+0xdc/0x128 [ 19.453423] kasan_check_range+0x100/0x1a8 [ 19.453551] __kasan_check_write+0x20/0x30 [ 19.453813] kasan_atomics_helper+0x1128/0x4858 [ 19.454946] kasan_atomics+0x198/0x2e0 [ 19.455014] kunit_try_run_case+0x170/0x3f0 [ 19.455084] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.455141] kthread+0x328/0x630 [ 19.455187] ret_from_fork+0x10/0x20 [ 19.455236] [ 19.455257] Allocated by task 265: [ 19.455555] kasan_save_stack+0x3c/0x68 [ 19.455900] kasan_save_track+0x20/0x40 [ 19.455954] kasan_save_alloc_info+0x40/0x58 [ 19.456239] __kasan_kmalloc+0xd4/0xd8 [ 19.456296] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.456338] kasan_atomics+0xb8/0x2e0 [ 19.456567] kunit_try_run_case+0x170/0x3f0 [ 19.456625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.456833] kthread+0x328/0x630 [ 19.456881] ret_from_fork+0x10/0x20 [ 19.456922] [ 19.457356] The buggy address belongs to the object at fff00000c788e780 [ 19.457356] which belongs to the cache kmalloc-64 of size 64 [ 19.457430] The buggy address is located 0 bytes to the right of [ 19.457430] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.457591] [ 19.457617] The buggy address belongs to the physical page: [ 19.457664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.458010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.458142] page_type: f5(slab) [ 19.458205] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.458258] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.458302] page dumped because: kasan: bad access detected [ 19.458466] [ 19.458492] Memory state around the buggy address: [ 19.458530] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.458586] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.458729] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.458904] ^ [ 19.459018] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.459082] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.459227] ================================================================== [ 19.325310] ================================================================== [ 19.325369] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 19.325420] Write of size 4 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.325489] [ 19.325555] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.325695] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.325757] Hardware name: linux,dummy-virt (DT) [ 19.325863] Call trace: [ 19.325952] show_stack+0x20/0x38 (C) [ 19.326047] dump_stack_lvl+0x8c/0xd0 [ 19.326105] print_report+0x118/0x608 [ 19.326162] kasan_report+0xdc/0x128 [ 19.326207] kasan_check_range+0x100/0x1a8 [ 19.326256] __kasan_check_write+0x20/0x30 [ 19.326555] kasan_atomics_helper+0x99c/0x4858 [ 19.326650] kasan_atomics+0x198/0x2e0 [ 19.326697] kunit_try_run_case+0x170/0x3f0 [ 19.326745] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.326798] kthread+0x328/0x630 [ 19.327076] ret_from_fork+0x10/0x20 [ 19.327227] [ 19.327253] Allocated by task 265: [ 19.327287] kasan_save_stack+0x3c/0x68 [ 19.327365] kasan_save_track+0x20/0x40 [ 19.327442] kasan_save_alloc_info+0x40/0x58 [ 19.327523] __kasan_kmalloc+0xd4/0xd8 [ 19.327561] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.327601] kasan_atomics+0xb8/0x2e0 [ 19.327647] kunit_try_run_case+0x170/0x3f0 [ 19.327743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.327820] kthread+0x328/0x630 [ 19.328021] ret_from_fork+0x10/0x20 [ 19.328236] [ 19.328541] The buggy address belongs to the object at fff00000c788e780 [ 19.328541] which belongs to the cache kmalloc-64 of size 64 [ 19.328774] The buggy address is located 0 bytes to the right of [ 19.328774] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.329218] [ 19.329250] The buggy address belongs to the physical page: [ 19.329287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.329548] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.329603] page_type: f5(slab) [ 19.329756] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.329825] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.330106] page dumped because: kasan: bad access detected [ 19.330287] [ 19.330503] Memory state around the buggy address: [ 19.330834] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.331155] ================================================================== [ 19.230802] ================================================================== [ 19.232730] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 19.232965] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.233025] Call trace: [ 19.234182] __kasan_check_write+0x20/0x30 [ 19.234708] kunit_try_run_case+0x170/0x3f0 [ 19.235535] kasan_save_track+0x20/0x40 [ 19.236447] The buggy address is located 0 bytes to the right of [ 19.236447] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.239158] Write of size 4 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.240636] kasan_report+0xdc/0x128 [ 19.241264] kthread+0x328/0x630 [ 19.242746] [ 19.248682] kasan_atomics+0x198/0x2e0 [ 19.251575] page_type: f5(slab) [ 19.252553] ^ [ 19.253428] [ 19.253577] Hardware name: linux,dummy-virt (DT) [ 19.253635] show_stack+0x20/0x38 (C) [ 19.254044] kasan_atomics_helper+0x414/0x4858 [ 19.254544] [ 19.254730] __kasan_kmalloc+0xd4/0xd8 [ 19.255048] [ 19.255075] The buggy address belongs to the object at fff00000c788e780 [ 19.255075] which belongs to the cache kmalloc-64 of size 64 [ 19.255689] ^ [ 19.255774] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.255821] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.255861] ================================================================== [ 19.517078] ================================================================== [ 19.517294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 19.517374] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.517550] [ 19.517589] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.517800] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.517839] Hardware name: linux,dummy-virt (DT) [ 19.518089] Call trace: [ 19.518125] show_stack+0x20/0x38 (C) [ 19.518200] dump_stack_lvl+0x8c/0xd0 [ 19.518284] print_report+0x118/0x608 [ 19.518372] kasan_report+0xdc/0x128 [ 19.518465] kasan_check_range+0x100/0x1a8 [ 19.518513] __kasan_check_write+0x20/0x30 [ 19.518561] kasan_atomics_helper+0x15b4/0x4858 [ 19.518806] kasan_atomics+0x198/0x2e0 [ 19.518868] kunit_try_run_case+0x170/0x3f0 [ 19.518919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.519105] kthread+0x328/0x630 [ 19.519267] ret_from_fork+0x10/0x20 [ 19.519444] [ 19.519469] Allocated by task 265: [ 19.519505] kasan_save_stack+0x3c/0x68 [ 19.519551] kasan_save_track+0x20/0x40 [ 19.519591] kasan_save_alloc_info+0x40/0x58 [ 19.519631] __kasan_kmalloc+0xd4/0xd8 [ 19.519667] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.519707] kasan_atomics+0xb8/0x2e0 [ 19.519743] kunit_try_run_case+0x170/0x3f0 [ 19.520144] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.520192] kthread+0x328/0x630 [ 19.520718] ret_from_fork+0x10/0x20 [ 19.520837] [ 19.520868] The buggy address belongs to the object at fff00000c788e780 [ 19.520868] which belongs to the cache kmalloc-64 of size 64 [ 19.521135] The buggy address is located 0 bytes to the right of [ 19.521135] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.521231] [ 19.521305] The buggy address belongs to the physical page: [ 19.521508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.521681] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.521882] page_type: f5(slab) [ 19.522058] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.522120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.522163] page dumped because: kasan: bad access detected [ 19.522198] [ 19.522229] Memory state around the buggy address: [ 19.522265] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.522308] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.522350] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.522518] ^ [ 19.522569] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.522662] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.522706] ================================================================== [ 19.411373] ================================================================== [ 19.411563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 19.411639] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.411694] [ 19.411737] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.411824] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.411854] Hardware name: linux,dummy-virt (DT) [ 19.411887] Call trace: [ 19.411911] show_stack+0x20/0x38 (C) [ 19.411961] dump_stack_lvl+0x8c/0xd0 [ 19.412561] print_report+0x118/0x608 [ 19.412629] kasan_report+0xdc/0x128 [ 19.412677] kasan_check_range+0x100/0x1a8 [ 19.412740] __kasan_check_write+0x20/0x30 [ 19.412812] kasan_atomics_helper+0xe44/0x4858 [ 19.412907] kasan_atomics+0x198/0x2e0 [ 19.413000] kunit_try_run_case+0x170/0x3f0 [ 19.413120] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.413243] kthread+0x328/0x630 [ 19.413301] ret_from_fork+0x10/0x20 [ 19.413351] [ 19.413385] Allocated by task 265: [ 19.413417] kasan_save_stack+0x3c/0x68 [ 19.413461] kasan_save_track+0x20/0x40 [ 19.413498] kasan_save_alloc_info+0x40/0x58 [ 19.413538] __kasan_kmalloc+0xd4/0xd8 [ 19.413574] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.413614] kasan_atomics+0xb8/0x2e0 [ 19.413650] kunit_try_run_case+0x170/0x3f0 [ 19.413686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.413741] kthread+0x328/0x630 [ 19.413783] ret_from_fork+0x10/0x20 [ 19.413821] [ 19.413855] The buggy address belongs to the object at fff00000c788e780 [ 19.413855] which belongs to the cache kmalloc-64 of size 64 [ 19.413937] The buggy address is located 0 bytes to the right of [ 19.413937] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.414048] [ 19.414113] The buggy address belongs to the physical page: [ 19.414148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.414200] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.414269] page_type: f5(slab) [ 19.414311] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.414381] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.414466] page dumped because: kasan: bad access detected [ 19.414534] [ 19.414592] Memory state around the buggy address: [ 19.414644] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.414690] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.414747] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.414785] ^ [ 19.414831] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.414873] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.414911] ================================================================== [ 19.550318] ================================================================== [ 19.550376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 19.550533] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.550599] [ 19.550635] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.550809] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.550844] Hardware name: linux,dummy-virt (DT) [ 19.551072] Call trace: [ 19.551106] show_stack+0x20/0x38 (C) [ 19.551175] dump_stack_lvl+0x8c/0xd0 [ 19.551227] print_report+0x118/0x608 [ 19.551323] kasan_report+0xdc/0x128 [ 19.551386] kasan_check_range+0x100/0x1a8 [ 19.551440] __kasan_check_write+0x20/0x30 [ 19.551662] kasan_atomics_helper+0x175c/0x4858 [ 19.551784] kasan_atomics+0x198/0x2e0 [ 19.552031] kunit_try_run_case+0x170/0x3f0 [ 19.552105] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.552161] kthread+0x328/0x630 [ 19.552499] ret_from_fork+0x10/0x20 [ 19.552725] [ 19.552777] Allocated by task 265: [ 19.552817] kasan_save_stack+0x3c/0x68 [ 19.552870] kasan_save_track+0x20/0x40 [ 19.552910] kasan_save_alloc_info+0x40/0x58 [ 19.552950] __kasan_kmalloc+0xd4/0xd8 [ 19.552987] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.553025] kasan_atomics+0xb8/0x2e0 [ 19.553077] kunit_try_run_case+0x170/0x3f0 [ 19.553117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.553160] kthread+0x328/0x630 [ 19.553197] ret_from_fork+0x10/0x20 [ 19.553234] [ 19.553256] The buggy address belongs to the object at fff00000c788e780 [ 19.553256] which belongs to the cache kmalloc-64 of size 64 [ 19.553315] The buggy address is located 0 bytes to the right of [ 19.553315] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.553376] [ 19.553398] The buggy address belongs to the physical page: [ 19.553430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.553483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.553532] page_type: f5(slab) [ 19.553572] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.553624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.553665] page dumped because: kasan: bad access detected [ 19.553699] [ 19.553718] Memory state around the buggy address: [ 19.553750] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.553793] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.554210] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.554284] ^ [ 19.554337] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.554390] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.554735] ================================================================== [ 19.420937] ================================================================== [ 19.421027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 19.421090] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.421140] [ 19.421171] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.421256] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.421284] Hardware name: linux,dummy-virt (DT) [ 19.421314] Call trace: [ 19.421340] show_stack+0x20/0x38 (C) [ 19.421388] dump_stack_lvl+0x8c/0xd0 [ 19.421436] print_report+0x118/0x608 [ 19.421482] kasan_report+0xdc/0x128 [ 19.421527] kasan_check_range+0x100/0x1a8 [ 19.421574] __kasan_check_write+0x20/0x30 [ 19.421622] kasan_atomics_helper+0xf20/0x4858 [ 19.421668] kasan_atomics+0x198/0x2e0 [ 19.421712] kunit_try_run_case+0x170/0x3f0 [ 19.421758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.421809] kthread+0x328/0x630 [ 19.421852] ret_from_fork+0x10/0x20 [ 19.422213] [ 19.422278] Allocated by task 265: [ 19.422317] kasan_save_stack+0x3c/0x68 [ 19.422371] kasan_save_track+0x20/0x40 [ 19.422410] kasan_save_alloc_info+0x40/0x58 [ 19.422452] __kasan_kmalloc+0xd4/0xd8 [ 19.422489] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.422528] kasan_atomics+0xb8/0x2e0 [ 19.422575] kunit_try_run_case+0x170/0x3f0 [ 19.422620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.422663] kthread+0x328/0x630 [ 19.422700] ret_from_fork+0x10/0x20 [ 19.422738] [ 19.422760] The buggy address belongs to the object at fff00000c788e780 [ 19.422760] which belongs to the cache kmalloc-64 of size 64 [ 19.422871] The buggy address is located 0 bytes to the right of [ 19.422871] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.422968] [ 19.423002] The buggy address belongs to the physical page: [ 19.423035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.423116] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.423173] page_type: f5(slab) [ 19.423213] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.423264] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.423305] page dumped because: kasan: bad access detected [ 19.423339] [ 19.423370] Memory state around the buggy address: [ 19.423402] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.423446] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.423544] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.423625] ^ [ 19.423678] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.423726] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.423766] ================================================================== [ 19.544973] ================================================================== [ 19.545302] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 19.545386] Read of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.545473] [ 19.545505] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.545588] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.545624] Hardware name: linux,dummy-virt (DT) [ 19.545690] Call trace: [ 19.545733] show_stack+0x20/0x38 (C) [ 19.545827] dump_stack_lvl+0x8c/0xd0 [ 19.546055] print_report+0x118/0x608 [ 19.546346] kasan_report+0xdc/0x128 [ 19.546408] __asan_report_load8_noabort+0x20/0x30 [ 19.546476] kasan_atomics_helper+0x3e10/0x4858 [ 19.546818] kasan_atomics+0x198/0x2e0 [ 19.546891] kunit_try_run_case+0x170/0x3f0 [ 19.546953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.547011] kthread+0x328/0x630 [ 19.547312] ret_from_fork+0x10/0x20 [ 19.547463] [ 19.547593] Allocated by task 265: [ 19.547767] kasan_save_stack+0x3c/0x68 [ 19.547974] kasan_save_track+0x20/0x40 [ 19.548020] kasan_save_alloc_info+0x40/0x58 [ 19.548077] __kasan_kmalloc+0xd4/0xd8 [ 19.548118] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.548158] kasan_atomics+0xb8/0x2e0 [ 19.548196] kunit_try_run_case+0x170/0x3f0 [ 19.548235] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.548277] kthread+0x328/0x630 [ 19.548315] ret_from_fork+0x10/0x20 [ 19.548352] [ 19.548373] The buggy address belongs to the object at fff00000c788e780 [ 19.548373] which belongs to the cache kmalloc-64 of size 64 [ 19.548431] The buggy address is located 0 bytes to the right of [ 19.548431] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.548494] [ 19.548516] The buggy address belongs to the physical page: [ 19.548548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.548602] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.548652] page_type: f5(slab) [ 19.548692] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.548744] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.548786] page dumped because: kasan: bad access detected [ 19.548819] [ 19.549194] Memory state around the buggy address: [ 19.549235] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.549283] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.549327] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.549418] ^ [ 19.549455] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.549499] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.549538] ================================================================== [ 19.533456] ================================================================== [ 19.533733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 19.534008] Read of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.534232] [ 19.534271] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.534467] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.534599] Hardware name: linux,dummy-virt (DT) [ 19.534791] Call trace: [ 19.534986] show_stack+0x20/0x38 (C) [ 19.535064] dump_stack_lvl+0x8c/0xd0 [ 19.535117] print_report+0x118/0x608 [ 19.535201] kasan_report+0xdc/0x128 [ 19.535453] __asan_report_load8_noabort+0x20/0x30 [ 19.535565] kasan_atomics_helper+0x3df4/0x4858 [ 19.535869] kasan_atomics+0x198/0x2e0 [ 19.536113] kunit_try_run_case+0x170/0x3f0 [ 19.536178] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.536503] kthread+0x328/0x630 [ 19.536845] ret_from_fork+0x10/0x20 [ 19.536900] [ 19.536921] Allocated by task 265: [ 19.536953] kasan_save_stack+0x3c/0x68 [ 19.536998] kasan_save_track+0x20/0x40 [ 19.537062] kasan_save_alloc_info+0x40/0x58 [ 19.537155] __kasan_kmalloc+0xd4/0xd8 [ 19.537218] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.537257] kasan_atomics+0xb8/0x2e0 [ 19.537299] kunit_try_run_case+0x170/0x3f0 [ 19.537445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.537687] kthread+0x328/0x630 [ 19.537913] ret_from_fork+0x10/0x20 [ 19.537958] [ 19.537981] The buggy address belongs to the object at fff00000c788e780 [ 19.537981] which belongs to the cache kmalloc-64 of size 64 [ 19.538054] The buggy address is located 0 bytes to the right of [ 19.538054] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.538207] [ 19.538247] The buggy address belongs to the physical page: [ 19.538329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.538386] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.538441] page_type: f5(slab) [ 19.538530] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.538596] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.538700] page dumped because: kasan: bad access detected [ 19.538736] [ 19.538758] Memory state around the buggy address: [ 19.538845] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.538926] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.538970] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.539009] ^ [ 19.539052] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.539100] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.539139] ================================================================== [ 19.459604] ================================================================== [ 19.459651] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 19.459707] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.459757] [ 19.459789] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.459873] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.459902] Hardware name: linux,dummy-virt (DT) [ 19.459934] Call trace: [ 19.459958] show_stack+0x20/0x38 (C) [ 19.460008] dump_stack_lvl+0x8c/0xd0 [ 19.460072] print_report+0x118/0x608 [ 19.462097] kasan_report+0xdc/0x128 [ 19.462932] kasan_check_range+0x100/0x1a8 [ 19.463262] __kasan_check_write+0x20/0x30 [ 19.463347] kasan_atomics_helper+0x1190/0x4858 [ 19.463450] kasan_atomics+0x198/0x2e0 [ 19.463512] kunit_try_run_case+0x170/0x3f0 [ 19.463579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.463632] kthread+0x328/0x630 [ 19.463869] ret_from_fork+0x10/0x20 [ 19.463945] [ 19.463981] Allocated by task 265: [ 19.464275] kasan_save_stack+0x3c/0x68 [ 19.464329] kasan_save_track+0x20/0x40 [ 19.464589] kasan_save_alloc_info+0x40/0x58 [ 19.464641] __kasan_kmalloc+0xd4/0xd8 [ 19.464680] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.464759] kasan_atomics+0xb8/0x2e0 [ 19.464822] kunit_try_run_case+0x170/0x3f0 [ 19.464865] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.464910] kthread+0x328/0x630 [ 19.465255] ret_from_fork+0x10/0x20 [ 19.465330] [ 19.465356] The buggy address belongs to the object at fff00000c788e780 [ 19.465356] which belongs to the cache kmalloc-64 of size 64 [ 19.465417] The buggy address is located 0 bytes to the right of [ 19.465417] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.465480] [ 19.466069] The buggy address belongs to the physical page: [ 19.466138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.466322] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.466378] page_type: f5(slab) [ 19.466420] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.466623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.466824] page dumped because: kasan: bad access detected [ 19.466869] [ 19.466894] Memory state around the buggy address: [ 19.467057] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.467339] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.467534] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.467581] ^ [ 19.467912] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.468192] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.468359] ================================================================== [ 19.433309] ================================================================== [ 19.433406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 19.433465] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.433608] [ 19.433673] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.433765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.433793] Hardware name: linux,dummy-virt (DT) [ 19.433827] Call trace: [ 19.434394] show_stack+0x20/0x38 (C) [ 19.434478] dump_stack_lvl+0x8c/0xd0 [ 19.434529] print_report+0x118/0x608 [ 19.434591] kasan_report+0xdc/0x128 [ 19.434641] kasan_check_range+0x100/0x1a8 [ 19.434690] __kasan_check_write+0x20/0x30 [ 19.434827] kasan_atomics_helper+0xff0/0x4858 [ 19.434985] kasan_atomics+0x198/0x2e0 [ 19.435240] kunit_try_run_case+0x170/0x3f0 [ 19.435311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.435487] kthread+0x328/0x630 [ 19.435554] ret_from_fork+0x10/0x20 [ 19.435604] [ 19.435639] Allocated by task 265: [ 19.435715] kasan_save_stack+0x3c/0x68 [ 19.435917] kasan_save_track+0x20/0x40 [ 19.436126] kasan_save_alloc_info+0x40/0x58 [ 19.436297] __kasan_kmalloc+0xd4/0xd8 [ 19.436339] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.436398] kasan_atomics+0xb8/0x2e0 [ 19.436536] kunit_try_run_case+0x170/0x3f0 [ 19.436761] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.436812] kthread+0x328/0x630 [ 19.436851] ret_from_fork+0x10/0x20 [ 19.436888] [ 19.436912] The buggy address belongs to the object at fff00000c788e780 [ 19.436912] which belongs to the cache kmalloc-64 of size 64 [ 19.438062] The buggy address is located 0 bytes to the right of [ 19.438062] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.438334] [ 19.438366] The buggy address belongs to the physical page: [ 19.438400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.438456] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.438506] page_type: f5(slab) [ 19.438547] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.438615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.438698] page dumped because: kasan: bad access detected [ 19.438733] [ 19.438753] Memory state around the buggy address: [ 19.438786] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.438830] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.438873] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.438913] ^ [ 19.438946] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.438992] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.439030] ================================================================== [ 19.391356] ================================================================== [ 19.391417] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 19.391476] Write of size 4 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.391547] [ 19.391585] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.391672] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.391838] Hardware name: linux,dummy-virt (DT) [ 19.391912] Call trace: [ 19.391968] show_stack+0x20/0x38 (C) [ 19.392088] dump_stack_lvl+0x8c/0xd0 [ 19.392149] print_report+0x118/0x608 [ 19.392254] kasan_report+0xdc/0x128 [ 19.392300] kasan_check_range+0x100/0x1a8 [ 19.392346] __kasan_check_write+0x20/0x30 [ 19.392395] kasan_atomics_helper+0xd3c/0x4858 [ 19.392443] kasan_atomics+0x198/0x2e0 [ 19.392487] kunit_try_run_case+0x170/0x3f0 [ 19.392533] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.392583] kthread+0x328/0x630 [ 19.392628] ret_from_fork+0x10/0x20 [ 19.392677] [ 19.392697] Allocated by task 265: [ 19.392728] kasan_save_stack+0x3c/0x68 [ 19.392771] kasan_save_track+0x20/0x40 [ 19.392810] kasan_save_alloc_info+0x40/0x58 [ 19.392849] __kasan_kmalloc+0xd4/0xd8 [ 19.392885] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.392925] kasan_atomics+0xb8/0x2e0 [ 19.392959] kunit_try_run_case+0x170/0x3f0 [ 19.392995] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.393036] kthread+0x328/0x630 [ 19.393161] ret_from_fork+0x10/0x20 [ 19.393334] [ 19.393358] The buggy address belongs to the object at fff00000c788e780 [ 19.393358] which belongs to the cache kmalloc-64 of size 64 [ 19.393438] The buggy address is located 0 bytes to the right of [ 19.393438] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.393634] [ 19.393701] The buggy address belongs to the physical page: [ 19.393940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.394025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.394088] page_type: f5(slab) [ 19.394140] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.394207] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.394250] page dumped because: kasan: bad access detected [ 19.394284] [ 19.394305] Memory state around the buggy address: [ 19.394339] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.394405] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.394470] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.394520] ^ [ 19.394554] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.394680] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.394800] ================================================================== [ 19.489554] ================================================================== [ 19.489601] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 19.489648] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.489697] [ 19.489726] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.489807] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.489836] Hardware name: linux,dummy-virt (DT) [ 19.489866] Call trace: [ 19.489911] show_stack+0x20/0x38 (C) [ 19.490015] dump_stack_lvl+0x8c/0xd0 [ 19.490079] print_report+0x118/0x608 [ 19.490131] kasan_report+0xdc/0x128 [ 19.490176] kasan_check_range+0x100/0x1a8 [ 19.490222] __kasan_check_write+0x20/0x30 [ 19.490270] kasan_atomics_helper+0x1384/0x4858 [ 19.490353] kasan_atomics+0x198/0x2e0 [ 19.490409] kunit_try_run_case+0x170/0x3f0 [ 19.490482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.490578] kthread+0x328/0x630 [ 19.490814] ret_from_fork+0x10/0x20 [ 19.490870] [ 19.490892] Allocated by task 265: [ 19.490923] kasan_save_stack+0x3c/0x68 [ 19.491071] kasan_save_track+0x20/0x40 [ 19.491115] kasan_save_alloc_info+0x40/0x58 [ 19.491156] __kasan_kmalloc+0xd4/0xd8 [ 19.491192] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.491233] kasan_atomics+0xb8/0x2e0 [ 19.491569] kunit_try_run_case+0x170/0x3f0 [ 19.491654] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.491704] kthread+0x328/0x630 [ 19.491743] ret_from_fork+0x10/0x20 [ 19.491780] [ 19.491946] The buggy address belongs to the object at fff00000c788e780 [ 19.491946] which belongs to the cache kmalloc-64 of size 64 [ 19.492013] The buggy address is located 0 bytes to the right of [ 19.492013] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.492088] [ 19.492128] The buggy address belongs to the physical page: [ 19.492175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.492225] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.492297] page_type: f5(slab) [ 19.492386] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.492438] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.492508] page dumped because: kasan: bad access detected [ 19.492542] [ 19.492562] Memory state around the buggy address: [ 19.492611] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.492707] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.492939] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.493015] ^ [ 19.493062] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.493296] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.493948] ================================================================== [ 19.555164] ================================================================== [ 19.555223] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 19.555281] Read of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.555332] [ 19.555378] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.555461] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.555491] Hardware name: linux,dummy-virt (DT) [ 19.555522] Call trace: [ 19.555545] show_stack+0x20/0x38 (C) [ 19.555596] dump_stack_lvl+0x8c/0xd0 [ 19.555644] print_report+0x118/0x608 [ 19.555690] kasan_report+0xdc/0x128 [ 19.555734] __asan_report_load8_noabort+0x20/0x30 [ 19.555841] kasan_atomics_helper+0x3e20/0x4858 [ 19.556004] kasan_atomics+0x198/0x2e0 [ 19.556202] kunit_try_run_case+0x170/0x3f0 [ 19.556378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.556461] kthread+0x328/0x630 [ 19.556516] ret_from_fork+0x10/0x20 [ 19.556566] [ 19.556587] Allocated by task 265: [ 19.556618] kasan_save_stack+0x3c/0x68 [ 19.556815] kasan_save_track+0x20/0x40 [ 19.556863] kasan_save_alloc_info+0x40/0x58 [ 19.556919] __kasan_kmalloc+0xd4/0xd8 [ 19.557031] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.557144] kasan_atomics+0xb8/0x2e0 [ 19.557358] kunit_try_run_case+0x170/0x3f0 [ 19.557448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.557601] kthread+0x328/0x630 [ 19.557641] ret_from_fork+0x10/0x20 [ 19.557686] [ 19.557729] The buggy address belongs to the object at fff00000c788e780 [ 19.557729] which belongs to the cache kmalloc-64 of size 64 [ 19.557874] The buggy address is located 0 bytes to the right of [ 19.557874] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.557977] [ 19.558000] The buggy address belongs to the physical page: [ 19.558576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.558719] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.558803] page_type: f5(slab) [ 19.558844] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.558921] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.558968] page dumped because: kasan: bad access detected [ 19.559003] [ 19.559023] Memory state around the buggy address: [ 19.559103] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.559340] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.559663] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.559750] ^ [ 19.559808] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.559851] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.560080] ================================================================== [ 19.527354] ================================================================== [ 19.527423] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 19.527790] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.527867] [ 19.527902] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.527990] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.528020] Hardware name: linux,dummy-virt (DT) [ 19.528063] Call trace: [ 19.528090] show_stack+0x20/0x38 (C) [ 19.528145] dump_stack_lvl+0x8c/0xd0 [ 19.528358] print_report+0x118/0x608 [ 19.528556] kasan_report+0xdc/0x128 [ 19.528610] kasan_check_range+0x100/0x1a8 [ 19.528690] __kasan_check_write+0x20/0x30 [ 19.528780] kasan_atomics_helper+0x1644/0x4858 [ 19.528840] kasan_atomics+0x198/0x2e0 [ 19.528948] kunit_try_run_case+0x170/0x3f0 [ 19.529005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.529165] kthread+0x328/0x630 [ 19.529223] ret_from_fork+0x10/0x20 [ 19.529292] [ 19.529319] Allocated by task 265: [ 19.529352] kasan_save_stack+0x3c/0x68 [ 19.529397] kasan_save_track+0x20/0x40 [ 19.529651] kasan_save_alloc_info+0x40/0x58 [ 19.529933] __kasan_kmalloc+0xd4/0xd8 [ 19.529999] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.530050] kasan_atomics+0xb8/0x2e0 [ 19.530094] kunit_try_run_case+0x170/0x3f0 [ 19.530412] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.530503] kthread+0x328/0x630 [ 19.530655] ret_from_fork+0x10/0x20 [ 19.530866] [ 19.530947] The buggy address belongs to the object at fff00000c788e780 [ 19.530947] which belongs to the cache kmalloc-64 of size 64 [ 19.531014] The buggy address is located 0 bytes to the right of [ 19.531014] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.531089] [ 19.531116] The buggy address belongs to the physical page: [ 19.531204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.531543] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.531615] page_type: f5(slab) [ 19.531851] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.531925] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.532106] page dumped because: kasan: bad access detected [ 19.532372] [ 19.532401] Memory state around the buggy address: [ 19.532485] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.532535] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.532770] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.532818] ^ [ 19.532859] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.533185] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.533233] ================================================================== [ 19.404957] ================================================================== [ 19.405001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 19.405060] Read of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.405110] [ 19.405143] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.405226] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.405256] Hardware name: linux,dummy-virt (DT) [ 19.405289] Call trace: [ 19.405326] show_stack+0x20/0x38 (C) [ 19.405377] dump_stack_lvl+0x8c/0xd0 [ 19.405426] print_report+0x118/0x608 [ 19.405471] kasan_report+0xdc/0x128 [ 19.405517] __asan_report_load8_noabort+0x20/0x30 [ 19.406082] kasan_atomics_helper+0x3f58/0x4858 [ 19.406200] kasan_atomics+0x198/0x2e0 [ 19.406253] kunit_try_run_case+0x170/0x3f0 [ 19.406302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.406431] kthread+0x328/0x630 [ 19.406486] ret_from_fork+0x10/0x20 [ 19.406537] [ 19.406608] Allocated by task 265: [ 19.406644] kasan_save_stack+0x3c/0x68 [ 19.407433] kasan_save_track+0x20/0x40 [ 19.407503] kasan_save_alloc_info+0x40/0x58 [ 19.407557] __kasan_kmalloc+0xd4/0xd8 [ 19.407597] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.407637] kasan_atomics+0xb8/0x2e0 [ 19.407673] kunit_try_run_case+0x170/0x3f0 [ 19.407711] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.407754] kthread+0x328/0x630 [ 19.407793] ret_from_fork+0x10/0x20 [ 19.408391] [ 19.408419] The buggy address belongs to the object at fff00000c788e780 [ 19.408419] which belongs to the cache kmalloc-64 of size 64 [ 19.408481] The buggy address is located 0 bytes to the right of [ 19.408481] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.408544] [ 19.408567] The buggy address belongs to the physical page: [ 19.408598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.408650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.408832] page_type: f5(slab) [ 19.408880] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.409397] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.409491] page dumped because: kasan: bad access detected [ 19.409727] [ 19.409773] Memory state around the buggy address: [ 19.409807] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.409853] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.409905] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.409948] ^ [ 19.410328] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.410519] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.410590] ================================================================== [ 19.315730] ================================================================== [ 19.315791] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 19.315848] Read of size 4 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.315912] [ 19.315949] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.316431] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.316505] Hardware name: linux,dummy-virt (DT) [ 19.316544] Call trace: [ 19.316569] show_stack+0x20/0x38 (C) [ 19.316627] dump_stack_lvl+0x8c/0xd0 [ 19.317056] print_report+0x118/0x608 [ 19.317126] kasan_report+0xdc/0x128 [ 19.317177] __asan_report_load4_noabort+0x20/0x30 [ 19.317230] kasan_atomics_helper+0x42d8/0x4858 [ 19.317318] kasan_atomics+0x198/0x2e0 [ 19.317379] kunit_try_run_case+0x170/0x3f0 [ 19.317472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.317550] kthread+0x328/0x630 [ 19.317644] ret_from_fork+0x10/0x20 [ 19.317751] [ 19.317807] Allocated by task 265: [ 19.317847] kasan_save_stack+0x3c/0x68 [ 19.318124] kasan_save_track+0x20/0x40 [ 19.318170] kasan_save_alloc_info+0x40/0x58 [ 19.318212] __kasan_kmalloc+0xd4/0xd8 [ 19.318262] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.318409] kasan_atomics+0xb8/0x2e0 [ 19.318535] kunit_try_run_case+0x170/0x3f0 [ 19.318657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.318707] kthread+0x328/0x630 [ 19.318744] ret_from_fork+0x10/0x20 [ 19.318781] [ 19.318806] The buggy address belongs to the object at fff00000c788e780 [ 19.318806] which belongs to the cache kmalloc-64 of size 64 [ 19.318866] The buggy address is located 0 bytes to the right of [ 19.318866] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.319283] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.319572] page dumped because: kasan: bad access detected [ 19.320383] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.321912] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.323158] kthread+0x328/0x630 [ 19.323648] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.323689] kasan_atomics+0xb8/0x2e0 [ 19.323725] kunit_try_run_case+0x170/0x3f0 [ 19.323763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.323806] kthread+0x328/0x630 [ 19.323895] ret_from_fork+0x10/0x20 [ 19.323947] [ 19.323970] The buggy address belongs to the object at fff00000c788e780 [ 19.323970] which belongs to the cache kmalloc-64 of size 64 [ 19.324034] The buggy address is located 0 bytes to the right of [ 19.324034] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.324110] [ 19.324133] The buggy address belongs to the physical page: [ 19.324167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.324263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.324318] page_type: f5(slab) [ 19.324368] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.324462] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.324536] page dumped because: kasan: bad access detected [ 19.324576] [ 19.324597] Memory state around the buggy address: [ 19.324632] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.324709] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.324758] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.324798] ^ [ 19.324838] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.324918] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.324964] ================================================================== [ 19.424782] ================================================================== [ 19.424860] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 19.424923] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.424975] [ 19.425007] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.425104] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.425135] Hardware name: linux,dummy-virt (DT) [ 19.425169] Call trace: [ 19.425645] show_stack+0x20/0x38 (C) [ 19.426078] dump_stack_lvl+0x8c/0xd0 [ 19.426569] print_report+0x118/0x608 [ 19.426753] kasan_report+0xdc/0x128 [ 19.426947] kasan_check_range+0x100/0x1a8 [ 19.427012] __kasan_check_write+0x20/0x30 [ 19.427234] kasan_atomics_helper+0xf88/0x4858 [ 19.427385] kasan_atomics+0x198/0x2e0 [ 19.427784] kunit_try_run_case+0x170/0x3f0 [ 19.427884] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.428204] kthread+0x328/0x630 [ 19.428308] ret_from_fork+0x10/0x20 [ 19.428377] [ 19.428401] Allocated by task 265: [ 19.428726] kasan_save_stack+0x3c/0x68 [ 19.429007] kasan_save_track+0x20/0x40 [ 19.429086] kasan_save_alloc_info+0x40/0x58 [ 19.429583] __kasan_kmalloc+0xd4/0xd8 [ 19.429887] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.430107] kasan_atomics+0xb8/0x2e0 [ 19.430216] kunit_try_run_case+0x170/0x3f0 [ 19.430263] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.430307] kthread+0x328/0x630 [ 19.430344] ret_from_fork+0x10/0x20 [ 19.430380] [ 19.430405] The buggy address belongs to the object at fff00000c788e780 [ 19.430405] which belongs to the cache kmalloc-64 of size 64 [ 19.430464] The buggy address is located 0 bytes to the right of [ 19.430464] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.430974] [ 19.431062] The buggy address belongs to the physical page: [ 19.431477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.431550] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.431605] page_type: f5(slab) [ 19.431776] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.431837] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.431889] page dumped because: kasan: bad access detected [ 19.432128] [ 19.432166] Memory state around the buggy address: [ 19.432286] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.432348] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.432395] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.432565] ^ [ 19.432620] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.432667] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.432813] ================================================================== [ 19.385612] ================================================================== [ 19.385659] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 19.385760] Read of size 4 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.385815] [ 19.386446] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.386689] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.386737] Hardware name: linux,dummy-virt (DT) [ 19.386818] Call trace: [ 19.386863] show_stack+0x20/0x38 (C) [ 19.387118] dump_stack_lvl+0x8c/0xd0 [ 19.387180] print_report+0x118/0x608 [ 19.387229] kasan_report+0xdc/0x128 [ 19.387277] __asan_report_load4_noabort+0x20/0x30 [ 19.387542] kasan_atomics_helper+0x3dd8/0x4858 [ 19.387885] kasan_atomics+0x198/0x2e0 [ 19.387938] kunit_try_run_case+0x170/0x3f0 [ 19.387987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.388059] kthread+0x328/0x630 [ 19.388114] ret_from_fork+0x10/0x20 [ 19.388207] [ 19.388452] Allocated by task 265: [ 19.388512] kasan_save_stack+0x3c/0x68 [ 19.388571] kasan_save_track+0x20/0x40 [ 19.388673] kasan_save_alloc_info+0x40/0x58 [ 19.388718] __kasan_kmalloc+0xd4/0xd8 [ 19.388765] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.388933] kasan_atomics+0xb8/0x2e0 [ 19.389005] kunit_try_run_case+0x170/0x3f0 [ 19.389108] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.389161] kthread+0x328/0x630 [ 19.389197] ret_from_fork+0x10/0x20 [ 19.389235] [ 19.389393] The buggy address belongs to the object at fff00000c788e780 [ 19.389393] which belongs to the cache kmalloc-64 of size 64 [ 19.389464] The buggy address is located 0 bytes to the right of [ 19.389464] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.389579] [ 19.389629] The buggy address belongs to the physical page: [ 19.389677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.389731] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.389782] page_type: f5(slab) [ 19.389824] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.389888] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.389932] page dumped because: kasan: bad access detected [ 19.389965] [ 19.389985] Memory state around the buggy address: [ 19.390019] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.390073] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.390131] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.390172] ^ [ 19.390209] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.390252] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.390300] ================================================================== [ 19.494559] ================================================================== [ 19.494856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 19.494921] Read of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.495168] [ 19.495215] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.495646] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.495807] Hardware name: linux,dummy-virt (DT) [ 19.495852] Call trace: [ 19.496003] show_stack+0x20/0x38 (C) [ 19.496171] dump_stack_lvl+0x8c/0xd0 [ 19.496257] print_report+0x118/0x608 [ 19.496327] kasan_report+0xdc/0x128 [ 19.496379] __asan_report_load8_noabort+0x20/0x30 [ 19.496709] kasan_atomics_helper+0x3f04/0x4858 [ 19.496936] kasan_atomics+0x198/0x2e0 [ 19.497000] kunit_try_run_case+0x170/0x3f0 [ 19.497063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.497120] kthread+0x328/0x630 [ 19.497167] ret_from_fork+0x10/0x20 [ 19.497217] [ 19.497238] Allocated by task 265: [ 19.497271] kasan_save_stack+0x3c/0x68 [ 19.497315] kasan_save_track+0x20/0x40 [ 19.498096] kasan_save_alloc_info+0x40/0x58 [ 19.498319] __kasan_kmalloc+0xd4/0xd8 [ 19.498363] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.498401] kasan_atomics+0xb8/0x2e0 [ 19.498439] kunit_try_run_case+0x170/0x3f0 [ 19.498476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.498519] kthread+0x328/0x630 [ 19.498556] ret_from_fork+0x10/0x20 [ 19.498604] [ 19.498628] The buggy address belongs to the object at fff00000c788e780 [ 19.498628] which belongs to the cache kmalloc-64 of size 64 [ 19.498686] The buggy address is located 0 bytes to the right of [ 19.498686] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.498748] [ 19.498770] The buggy address belongs to the physical page: [ 19.498802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.498854] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.498903] page_type: f5(slab) [ 19.498942] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.498993] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.499035] page dumped because: kasan: bad access detected [ 19.499077] [ 19.499099] Memory state around the buggy address: [ 19.499131] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.499176] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.499218] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.499256] ^ [ 19.499291] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.499333] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.499371] ================================================================== [ 19.417908] ================================================================== [ 19.417955] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 19.418002] Write of size 8 at addr fff00000c788e7b0 by task kunit_try_catch/265 [ 19.418059] [ 19.418093] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT [ 19.418175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.418226] Hardware name: linux,dummy-virt (DT) [ 19.418278] Call trace: [ 19.418337] show_stack+0x20/0x38 (C) [ 19.418422] dump_stack_lvl+0x8c/0xd0 [ 19.418525] print_report+0x118/0x608 [ 19.418597] kasan_report+0xdc/0x128 [ 19.418645] kasan_check_range+0x100/0x1a8 [ 19.418692] __kasan_check_write+0x20/0x30 [ 19.418811] kasan_atomics_helper+0xeb8/0x4858 [ 19.418862] kasan_atomics+0x198/0x2e0 [ 19.418908] kunit_try_run_case+0x170/0x3f0 [ 19.418953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.419018] kthread+0x328/0x630 [ 19.419076] ret_from_fork+0x10/0x20 [ 19.419127] [ 19.419169] Allocated by task 265: [ 19.419255] kasan_save_stack+0x3c/0x68 [ 19.419342] kasan_save_track+0x20/0x40 [ 19.419406] kasan_save_alloc_info+0x40/0x58 [ 19.419501] __kasan_kmalloc+0xd4/0xd8 [ 19.419543] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.419582] kasan_atomics+0xb8/0x2e0 [ 19.419619] kunit_try_run_case+0x170/0x3f0 [ 19.419656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.419699] kthread+0x328/0x630 [ 19.419758] ret_from_fork+0x10/0x20 [ 19.419840] [ 19.419865] The buggy address belongs to the object at fff00000c788e780 [ 19.419865] which belongs to the cache kmalloc-64 of size 64 [ 19.419923] The buggy address is located 0 bytes to the right of [ 19.419923] allocated 48-byte region [fff00000c788e780, fff00000c788e7b0) [ 19.419984] [ 19.420005] The buggy address belongs to the physical page: [ 19.420036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788e [ 19.420098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.420145] page_type: f5(slab) [ 19.420201] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.420262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.420319] page dumped because: kasan: bad access detected [ 19.420359] [ 19.420378] Memory state around the buggy address: [ 19.420419] fff00000c788e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.420463] fff00000c788e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.420505] >fff00000c788e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.420542] ^ [ 19.420576] fff00000c788e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.420618] fff00000c788e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.420656] ==================================================================
[ 19.988528] ================================================================== [ 19.989093] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 19.989648] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282 [ 19.989971] [ 19.990129] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 19.990237] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.990276] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.990326] Call Trace: [ 19.990370] <TASK> [ 19.990412] dump_stack_lvl+0x73/0xb0 [ 19.990475] print_report+0xd1/0x650 [ 19.990529] ? __virt_addr_valid+0x1db/0x2d0 [ 19.990584] ? kasan_atomics_helper+0x4b3a/0x5450 [ 19.990635] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.990711] ? kasan_atomics_helper+0x4b3a/0x5450 [ 19.990765] kasan_report+0x141/0x180 [ 19.990819] ? kasan_atomics_helper+0x4b3a/0x5450 [ 19.990878] __asan_report_store4_noabort+0x1b/0x30 [ 19.990920] kasan_atomics_helper+0x4b3a/0x5450 [ 19.990974] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.991036] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.991086] ? kasan_atomics+0x152/0x310 [ 19.991148] kasan_atomics+0x1dc/0x310 [ 19.991193] ? __pfx_kasan_atomics+0x10/0x10 [ 19.991235] ? __pfx_read_tsc+0x10/0x10 [ 19.991292] ? ktime_get_ts64+0x86/0x230 [ 19.991335] kunit_try_run_case+0x1a5/0x480 [ 19.991377] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.991413] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.991454] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.991492] ? __kthread_parkme+0x82/0x180 [ 19.991527] ? preempt_count_sub+0x50/0x80 [ 19.991568] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.991607] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.991651] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.991860] kthread+0x337/0x6f0 [ 19.991960] ? trace_preempt_on+0x20/0xc0 [ 19.992030] ? __pfx_kthread+0x10/0x10 [ 19.992193] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.992292] ? calculate_sigpending+0x7b/0xa0 [ 19.992370] ? __pfx_kthread+0x10/0x10 [ 19.992425] ret_from_fork+0x116/0x1d0 [ 19.992461] ? __pfx_kthread+0x10/0x10 [ 19.992500] ret_from_fork_asm+0x1a/0x30 [ 19.992563] </TASK> [ 19.992591] [ 20.007373] Allocated by task 282: [ 20.007791] kasan_save_stack+0x45/0x70 [ 20.008361] kasan_save_track+0x18/0x40 [ 20.008700] kasan_save_alloc_info+0x3b/0x50 [ 20.009303] __kasan_kmalloc+0xb7/0xc0 [ 20.009953] __kmalloc_cache_noprof+0x189/0x420 [ 20.010419] kasan_atomics+0x95/0x310 [ 20.010709] kunit_try_run_case+0x1a5/0x480 [ 20.010936] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.011378] kthread+0x337/0x6f0 [ 20.011689] ret_from_fork+0x116/0x1d0 [ 20.011936] ret_from_fork_asm+0x1a/0x30 [ 20.012508] [ 20.012793] The buggy address belongs to the object at ffff888102b66500 [ 20.012793] which belongs to the cache kmalloc-64 of size 64 [ 20.013954] The buggy address is located 0 bytes to the right of [ 20.013954] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 20.014902] [ 20.015303] The buggy address belongs to the physical page: [ 20.015670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 20.016378] flags: 0x200000000000000(node=0|zone=2) [ 20.016810] page_type: f5(slab) [ 20.017393] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.017905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.018519] page dumped because: kasan: bad access detected [ 20.018952] [ 20.019316] Memory state around the buggy address: [ 20.019715] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.020505] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.020986] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.021856] ^ [ 20.022341] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.022861] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.023615] ================================================================== [ 20.834864] ================================================================== [ 20.835530] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 20.836122] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282 [ 20.836651] [ 20.836852] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 20.836962] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.836991] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.837037] Call Trace: [ 20.837080] <TASK> [ 20.837121] dump_stack_lvl+0x73/0xb0 [ 20.837185] print_report+0xd1/0x650 [ 20.837238] ? __virt_addr_valid+0x1db/0x2d0 [ 20.837302] ? kasan_atomics_helper+0x12e6/0x5450 [ 20.837355] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.837408] ? kasan_atomics_helper+0x12e6/0x5450 [ 20.837458] kasan_report+0x141/0x180 [ 20.837510] ? kasan_atomics_helper+0x12e6/0x5450 [ 20.837569] kasan_check_range+0x10c/0x1c0 [ 20.837624] __kasan_check_write+0x18/0x20 [ 20.837702] kasan_atomics_helper+0x12e6/0x5450 [ 20.837759] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.837814] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.837863] ? kasan_atomics+0x152/0x310 [ 20.837923] kasan_atomics+0x1dc/0x310 [ 20.837977] ? __pfx_kasan_atomics+0x10/0x10 [ 20.838034] ? __pfx_read_tsc+0x10/0x10 [ 20.838079] ? ktime_get_ts64+0x86/0x230 [ 20.838133] kunit_try_run_case+0x1a5/0x480 [ 20.838189] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.838236] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.838292] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.838338] ? __kthread_parkme+0x82/0x180 [ 20.838382] ? preempt_count_sub+0x50/0x80 [ 20.838430] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.838483] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.838536] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.838588] kthread+0x337/0x6f0 [ 20.838632] ? trace_preempt_on+0x20/0xc0 [ 20.838724] ? __pfx_kthread+0x10/0x10 [ 20.838770] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.838810] ? calculate_sigpending+0x7b/0xa0 [ 20.838856] ? __pfx_kthread+0x10/0x10 [ 20.838898] ret_from_fork+0x116/0x1d0 [ 20.838937] ? __pfx_kthread+0x10/0x10 [ 20.838974] ret_from_fork_asm+0x1a/0x30 [ 20.839043] </TASK> [ 20.839069] [ 20.849364] Allocated by task 282: [ 20.849623] kasan_save_stack+0x45/0x70 [ 20.849886] kasan_save_track+0x18/0x40 [ 20.850081] kasan_save_alloc_info+0x3b/0x50 [ 20.850293] __kasan_kmalloc+0xb7/0xc0 [ 20.850624] __kmalloc_cache_noprof+0x189/0x420 [ 20.851060] kasan_atomics+0x95/0x310 [ 20.851408] kunit_try_run_case+0x1a5/0x480 [ 20.851779] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.852227] kthread+0x337/0x6f0 [ 20.852542] ret_from_fork+0x116/0x1d0 [ 20.852830] ret_from_fork_asm+0x1a/0x30 [ 20.853026] [ 20.853210] The buggy address belongs to the object at ffff888102b66500 [ 20.853210] which belongs to the cache kmalloc-64 of size 64 [ 20.854003] The buggy address is located 0 bytes to the right of [ 20.854003] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 20.854509] [ 20.854737] The buggy address belongs to the physical page: [ 20.855151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 20.855647] flags: 0x200000000000000(node=0|zone=2) [ 20.855998] page_type: f5(slab) [ 20.856235] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.856540] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.856859] page dumped because: kasan: bad access detected [ 20.857082] [ 20.857198] Memory state around the buggy address: [ 20.857586] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.858164] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.858761] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.859301] ^ [ 20.859718] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.859997] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.860496] ================================================================== [ 20.862070] ================================================================== [ 20.862583] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 20.863060] Read of size 4 at addr ffff888102b66530 by task kunit_try_catch/282 [ 20.863412] [ 20.863639] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 20.863777] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.863809] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.863857] Call Trace: [ 20.863898] <TASK> [ 20.863938] dump_stack_lvl+0x73/0xb0 [ 20.863999] print_report+0xd1/0x650 [ 20.864049] ? __virt_addr_valid+0x1db/0x2d0 [ 20.864099] ? kasan_atomics_helper+0x49ce/0x5450 [ 20.864148] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.864204] ? kasan_atomics_helper+0x49ce/0x5450 [ 20.864254] kasan_report+0x141/0x180 [ 20.864319] ? kasan_atomics_helper+0x49ce/0x5450 [ 20.864377] __asan_report_load4_noabort+0x18/0x20 [ 20.864423] kasan_atomics_helper+0x49ce/0x5450 [ 20.864472] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.864517] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.864563] ? kasan_atomics+0x152/0x310 [ 20.864624] kasan_atomics+0x1dc/0x310 [ 20.864713] ? __pfx_kasan_atomics+0x10/0x10 [ 20.864773] ? __pfx_read_tsc+0x10/0x10 [ 20.864822] ? ktime_get_ts64+0x86/0x230 [ 20.864880] kunit_try_run_case+0x1a5/0x480 [ 20.864935] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.864985] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.865032] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.865073] ? __kthread_parkme+0x82/0x180 [ 20.865111] ? preempt_count_sub+0x50/0x80 [ 20.865160] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.865209] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.865255] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.865320] kthread+0x337/0x6f0 [ 20.865361] ? trace_preempt_on+0x20/0xc0 [ 20.865412] ? __pfx_kthread+0x10/0x10 [ 20.865459] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.865504] ? calculate_sigpending+0x7b/0xa0 [ 20.865552] ? __pfx_kthread+0x10/0x10 [ 20.865600] ret_from_fork+0x116/0x1d0 [ 20.865642] ? __pfx_kthread+0x10/0x10 [ 20.865724] ret_from_fork_asm+0x1a/0x30 [ 20.865790] </TASK> [ 20.865815] [ 20.875784] Allocated by task 282: [ 20.876115] kasan_save_stack+0x45/0x70 [ 20.876404] kasan_save_track+0x18/0x40 [ 20.876773] kasan_save_alloc_info+0x3b/0x50 [ 20.877031] __kasan_kmalloc+0xb7/0xc0 [ 20.877270] __kmalloc_cache_noprof+0x189/0x420 [ 20.877624] kasan_atomics+0x95/0x310 [ 20.877841] kunit_try_run_case+0x1a5/0x480 [ 20.878025] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.878441] kthread+0x337/0x6f0 [ 20.878781] ret_from_fork+0x116/0x1d0 [ 20.879007] ret_from_fork_asm+0x1a/0x30 [ 20.879196] [ 20.879327] The buggy address belongs to the object at ffff888102b66500 [ 20.879327] which belongs to the cache kmalloc-64 of size 64 [ 20.879771] The buggy address is located 0 bytes to the right of [ 20.879771] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 20.880208] [ 20.880375] The buggy address belongs to the physical page: [ 20.880843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 20.881449] flags: 0x200000000000000(node=0|zone=2) [ 20.881862] page_type: f5(slab) [ 20.882182] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.882814] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.883391] page dumped because: kasan: bad access detected [ 20.883853] [ 20.884037] Memory state around the buggy address: [ 20.884321] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.884779] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.885177] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.885624] ^ [ 20.885925] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.888011] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.888359] ================================================================== [ 21.071275] ================================================================== [ 21.071822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 21.072404] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282 [ 21.072938] [ 21.073109] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 21.073216] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.073245] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.073339] Call Trace: [ 21.073420] <TASK> [ 21.073476] dump_stack_lvl+0x73/0xb0 [ 21.073574] print_report+0xd1/0x650 [ 21.073651] ? __virt_addr_valid+0x1db/0x2d0 [ 21.073773] ? kasan_atomics_helper+0x164f/0x5450 [ 21.073837] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.073893] ? kasan_atomics_helper+0x164f/0x5450 [ 21.073945] kasan_report+0x141/0x180 [ 21.073998] ? kasan_atomics_helper+0x164f/0x5450 [ 21.074058] kasan_check_range+0x10c/0x1c0 [ 21.074114] __kasan_check_write+0x18/0x20 [ 21.074161] kasan_atomics_helper+0x164f/0x5450 [ 21.074214] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.074273] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.074322] ? kasan_atomics+0x152/0x310 [ 21.074416] kasan_atomics+0x1dc/0x310 [ 21.074483] ? __pfx_kasan_atomics+0x10/0x10 [ 21.074540] ? __pfx_read_tsc+0x10/0x10 [ 21.074580] ? ktime_get_ts64+0x86/0x230 [ 21.074626] kunit_try_run_case+0x1a5/0x480 [ 21.074743] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.074810] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.074892] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.074961] ? __kthread_parkme+0x82/0x180 [ 21.075021] ? preempt_count_sub+0x50/0x80 [ 21.075074] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.075120] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.075156] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.075183] kthread+0x337/0x6f0 [ 21.075207] ? trace_preempt_on+0x20/0xc0 [ 21.075234] ? __pfx_kthread+0x10/0x10 [ 21.075277] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.075310] ? calculate_sigpending+0x7b/0xa0 [ 21.075338] ? __pfx_kthread+0x10/0x10 [ 21.075363] ret_from_fork+0x116/0x1d0 [ 21.075386] ? __pfx_kthread+0x10/0x10 [ 21.075410] ret_from_fork_asm+0x1a/0x30 [ 21.075444] </TASK> [ 21.075459] [ 21.088076] Allocated by task 282: [ 21.088526] kasan_save_stack+0x45/0x70 [ 21.088943] kasan_save_track+0x18/0x40 [ 21.089305] kasan_save_alloc_info+0x3b/0x50 [ 21.089608] __kasan_kmalloc+0xb7/0xc0 [ 21.090050] __kmalloc_cache_noprof+0x189/0x420 [ 21.090336] kasan_atomics+0x95/0x310 [ 21.090801] kunit_try_run_case+0x1a5/0x480 [ 21.091085] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.091538] kthread+0x337/0x6f0 [ 21.091888] ret_from_fork+0x116/0x1d0 [ 21.092197] ret_from_fork_asm+0x1a/0x30 [ 21.092645] [ 21.092789] The buggy address belongs to the object at ffff888102b66500 [ 21.092789] which belongs to the cache kmalloc-64 of size 64 [ 21.093690] The buggy address is located 0 bytes to the right of [ 21.093690] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 21.094374] [ 21.094538] The buggy address belongs to the physical page: [ 21.094942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 21.095607] flags: 0x200000000000000(node=0|zone=2) [ 21.096049] page_type: f5(slab) [ 21.096412] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.096951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.097436] page dumped because: kasan: bad access detected [ 21.097895] [ 21.098112] Memory state around the buggy address: [ 21.098459] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.098936] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.099514] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.100039] ^ [ 21.100450] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.101035] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.101575] ================================================================== [ 21.778908] ================================================================== [ 21.779738] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 21.780313] Read of size 8 at addr ffff888102b66530 by task kunit_try_catch/282 [ 21.780964] [ 21.781146] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 21.781270] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.781302] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.781353] Call Trace: [ 21.781398] <TASK> [ 21.781443] dump_stack_lvl+0x73/0xb0 [ 21.781513] print_report+0xd1/0x650 [ 21.781568] ? __virt_addr_valid+0x1db/0x2d0 [ 21.781624] ? kasan_atomics_helper+0x5115/0x5450 [ 21.781673] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.781724] ? kasan_atomics_helper+0x5115/0x5450 [ 21.781775] kasan_report+0x141/0x180 [ 21.781826] ? kasan_atomics_helper+0x5115/0x5450 [ 21.781890] __asan_report_load8_noabort+0x18/0x20 [ 21.781940] kasan_atomics_helper+0x5115/0x5450 [ 21.781994] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.782065] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.782109] ? kasan_atomics+0x152/0x310 [ 21.782159] kasan_atomics+0x1dc/0x310 [ 21.782205] ? __pfx_kasan_atomics+0x10/0x10 [ 21.782306] ? __pfx_read_tsc+0x10/0x10 [ 21.782370] ? ktime_get_ts64+0x86/0x230 [ 21.782459] kunit_try_run_case+0x1a5/0x480 [ 21.782931] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.782973] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.783033] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.783071] ? __kthread_parkme+0x82/0x180 [ 21.783116] ? preempt_count_sub+0x50/0x80 [ 21.783168] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.783222] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.783286] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.783341] kthread+0x337/0x6f0 [ 21.783390] ? trace_preempt_on+0x20/0xc0 [ 21.783444] ? __pfx_kthread+0x10/0x10 [ 21.783492] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.783543] ? calculate_sigpending+0x7b/0xa0 [ 21.783602] ? __pfx_kthread+0x10/0x10 [ 21.783653] ret_from_fork+0x116/0x1d0 [ 21.783695] ? __pfx_kthread+0x10/0x10 [ 21.783742] ret_from_fork_asm+0x1a/0x30 [ 21.783811] </TASK> [ 21.783840] [ 21.795544] Allocated by task 282: [ 21.795907] kasan_save_stack+0x45/0x70 [ 21.796316] kasan_save_track+0x18/0x40 [ 21.796799] kasan_save_alloc_info+0x3b/0x50 [ 21.797362] __kasan_kmalloc+0xb7/0xc0 [ 21.797812] __kmalloc_cache_noprof+0x189/0x420 [ 21.798314] kasan_atomics+0x95/0x310 [ 21.798907] kunit_try_run_case+0x1a5/0x480 [ 21.799053] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.799181] kthread+0x337/0x6f0 [ 21.799385] ret_from_fork+0x116/0x1d0 [ 21.799869] ret_from_fork_asm+0x1a/0x30 [ 21.800285] [ 21.800419] The buggy address belongs to the object at ffff888102b66500 [ 21.800419] which belongs to the cache kmalloc-64 of size 64 [ 21.801492] The buggy address is located 0 bytes to the right of [ 21.801492] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 21.802079] [ 21.802193] The buggy address belongs to the physical page: [ 21.802473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 21.803321] flags: 0x200000000000000(node=0|zone=2) [ 21.803777] page_type: f5(slab) [ 21.804089] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.804681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.805343] page dumped because: kasan: bad access detected [ 21.805891] [ 21.806080] Memory state around the buggy address: [ 21.806609] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.807273] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.807619] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.808062] ^ [ 21.808502] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.808794] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.809361] ================================================================== [ 21.251854] ================================================================== [ 21.252247] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 21.252530] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282 [ 21.252739] [ 21.252865] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 21.252949] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.253034] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.253075] Call Trace: [ 21.253217] <TASK> [ 21.253274] dump_stack_lvl+0x73/0xb0 [ 21.253351] print_report+0xd1/0x650 [ 21.253416] ? __virt_addr_valid+0x1db/0x2d0 [ 21.253469] ? kasan_atomics_helper+0x19e3/0x5450 [ 21.253516] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.253569] ? kasan_atomics_helper+0x19e3/0x5450 [ 21.253614] kasan_report+0x141/0x180 [ 21.253658] ? kasan_atomics_helper+0x19e3/0x5450 [ 21.253714] kasan_check_range+0x10c/0x1c0 [ 21.253766] __kasan_check_write+0x18/0x20 [ 21.253813] kasan_atomics_helper+0x19e3/0x5450 [ 21.253866] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.253918] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.253965] ? kasan_atomics+0x152/0x310 [ 21.254015] kasan_atomics+0x1dc/0x310 [ 21.254061] ? __pfx_kasan_atomics+0x10/0x10 [ 21.254114] ? __pfx_read_tsc+0x10/0x10 [ 21.254152] ? ktime_get_ts64+0x86/0x230 [ 21.254239] kunit_try_run_case+0x1a5/0x480 [ 21.254324] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.254376] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.254430] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.254481] ? __kthread_parkme+0x82/0x180 [ 21.254530] ? preempt_count_sub+0x50/0x80 [ 21.254586] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.254640] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.254705] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.254751] kthread+0x337/0x6f0 [ 21.254794] ? trace_preempt_on+0x20/0xc0 [ 21.254842] ? __pfx_kthread+0x10/0x10 [ 21.254900] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.254962] ? calculate_sigpending+0x7b/0xa0 [ 21.255028] ? __pfx_kthread+0x10/0x10 [ 21.255081] ret_from_fork+0x116/0x1d0 [ 21.255124] ? __pfx_kthread+0x10/0x10 [ 21.255171] ret_from_fork_asm+0x1a/0x30 [ 21.255235] </TASK> [ 21.255279] [ 21.266747] Allocated by task 282: [ 21.267127] kasan_save_stack+0x45/0x70 [ 21.267442] kasan_save_track+0x18/0x40 [ 21.267649] kasan_save_alloc_info+0x3b/0x50 [ 21.268129] __kasan_kmalloc+0xb7/0xc0 [ 21.268499] __kmalloc_cache_noprof+0x189/0x420 [ 21.269624] kasan_atomics+0x95/0x310 [ 21.269900] kunit_try_run_case+0x1a5/0x480 [ 21.270115] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.270361] kthread+0x337/0x6f0 [ 21.270542] ret_from_fork+0x116/0x1d0 [ 21.271589] ret_from_fork_asm+0x1a/0x30 [ 21.272174] [ 21.272705] The buggy address belongs to the object at ffff888102b66500 [ 21.272705] which belongs to the cache kmalloc-64 of size 64 [ 21.273482] The buggy address is located 0 bytes to the right of [ 21.273482] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 21.274523] [ 21.274649] The buggy address belongs to the physical page: [ 21.275164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 21.275599] flags: 0x200000000000000(node=0|zone=2) [ 21.276366] page_type: f5(slab) [ 21.276667] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.277317] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.278145] page dumped because: kasan: bad access detected [ 21.278479] [ 21.278667] Memory state around the buggy address: [ 21.279347] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.279729] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.280127] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.280581] ^ [ 21.280864] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.281307] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.281635] ================================================================== [ 21.721797] ================================================================== [ 21.722284] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 21.722669] Read of size 8 at addr ffff888102b66530 by task kunit_try_catch/282 [ 21.722952] [ 21.723116] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 21.723221] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.723253] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.723315] Call Trace: [ 21.723356] <TASK> [ 21.723395] dump_stack_lvl+0x73/0xb0 [ 21.723459] print_report+0xd1/0x650 [ 21.723509] ? __virt_addr_valid+0x1db/0x2d0 [ 21.723559] ? kasan_atomics_helper+0x4fa5/0x5450 [ 21.723610] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.723658] ? kasan_atomics_helper+0x4fa5/0x5450 [ 21.724507] kasan_report+0x141/0x180 [ 21.724570] ? kasan_atomics_helper+0x4fa5/0x5450 [ 21.724635] __asan_report_load8_noabort+0x18/0x20 [ 21.724679] kasan_atomics_helper+0x4fa5/0x5450 [ 21.724974] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.725003] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.725028] ? kasan_atomics+0x152/0x310 [ 21.725058] kasan_atomics+0x1dc/0x310 [ 21.725084] ? __pfx_kasan_atomics+0x10/0x10 [ 21.725112] ? __pfx_read_tsc+0x10/0x10 [ 21.725137] ? ktime_get_ts64+0x86/0x230 [ 21.725165] kunit_try_run_case+0x1a5/0x480 [ 21.725193] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.725218] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.725245] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.725295] ? __kthread_parkme+0x82/0x180 [ 21.725323] ? preempt_count_sub+0x50/0x80 [ 21.725349] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.725376] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.725402] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.725428] kthread+0x337/0x6f0 [ 21.725451] ? trace_preempt_on+0x20/0xc0 [ 21.725478] ? __pfx_kthread+0x10/0x10 [ 21.725501] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.725524] ? calculate_sigpending+0x7b/0xa0 [ 21.725552] ? __pfx_kthread+0x10/0x10 [ 21.725576] ret_from_fork+0x116/0x1d0 [ 21.725597] ? __pfx_kthread+0x10/0x10 [ 21.725621] ret_from_fork_asm+0x1a/0x30 [ 21.725655] </TASK> [ 21.725677] [ 21.738203] Allocated by task 282: [ 21.738557] kasan_save_stack+0x45/0x70 [ 21.738875] kasan_save_track+0x18/0x40 [ 21.739212] kasan_save_alloc_info+0x3b/0x50 [ 21.739583] __kasan_kmalloc+0xb7/0xc0 [ 21.740043] __kmalloc_cache_noprof+0x189/0x420 [ 21.740275] kasan_atomics+0x95/0x310 [ 21.740467] kunit_try_run_case+0x1a5/0x480 [ 21.740882] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.741328] kthread+0x337/0x6f0 [ 21.741641] ret_from_fork+0x116/0x1d0 [ 21.741899] ret_from_fork_asm+0x1a/0x30 [ 21.742215] [ 21.742411] The buggy address belongs to the object at ffff888102b66500 [ 21.742411] which belongs to the cache kmalloc-64 of size 64 [ 21.743232] The buggy address is located 0 bytes to the right of [ 21.743232] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 21.743701] [ 21.743915] The buggy address belongs to the physical page: [ 21.744355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 21.744799] flags: 0x200000000000000(node=0|zone=2) [ 21.745230] page_type: f5(slab) [ 21.745657] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.746043] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.746660] page dumped because: kasan: bad access detected [ 21.747239] [ 21.747433] Memory state around the buggy address: [ 21.747754] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.748028] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.748710] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.749059] ^ [ 21.749282] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.749558] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.749821] ================================================================== [ 20.168692] ================================================================== [ 20.169888] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 20.170564] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282 [ 20.170942] [ 20.171254] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 20.171377] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.171407] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.171458] Call Trace: [ 20.171726] <TASK> [ 20.171805] dump_stack_lvl+0x73/0xb0 [ 20.171897] print_report+0xd1/0x650 [ 20.171974] ? __virt_addr_valid+0x1db/0x2d0 [ 20.172067] ? kasan_atomics_helper+0x7c7/0x5450 [ 20.172347] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.172396] ? kasan_atomics_helper+0x7c7/0x5450 [ 20.172422] kasan_report+0x141/0x180 [ 20.172451] ? kasan_atomics_helper+0x7c7/0x5450 [ 20.172480] kasan_check_range+0x10c/0x1c0 [ 20.172507] __kasan_check_write+0x18/0x20 [ 20.172530] kasan_atomics_helper+0x7c7/0x5450 [ 20.172556] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.172581] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.172606] ? kasan_atomics+0x152/0x310 [ 20.172635] kasan_atomics+0x1dc/0x310 [ 20.172683] ? __pfx_kasan_atomics+0x10/0x10 [ 20.172737] ? __pfx_read_tsc+0x10/0x10 [ 20.172762] ? ktime_get_ts64+0x86/0x230 [ 20.172789] kunit_try_run_case+0x1a5/0x480 [ 20.172818] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.172843] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.172870] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.172894] ? __kthread_parkme+0x82/0x180 [ 20.172918] ? preempt_count_sub+0x50/0x80 [ 20.172944] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.172971] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.172996] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.173022] kthread+0x337/0x6f0 [ 20.173052] ? trace_preempt_on+0x20/0xc0 [ 20.173111] ? __pfx_kthread+0x10/0x10 [ 20.173149] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.173184] ? calculate_sigpending+0x7b/0xa0 [ 20.173228] ? __pfx_kthread+0x10/0x10 [ 20.173269] ret_from_fork+0x116/0x1d0 [ 20.173298] ? __pfx_kthread+0x10/0x10 [ 20.173323] ret_from_fork_asm+0x1a/0x30 [ 20.173356] </TASK> [ 20.173371] [ 20.189819] Allocated by task 282: [ 20.190385] kasan_save_stack+0x45/0x70 [ 20.191190] kasan_save_track+0x18/0x40 [ 20.191699] kasan_save_alloc_info+0x3b/0x50 [ 20.192028] __kasan_kmalloc+0xb7/0xc0 [ 20.192374] __kmalloc_cache_noprof+0x189/0x420 [ 20.192672] kasan_atomics+0x95/0x310 [ 20.193017] kunit_try_run_case+0x1a5/0x480 [ 20.193880] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.194473] kthread+0x337/0x6f0 [ 20.194649] ret_from_fork+0x116/0x1d0 [ 20.195373] ret_from_fork_asm+0x1a/0x30 [ 20.196043] [ 20.196572] The buggy address belongs to the object at ffff888102b66500 [ 20.196572] which belongs to the cache kmalloc-64 of size 64 [ 20.197271] The buggy address is located 0 bytes to the right of [ 20.197271] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 20.198386] [ 20.199223] The buggy address belongs to the physical page: [ 20.199691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 20.200659] flags: 0x200000000000000(node=0|zone=2) [ 20.200986] page_type: f5(slab) [ 20.201294] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.202659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.203058] page dumped because: kasan: bad access detected [ 20.203497] [ 20.204247] Memory state around the buggy address: [ 20.204804] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.205335] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.205853] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.206562] ^ [ 20.207046] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.207379] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.208765] ================================================================== [ 19.775823] ================================================================== [ 19.777795] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 19.778236] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282 [ 19.779310] [ 19.779464] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 19.779531] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.779545] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.779572] Call Trace: [ 19.779589] <TASK> [ 19.779611] dump_stack_lvl+0x73/0xb0 [ 19.779649] print_report+0xd1/0x650 [ 19.779686] ? __virt_addr_valid+0x1db/0x2d0 [ 19.779719] ? kasan_atomics_helper+0x4ba2/0x5450 [ 19.779742] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.779766] ? kasan_atomics_helper+0x4ba2/0x5450 [ 19.779789] kasan_report+0x141/0x180 [ 19.779813] ? kasan_atomics_helper+0x4ba2/0x5450 [ 19.779840] __asan_report_store4_noabort+0x1b/0x30 [ 19.779862] kasan_atomics_helper+0x4ba2/0x5450 [ 19.779886] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.779910] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.779933] ? kasan_atomics+0x152/0x310 [ 19.779961] kasan_atomics+0x1dc/0x310 [ 19.779986] ? __pfx_kasan_atomics+0x10/0x10 [ 19.780011] ? __pfx_read_tsc+0x10/0x10 [ 19.780038] ? ktime_get_ts64+0x86/0x230 [ 19.780326] kunit_try_run_case+0x1a5/0x480 [ 19.780390] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.780438] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.780483] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.780539] ? __kthread_parkme+0x82/0x180 [ 19.780582] ? preempt_count_sub+0x50/0x80 [ 19.780633] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.780680] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.780726] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.780766] kthread+0x337/0x6f0 [ 19.780798] ? trace_preempt_on+0x20/0xc0 [ 19.780825] ? __pfx_kthread+0x10/0x10 [ 19.780847] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.780869] ? calculate_sigpending+0x7b/0xa0 [ 19.780894] ? __pfx_kthread+0x10/0x10 [ 19.780917] ret_from_fork+0x116/0x1d0 [ 19.780937] ? __pfx_kthread+0x10/0x10 [ 19.780958] ret_from_fork_asm+0x1a/0x30 [ 19.780989] </TASK> [ 19.781002] [ 19.794225] Allocated by task 282: [ 19.794879] kasan_save_stack+0x45/0x70 [ 19.795588] kasan_save_track+0x18/0x40 [ 19.795971] kasan_save_alloc_info+0x3b/0x50 [ 19.796425] __kasan_kmalloc+0xb7/0xc0 [ 19.796799] __kmalloc_cache_noprof+0x189/0x420 [ 19.797348] kasan_atomics+0x95/0x310 [ 19.797730] kunit_try_run_case+0x1a5/0x480 [ 19.798370] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.798883] kthread+0x337/0x6f0 [ 19.799687] ret_from_fork+0x116/0x1d0 [ 19.800120] ret_from_fork_asm+0x1a/0x30 [ 19.800511] [ 19.800721] The buggy address belongs to the object at ffff888102b66500 [ 19.800721] which belongs to the cache kmalloc-64 of size 64 [ 19.801577] The buggy address is located 0 bytes to the right of [ 19.801577] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 19.802617] [ 19.802824] The buggy address belongs to the physical page: [ 19.803177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 19.803955] flags: 0x200000000000000(node=0|zone=2) [ 19.804828] page_type: f5(slab) [ 19.805393] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.805858] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.806550] page dumped because: kasan: bad access detected [ 19.807029] [ 19.807210] Memory state around the buggy address: [ 19.807490] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.808032] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.808941] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.809361] ^ [ 19.810114] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.810922] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.811896] ================================================================== [ 20.086429] ================================================================== [ 20.087094] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 20.087628] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282 [ 20.088150] [ 20.088388] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 20.088486] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.088511] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.088550] Call Trace: [ 20.088588] <TASK> [ 20.088625] dump_stack_lvl+0x73/0xb0 [ 20.088781] print_report+0xd1/0x650 [ 20.088833] ? __virt_addr_valid+0x1db/0x2d0 [ 20.088886] ? kasan_atomics_helper+0x697/0x5450 [ 20.088931] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.089017] ? kasan_atomics_helper+0x697/0x5450 [ 20.089093] kasan_report+0x141/0x180 [ 20.089146] ? kasan_atomics_helper+0x697/0x5450 [ 20.089235] kasan_check_range+0x10c/0x1c0 [ 20.089304] __kasan_check_write+0x18/0x20 [ 20.089345] kasan_atomics_helper+0x697/0x5450 [ 20.089386] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.089424] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.089462] ? kasan_atomics+0x152/0x310 [ 20.089508] kasan_atomics+0x1dc/0x310 [ 20.089546] ? __pfx_kasan_atomics+0x10/0x10 [ 20.089586] ? __pfx_read_tsc+0x10/0x10 [ 20.089624] ? ktime_get_ts64+0x86/0x230 [ 20.089702] kunit_try_run_case+0x1a5/0x480 [ 20.089753] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.089796] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.089888] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.089935] ? __kthread_parkme+0x82/0x180 [ 20.089978] ? preempt_count_sub+0x50/0x80 [ 20.090055] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.090145] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.090221] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.090306] kthread+0x337/0x6f0 [ 20.090375] ? trace_preempt_on+0x20/0xc0 [ 20.090450] ? __pfx_kthread+0x10/0x10 [ 20.090520] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.090570] ? calculate_sigpending+0x7b/0xa0 [ 20.090643] ? __pfx_kthread+0x10/0x10 [ 20.090764] ret_from_fork+0x116/0x1d0 [ 20.090824] ? __pfx_kthread+0x10/0x10 [ 20.090879] ret_from_fork_asm+0x1a/0x30 [ 20.090948] </TASK> [ 20.090977] [ 20.108987] Allocated by task 282: [ 20.109800] kasan_save_stack+0x45/0x70 [ 20.110407] kasan_save_track+0x18/0x40 [ 20.110734] kasan_save_alloc_info+0x3b/0x50 [ 20.110927] __kasan_kmalloc+0xb7/0xc0 [ 20.111554] __kmalloc_cache_noprof+0x189/0x420 [ 20.112088] kasan_atomics+0x95/0x310 [ 20.112518] kunit_try_run_case+0x1a5/0x480 [ 20.113193] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.113556] kthread+0x337/0x6f0 [ 20.113815] ret_from_fork+0x116/0x1d0 [ 20.114453] ret_from_fork_asm+0x1a/0x30 [ 20.115153] [ 20.115370] The buggy address belongs to the object at ffff888102b66500 [ 20.115370] which belongs to the cache kmalloc-64 of size 64 [ 20.116286] The buggy address is located 0 bytes to the right of [ 20.116286] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 20.116907] [ 20.117042] The buggy address belongs to the physical page: [ 20.117250] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 20.118516] flags: 0x200000000000000(node=0|zone=2) [ 20.119463] page_type: f5(slab) [ 20.120031] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.120572] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.121242] page dumped because: kasan: bad access detected [ 20.121992] [ 20.122788] Memory state around the buggy address: [ 20.123071] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.123919] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.124376] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.125054] ^ [ 20.125311] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.125564] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.126184] ================================================================== [ 20.690008] ================================================================== [ 20.691416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 20.692110] Read of size 4 at addr ffff888102b66530 by task kunit_try_catch/282 [ 20.693074] [ 20.693234] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 20.693327] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.693354] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.693397] Call Trace: [ 20.693438] <TASK> [ 20.693503] dump_stack_lvl+0x73/0xb0 [ 20.693550] print_report+0xd1/0x650 [ 20.693591] ? __virt_addr_valid+0x1db/0x2d0 [ 20.693629] ? kasan_atomics_helper+0x4a1c/0x5450 [ 20.693659] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.693816] ? kasan_atomics_helper+0x4a1c/0x5450 [ 20.693844] kasan_report+0x141/0x180 [ 20.693870] ? kasan_atomics_helper+0x4a1c/0x5450 [ 20.693903] __asan_report_load4_noabort+0x18/0x20 [ 20.693926] kasan_atomics_helper+0x4a1c/0x5450 [ 20.693952] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.693979] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.694004] ? kasan_atomics+0x152/0x310 [ 20.694033] kasan_atomics+0x1dc/0x310 [ 20.694059] ? __pfx_kasan_atomics+0x10/0x10 [ 20.694087] ? __pfx_read_tsc+0x10/0x10 [ 20.694111] ? ktime_get_ts64+0x86/0x230 [ 20.694138] kunit_try_run_case+0x1a5/0x480 [ 20.694166] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.694191] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.694217] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.694243] ? __kthread_parkme+0x82/0x180 [ 20.694281] ? preempt_count_sub+0x50/0x80 [ 20.694310] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.694337] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.694362] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.694388] kthread+0x337/0x6f0 [ 20.694410] ? trace_preempt_on+0x20/0xc0 [ 20.694437] ? __pfx_kthread+0x10/0x10 [ 20.694460] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.694484] ? calculate_sigpending+0x7b/0xa0 [ 20.694511] ? __pfx_kthread+0x10/0x10 [ 20.694535] ret_from_fork+0x116/0x1d0 [ 20.694556] ? __pfx_kthread+0x10/0x10 [ 20.694579] ret_from_fork_asm+0x1a/0x30 [ 20.694613] </TASK> [ 20.694627] [ 20.705565] Allocated by task 282: [ 20.706001] kasan_save_stack+0x45/0x70 [ 20.706337] kasan_save_track+0x18/0x40 [ 20.706746] kasan_save_alloc_info+0x3b/0x50 [ 20.707072] __kasan_kmalloc+0xb7/0xc0 [ 20.707415] __kmalloc_cache_noprof+0x189/0x420 [ 20.707840] kasan_atomics+0x95/0x310 [ 20.708215] kunit_try_run_case+0x1a5/0x480 [ 20.708558] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.708977] kthread+0x337/0x6f0 [ 20.709316] ret_from_fork+0x116/0x1d0 [ 20.709510] ret_from_fork_asm+0x1a/0x30 [ 20.709734] [ 20.709856] The buggy address belongs to the object at ffff888102b66500 [ 20.709856] which belongs to the cache kmalloc-64 of size 64 [ 20.710792] The buggy address is located 0 bytes to the right of [ 20.710792] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 20.711622] [ 20.711775] The buggy address belongs to the physical page: [ 20.712007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 20.712450] flags: 0x200000000000000(node=0|zone=2) [ 20.712933] page_type: f5(slab) [ 20.713266] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.713976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.714600] page dumped because: kasan: bad access detected [ 20.714981] [ 20.715178] Memory state around the buggy address: [ 20.715464] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.715787] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.716252] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.716877] ^ [ 20.717274] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.717705] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.717975] ================================================================== [ 20.659230] ================================================================== [ 20.659736] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 20.660378] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282 [ 20.660752] [ 20.661028] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 20.661173] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.661203] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.661251] Call Trace: [ 20.661305] <TASK> [ 20.661347] dump_stack_lvl+0x73/0xb0 [ 20.661414] print_report+0xd1/0x650 [ 20.661467] ? __virt_addr_valid+0x1db/0x2d0 [ 20.661548] ? kasan_atomics_helper+0x1079/0x5450 [ 20.661586] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.662104] ? kasan_atomics_helper+0x1079/0x5450 [ 20.662166] kasan_report+0x141/0x180 [ 20.662273] ? kasan_atomics_helper+0x1079/0x5450 [ 20.662361] kasan_check_range+0x10c/0x1c0 [ 20.662410] __kasan_check_write+0x18/0x20 [ 20.662454] kasan_atomics_helper+0x1079/0x5450 [ 20.662505] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.662560] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.662611] ? kasan_atomics+0x152/0x310 [ 20.662709] kasan_atomics+0x1dc/0x310 [ 20.662760] ? __pfx_kasan_atomics+0x10/0x10 [ 20.662790] ? __pfx_read_tsc+0x10/0x10 [ 20.662815] ? ktime_get_ts64+0x86/0x230 [ 20.662843] kunit_try_run_case+0x1a5/0x480 [ 20.662871] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.662896] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.662922] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.662947] ? __kthread_parkme+0x82/0x180 [ 20.662971] ? preempt_count_sub+0x50/0x80 [ 20.663009] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.663039] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.663065] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.663091] kthread+0x337/0x6f0 [ 20.663113] ? trace_preempt_on+0x20/0xc0 [ 20.663141] ? __pfx_kthread+0x10/0x10 [ 20.663164] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.663187] ? calculate_sigpending+0x7b/0xa0 [ 20.663216] ? __pfx_kthread+0x10/0x10 [ 20.663240] ret_from_fork+0x116/0x1d0 [ 20.663282] ? __pfx_kthread+0x10/0x10 [ 20.663311] ret_from_fork_asm+0x1a/0x30 [ 20.663345] </TASK> [ 20.663360] [ 20.675178] Allocated by task 282: [ 20.675412] kasan_save_stack+0x45/0x70 [ 20.675741] kasan_save_track+0x18/0x40 [ 20.676211] kasan_save_alloc_info+0x3b/0x50 [ 20.676595] __kasan_kmalloc+0xb7/0xc0 [ 20.677095] __kmalloc_cache_noprof+0x189/0x420 [ 20.677495] kasan_atomics+0x95/0x310 [ 20.677947] kunit_try_run_case+0x1a5/0x480 [ 20.678379] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.678937] kthread+0x337/0x6f0 [ 20.679169] ret_from_fork+0x116/0x1d0 [ 20.679535] ret_from_fork_asm+0x1a/0x30 [ 20.679976] [ 20.680176] The buggy address belongs to the object at ffff888102b66500 [ 20.680176] which belongs to the cache kmalloc-64 of size 64 [ 20.680610] The buggy address is located 0 bytes to the right of [ 20.680610] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 20.681296] [ 20.681507] The buggy address belongs to the physical page: [ 20.682110] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 20.682770] flags: 0x200000000000000(node=0|zone=2) [ 20.683310] page_type: f5(slab) [ 20.683713] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.684310] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.684924] page dumped because: kasan: bad access detected [ 20.685158] [ 20.685346] Memory state around the buggy address: [ 20.685885] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.686492] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.686918] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.687277] ^ [ 20.687656] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.688755] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.689273] ================================================================== [ 20.248627] ================================================================== [ 20.249079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 20.250725] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282 [ 20.251156] [ 20.251338] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 20.251406] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.251425] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.251452] Call Trace: [ 20.251476] <TASK> [ 20.251511] dump_stack_lvl+0x73/0xb0 [ 20.251572] print_report+0xd1/0x650 [ 20.251621] ? __virt_addr_valid+0x1db/0x2d0 [ 20.251666] ? kasan_atomics_helper+0x8f9/0x5450 [ 20.251729] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.251772] ? kasan_atomics_helper+0x8f9/0x5450 [ 20.251814] kasan_report+0x141/0x180 [ 20.251861] ? kasan_atomics_helper+0x8f9/0x5450 [ 20.251916] kasan_check_range+0x10c/0x1c0 [ 20.251963] __kasan_check_write+0x18/0x20 [ 20.252003] kasan_atomics_helper+0x8f9/0x5450 [ 20.252048] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.252087] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.252127] ? kasan_atomics+0x152/0x310 [ 20.252182] kasan_atomics+0x1dc/0x310 [ 20.252232] ? __pfx_kasan_atomics+0x10/0x10 [ 20.252302] ? __pfx_read_tsc+0x10/0x10 [ 20.252339] ? ktime_get_ts64+0x86/0x230 [ 20.252368] kunit_try_run_case+0x1a5/0x480 [ 20.252398] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.252423] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.252449] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.252474] ? __kthread_parkme+0x82/0x180 [ 20.252499] ? preempt_count_sub+0x50/0x80 [ 20.252525] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.252551] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.252576] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.252602] kthread+0x337/0x6f0 [ 20.252624] ? trace_preempt_on+0x20/0xc0 [ 20.252651] ? __pfx_kthread+0x10/0x10 [ 20.252686] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.252719] ? calculate_sigpending+0x7b/0xa0 [ 20.252746] ? __pfx_kthread+0x10/0x10 [ 20.252770] ret_from_fork+0x116/0x1d0 [ 20.252791] ? __pfx_kthread+0x10/0x10 [ 20.252815] ret_from_fork_asm+0x1a/0x30 [ 20.252848] </TASK> [ 20.252861] [ 20.263249] Allocated by task 282: [ 20.263493] kasan_save_stack+0x45/0x70 [ 20.263898] kasan_save_track+0x18/0x40 [ 20.264099] kasan_save_alloc_info+0x3b/0x50 [ 20.264311] __kasan_kmalloc+0xb7/0xc0 [ 20.264497] __kmalloc_cache_noprof+0x189/0x420 [ 20.264698] kasan_atomics+0x95/0x310 [ 20.265006] kunit_try_run_case+0x1a5/0x480 [ 20.265396] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.265841] kthread+0x337/0x6f0 [ 20.267796] ret_from_fork+0x116/0x1d0 [ 20.268187] ret_from_fork_asm+0x1a/0x30 [ 20.268561] [ 20.268772] The buggy address belongs to the object at ffff888102b66500 [ 20.268772] which belongs to the cache kmalloc-64 of size 64 [ 20.269198] The buggy address is located 0 bytes to the right of [ 20.269198] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 20.269651] [ 20.270696] The buggy address belongs to the physical page: [ 20.271503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 20.271991] flags: 0x200000000000000(node=0|zone=2) [ 20.272384] page_type: f5(slab) [ 20.272569] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.273071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.273573] page dumped because: kasan: bad access detected [ 20.273809] [ 20.273995] Memory state around the buggy address: [ 20.274349] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.274807] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.275386] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.275686] ^ [ 20.276083] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.276814] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.277127] ================================================================== [ 21.459483] ================================================================== [ 21.460126] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 21.460555] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282 [ 21.461055] [ 21.461295] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 21.461405] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.461435] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.461482] Call Trace: [ 21.461525] <TASK> [ 21.461571] dump_stack_lvl+0x73/0xb0 [ 21.461641] print_report+0xd1/0x650 [ 21.461734] ? __virt_addr_valid+0x1db/0x2d0 [ 21.461788] ? kasan_atomics_helper+0x1e12/0x5450 [ 21.461838] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.461890] ? kasan_atomics_helper+0x1e12/0x5450 [ 21.461937] kasan_report+0x141/0x180 [ 21.461984] ? kasan_atomics_helper+0x1e12/0x5450 [ 21.462041] kasan_check_range+0x10c/0x1c0 [ 21.462088] __kasan_check_write+0x18/0x20 [ 21.462129] kasan_atomics_helper+0x1e12/0x5450 [ 21.462176] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.462220] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.462274] ? kasan_atomics+0x152/0x310 [ 21.462337] kasan_atomics+0x1dc/0x310 [ 21.462390] ? __pfx_kasan_atomics+0x10/0x10 [ 21.462446] ? __pfx_read_tsc+0x10/0x10 [ 21.462496] ? ktime_get_ts64+0x86/0x230 [ 21.462553] kunit_try_run_case+0x1a5/0x480 [ 21.462610] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.462686] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.462744] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.462797] ? __kthread_parkme+0x82/0x180 [ 21.462846] ? preempt_count_sub+0x50/0x80 [ 21.462902] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.462956] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.463022] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.463076] kthread+0x337/0x6f0 [ 21.463118] ? trace_preempt_on+0x20/0xc0 [ 21.463167] ? __pfx_kthread+0x10/0x10 [ 21.463203] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.463241] ? calculate_sigpending+0x7b/0xa0 [ 21.463300] ? __pfx_kthread+0x10/0x10 [ 21.463344] ret_from_fork+0x116/0x1d0 [ 21.463382] ? __pfx_kthread+0x10/0x10 [ 21.463421] ret_from_fork_asm+0x1a/0x30 [ 21.463487] </TASK> [ 21.463515] [ 21.473694] Allocated by task 282: [ 21.473999] kasan_save_stack+0x45/0x70 [ 21.474374] kasan_save_track+0x18/0x40 [ 21.474724] kasan_save_alloc_info+0x3b/0x50 [ 21.475070] __kasan_kmalloc+0xb7/0xc0 [ 21.475410] __kmalloc_cache_noprof+0x189/0x420 [ 21.475705] kasan_atomics+0x95/0x310 [ 21.476043] kunit_try_run_case+0x1a5/0x480 [ 21.476375] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.476749] kthread+0x337/0x6f0 [ 21.477046] ret_from_fork+0x116/0x1d0 [ 21.477308] ret_from_fork_asm+0x1a/0x30 [ 21.477545] [ 21.477738] The buggy address belongs to the object at ffff888102b66500 [ 21.477738] which belongs to the cache kmalloc-64 of size 64 [ 21.478341] The buggy address is located 0 bytes to the right of [ 21.478341] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 21.479019] [ 21.479147] The buggy address belongs to the physical page: [ 21.479567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 21.479997] flags: 0x200000000000000(node=0|zone=2) [ 21.480235] page_type: f5(slab) [ 21.480448] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.480776] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.481059] page dumped because: kasan: bad access detected [ 21.481291] [ 21.481471] Memory state around the buggy address: [ 21.481894] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.482456] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.483021] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.483575] ^ [ 21.484006] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.484560] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.485101] ================================================================== [ 20.279014] ================================================================== [ 20.279664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 20.280479] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282 [ 20.280890] [ 20.281580] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 20.281708] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.281738] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.281782] Call Trace: [ 20.281822] <TASK> [ 20.281864] dump_stack_lvl+0x73/0xb0 [ 20.281925] print_report+0xd1/0x650 [ 20.281954] ? __virt_addr_valid+0x1db/0x2d0 [ 20.281981] ? kasan_atomics_helper+0x992/0x5450 [ 20.282006] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.282032] ? kasan_atomics_helper+0x992/0x5450 [ 20.282056] kasan_report+0x141/0x180 [ 20.282081] ? kasan_atomics_helper+0x992/0x5450 [ 20.282110] kasan_check_range+0x10c/0x1c0 [ 20.282137] __kasan_check_write+0x18/0x20 [ 20.282159] kasan_atomics_helper+0x992/0x5450 [ 20.282184] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.282211] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.282236] ? kasan_atomics+0x152/0x310 [ 20.282288] kasan_atomics+0x1dc/0x310 [ 20.282318] ? __pfx_kasan_atomics+0x10/0x10 [ 20.282345] ? __pfx_read_tsc+0x10/0x10 [ 20.282370] ? ktime_get_ts64+0x86/0x230 [ 20.282397] kunit_try_run_case+0x1a5/0x480 [ 20.282425] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.282450] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.282476] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.282501] ? __kthread_parkme+0x82/0x180 [ 20.282525] ? preempt_count_sub+0x50/0x80 [ 20.282551] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.282577] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.282603] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.282629] kthread+0x337/0x6f0 [ 20.282651] ? trace_preempt_on+0x20/0xc0 [ 20.282678] ? __pfx_kthread+0x10/0x10 [ 20.282701] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.282725] ? calculate_sigpending+0x7b/0xa0 [ 20.282753] ? __pfx_kthread+0x10/0x10 [ 20.282777] ret_from_fork+0x116/0x1d0 [ 20.282798] ? __pfx_kthread+0x10/0x10 [ 20.282821] ret_from_fork_asm+0x1a/0x30 [ 20.282854] </TASK> [ 20.282869] [ 20.293598] Allocated by task 282: [ 20.293941] kasan_save_stack+0x45/0x70 [ 20.294323] kasan_save_track+0x18/0x40 [ 20.294672] kasan_save_alloc_info+0x3b/0x50 [ 20.295038] __kasan_kmalloc+0xb7/0xc0 [ 20.295379] __kmalloc_cache_noprof+0x189/0x420 [ 20.295710] kasan_atomics+0x95/0x310 [ 20.295971] kunit_try_run_case+0x1a5/0x480 [ 20.296333] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.296573] kthread+0x337/0x6f0 [ 20.296829] ret_from_fork+0x116/0x1d0 [ 20.297186] ret_from_fork_asm+0x1a/0x30 [ 20.297541] [ 20.297759] The buggy address belongs to the object at ffff888102b66500 [ 20.297759] which belongs to the cache kmalloc-64 of size 64 [ 20.298504] The buggy address is located 0 bytes to the right of [ 20.298504] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 20.299311] [ 20.299505] The buggy address belongs to the physical page: [ 20.299860] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 20.300382] flags: 0x200000000000000(node=0|zone=2) [ 20.300832] page_type: f5(slab) [ 20.301205] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.301639] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.302173] page dumped because: kasan: bad access detected [ 20.302529] [ 20.302750] Memory state around the buggy address: [ 20.303306] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.303737] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.304230] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.304704] ^ [ 20.305033] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.305483] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.306180] ================================================================== [ 20.402822] ================================================================== [ 20.404155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 20.404681] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282 [ 20.405218] [ 20.405455] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 20.405552] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.405576] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.405613] Call Trace: [ 20.405649] <TASK> [ 20.405686] dump_stack_lvl+0x73/0xb0 [ 20.405738] print_report+0xd1/0x650 [ 20.405780] ? __virt_addr_valid+0x1db/0x2d0 [ 20.405818] ? kasan_atomics_helper+0xc70/0x5450 [ 20.405855] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.405891] ? kasan_atomics_helper+0xc70/0x5450 [ 20.405932] kasan_report+0x141/0x180 [ 20.405970] ? kasan_atomics_helper+0xc70/0x5450 [ 20.406016] kasan_check_range+0x10c/0x1c0 [ 20.406054] __kasan_check_write+0x18/0x20 [ 20.406086] kasan_atomics_helper+0xc70/0x5450 [ 20.406120] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.406156] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.406192] ? kasan_atomics+0x152/0x310 [ 20.406239] kasan_atomics+0x1dc/0x310 [ 20.406302] ? __pfx_kasan_atomics+0x10/0x10 [ 20.406353] ? __pfx_read_tsc+0x10/0x10 [ 20.406901] ? ktime_get_ts64+0x86/0x230 [ 20.406941] kunit_try_run_case+0x1a5/0x480 [ 20.406972] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.407010] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.407041] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.407069] ? __kthread_parkme+0x82/0x180 [ 20.407093] ? preempt_count_sub+0x50/0x80 [ 20.407120] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.407147] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.407172] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.407198] kthread+0x337/0x6f0 [ 20.407220] ? trace_preempt_on+0x20/0xc0 [ 20.407248] ? __pfx_kthread+0x10/0x10 [ 20.407295] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.407320] ? calculate_sigpending+0x7b/0xa0 [ 20.407348] ? __pfx_kthread+0x10/0x10 [ 20.407372] ret_from_fork+0x116/0x1d0 [ 20.407394] ? __pfx_kthread+0x10/0x10 [ 20.407419] ret_from_fork_asm+0x1a/0x30 [ 20.407452] </TASK> [ 20.407467] [ 20.421102] Allocated by task 282: [ 20.421528] kasan_save_stack+0x45/0x70 [ 20.421971] kasan_save_track+0x18/0x40 [ 20.422166] kasan_save_alloc_info+0x3b/0x50 [ 20.422377] __kasan_kmalloc+0xb7/0xc0 [ 20.422583] __kmalloc_cache_noprof+0x189/0x420 [ 20.423724] kasan_atomics+0x95/0x310 [ 20.423947] kunit_try_run_case+0x1a5/0x480 [ 20.424119] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.424459] kthread+0x337/0x6f0 [ 20.424754] ret_from_fork+0x116/0x1d0 [ 20.425572] ret_from_fork_asm+0x1a/0x30 [ 20.426028] [ 20.426134] The buggy address belongs to the object at ffff888102b66500 [ 20.426134] which belongs to the cache kmalloc-64 of size 64 [ 20.427221] The buggy address is located 0 bytes to the right of [ 20.427221] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 20.428242] [ 20.428466] The buggy address belongs to the physical page: [ 20.428857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 20.429230] flags: 0x200000000000000(node=0|zone=2) [ 20.429580] page_type: f5(slab) [ 20.429848] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.430763] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.431355] page dumped because: kasan: bad access detected [ 20.431811] [ 20.431999] Memory state around the buggy address: [ 20.432541] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.433137] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.433746] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.434285] ^ [ 20.434668] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.435329] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.435881] ================================================================== [ 21.626602] ================================================================== [ 21.627596] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 21.628238] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282 [ 21.628820] [ 21.628986] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 21.629095] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.629126] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.629171] Call Trace: [ 21.629212] <TASK> [ 21.629254] dump_stack_lvl+0x73/0xb0 [ 21.629334] print_report+0xd1/0x650 [ 21.629388] ? __virt_addr_valid+0x1db/0x2d0 [ 21.629441] ? kasan_atomics_helper+0x20c8/0x5450 [ 21.629491] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.629539] ? kasan_atomics_helper+0x20c8/0x5450 [ 21.629582] kasan_report+0x141/0x180 [ 21.629624] ? kasan_atomics_helper+0x20c8/0x5450 [ 21.629709] kasan_check_range+0x10c/0x1c0 [ 21.629765] __kasan_check_write+0x18/0x20 [ 21.629811] kasan_atomics_helper+0x20c8/0x5450 [ 21.629861] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.629904] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.629943] ? kasan_atomics+0x152/0x310 [ 21.629995] kasan_atomics+0x1dc/0x310 [ 21.630041] ? __pfx_kasan_atomics+0x10/0x10 [ 21.630082] ? __pfx_read_tsc+0x10/0x10 [ 21.630128] ? ktime_get_ts64+0x86/0x230 [ 21.630184] kunit_try_run_case+0x1a5/0x480 [ 21.630240] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.630304] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.630358] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.630410] ? __kthread_parkme+0x82/0x180 [ 21.630461] ? preempt_count_sub+0x50/0x80 [ 21.630517] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.630572] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.630627] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.630714] kthread+0x337/0x6f0 [ 21.630762] ? trace_preempt_on+0x20/0xc0 [ 21.630817] ? __pfx_kthread+0x10/0x10 [ 21.630865] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.630913] ? calculate_sigpending+0x7b/0xa0 [ 21.630963] ? __pfx_kthread+0x10/0x10 [ 21.631023] ret_from_fork+0x116/0x1d0 [ 21.631068] ? __pfx_kthread+0x10/0x10 [ 21.631118] ret_from_fork_asm+0x1a/0x30 [ 21.631189] </TASK> [ 21.631217] [ 21.640950] Allocated by task 282: [ 21.641164] kasan_save_stack+0x45/0x70 [ 21.641543] kasan_save_track+0x18/0x40 [ 21.641925] kasan_save_alloc_info+0x3b/0x50 [ 21.642295] __kasan_kmalloc+0xb7/0xc0 [ 21.642618] __kmalloc_cache_noprof+0x189/0x420 [ 21.643040] kasan_atomics+0x95/0x310 [ 21.643368] kunit_try_run_case+0x1a5/0x480 [ 21.643740] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.644020] kthread+0x337/0x6f0 [ 21.644314] ret_from_fork+0x116/0x1d0 [ 21.644570] ret_from_fork_asm+0x1a/0x30 [ 21.644812] [ 21.644938] The buggy address belongs to the object at ffff888102b66500 [ 21.644938] which belongs to the cache kmalloc-64 of size 64 [ 21.645502] The buggy address is located 0 bytes to the right of [ 21.645502] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 21.646402] [ 21.646593] The buggy address belongs to the physical page: [ 21.648674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 21.649719] flags: 0x200000000000000(node=0|zone=2) [ 21.650137] page_type: f5(slab) [ 21.650456] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.651349] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.652569] page dumped because: kasan: bad access detected [ 21.653059] [ 21.653240] Memory state around the buggy address: [ 21.653581] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.654309] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.654913] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.655520] ^ [ 21.655895] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.656337] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.656927] ================================================================== [ 20.209623] ================================================================== [ 20.209955] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 20.210572] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282 [ 20.211711] [ 20.211921] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 20.212029] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.212055] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.212599] Call Trace: [ 20.212651] <TASK> [ 20.212708] dump_stack_lvl+0x73/0xb0 [ 20.212815] print_report+0xd1/0x650 [ 20.212868] ? __virt_addr_valid+0x1db/0x2d0 [ 20.212959] ? kasan_atomics_helper+0x860/0x5450 [ 20.213033] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.213098] ? kasan_atomics_helper+0x860/0x5450 [ 20.213146] kasan_report+0x141/0x180 [ 20.213188] ? kasan_atomics_helper+0x860/0x5450 [ 20.213233] kasan_check_range+0x10c/0x1c0 [ 20.213291] __kasan_check_write+0x18/0x20 [ 20.213329] kasan_atomics_helper+0x860/0x5450 [ 20.213371] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.213396] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.213421] ? kasan_atomics+0x152/0x310 [ 20.213451] kasan_atomics+0x1dc/0x310 [ 20.213477] ? __pfx_kasan_atomics+0x10/0x10 [ 20.213504] ? __pfx_read_tsc+0x10/0x10 [ 20.213529] ? ktime_get_ts64+0x86/0x230 [ 20.213556] kunit_try_run_case+0x1a5/0x480 [ 20.213584] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.213610] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.213636] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.213678] ? __kthread_parkme+0x82/0x180 [ 20.213729] ? preempt_count_sub+0x50/0x80 [ 20.213756] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.213783] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.213808] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.213834] kthread+0x337/0x6f0 [ 20.213857] ? trace_preempt_on+0x20/0xc0 [ 20.213883] ? __pfx_kthread+0x10/0x10 [ 20.213910] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.213933] ? calculate_sigpending+0x7b/0xa0 [ 20.213960] ? __pfx_kthread+0x10/0x10 [ 20.213984] ret_from_fork+0x116/0x1d0 [ 20.214005] ? __pfx_kthread+0x10/0x10 [ 20.214028] ret_from_fork_asm+0x1a/0x30 [ 20.214095] </TASK> [ 20.214119] [ 20.229806] Allocated by task 282: [ 20.230248] kasan_save_stack+0x45/0x70 [ 20.231146] kasan_save_track+0x18/0x40 [ 20.231603] kasan_save_alloc_info+0x3b/0x50 [ 20.231994] __kasan_kmalloc+0xb7/0xc0 [ 20.232529] __kmalloc_cache_noprof+0x189/0x420 [ 20.233080] kasan_atomics+0x95/0x310 [ 20.233625] kunit_try_run_case+0x1a5/0x480 [ 20.234169] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.234658] kthread+0x337/0x6f0 [ 20.235156] ret_from_fork+0x116/0x1d0 [ 20.235406] ret_from_fork_asm+0x1a/0x30 [ 20.236112] [ 20.236492] The buggy address belongs to the object at ffff888102b66500 [ 20.236492] which belongs to the cache kmalloc-64 of size 64 [ 20.237429] The buggy address is located 0 bytes to the right of [ 20.237429] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 20.237974] [ 20.238560] The buggy address belongs to the physical page: [ 20.239487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 20.240016] flags: 0x200000000000000(node=0|zone=2) [ 20.240343] page_type: f5(slab) [ 20.240962] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.241433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.241686] page dumped because: kasan: bad access detected [ 20.242235] [ 20.242441] Memory state around the buggy address: [ 20.243506] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.243902] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.244557] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.245135] ^ [ 20.245519] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.246762] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.247239] ================================================================== [ 20.719044] ================================================================== [ 20.720279] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 20.720978] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282 [ 20.721593] [ 20.721888] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 20.722052] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.722085] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.722132] Call Trace: [ 20.722173] <TASK> [ 20.722217] dump_stack_lvl+0x73/0xb0 [ 20.722295] print_report+0xd1/0x650 [ 20.722352] ? __virt_addr_valid+0x1db/0x2d0 [ 20.722399] ? kasan_atomics_helper+0x1148/0x5450 [ 20.722445] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.722525] ? kasan_atomics_helper+0x1148/0x5450 [ 20.722594] kasan_report+0x141/0x180 [ 20.722646] ? kasan_atomics_helper+0x1148/0x5450 [ 20.722712] kasan_check_range+0x10c/0x1c0 [ 20.722756] __kasan_check_write+0x18/0x20 [ 20.722798] kasan_atomics_helper+0x1148/0x5450 [ 20.722846] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.722932] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.723032] ? kasan_atomics+0x152/0x310 [ 20.723107] kasan_atomics+0x1dc/0x310 [ 20.723161] ? __pfx_kasan_atomics+0x10/0x10 [ 20.723217] ? __pfx_read_tsc+0x10/0x10 [ 20.723269] ? ktime_get_ts64+0x86/0x230 [ 20.723319] kunit_try_run_case+0x1a5/0x480 [ 20.723358] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.723385] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.723412] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.723438] ? __kthread_parkme+0x82/0x180 [ 20.723462] ? preempt_count_sub+0x50/0x80 [ 20.723489] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.723515] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.723544] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.723571] kthread+0x337/0x6f0 [ 20.723592] ? trace_preempt_on+0x20/0xc0 [ 20.723619] ? __pfx_kthread+0x10/0x10 [ 20.723643] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.723674] ? calculate_sigpending+0x7b/0xa0 [ 20.723731] ? __pfx_kthread+0x10/0x10 [ 20.723756] ret_from_fork+0x116/0x1d0 [ 20.723778] ? __pfx_kthread+0x10/0x10 [ 20.723801] ret_from_fork_asm+0x1a/0x30 [ 20.723835] </TASK> [ 20.723849] [ 20.734594] Allocated by task 282: [ 20.734805] kasan_save_stack+0x45/0x70 [ 20.735166] kasan_save_track+0x18/0x40 [ 20.735531] kasan_save_alloc_info+0x3b/0x50 [ 20.735884] __kasan_kmalloc+0xb7/0xc0 [ 20.736344] __kmalloc_cache_noprof+0x189/0x420 [ 20.736741] kasan_atomics+0x95/0x310 [ 20.737080] kunit_try_run_case+0x1a5/0x480 [ 20.737475] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.737710] kthread+0x337/0x6f0 [ 20.737859] ret_from_fork+0x116/0x1d0 [ 20.738012] ret_from_fork_asm+0x1a/0x30 [ 20.738179] [ 20.738296] The buggy address belongs to the object at ffff888102b66500 [ 20.738296] which belongs to the cache kmalloc-64 of size 64 [ 20.738682] The buggy address is located 0 bytes to the right of [ 20.738682] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 20.739076] [ 20.739182] The buggy address belongs to the physical page: [ 20.739417] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 20.739724] flags: 0x200000000000000(node=0|zone=2) [ 20.739949] page_type: f5(slab) [ 20.740138] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.740606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.741418] page dumped because: kasan: bad access detected [ 20.741635] [ 20.741743] Memory state around the buggy address: [ 20.741957] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.742222] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.742781] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.743475] ^ [ 20.743862] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.744109] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.744369] ================================================================== [ 21.282923] ================================================================== [ 21.283394] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 21.283962] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282 [ 21.284515] [ 21.284732] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 21.284862] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.284894] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.284942] Call Trace: [ 21.284987] <TASK> [ 21.285026] dump_stack_lvl+0x73/0xb0 [ 21.285090] print_report+0xd1/0x650 [ 21.285136] ? __virt_addr_valid+0x1db/0x2d0 [ 21.285187] ? kasan_atomics_helper+0x1a7f/0x5450 [ 21.285236] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.285303] ? kasan_atomics_helper+0x1a7f/0x5450 [ 21.285357] kasan_report+0x141/0x180 [ 21.285409] ? kasan_atomics_helper+0x1a7f/0x5450 [ 21.285471] kasan_check_range+0x10c/0x1c0 [ 21.285521] __kasan_check_write+0x18/0x20 [ 21.285560] kasan_atomics_helper+0x1a7f/0x5450 [ 21.285604] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.285643] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.285708] ? kasan_atomics+0x152/0x310 [ 21.285764] kasan_atomics+0x1dc/0x310 [ 21.285808] ? __pfx_kasan_atomics+0x10/0x10 [ 21.285856] ? __pfx_read_tsc+0x10/0x10 [ 21.285899] ? ktime_get_ts64+0x86/0x230 [ 21.285948] kunit_try_run_case+0x1a5/0x480 [ 21.286004] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.286053] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.286106] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.286151] ? __kthread_parkme+0x82/0x180 [ 21.286198] ? preempt_count_sub+0x50/0x80 [ 21.286251] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.286320] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.286368] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.286414] kthread+0x337/0x6f0 [ 21.286448] ? trace_preempt_on+0x20/0xc0 [ 21.286495] ? __pfx_kthread+0x10/0x10 [ 21.286537] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.286583] ? calculate_sigpending+0x7b/0xa0 [ 21.286636] ? __pfx_kthread+0x10/0x10 [ 21.286680] ret_from_fork+0x116/0x1d0 [ 21.286721] ? __pfx_kthread+0x10/0x10 [ 21.286770] ret_from_fork_asm+0x1a/0x30 [ 21.286842] </TASK> [ 21.286871] [ 21.296760] Allocated by task 282: [ 21.297003] kasan_save_stack+0x45/0x70 [ 21.297242] kasan_save_track+0x18/0x40 [ 21.297578] kasan_save_alloc_info+0x3b/0x50 [ 21.297956] __kasan_kmalloc+0xb7/0xc0 [ 21.298300] __kmalloc_cache_noprof+0x189/0x420 [ 21.298851] kasan_atomics+0x95/0x310 [ 21.299210] kunit_try_run_case+0x1a5/0x480 [ 21.299601] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.300049] kthread+0x337/0x6f0 [ 21.300379] ret_from_fork+0x116/0x1d0 [ 21.302212] ret_from_fork_asm+0x1a/0x30 [ 21.302633] [ 21.302850] The buggy address belongs to the object at ffff888102b66500 [ 21.302850] which belongs to the cache kmalloc-64 of size 64 [ 21.303409] The buggy address is located 0 bytes to the right of [ 21.303409] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 21.304881] [ 21.305135] The buggy address belongs to the physical page: [ 21.305543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 21.306422] flags: 0x200000000000000(node=0|zone=2) [ 21.306975] page_type: f5(slab) [ 21.307611] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.308067] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.308361] page dumped because: kasan: bad access detected [ 21.308651] [ 21.309340] Memory state around the buggy address: [ 21.309755] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.310134] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.310546] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.310825] ^ [ 21.311240] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.311623] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.312098] ================================================================== [ 21.569846] ================================================================== [ 21.570363] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 21.570832] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282 [ 21.571254] [ 21.571444] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 21.571560] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.571592] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.571641] Call Trace: [ 21.571727] <TASK> [ 21.571776] dump_stack_lvl+0x73/0xb0 [ 21.571844] print_report+0xd1/0x650 [ 21.571899] ? __virt_addr_valid+0x1db/0x2d0 [ 21.571952] ? kasan_atomics_helper+0x2006/0x5450 [ 21.572003] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.572054] ? kasan_atomics_helper+0x2006/0x5450 [ 21.572104] kasan_report+0x141/0x180 [ 21.572147] ? kasan_atomics_helper+0x2006/0x5450 [ 21.572197] kasan_check_range+0x10c/0x1c0 [ 21.572245] __kasan_check_write+0x18/0x20 [ 21.572301] kasan_atomics_helper+0x2006/0x5450 [ 21.572352] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.572405] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.572455] ? kasan_atomics+0x152/0x310 [ 21.572516] kasan_atomics+0x1dc/0x310 [ 21.572569] ? __pfx_kasan_atomics+0x10/0x10 [ 21.572624] ? __pfx_read_tsc+0x10/0x10 [ 21.572702] ? ktime_get_ts64+0x86/0x230 [ 21.572754] kunit_try_run_case+0x1a5/0x480 [ 21.572811] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.572863] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.572915] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.572966] ? __kthread_parkme+0x82/0x180 [ 21.573017] ? preempt_count_sub+0x50/0x80 [ 21.573071] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.573125] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.573179] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.573232] kthread+0x337/0x6f0 [ 21.573290] ? trace_preempt_on+0x20/0xc0 [ 21.573342] ? __pfx_kthread+0x10/0x10 [ 21.573383] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.573421] ? calculate_sigpending+0x7b/0xa0 [ 21.573461] ? __pfx_kthread+0x10/0x10 [ 21.573501] ret_from_fork+0x116/0x1d0 [ 21.573540] ? __pfx_kthread+0x10/0x10 [ 21.573585] ret_from_fork_asm+0x1a/0x30 [ 21.573642] </TASK> [ 21.573698] [ 21.583633] Allocated by task 282: [ 21.584000] kasan_save_stack+0x45/0x70 [ 21.584383] kasan_save_track+0x18/0x40 [ 21.584749] kasan_save_alloc_info+0x3b/0x50 [ 21.585115] __kasan_kmalloc+0xb7/0xc0 [ 21.585428] __kmalloc_cache_noprof+0x189/0x420 [ 21.585819] kasan_atomics+0x95/0x310 [ 21.586142] kunit_try_run_case+0x1a5/0x480 [ 21.586436] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.586821] kthread+0x337/0x6f0 [ 21.587022] ret_from_fork+0x116/0x1d0 [ 21.587216] ret_from_fork_asm+0x1a/0x30 [ 21.587430] [ 21.587553] The buggy address belongs to the object at ffff888102b66500 [ 21.587553] which belongs to the cache kmalloc-64 of size 64 [ 21.588399] The buggy address is located 0 bytes to the right of [ 21.588399] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 21.589306] [ 21.589485] The buggy address belongs to the physical page: [ 21.589922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 21.590401] flags: 0x200000000000000(node=0|zone=2) [ 21.590636] page_type: f5(slab) [ 21.590860] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.591162] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.591719] page dumped because: kasan: bad access detected [ 21.592136] [ 21.592315] Memory state around the buggy address: [ 21.592751] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.593300] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.593861] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.594344] ^ [ 21.594555] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.594867] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.595150] ================================================================== [ 21.486389] ================================================================== [ 21.487007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 21.487602] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282 [ 21.487918] [ 21.488138] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 21.488237] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.488274] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.488324] Call Trace: [ 21.488368] <TASK> [ 21.488412] dump_stack_lvl+0x73/0xb0 [ 21.488476] print_report+0xd1/0x650 [ 21.488526] ? __virt_addr_valid+0x1db/0x2d0 [ 21.488573] ? kasan_atomics_helper+0x1eaa/0x5450 [ 21.488613] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.488648] ? kasan_atomics_helper+0x1eaa/0x5450 [ 21.488726] kasan_report+0x141/0x180 [ 21.488762] ? kasan_atomics_helper+0x1eaa/0x5450 [ 21.488802] kasan_check_range+0x10c/0x1c0 [ 21.488839] __kasan_check_write+0x18/0x20 [ 21.488893] kasan_atomics_helper+0x1eaa/0x5450 [ 21.488934] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.488968] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.489005] ? kasan_atomics+0x152/0x310 [ 21.489070] kasan_atomics+0x1dc/0x310 [ 21.489116] ? __pfx_kasan_atomics+0x10/0x10 [ 21.489167] ? __pfx_read_tsc+0x10/0x10 [ 21.489210] ? ktime_get_ts64+0x86/0x230 [ 21.489253] kunit_try_run_case+0x1a5/0x480 [ 21.489332] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.489375] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.489417] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.489459] ? __kthread_parkme+0x82/0x180 [ 21.489501] ? preempt_count_sub+0x50/0x80 [ 21.489550] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.489596] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.489648] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.490145] kthread+0x337/0x6f0 [ 21.490197] ? trace_preempt_on+0x20/0xc0 [ 21.490247] ? __pfx_kthread+0x10/0x10 [ 21.490305] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.490353] ? calculate_sigpending+0x7b/0xa0 [ 21.490403] ? __pfx_kthread+0x10/0x10 [ 21.490448] ret_from_fork+0x116/0x1d0 [ 21.490490] ? __pfx_kthread+0x10/0x10 [ 21.490530] ret_from_fork_asm+0x1a/0x30 [ 21.490592] </TASK> [ 21.490618] [ 21.501390] Allocated by task 282: [ 21.501786] kasan_save_stack+0x45/0x70 [ 21.502184] kasan_save_track+0x18/0x40 [ 21.502536] kasan_save_alloc_info+0x3b/0x50 [ 21.502933] __kasan_kmalloc+0xb7/0xc0 [ 21.503284] __kmalloc_cache_noprof+0x189/0x420 [ 21.503639] kasan_atomics+0x95/0x310 [ 21.504007] kunit_try_run_case+0x1a5/0x480 [ 21.504363] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.504678] kthread+0x337/0x6f0 [ 21.504868] ret_from_fork+0x116/0x1d0 [ 21.505167] ret_from_fork_asm+0x1a/0x30 [ 21.505499] [ 21.505697] The buggy address belongs to the object at ffff888102b66500 [ 21.505697] which belongs to the cache kmalloc-64 of size 64 [ 21.506151] The buggy address is located 0 bytes to the right of [ 21.506151] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 21.507097] [ 21.507296] The buggy address belongs to the physical page: [ 21.507531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 21.507871] flags: 0x200000000000000(node=0|zone=2) [ 21.508106] page_type: f5(slab) [ 21.508303] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.508600] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.509062] page dumped because: kasan: bad access detected [ 21.509456] [ 21.509618] Memory state around the buggy address: [ 21.510029] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.510585] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.511143] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.511695] ^ [ 21.512090] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.512540] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.512868] ================================================================== [ 20.807536] ================================================================== [ 20.807994] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 20.808347] Read of size 4 at addr ffff888102b66530 by task kunit_try_catch/282 [ 20.808957] [ 20.809236] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 20.809329] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.809351] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.809386] Call Trace: [ 20.809422] <TASK> [ 20.809455] dump_stack_lvl+0x73/0xb0 [ 20.809505] print_report+0xd1/0x650 [ 20.809539] ? __virt_addr_valid+0x1db/0x2d0 [ 20.809577] ? kasan_atomics_helper+0x49e8/0x5450 [ 20.809622] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.809702] ? kasan_atomics_helper+0x49e8/0x5450 [ 20.809758] kasan_report+0x141/0x180 [ 20.809809] ? kasan_atomics_helper+0x49e8/0x5450 [ 20.809868] __asan_report_load4_noabort+0x18/0x20 [ 20.809916] kasan_atomics_helper+0x49e8/0x5450 [ 20.809967] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.810017] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.810069] ? kasan_atomics+0x152/0x310 [ 20.810119] kasan_atomics+0x1dc/0x310 [ 20.810159] ? __pfx_kasan_atomics+0x10/0x10 [ 20.810205] ? __pfx_read_tsc+0x10/0x10 [ 20.810247] ? ktime_get_ts64+0x86/0x230 [ 20.810310] kunit_try_run_case+0x1a5/0x480 [ 20.810350] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.810388] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.810432] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.810478] ? __kthread_parkme+0x82/0x180 [ 20.810522] ? preempt_count_sub+0x50/0x80 [ 20.810581] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.810636] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.810722] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.810767] kthread+0x337/0x6f0 [ 20.810808] ? trace_preempt_on+0x20/0xc0 [ 20.810855] ? __pfx_kthread+0x10/0x10 [ 20.810903] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.810952] ? calculate_sigpending+0x7b/0xa0 [ 20.811017] ? __pfx_kthread+0x10/0x10 [ 20.811072] ret_from_fork+0x116/0x1d0 [ 20.811116] ? __pfx_kthread+0x10/0x10 [ 20.811166] ret_from_fork_asm+0x1a/0x30 [ 20.811230] </TASK> [ 20.811255] [ 20.821499] Allocated by task 282: [ 20.821785] kasan_save_stack+0x45/0x70 [ 20.822480] kasan_save_track+0x18/0x40 [ 20.822811] kasan_save_alloc_info+0x3b/0x50 [ 20.823037] __kasan_kmalloc+0xb7/0xc0 [ 20.823230] __kmalloc_cache_noprof+0x189/0x420 [ 20.823453] kasan_atomics+0x95/0x310 [ 20.824023] kunit_try_run_case+0x1a5/0x480 [ 20.824436] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.824911] kthread+0x337/0x6f0 [ 20.825211] ret_from_fork+0x116/0x1d0 [ 20.825549] ret_from_fork_asm+0x1a/0x30 [ 20.825922] [ 20.826103] The buggy address belongs to the object at ffff888102b66500 [ 20.826103] which belongs to the cache kmalloc-64 of size 64 [ 20.826798] The buggy address is located 0 bytes to the right of [ 20.826798] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 20.827694] [ 20.827860] The buggy address belongs to the physical page: [ 20.828144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 20.828696] flags: 0x200000000000000(node=0|zone=2) [ 20.829022] page_type: f5(slab) [ 20.829306] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.829641] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.829958] page dumped because: kasan: bad access detected [ 20.830179] [ 20.830310] Memory state around the buggy address: [ 20.830719] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.831279] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.831841] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.832367] ^ [ 20.832632] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.832947] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.833217] ================================================================== [ 20.945558] ================================================================== [ 20.947544] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 20.948035] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282 [ 20.948351] [ 20.948515] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 20.948627] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.948658] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.948706] Call Trace: [ 20.948748] <TASK> [ 20.948793] dump_stack_lvl+0x73/0xb0 [ 20.948857] print_report+0xd1/0x650 [ 20.950626] ? __virt_addr_valid+0x1db/0x2d0 [ 20.950668] ? kasan_atomics_helper+0x1467/0x5450 [ 20.950707] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.950743] ? kasan_atomics_helper+0x1467/0x5450 [ 20.950778] kasan_report+0x141/0x180 [ 20.950818] ? kasan_atomics_helper+0x1467/0x5450 [ 20.950926] kasan_check_range+0x10c/0x1c0 [ 20.951022] __kasan_check_write+0x18/0x20 [ 20.951069] kasan_atomics_helper+0x1467/0x5450 [ 20.951113] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.951151] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.951186] ? kasan_atomics+0x152/0x310 [ 20.951230] kasan_atomics+0x1dc/0x310 [ 20.951299] ? __pfx_kasan_atomics+0x10/0x10 [ 20.951341] ? __pfx_read_tsc+0x10/0x10 [ 20.951375] ? ktime_get_ts64+0x86/0x230 [ 20.951416] kunit_try_run_case+0x1a5/0x480 [ 20.951458] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.951499] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.951540] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.951579] ? __kthread_parkme+0x82/0x180 [ 20.951615] ? preempt_count_sub+0x50/0x80 [ 20.951669] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.951715] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.951755] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.951796] kthread+0x337/0x6f0 [ 20.951832] ? trace_preempt_on+0x20/0xc0 [ 20.951874] ? __pfx_kthread+0x10/0x10 [ 20.951915] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.951952] ? calculate_sigpending+0x7b/0xa0 [ 20.952001] ? __pfx_kthread+0x10/0x10 [ 20.952042] ret_from_fork+0x116/0x1d0 [ 20.952074] ? __pfx_kthread+0x10/0x10 [ 20.952111] ret_from_fork_asm+0x1a/0x30 [ 20.952170] </TASK> [ 20.952192] [ 20.966478] Allocated by task 282: [ 20.966867] kasan_save_stack+0x45/0x70 [ 20.967126] kasan_save_track+0x18/0x40 [ 20.967329] kasan_save_alloc_info+0x3b/0x50 [ 20.967767] __kasan_kmalloc+0xb7/0xc0 [ 20.968237] __kmalloc_cache_noprof+0x189/0x420 [ 20.968741] kasan_atomics+0x95/0x310 [ 20.969077] kunit_try_run_case+0x1a5/0x480 [ 20.969350] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.969922] kthread+0x337/0x6f0 [ 20.970117] ret_from_fork+0x116/0x1d0 [ 20.970355] ret_from_fork_asm+0x1a/0x30 [ 20.970831] [ 20.971058] The buggy address belongs to the object at ffff888102b66500 [ 20.971058] which belongs to the cache kmalloc-64 of size 64 [ 20.971932] The buggy address is located 0 bytes to the right of [ 20.971932] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 20.972966] [ 20.973209] The buggy address belongs to the physical page: [ 20.973475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 20.974160] flags: 0x200000000000000(node=0|zone=2) [ 20.974613] page_type: f5(slab) [ 20.975038] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.975496] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.975966] page dumped because: kasan: bad access detected [ 20.976518] [ 20.976738] Memory state around the buggy address: [ 20.977168] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.977652] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.978083] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.978633] ^ [ 20.979084] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.979528] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.980101] ================================================================== [ 20.467362] ================================================================== [ 20.468600] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 20.468989] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282 [ 20.469819] [ 20.470124] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 20.470250] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.470296] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.470347] Call Trace: [ 20.470393] <TASK> [ 20.470437] dump_stack_lvl+0x73/0xb0 [ 20.470508] print_report+0xd1/0x650 [ 20.470562] ? __virt_addr_valid+0x1db/0x2d0 [ 20.470615] ? kasan_atomics_helper+0xd47/0x5450 [ 20.470671] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.470723] ? kasan_atomics_helper+0xd47/0x5450 [ 20.470775] kasan_report+0x141/0x180 [ 20.470828] ? kasan_atomics_helper+0xd47/0x5450 [ 20.470889] kasan_check_range+0x10c/0x1c0 [ 20.470945] __kasan_check_write+0x18/0x20 [ 20.470998] kasan_atomics_helper+0xd47/0x5450 [ 20.471054] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.471107] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.471154] ? kasan_atomics+0x152/0x310 [ 20.471201] kasan_atomics+0x1dc/0x310 [ 20.471232] ? __pfx_kasan_atomics+0x10/0x10 [ 20.471282] ? __pfx_read_tsc+0x10/0x10 [ 20.471312] ? ktime_get_ts64+0x86/0x230 [ 20.471345] kunit_try_run_case+0x1a5/0x480 [ 20.471388] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.471431] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.471475] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.471516] ? __kthread_parkme+0x82/0x180 [ 20.471609] ? preempt_count_sub+0x50/0x80 [ 20.471675] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.471745] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.471794] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.471859] kthread+0x337/0x6f0 [ 20.471912] ? trace_preempt_on+0x20/0xc0 [ 20.471968] ? __pfx_kthread+0x10/0x10 [ 20.472003] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.472028] ? calculate_sigpending+0x7b/0xa0 [ 20.472056] ? __pfx_kthread+0x10/0x10 [ 20.472081] ret_from_fork+0x116/0x1d0 [ 20.472103] ? __pfx_kthread+0x10/0x10 [ 20.472127] ret_from_fork_asm+0x1a/0x30 [ 20.472161] </TASK> [ 20.472175] [ 20.484800] Allocated by task 282: [ 20.485167] kasan_save_stack+0x45/0x70 [ 20.485548] kasan_save_track+0x18/0x40 [ 20.485930] kasan_save_alloc_info+0x3b/0x50 [ 20.486360] __kasan_kmalloc+0xb7/0xc0 [ 20.486773] __kmalloc_cache_noprof+0x189/0x420 [ 20.487250] kasan_atomics+0x95/0x310 [ 20.487649] kunit_try_run_case+0x1a5/0x480 [ 20.488079] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.488469] kthread+0x337/0x6f0 [ 20.488580] ret_from_fork+0x116/0x1d0 [ 20.488726] ret_from_fork_asm+0x1a/0x30 [ 20.489029] [ 20.489272] The buggy address belongs to the object at ffff888102b66500 [ 20.489272] which belongs to the cache kmalloc-64 of size 64 [ 20.489763] The buggy address is located 0 bytes to the right of [ 20.489763] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 20.490422] [ 20.490637] The buggy address belongs to the physical page: [ 20.491191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 20.491663] flags: 0x200000000000000(node=0|zone=2) [ 20.491998] page_type: f5(slab) [ 20.492301] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.492783] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.493113] page dumped because: kasan: bad access detected [ 20.493432] [ 20.493597] Memory state around the buggy address: [ 20.494104] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.494416] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.494949] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.495335] ^ [ 20.495732] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.496454] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.496807] ================================================================== [ 20.057415] ================================================================== [ 20.057889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 20.058444] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282 [ 20.058900] [ 20.059079] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 20.059187] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.059216] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.059307] Call Trace: [ 20.059348] <TASK> [ 20.059384] dump_stack_lvl+0x73/0xb0 [ 20.059441] print_report+0xd1/0x650 [ 20.059480] ? __virt_addr_valid+0x1db/0x2d0 [ 20.059519] ? kasan_atomics_helper+0x5fe/0x5450 [ 20.059556] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.059599] ? kasan_atomics_helper+0x5fe/0x5450 [ 20.059645] kasan_report+0x141/0x180 [ 20.059772] ? kasan_atomics_helper+0x5fe/0x5450 [ 20.059826] kasan_check_range+0x10c/0x1c0 [ 20.059877] __kasan_check_write+0x18/0x20 [ 20.059925] kasan_atomics_helper+0x5fe/0x5450 [ 20.059976] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.060024] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.060138] ? kasan_atomics+0x152/0x310 [ 20.060195] kasan_atomics+0x1dc/0x310 [ 20.060246] ? __pfx_kasan_atomics+0x10/0x10 [ 20.060314] ? __pfx_read_tsc+0x10/0x10 [ 20.060359] ? ktime_get_ts64+0x86/0x230 [ 20.060453] kunit_try_run_case+0x1a5/0x480 [ 20.060507] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.060558] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.060634] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.060698] ? __kthread_parkme+0x82/0x180 [ 20.060749] ? preempt_count_sub+0x50/0x80 [ 20.060828] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.060906] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.060952] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.060994] kthread+0x337/0x6f0 [ 20.061045] ? trace_preempt_on+0x20/0xc0 [ 20.061148] ? __pfx_kthread+0x10/0x10 [ 20.061193] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.061242] ? calculate_sigpending+0x7b/0xa0 [ 20.061304] ? __pfx_kthread+0x10/0x10 [ 20.061342] ret_from_fork+0x116/0x1d0 [ 20.061377] ? __pfx_kthread+0x10/0x10 [ 20.061414] ret_from_fork_asm+0x1a/0x30 [ 20.061466] </TASK> [ 20.061489] [ 20.073188] Allocated by task 282: [ 20.073481] kasan_save_stack+0x45/0x70 [ 20.073783] kasan_save_track+0x18/0x40 [ 20.074195] kasan_save_alloc_info+0x3b/0x50 [ 20.074576] __kasan_kmalloc+0xb7/0xc0 [ 20.074907] __kmalloc_cache_noprof+0x189/0x420 [ 20.075268] kasan_atomics+0x95/0x310 [ 20.075674] kunit_try_run_case+0x1a5/0x480 [ 20.076179] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.076390] kthread+0x337/0x6f0 [ 20.076537] ret_from_fork+0x116/0x1d0 [ 20.076752] ret_from_fork_asm+0x1a/0x30 [ 20.077138] [ 20.077334] The buggy address belongs to the object at ffff888102b66500 [ 20.077334] which belongs to the cache kmalloc-64 of size 64 [ 20.078217] The buggy address is located 0 bytes to the right of [ 20.078217] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 20.078881] [ 20.079023] The buggy address belongs to the physical page: [ 20.079446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 20.080212] flags: 0x200000000000000(node=0|zone=2) [ 20.080522] page_type: f5(slab) [ 20.080740] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.081377] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.081971] page dumped because: kasan: bad access detected [ 20.082391] [ 20.082498] Memory state around the buggy address: [ 20.082945] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.083458] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.083689] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.084287] ^ [ 20.084675] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.085131] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.085477] ================================================================== [ 20.526783] ================================================================== [ 20.527376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 20.528020] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282 [ 20.528329] [ 20.528494] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 20.528605] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.528636] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.528686] Call Trace: [ 20.528731] <TASK> [ 20.528773] dump_stack_lvl+0x73/0xb0 [ 20.528838] print_report+0xd1/0x650 [ 20.528892] ? __virt_addr_valid+0x1db/0x2d0 [ 20.528933] ? kasan_atomics_helper+0xe78/0x5450 [ 20.528967] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.529001] ? kasan_atomics_helper+0xe78/0x5450 [ 20.529035] kasan_report+0x141/0x180 [ 20.529070] ? kasan_atomics_helper+0xe78/0x5450 [ 20.529110] kasan_check_range+0x10c/0x1c0 [ 20.529147] __kasan_check_write+0x18/0x20 [ 20.529177] kasan_atomics_helper+0xe78/0x5450 [ 20.529211] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.529246] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.529298] ? kasan_atomics+0x152/0x310 [ 20.529338] kasan_atomics+0x1dc/0x310 [ 20.529374] ? __pfx_kasan_atomics+0x10/0x10 [ 20.529411] ? __pfx_read_tsc+0x10/0x10 [ 20.529445] ? ktime_get_ts64+0x86/0x230 [ 20.529483] kunit_try_run_case+0x1a5/0x480 [ 20.529522] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.529556] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.529591] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.529624] ? __kthread_parkme+0x82/0x180 [ 20.529662] ? preempt_count_sub+0x50/0x80 [ 20.529701] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.529859] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.529907] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.529955] kthread+0x337/0x6f0 [ 20.530030] ? trace_preempt_on+0x20/0xc0 [ 20.530086] ? __pfx_kthread+0x10/0x10 [ 20.530131] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.530193] ? calculate_sigpending+0x7b/0xa0 [ 20.530270] ? __pfx_kthread+0x10/0x10 [ 20.530337] ret_from_fork+0x116/0x1d0 [ 20.530384] ? __pfx_kthread+0x10/0x10 [ 20.530443] ret_from_fork_asm+0x1a/0x30 [ 20.530524] </TASK> [ 20.530565] [ 20.542115] Allocated by task 282: [ 20.542587] kasan_save_stack+0x45/0x70 [ 20.543028] kasan_save_track+0x18/0x40 [ 20.543355] kasan_save_alloc_info+0x3b/0x50 [ 20.543757] __kasan_kmalloc+0xb7/0xc0 [ 20.544097] __kmalloc_cache_noprof+0x189/0x420 [ 20.544502] kasan_atomics+0x95/0x310 [ 20.544878] kunit_try_run_case+0x1a5/0x480 [ 20.545114] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.545499] kthread+0x337/0x6f0 [ 20.545684] ret_from_fork+0x116/0x1d0 [ 20.545877] ret_from_fork_asm+0x1a/0x30 [ 20.546079] [ 20.546295] The buggy address belongs to the object at ffff888102b66500 [ 20.546295] which belongs to the cache kmalloc-64 of size 64 [ 20.547183] The buggy address is located 0 bytes to the right of [ 20.547183] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 20.547917] [ 20.548068] The buggy address belongs to the physical page: [ 20.548335] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 20.548690] flags: 0x200000000000000(node=0|zone=2) [ 20.548959] page_type: f5(slab) [ 20.549179] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.549885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.550496] page dumped because: kasan: bad access detected [ 20.550942] [ 20.551137] Memory state around the buggy address: [ 20.551553] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.552108] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.553755] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.554345] ^ [ 20.555610] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.556573] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.557497] ================================================================== [ 19.955275] ================================================================== [ 19.955793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 19.956939] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282 [ 19.957739] [ 19.958079] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 19.958182] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.958204] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.958248] Call Trace: [ 19.958285] <TASK> [ 19.958323] dump_stack_lvl+0x73/0xb0 [ 19.958392] print_report+0xd1/0x650 [ 19.958446] ? __virt_addr_valid+0x1db/0x2d0 [ 19.958494] ? kasan_atomics_helper+0x4a0/0x5450 [ 19.958545] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.958594] ? kasan_atomics_helper+0x4a0/0x5450 [ 19.958631] kasan_report+0x141/0x180 [ 19.958703] ? kasan_atomics_helper+0x4a0/0x5450 [ 19.958748] kasan_check_range+0x10c/0x1c0 [ 19.958790] __kasan_check_write+0x18/0x20 [ 19.958826] kasan_atomics_helper+0x4a0/0x5450 [ 19.958868] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.958907] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.958948] ? kasan_atomics+0x152/0x310 [ 19.959007] kasan_atomics+0x1dc/0x310 [ 19.959096] ? __pfx_kasan_atomics+0x10/0x10 [ 19.959148] ? __pfx_read_tsc+0x10/0x10 [ 19.959191] ? ktime_get_ts64+0x86/0x230 [ 19.959246] kunit_try_run_case+0x1a5/0x480 [ 19.959314] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.959365] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.959408] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.959447] ? __kthread_parkme+0x82/0x180 [ 19.959483] ? preempt_count_sub+0x50/0x80 [ 19.959526] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.959571] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.959610] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.959650] kthread+0x337/0x6f0 [ 19.959773] ? trace_preempt_on+0x20/0xc0 [ 19.959836] ? __pfx_kthread+0x10/0x10 [ 19.959879] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.959927] ? calculate_sigpending+0x7b/0xa0 [ 19.959980] ? __pfx_kthread+0x10/0x10 [ 19.960030] ret_from_fork+0x116/0x1d0 [ 19.960109] ? __pfx_kthread+0x10/0x10 [ 19.960147] ret_from_fork_asm+0x1a/0x30 [ 19.960199] </TASK> [ 19.960222] [ 19.974097] Allocated by task 282: [ 19.974366] kasan_save_stack+0x45/0x70 [ 19.975068] kasan_save_track+0x18/0x40 [ 19.975420] kasan_save_alloc_info+0x3b/0x50 [ 19.975583] __kasan_kmalloc+0xb7/0xc0 [ 19.975773] __kmalloc_cache_noprof+0x189/0x420 [ 19.976177] kasan_atomics+0x95/0x310 [ 19.976528] kunit_try_run_case+0x1a5/0x480 [ 19.977044] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.977427] kthread+0x337/0x6f0 [ 19.977618] ret_from_fork+0x116/0x1d0 [ 19.977836] ret_from_fork_asm+0x1a/0x30 [ 19.978025] [ 19.978145] The buggy address belongs to the object at ffff888102b66500 [ 19.978145] which belongs to the cache kmalloc-64 of size 64 [ 19.978961] The buggy address is located 0 bytes to the right of [ 19.978961] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 19.980254] [ 19.980537] The buggy address belongs to the physical page: [ 19.981019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 19.981864] flags: 0x200000000000000(node=0|zone=2) [ 19.982317] page_type: f5(slab) [ 19.982747] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.983185] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.983484] page dumped because: kasan: bad access detected [ 19.983745] [ 19.983867] Memory state around the buggy address: [ 19.984110] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.984643] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.985157] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.985766] ^ [ 19.986157] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.987022] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.987560] ================================================================== [ 20.981316] ================================================================== [ 20.982006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 20.982793] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282 [ 20.983146] [ 20.983881] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 20.984014] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.984046] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.984095] Call Trace: [ 20.984128] <TASK> [ 20.984155] dump_stack_lvl+0x73/0xb0 [ 20.984196] print_report+0xd1/0x650 [ 20.984223] ? __virt_addr_valid+0x1db/0x2d0 [ 20.984251] ? kasan_atomics_helper+0x50d4/0x5450 [ 20.984302] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.984328] ? kasan_atomics_helper+0x50d4/0x5450 [ 20.984354] kasan_report+0x141/0x180 [ 20.984380] ? kasan_atomics_helper+0x50d4/0x5450 [ 20.984409] __asan_report_store8_noabort+0x1b/0x30 [ 20.984433] kasan_atomics_helper+0x50d4/0x5450 [ 20.984459] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.984484] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.984509] ? kasan_atomics+0x152/0x310 [ 20.984539] kasan_atomics+0x1dc/0x310 [ 20.984566] ? __pfx_kasan_atomics+0x10/0x10 [ 20.984593] ? __pfx_read_tsc+0x10/0x10 [ 20.984618] ? ktime_get_ts64+0x86/0x230 [ 20.984650] kunit_try_run_case+0x1a5/0x480 [ 20.984707] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.984735] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.984761] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.984786] ? __kthread_parkme+0x82/0x180 [ 20.984810] ? preempt_count_sub+0x50/0x80 [ 20.984835] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.984862] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.984888] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.984914] kthread+0x337/0x6f0 [ 20.984936] ? trace_preempt_on+0x20/0xc0 [ 20.984964] ? __pfx_kthread+0x10/0x10 [ 20.984987] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.985010] ? calculate_sigpending+0x7b/0xa0 [ 20.985038] ? __pfx_kthread+0x10/0x10 [ 20.985062] ret_from_fork+0x116/0x1d0 [ 20.985083] ? __pfx_kthread+0x10/0x10 [ 20.985106] ret_from_fork_asm+0x1a/0x30 [ 20.985140] </TASK> [ 20.985155] [ 20.998781] Allocated by task 282: [ 20.999017] kasan_save_stack+0x45/0x70 [ 20.999209] kasan_save_track+0x18/0x40 [ 20.999444] kasan_save_alloc_info+0x3b/0x50 [ 21.000333] __kasan_kmalloc+0xb7/0xc0 [ 21.000581] __kmalloc_cache_noprof+0x189/0x420 [ 21.000794] kasan_atomics+0x95/0x310 [ 21.000988] kunit_try_run_case+0x1a5/0x480 [ 21.001899] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.002369] kthread+0x337/0x6f0 [ 21.002632] ret_from_fork+0x116/0x1d0 [ 21.002863] ret_from_fork_asm+0x1a/0x30 [ 21.003224] [ 21.003369] The buggy address belongs to the object at ffff888102b66500 [ 21.003369] which belongs to the cache kmalloc-64 of size 64 [ 21.004028] The buggy address is located 0 bytes to the right of [ 21.004028] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 21.004641] [ 21.004810] The buggy address belongs to the physical page: [ 21.005041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 21.005682] flags: 0x200000000000000(node=0|zone=2) [ 21.006103] page_type: f5(slab) [ 21.006453] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.007095] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.007447] page dumped because: kasan: bad access detected [ 21.007946] [ 21.008084] Memory state around the buggy address: [ 21.008374] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.008880] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.009319] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.009734] ^ [ 21.010081] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.010577] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.011038] ================================================================== [ 19.878475] ================================================================== [ 19.878893] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 19.879250] Read of size 4 at addr ffff888102b66530 by task kunit_try_catch/282 [ 19.880140] [ 19.880387] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 19.880523] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.880549] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.880595] Call Trace: [ 19.880637] <TASK> [ 19.880720] dump_stack_lvl+0x73/0xb0 [ 19.880827] print_report+0xd1/0x650 [ 19.880886] ? __virt_addr_valid+0x1db/0x2d0 [ 19.880943] ? kasan_atomics_helper+0x3df/0x5450 [ 19.880994] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.881072] ? kasan_atomics_helper+0x3df/0x5450 [ 19.881127] kasan_report+0x141/0x180 [ 19.881180] ? kasan_atomics_helper+0x3df/0x5450 [ 19.881241] kasan_check_range+0x10c/0x1c0 [ 19.881308] __kasan_check_read+0x15/0x20 [ 19.881357] kasan_atomics_helper+0x3df/0x5450 [ 19.881411] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.881465] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.881518] ? kasan_atomics+0x152/0x310 [ 19.881577] kasan_atomics+0x1dc/0x310 [ 19.881628] ? __pfx_kasan_atomics+0x10/0x10 [ 19.881706] ? __pfx_read_tsc+0x10/0x10 [ 19.881750] ? ktime_get_ts64+0x86/0x230 [ 19.881857] kunit_try_run_case+0x1a5/0x480 [ 19.881918] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.881970] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.882023] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.882075] ? __kthread_parkme+0x82/0x180 [ 19.882123] ? preempt_count_sub+0x50/0x80 [ 19.882179] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.882233] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.882296] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.882356] kthread+0x337/0x6f0 [ 19.882402] ? trace_preempt_on+0x20/0xc0 [ 19.882458] ? __pfx_kthread+0x10/0x10 [ 19.882505] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.882549] ? calculate_sigpending+0x7b/0xa0 [ 19.882602] ? __pfx_kthread+0x10/0x10 [ 19.882680] ret_from_fork+0x116/0x1d0 [ 19.882730] ? __pfx_kthread+0x10/0x10 [ 19.882781] ret_from_fork_asm+0x1a/0x30 [ 19.882853] </TASK> [ 19.882882] [ 19.896211] Allocated by task 282: [ 19.899936] kasan_save_stack+0x45/0x70 [ 19.900521] kasan_save_track+0x18/0x40 [ 19.900844] kasan_save_alloc_info+0x3b/0x50 [ 19.901430] __kasan_kmalloc+0xb7/0xc0 [ 19.902016] __kmalloc_cache_noprof+0x189/0x420 [ 19.902729] kasan_atomics+0x95/0x310 [ 19.903066] kunit_try_run_case+0x1a5/0x480 [ 19.903925] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.904582] kthread+0x337/0x6f0 [ 19.905043] ret_from_fork+0x116/0x1d0 [ 19.905739] ret_from_fork_asm+0x1a/0x30 [ 19.905956] [ 19.906151] The buggy address belongs to the object at ffff888102b66500 [ 19.906151] which belongs to the cache kmalloc-64 of size 64 [ 19.907011] The buggy address is located 0 bytes to the right of [ 19.907011] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 19.909098] [ 19.909235] The buggy address belongs to the physical page: [ 19.909561] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 19.910333] flags: 0x200000000000000(node=0|zone=2) [ 19.910582] page_type: f5(slab) [ 19.910913] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.911828] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.912713] page dumped because: kasan: bad access detected [ 19.912948] [ 19.913345] Memory state around the buggy address: [ 19.914179] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.914665] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.915082] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.915789] ^ [ 19.916379] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.916647] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.917065] ================================================================== [ 21.041913] ================================================================== [ 21.042563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 21.043189] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282 [ 21.043686] [ 21.043947] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 21.044043] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.044065] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.044102] Call Trace: [ 21.044139] <TASK> [ 21.044178] dump_stack_lvl+0x73/0xb0 [ 21.044244] print_report+0xd1/0x650 [ 21.044308] ? __virt_addr_valid+0x1db/0x2d0 [ 21.044338] ? kasan_atomics_helper+0x15b6/0x5450 [ 21.044363] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.044388] ? kasan_atomics_helper+0x15b6/0x5450 [ 21.044414] kasan_report+0x141/0x180 [ 21.044439] ? kasan_atomics_helper+0x15b6/0x5450 [ 21.044468] kasan_check_range+0x10c/0x1c0 [ 21.044495] __kasan_check_write+0x18/0x20 [ 21.044517] kasan_atomics_helper+0x15b6/0x5450 [ 21.044544] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.044569] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.044594] ? kasan_atomics+0x152/0x310 [ 21.044623] kasan_atomics+0x1dc/0x310 [ 21.044649] ? __pfx_kasan_atomics+0x10/0x10 [ 21.044688] ? __pfx_read_tsc+0x10/0x10 [ 21.044713] ? ktime_get_ts64+0x86/0x230 [ 21.044739] kunit_try_run_case+0x1a5/0x480 [ 21.044768] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.044793] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.044819] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.044844] ? __kthread_parkme+0x82/0x180 [ 21.044867] ? preempt_count_sub+0x50/0x80 [ 21.044893] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.044919] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.044945] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.044971] kthread+0x337/0x6f0 [ 21.044992] ? trace_preempt_on+0x20/0xc0 [ 21.045020] ? __pfx_kthread+0x10/0x10 [ 21.045043] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.045066] ? calculate_sigpending+0x7b/0xa0 [ 21.045093] ? __pfx_kthread+0x10/0x10 [ 21.045116] ret_from_fork+0x116/0x1d0 [ 21.045137] ? __pfx_kthread+0x10/0x10 [ 21.045160] ret_from_fork_asm+0x1a/0x30 [ 21.045193] </TASK> [ 21.045207] [ 21.057183] Allocated by task 282: [ 21.057584] kasan_save_stack+0x45/0x70 [ 21.057897] kasan_save_track+0x18/0x40 [ 21.058098] kasan_save_alloc_info+0x3b/0x50 [ 21.058306] __kasan_kmalloc+0xb7/0xc0 [ 21.058716] __kmalloc_cache_noprof+0x189/0x420 [ 21.059114] kasan_atomics+0x95/0x310 [ 21.059555] kunit_try_run_case+0x1a5/0x480 [ 21.059998] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.060474] kthread+0x337/0x6f0 [ 21.060780] ret_from_fork+0x116/0x1d0 [ 21.061125] ret_from_fork_asm+0x1a/0x30 [ 21.061478] [ 21.061608] The buggy address belongs to the object at ffff888102b66500 [ 21.061608] which belongs to the cache kmalloc-64 of size 64 [ 21.062060] The buggy address is located 0 bytes to the right of [ 21.062060] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 21.063072] [ 21.063277] The buggy address belongs to the physical page: [ 21.063784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 21.064380] flags: 0x200000000000000(node=0|zone=2) [ 21.064622] page_type: f5(slab) [ 21.064853] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.065364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.065991] page dumped because: kasan: bad access detected [ 21.066508] [ 21.066805] Memory state around the buggy address: [ 21.067204] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.067516] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.067801] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.068071] ^ [ 21.068550] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.069207] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.069810] ================================================================== [ 20.337676] ================================================================== [ 20.338199] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 20.338582] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282 [ 20.339189] [ 20.339448] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 20.339553] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.339584] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.339632] Call Trace: [ 20.339704] <TASK> [ 20.339751] dump_stack_lvl+0x73/0xb0 [ 20.339822] print_report+0xd1/0x650 [ 20.339873] ? __virt_addr_valid+0x1db/0x2d0 [ 20.339921] ? kasan_atomics_helper+0xac7/0x5450 [ 20.339992] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.340037] ? kasan_atomics_helper+0xac7/0x5450 [ 20.340083] kasan_report+0x141/0x180 [ 20.340150] ? kasan_atomics_helper+0xac7/0x5450 [ 20.340201] kasan_check_range+0x10c/0x1c0 [ 20.340248] __kasan_check_write+0x18/0x20 [ 20.340306] kasan_atomics_helper+0xac7/0x5450 [ 20.340373] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.340435] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.340495] ? kasan_atomics+0x152/0x310 [ 20.340547] kasan_atomics+0x1dc/0x310 [ 20.340594] ? __pfx_kasan_atomics+0x10/0x10 [ 20.340649] ? __pfx_read_tsc+0x10/0x10 [ 20.340729] ? ktime_get_ts64+0x86/0x230 [ 20.340782] kunit_try_run_case+0x1a5/0x480 [ 20.340832] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.340882] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.340935] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.340988] ? __kthread_parkme+0x82/0x180 [ 20.341038] ? preempt_count_sub+0x50/0x80 [ 20.341088] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.341133] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.341183] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.341266] kthread+0x337/0x6f0 [ 20.341312] ? trace_preempt_on+0x20/0xc0 [ 20.341362] ? __pfx_kthread+0x10/0x10 [ 20.341409] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.341452] ? calculate_sigpending+0x7b/0xa0 [ 20.341522] ? __pfx_kthread+0x10/0x10 [ 20.341572] ret_from_fork+0x116/0x1d0 [ 20.341610] ? __pfx_kthread+0x10/0x10 [ 20.341683] ret_from_fork_asm+0x1a/0x30 [ 20.341751] </TASK> [ 20.341769] [ 20.352179] Allocated by task 282: [ 20.352518] kasan_save_stack+0x45/0x70 [ 20.352927] kasan_save_track+0x18/0x40 [ 20.353282] kasan_save_alloc_info+0x3b/0x50 [ 20.353645] __kasan_kmalloc+0xb7/0xc0 [ 20.354005] __kmalloc_cache_noprof+0x189/0x420 [ 20.354380] kasan_atomics+0x95/0x310 [ 20.354765] kunit_try_run_case+0x1a5/0x480 [ 20.355089] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.355440] kthread+0x337/0x6f0 [ 20.355625] ret_from_fork+0x116/0x1d0 [ 20.356013] ret_from_fork_asm+0x1a/0x30 [ 20.356379] [ 20.356563] The buggy address belongs to the object at ffff888102b66500 [ 20.356563] which belongs to the cache kmalloc-64 of size 64 [ 20.357210] The buggy address is located 0 bytes to the right of [ 20.357210] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 20.357728] [ 20.357878] The buggy address belongs to the physical page: [ 20.358147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 20.358792] flags: 0x200000000000000(node=0|zone=2) [ 20.359219] page_type: f5(slab) [ 20.359557] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.360157] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.361175] page dumped because: kasan: bad access detected [ 20.361622] [ 20.362667] Memory state around the buggy address: [ 20.363448] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.365808] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.366179] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.366852] ^ [ 20.367278] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.367806] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.368413] ================================================================== [ 21.373026] ================================================================== [ 21.373642] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 21.373992] Read of size 8 at addr ffff888102b66530 by task kunit_try_catch/282 [ 21.374201] [ 21.375347] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 21.375473] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.375505] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.375554] Call Trace: [ 21.375600] <TASK> [ 21.375640] dump_stack_lvl+0x73/0xb0 [ 21.375744] print_report+0xd1/0x650 [ 21.375816] ? __virt_addr_valid+0x1db/0x2d0 [ 21.375871] ? kasan_atomics_helper+0x4f30/0x5450 [ 21.375933] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.375982] ? kasan_atomics_helper+0x4f30/0x5450 [ 21.376025] kasan_report+0x141/0x180 [ 21.376055] ? kasan_atomics_helper+0x4f30/0x5450 [ 21.376085] __asan_report_load8_noabort+0x18/0x20 [ 21.376109] kasan_atomics_helper+0x4f30/0x5450 [ 21.376135] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.376160] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.376185] ? kasan_atomics+0x152/0x310 [ 21.376215] kasan_atomics+0x1dc/0x310 [ 21.376240] ? __pfx_kasan_atomics+0x10/0x10 [ 21.376299] ? __pfx_read_tsc+0x10/0x10 [ 21.376326] ? ktime_get_ts64+0x86/0x230 [ 21.376353] kunit_try_run_case+0x1a5/0x480 [ 21.376382] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.376406] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.376433] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.376457] ? __kthread_parkme+0x82/0x180 [ 21.376481] ? preempt_count_sub+0x50/0x80 [ 21.376508] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.376534] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.376559] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.376586] kthread+0x337/0x6f0 [ 21.376608] ? trace_preempt_on+0x20/0xc0 [ 21.376634] ? __pfx_kthread+0x10/0x10 [ 21.376664] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.376716] ? calculate_sigpending+0x7b/0xa0 [ 21.376746] ? __pfx_kthread+0x10/0x10 [ 21.376771] ret_from_fork+0x116/0x1d0 [ 21.376793] ? __pfx_kthread+0x10/0x10 [ 21.376816] ret_from_fork_asm+0x1a/0x30 [ 21.376850] </TASK> [ 21.376864] [ 21.390336] Allocated by task 282: [ 21.390862] kasan_save_stack+0x45/0x70 [ 21.391131] kasan_save_track+0x18/0x40 [ 21.391432] kasan_save_alloc_info+0x3b/0x50 [ 21.392056] __kasan_kmalloc+0xb7/0xc0 [ 21.392294] __kmalloc_cache_noprof+0x189/0x420 [ 21.392469] kasan_atomics+0x95/0x310 [ 21.393076] kunit_try_run_case+0x1a5/0x480 [ 21.393485] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.394098] kthread+0x337/0x6f0 [ 21.394567] ret_from_fork+0x116/0x1d0 [ 21.394916] ret_from_fork_asm+0x1a/0x30 [ 21.395198] [ 21.395331] The buggy address belongs to the object at ffff888102b66500 [ 21.395331] which belongs to the cache kmalloc-64 of size 64 [ 21.396340] The buggy address is located 0 bytes to the right of [ 21.396340] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 21.397214] [ 21.397473] The buggy address belongs to the physical page: [ 21.397942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 21.398332] flags: 0x200000000000000(node=0|zone=2) [ 21.398762] page_type: f5(slab) [ 21.398982] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.399464] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.399883] page dumped because: kasan: bad access detected [ 21.400312] [ 21.400506] Memory state around the buggy address: [ 21.400845] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.401398] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.401948] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.402451] ^ [ 21.402726] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.403201] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.403714] ================================================================== [ 20.593493] ================================================================== [ 20.593801] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 20.594054] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282 [ 20.594239] [ 20.594355] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 20.594417] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.594432] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.594460] Call Trace: [ 20.594484] <TASK> [ 20.594509] dump_stack_lvl+0x73/0xb0 [ 20.594543] print_report+0xd1/0x650 [ 20.594568] ? __virt_addr_valid+0x1db/0x2d0 [ 20.594595] ? kasan_atomics_helper+0xfa9/0x5450 [ 20.594618] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.594643] ? kasan_atomics_helper+0xfa9/0x5450 [ 20.594667] kasan_report+0x141/0x180 [ 20.594692] ? kasan_atomics_helper+0xfa9/0x5450 [ 20.594721] kasan_check_range+0x10c/0x1c0 [ 20.594747] __kasan_check_write+0x18/0x20 [ 20.594769] kasan_atomics_helper+0xfa9/0x5450 [ 20.594794] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.594818] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.594843] ? kasan_atomics+0x152/0x310 [ 20.594873] kasan_atomics+0x1dc/0x310 [ 20.594899] ? __pfx_kasan_atomics+0x10/0x10 [ 20.594925] ? __pfx_read_tsc+0x10/0x10 [ 20.594949] ? ktime_get_ts64+0x86/0x230 [ 20.594977] kunit_try_run_case+0x1a5/0x480 [ 20.595022] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.595048] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.595073] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.595098] ? __kthread_parkme+0x82/0x180 [ 20.595121] ? preempt_count_sub+0x50/0x80 [ 20.595147] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.595173] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.595199] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.595225] kthread+0x337/0x6f0 [ 20.595247] ? trace_preempt_on+0x20/0xc0 [ 20.595520] ? __pfx_kthread+0x10/0x10 [ 20.595565] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.595609] ? calculate_sigpending+0x7b/0xa0 [ 20.595660] ? __pfx_kthread+0x10/0x10 [ 20.595706] ret_from_fork+0x116/0x1d0 [ 20.595748] ? __pfx_kthread+0x10/0x10 [ 20.595794] ret_from_fork_asm+0x1a/0x30 [ 20.595857] </TASK> [ 20.595880] [ 20.612226] Allocated by task 282: [ 20.612609] kasan_save_stack+0x45/0x70 [ 20.613220] kasan_save_track+0x18/0x40 [ 20.613412] kasan_save_alloc_info+0x3b/0x50 [ 20.613942] __kasan_kmalloc+0xb7/0xc0 [ 20.614179] __kmalloc_cache_noprof+0x189/0x420 [ 20.614558] kasan_atomics+0x95/0x310 [ 20.615250] kunit_try_run_case+0x1a5/0x480 [ 20.615610] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.616329] kthread+0x337/0x6f0 [ 20.616550] ret_from_fork+0x116/0x1d0 [ 20.617003] ret_from_fork_asm+0x1a/0x30 [ 20.617499] [ 20.617608] The buggy address belongs to the object at ffff888102b66500 [ 20.617608] which belongs to the cache kmalloc-64 of size 64 [ 20.617927] The buggy address is located 0 bytes to the right of [ 20.617927] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 20.619454] [ 20.619628] The buggy address belongs to the physical page: [ 20.620013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 20.620930] flags: 0x200000000000000(node=0|zone=2) [ 20.621363] page_type: f5(slab) [ 20.621718] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.622305] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.622976] page dumped because: kasan: bad access detected [ 20.623315] [ 20.623522] Memory state around the buggy address: [ 20.623898] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.624682] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.625097] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.625631] ^ [ 20.626071] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.626502] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.627033] ================================================================== [ 21.132622] ================================================================== [ 21.133102] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 21.133759] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282 [ 21.134151] [ 21.134333] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 21.134441] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.134495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.134532] Call Trace: [ 21.134570] <TASK> [ 21.134605] dump_stack_lvl+0x73/0xb0 [ 21.134661] print_report+0xd1/0x650 [ 21.134726] ? __virt_addr_valid+0x1db/0x2d0 [ 21.134774] ? kasan_atomics_helper+0x177f/0x5450 [ 21.134840] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.134884] ? kasan_atomics_helper+0x177f/0x5450 [ 21.134920] kasan_report+0x141/0x180 [ 21.134959] ? kasan_atomics_helper+0x177f/0x5450 [ 21.135021] kasan_check_range+0x10c/0x1c0 [ 21.135074] __kasan_check_write+0x18/0x20 [ 21.135121] kasan_atomics_helper+0x177f/0x5450 [ 21.135174] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.135216] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.135252] ? kasan_atomics+0x152/0x310 [ 21.135332] kasan_atomics+0x1dc/0x310 [ 21.135372] ? __pfx_kasan_atomics+0x10/0x10 [ 21.135410] ? __pfx_read_tsc+0x10/0x10 [ 21.135444] ? ktime_get_ts64+0x86/0x230 [ 21.135483] kunit_try_run_case+0x1a5/0x480 [ 21.135520] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.135554] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.135590] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.135626] ? __kthread_parkme+0x82/0x180 [ 21.135661] ? preempt_count_sub+0x50/0x80 [ 21.135699] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.135735] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.135770] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.135806] kthread+0x337/0x6f0 [ 21.135838] ? trace_preempt_on+0x20/0xc0 [ 21.135876] ? __pfx_kthread+0x10/0x10 [ 21.135910] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.135956] ? calculate_sigpending+0x7b/0xa0 [ 21.136003] ? __pfx_kthread+0x10/0x10 [ 21.136046] ret_from_fork+0x116/0x1d0 [ 21.136117] ? __pfx_kthread+0x10/0x10 [ 21.136155] ret_from_fork_asm+0x1a/0x30 [ 21.136213] </TASK> [ 21.136241] [ 21.148098] Allocated by task 282: [ 21.148562] kasan_save_stack+0x45/0x70 [ 21.149078] kasan_save_track+0x18/0x40 [ 21.149578] kasan_save_alloc_info+0x3b/0x50 [ 21.150154] __kasan_kmalloc+0xb7/0xc0 [ 21.150544] __kmalloc_cache_noprof+0x189/0x420 [ 21.151001] kasan_atomics+0x95/0x310 [ 21.151411] kunit_try_run_case+0x1a5/0x480 [ 21.151994] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.152626] kthread+0x337/0x6f0 [ 21.153048] ret_from_fork+0x116/0x1d0 [ 21.153283] ret_from_fork_asm+0x1a/0x30 [ 21.153799] [ 21.153938] The buggy address belongs to the object at ffff888102b66500 [ 21.153938] which belongs to the cache kmalloc-64 of size 64 [ 21.154696] The buggy address is located 0 bytes to the right of [ 21.154696] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 21.155496] [ 21.155738] The buggy address belongs to the physical page: [ 21.156296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 21.156487] flags: 0x200000000000000(node=0|zone=2) [ 21.156610] page_type: f5(slab) [ 21.156811] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.157890] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.158320] page dumped because: kasan: bad access detected [ 21.158690] [ 21.158818] Memory state around the buggy address: [ 21.159202] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.159603] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.160067] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.160621] ^ [ 21.160958] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.161411] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.161914] ================================================================== [ 20.436970] ================================================================== [ 20.437922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 20.438557] Read of size 4 at addr ffff888102b66530 by task kunit_try_catch/282 [ 20.439070] [ 20.439241] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 20.439575] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.439604] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.439810] Call Trace: [ 20.439845] <TASK> [ 20.439875] dump_stack_lvl+0x73/0xb0 [ 20.439923] print_report+0xd1/0x650 [ 20.439950] ? __virt_addr_valid+0x1db/0x2d0 [ 20.439987] ? kasan_atomics_helper+0x4a84/0x5450 [ 20.440025] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.440050] ? kasan_atomics_helper+0x4a84/0x5450 [ 20.440075] kasan_report+0x141/0x180 [ 20.440100] ? kasan_atomics_helper+0x4a84/0x5450 [ 20.440129] __asan_report_load4_noabort+0x18/0x20 [ 20.440152] kasan_atomics_helper+0x4a84/0x5450 [ 20.440178] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.440202] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.440227] ? kasan_atomics+0x152/0x310 [ 20.440366] kasan_atomics+0x1dc/0x310 [ 20.440402] ? __pfx_kasan_atomics+0x10/0x10 [ 20.440431] ? __pfx_read_tsc+0x10/0x10 [ 20.440456] ? ktime_get_ts64+0x86/0x230 [ 20.440484] kunit_try_run_case+0x1a5/0x480 [ 20.440513] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.440537] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.440565] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.440590] ? __kthread_parkme+0x82/0x180 [ 20.440615] ? preempt_count_sub+0x50/0x80 [ 20.440641] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.440676] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.440734] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.440761] kthread+0x337/0x6f0 [ 20.440784] ? trace_preempt_on+0x20/0xc0 [ 20.440811] ? __pfx_kthread+0x10/0x10 [ 20.440834] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.440857] ? calculate_sigpending+0x7b/0xa0 [ 20.440886] ? __pfx_kthread+0x10/0x10 [ 20.440910] ret_from_fork+0x116/0x1d0 [ 20.440930] ? __pfx_kthread+0x10/0x10 [ 20.440954] ret_from_fork_asm+0x1a/0x30 [ 20.440987] </TASK> [ 20.441002] [ 20.453643] Allocated by task 282: [ 20.453859] kasan_save_stack+0x45/0x70 [ 20.454293] kasan_save_track+0x18/0x40 [ 20.454816] kasan_save_alloc_info+0x3b/0x50 [ 20.455211] __kasan_kmalloc+0xb7/0xc0 [ 20.455428] __kmalloc_cache_noprof+0x189/0x420 [ 20.455643] kasan_atomics+0x95/0x310 [ 20.455918] kunit_try_run_case+0x1a5/0x480 [ 20.456340] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.456773] kthread+0x337/0x6f0 [ 20.457084] ret_from_fork+0x116/0x1d0 [ 20.457513] ret_from_fork_asm+0x1a/0x30 [ 20.457974] [ 20.458104] The buggy address belongs to the object at ffff888102b66500 [ 20.458104] which belongs to the cache kmalloc-64 of size 64 [ 20.458537] The buggy address is located 0 bytes to the right of [ 20.458537] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 20.458965] [ 20.459154] The buggy address belongs to the physical page: [ 20.459838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 20.460466] flags: 0x200000000000000(node=0|zone=2) [ 20.460886] page_type: f5(slab) [ 20.461333] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.462000] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.462598] page dumped because: kasan: bad access detected [ 20.463217] [ 20.463357] Memory state around the buggy address: [ 20.463568] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.463844] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.464121] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.464541] ^ [ 20.464933] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.465487] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.466065] ================================================================== [ 21.751761] ================================================================== [ 21.753456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 21.753943] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282 [ 21.754339] [ 21.754570] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 21.754680] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.754709] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.754758] Call Trace: [ 21.754802] <TASK> [ 21.754845] dump_stack_lvl+0x73/0xb0 [ 21.754911] print_report+0xd1/0x650 [ 21.754957] ? __virt_addr_valid+0x1db/0x2d0 [ 21.755012] ? kasan_atomics_helper+0x224c/0x5450 [ 21.755056] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.755103] ? kasan_atomics_helper+0x224c/0x5450 [ 21.755150] kasan_report+0x141/0x180 [ 21.755202] ? kasan_atomics_helper+0x224c/0x5450 [ 21.755274] kasan_check_range+0x10c/0x1c0 [ 21.755333] __kasan_check_write+0x18/0x20 [ 21.755382] kasan_atomics_helper+0x224c/0x5450 [ 21.755436] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.755488] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.755540] ? kasan_atomics+0x152/0x310 [ 21.755589] kasan_atomics+0x1dc/0x310 [ 21.755617] ? __pfx_kasan_atomics+0x10/0x10 [ 21.755646] ? __pfx_read_tsc+0x10/0x10 [ 21.755686] ? ktime_get_ts64+0x86/0x230 [ 21.755742] kunit_try_run_case+0x1a5/0x480 [ 21.755772] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.755798] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.755825] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.755851] ? __kthread_parkme+0x82/0x180 [ 21.755876] ? preempt_count_sub+0x50/0x80 [ 21.755904] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.755932] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.755958] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.755986] kthread+0x337/0x6f0 [ 21.756009] ? trace_preempt_on+0x20/0xc0 [ 21.756036] ? __pfx_kthread+0x10/0x10 [ 21.756060] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.756084] ? calculate_sigpending+0x7b/0xa0 [ 21.756112] ? __pfx_kthread+0x10/0x10 [ 21.756137] ret_from_fork+0x116/0x1d0 [ 21.756159] ? __pfx_kthread+0x10/0x10 [ 21.756182] ret_from_fork_asm+0x1a/0x30 [ 21.756216] </TASK> [ 21.756231] [ 21.766629] Allocated by task 282: [ 21.766985] kasan_save_stack+0x45/0x70 [ 21.767216] kasan_save_track+0x18/0x40 [ 21.767430] kasan_save_alloc_info+0x3b/0x50 [ 21.767638] __kasan_kmalloc+0xb7/0xc0 [ 21.767964] __kmalloc_cache_noprof+0x189/0x420 [ 21.768466] kasan_atomics+0x95/0x310 [ 21.768813] kunit_try_run_case+0x1a5/0x480 [ 21.769176] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.769557] kthread+0x337/0x6f0 [ 21.769864] ret_from_fork+0x116/0x1d0 [ 21.770080] ret_from_fork_asm+0x1a/0x30 [ 21.770352] [ 21.770465] The buggy address belongs to the object at ffff888102b66500 [ 21.770465] which belongs to the cache kmalloc-64 of size 64 [ 21.771268] The buggy address is located 0 bytes to the right of [ 21.771268] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 21.772287] [ 21.772423] The buggy address belongs to the physical page: [ 21.772647] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 21.772956] flags: 0x200000000000000(node=0|zone=2) [ 21.773224] page_type: f5(slab) [ 21.773541] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.774311] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.774738] page dumped because: kasan: bad access detected [ 21.775074] [ 21.775241] Memory state around the buggy address: [ 21.775492] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.776179] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.776535] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.777002] ^ [ 21.777226] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.777507] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.777775] ================================================================== [ 21.013761] ================================================================== [ 21.014204] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 21.014681] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282 [ 21.015020] [ 21.015248] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 21.015398] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.015429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.015477] Call Trace: [ 21.015520] <TASK> [ 21.015579] dump_stack_lvl+0x73/0xb0 [ 21.015648] print_report+0xd1/0x650 [ 21.015698] ? __virt_addr_valid+0x1db/0x2d0 [ 21.015764] ? kasan_atomics_helper+0x151d/0x5450 [ 21.015824] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.015898] ? kasan_atomics_helper+0x151d/0x5450 [ 21.015941] kasan_report+0x141/0x180 [ 21.015990] ? kasan_atomics_helper+0x151d/0x5450 [ 21.016051] kasan_check_range+0x10c/0x1c0 [ 21.016106] __kasan_check_write+0x18/0x20 [ 21.016154] kasan_atomics_helper+0x151d/0x5450 [ 21.016210] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.016274] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.016327] ? kasan_atomics+0x152/0x310 [ 21.016387] kasan_atomics+0x1dc/0x310 [ 21.016431] ? __pfx_kasan_atomics+0x10/0x10 [ 21.016465] ? __pfx_read_tsc+0x10/0x10 [ 21.016491] ? ktime_get_ts64+0x86/0x230 [ 21.016518] kunit_try_run_case+0x1a5/0x480 [ 21.016547] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.016573] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.016599] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.016624] ? __kthread_parkme+0x82/0x180 [ 21.016648] ? preempt_count_sub+0x50/0x80 [ 21.016688] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.016723] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.016749] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.016775] kthread+0x337/0x6f0 [ 21.016797] ? trace_preempt_on+0x20/0xc0 [ 21.016823] ? __pfx_kthread+0x10/0x10 [ 21.016846] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.016869] ? calculate_sigpending+0x7b/0xa0 [ 21.016899] ? __pfx_kthread+0x10/0x10 [ 21.016923] ret_from_fork+0x116/0x1d0 [ 21.016944] ? __pfx_kthread+0x10/0x10 [ 21.016966] ret_from_fork_asm+0x1a/0x30 [ 21.016998] </TASK> [ 21.017013] [ 21.027850] Allocated by task 282: [ 21.028071] kasan_save_stack+0x45/0x70 [ 21.028312] kasan_save_track+0x18/0x40 [ 21.028508] kasan_save_alloc_info+0x3b/0x50 [ 21.028712] __kasan_kmalloc+0xb7/0xc0 [ 21.029088] __kmalloc_cache_noprof+0x189/0x420 [ 21.029487] kasan_atomics+0x95/0x310 [ 21.029862] kunit_try_run_case+0x1a5/0x480 [ 21.030223] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.030511] kthread+0x337/0x6f0 [ 21.030906] ret_from_fork+0x116/0x1d0 [ 21.031147] ret_from_fork_asm+0x1a/0x30 [ 21.031496] [ 21.031749] The buggy address belongs to the object at ffff888102b66500 [ 21.031749] which belongs to the cache kmalloc-64 of size 64 [ 21.032270] The buggy address is located 0 bytes to the right of [ 21.032270] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 21.032982] [ 21.033183] The buggy address belongs to the physical page: [ 21.033703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 21.034370] flags: 0x200000000000000(node=0|zone=2) [ 21.034868] page_type: f5(slab) [ 21.035160] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.035471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.035836] page dumped because: kasan: bad access detected [ 21.036297] [ 21.036500] Memory state around the buggy address: [ 21.036936] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.037555] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.038114] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.038604] ^ [ 21.038858] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.039142] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.039735] ================================================================== [ 20.497902] ================================================================== [ 20.498319] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 20.498902] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282 [ 20.499280] [ 20.499447] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 20.499549] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.499580] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.499630] Call Trace: [ 20.499674] <TASK> [ 20.499714] dump_stack_lvl+0x73/0xb0 [ 20.499777] print_report+0xd1/0x650 [ 20.499875] ? __virt_addr_valid+0x1db/0x2d0 [ 20.499920] ? kasan_atomics_helper+0xde0/0x5450 [ 20.499953] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.499986] ? kasan_atomics_helper+0xde0/0x5450 [ 20.500020] kasan_report+0x141/0x180 [ 20.500054] ? kasan_atomics_helper+0xde0/0x5450 [ 20.500091] kasan_check_range+0x10c/0x1c0 [ 20.500128] __kasan_check_write+0x18/0x20 [ 20.500158] kasan_atomics_helper+0xde0/0x5450 [ 20.500193] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.500227] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.500278] ? kasan_atomics+0x152/0x310 [ 20.500334] kasan_atomics+0x1dc/0x310 [ 20.500385] ? __pfx_kasan_atomics+0x10/0x10 [ 20.500439] ? __pfx_read_tsc+0x10/0x10 [ 20.500481] ? ktime_get_ts64+0x86/0x230 [ 20.500535] kunit_try_run_case+0x1a5/0x480 [ 20.500611] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.500660] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.500735] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.500805] ? __kthread_parkme+0x82/0x180 [ 20.500855] ? preempt_count_sub+0x50/0x80 [ 20.500904] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.500954] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.501011] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.501064] kthread+0x337/0x6f0 [ 20.501110] ? trace_preempt_on+0x20/0xc0 [ 20.501181] ? __pfx_kthread+0x10/0x10 [ 20.501228] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.501286] ? calculate_sigpending+0x7b/0xa0 [ 20.501336] ? __pfx_kthread+0x10/0x10 [ 20.501375] ret_from_fork+0x116/0x1d0 [ 20.501414] ? __pfx_kthread+0x10/0x10 [ 20.501460] ret_from_fork_asm+0x1a/0x30 [ 20.501546] </TASK> [ 20.501575] [ 20.512825] Allocated by task 282: [ 20.513181] kasan_save_stack+0x45/0x70 [ 20.513572] kasan_save_track+0x18/0x40 [ 20.514027] kasan_save_alloc_info+0x3b/0x50 [ 20.514330] __kasan_kmalloc+0xb7/0xc0 [ 20.514616] __kmalloc_cache_noprof+0x189/0x420 [ 20.514999] kasan_atomics+0x95/0x310 [ 20.515286] kunit_try_run_case+0x1a5/0x480 [ 20.515548] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.516141] kthread+0x337/0x6f0 [ 20.516395] ret_from_fork+0x116/0x1d0 [ 20.516709] ret_from_fork_asm+0x1a/0x30 [ 20.517077] [ 20.517253] The buggy address belongs to the object at ffff888102b66500 [ 20.517253] which belongs to the cache kmalloc-64 of size 64 [ 20.517706] The buggy address is located 0 bytes to the right of [ 20.517706] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 20.518208] [ 20.518437] The buggy address belongs to the physical page: [ 20.518935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 20.519588] flags: 0x200000000000000(node=0|zone=2) [ 20.520031] page_type: f5(slab) [ 20.520361] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.520984] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.521350] page dumped because: kasan: bad access detected [ 20.521718] [ 20.521894] Memory state around the buggy address: [ 20.522241] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.522634] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.523184] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.523599] ^ [ 20.524170] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.524485] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.525173] ================================================================== [ 20.745433] ================================================================== [ 20.745743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 20.746007] Read of size 4 at addr ffff888102b66530 by task kunit_try_catch/282 [ 20.746255] [ 20.746920] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 20.747046] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.747076] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.747127] Call Trace: [ 20.747170] <TASK> [ 20.747213] dump_stack_lvl+0x73/0xb0 [ 20.747295] print_report+0xd1/0x650 [ 20.747351] ? __virt_addr_valid+0x1db/0x2d0 [ 20.747404] ? kasan_atomics_helper+0x4a02/0x5450 [ 20.747455] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.747508] ? kasan_atomics_helper+0x4a02/0x5450 [ 20.747561] kasan_report+0x141/0x180 [ 20.747612] ? kasan_atomics_helper+0x4a02/0x5450 [ 20.747669] __asan_report_load4_noabort+0x18/0x20 [ 20.747717] kasan_atomics_helper+0x4a02/0x5450 [ 20.747770] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.747823] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.747874] ? kasan_atomics+0x152/0x310 [ 20.747936] kasan_atomics+0x1dc/0x310 [ 20.747989] ? __pfx_kasan_atomics+0x10/0x10 [ 20.748045] ? __pfx_read_tsc+0x10/0x10 [ 20.748092] ? ktime_get_ts64+0x86/0x230 [ 20.748146] kunit_try_run_case+0x1a5/0x480 [ 20.748202] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.748251] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.748305] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.748347] ? __kthread_parkme+0x82/0x180 [ 20.748384] ? preempt_count_sub+0x50/0x80 [ 20.748423] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.748469] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.748514] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.748559] kthread+0x337/0x6f0 [ 20.748597] ? trace_preempt_on+0x20/0xc0 [ 20.748643] ? __pfx_kthread+0x10/0x10 [ 20.748684] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.748724] ? calculate_sigpending+0x7b/0xa0 [ 20.748770] ? __pfx_kthread+0x10/0x10 [ 20.748814] ret_from_fork+0x116/0x1d0 [ 20.748855] ? __pfx_kthread+0x10/0x10 [ 20.748900] ret_from_fork_asm+0x1a/0x30 [ 20.748958] </TASK> [ 20.748986] [ 20.763843] Allocated by task 282: [ 20.764267] kasan_save_stack+0x45/0x70 [ 20.764630] kasan_save_track+0x18/0x40 [ 20.764832] kasan_save_alloc_info+0x3b/0x50 [ 20.765194] __kasan_kmalloc+0xb7/0xc0 [ 20.765528] __kmalloc_cache_noprof+0x189/0x420 [ 20.765924] kasan_atomics+0x95/0x310 [ 20.766549] kunit_try_run_case+0x1a5/0x480 [ 20.766826] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.767269] kthread+0x337/0x6f0 [ 20.767588] ret_from_fork+0x116/0x1d0 [ 20.767918] ret_from_fork_asm+0x1a/0x30 [ 20.768114] [ 20.768343] The buggy address belongs to the object at ffff888102b66500 [ 20.768343] which belongs to the cache kmalloc-64 of size 64 [ 20.769120] The buggy address is located 0 bytes to the right of [ 20.769120] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 20.769798] [ 20.769987] The buggy address belongs to the physical page: [ 20.770368] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 20.770880] flags: 0x200000000000000(node=0|zone=2) [ 20.771159] page_type: f5(slab) [ 20.771419] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.771754] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.772033] page dumped because: kasan: bad access detected [ 20.772384] [ 20.772498] Memory state around the buggy address: [ 20.772930] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.773452] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.773923] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.774289] ^ [ 20.774586] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.775011] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.775415] ================================================================== [ 19.738949] ================================================================== [ 19.739949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 19.740752] Read of size 4 at addr ffff888102b66530 by task kunit_try_catch/282 [ 19.741571] [ 19.741840] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 19.741968] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.741998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.742041] Call Trace: [ 19.742069] <TASK> [ 19.742115] dump_stack_lvl+0x73/0xb0 [ 19.742186] print_report+0xd1/0x650 [ 19.742239] ? __virt_addr_valid+0x1db/0x2d0 [ 19.742342] ? kasan_atomics_helper+0x4bbc/0x5450 [ 19.742381] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.742417] ? kasan_atomics_helper+0x4bbc/0x5450 [ 19.742453] kasan_report+0x141/0x180 [ 19.742490] ? kasan_atomics_helper+0x4bbc/0x5450 [ 19.742533] __asan_report_load4_noabort+0x18/0x20 [ 19.742566] kasan_atomics_helper+0x4bbc/0x5450 [ 19.742603] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.742639] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.742674] ? kasan_atomics+0x152/0x310 [ 19.742759] kasan_atomics+0x1dc/0x310 [ 19.742787] ? __pfx_kasan_atomics+0x10/0x10 [ 19.742815] ? __pfx_read_tsc+0x10/0x10 [ 19.742838] ? ktime_get_ts64+0x86/0x230 [ 19.742865] kunit_try_run_case+0x1a5/0x480 [ 19.742893] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.742916] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.742942] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.742966] ? __kthread_parkme+0x82/0x180 [ 19.742997] ? preempt_count_sub+0x50/0x80 [ 19.743029] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.743209] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.743238] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.743284] kthread+0x337/0x6f0 [ 19.743309] ? trace_preempt_on+0x20/0xc0 [ 19.743337] ? __pfx_kthread+0x10/0x10 [ 19.743360] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.743383] ? calculate_sigpending+0x7b/0xa0 [ 19.743410] ? __pfx_kthread+0x10/0x10 [ 19.743433] ret_from_fork+0x116/0x1d0 [ 19.743453] ? __pfx_kthread+0x10/0x10 [ 19.743476] ret_from_fork_asm+0x1a/0x30 [ 19.743508] </TASK> [ 19.743522] [ 19.756238] Allocated by task 282: [ 19.756730] kasan_save_stack+0x45/0x70 [ 19.757217] kasan_save_track+0x18/0x40 [ 19.757756] kasan_save_alloc_info+0x3b/0x50 [ 19.758422] __kasan_kmalloc+0xb7/0xc0 [ 19.758800] __kmalloc_cache_noprof+0x189/0x420 [ 19.759775] kasan_atomics+0x95/0x310 [ 19.760022] kunit_try_run_case+0x1a5/0x480 [ 19.760541] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.761437] kthread+0x337/0x6f0 [ 19.762213] ret_from_fork+0x116/0x1d0 [ 19.762426] ret_from_fork_asm+0x1a/0x30 [ 19.763081] [ 19.763518] The buggy address belongs to the object at ffff888102b66500 [ 19.763518] which belongs to the cache kmalloc-64 of size 64 [ 19.764747] The buggy address is located 0 bytes to the right of [ 19.764747] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 19.765668] [ 19.766132] The buggy address belongs to the physical page: [ 19.766855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 19.767404] flags: 0x200000000000000(node=0|zone=2) [ 19.768085] page_type: f5(slab) [ 19.768401] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.768998] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.769853] page dumped because: kasan: bad access detected [ 19.770490] [ 19.770808] Memory state around the buggy address: [ 19.771094] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.771822] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.772253] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.772654] ^ [ 19.772893] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.773588] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.774610] ================================================================== [ 20.627963] ================================================================== [ 20.629059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 20.629497] Read of size 4 at addr ffff888102b66530 by task kunit_try_catch/282 [ 20.630087] [ 20.630287] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 20.630447] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.630480] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.630539] Call Trace: [ 20.630585] <TASK> [ 20.630631] dump_stack_lvl+0x73/0xb0 [ 20.630843] print_report+0xd1/0x650 [ 20.630920] ? __virt_addr_valid+0x1db/0x2d0 [ 20.630975] ? kasan_atomics_helper+0x4a36/0x5450 [ 20.631013] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.631040] ? kasan_atomics_helper+0x4a36/0x5450 [ 20.631066] kasan_report+0x141/0x180 [ 20.631092] ? kasan_atomics_helper+0x4a36/0x5450 [ 20.631121] __asan_report_load4_noabort+0x18/0x20 [ 20.631145] kasan_atomics_helper+0x4a36/0x5450 [ 20.631170] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.631196] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.631221] ? kasan_atomics+0x152/0x310 [ 20.631250] kasan_atomics+0x1dc/0x310 [ 20.631313] ? __pfx_kasan_atomics+0x10/0x10 [ 20.631360] ? __pfx_read_tsc+0x10/0x10 [ 20.631404] ? ktime_get_ts64+0x86/0x230 [ 20.631451] kunit_try_run_case+0x1a5/0x480 [ 20.631515] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.631622] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.631672] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.631718] ? __kthread_parkme+0x82/0x180 [ 20.631762] ? preempt_count_sub+0x50/0x80 [ 20.631819] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.631871] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.631937] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.631986] kthread+0x337/0x6f0 [ 20.632023] ? trace_preempt_on+0x20/0xc0 [ 20.632055] ? __pfx_kthread+0x10/0x10 [ 20.632079] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.632103] ? calculate_sigpending+0x7b/0xa0 [ 20.632131] ? __pfx_kthread+0x10/0x10 [ 20.632155] ret_from_fork+0x116/0x1d0 [ 20.632177] ? __pfx_kthread+0x10/0x10 [ 20.632200] ret_from_fork_asm+0x1a/0x30 [ 20.632234] </TASK> [ 20.632249] [ 20.644857] Allocated by task 282: [ 20.645190] kasan_save_stack+0x45/0x70 [ 20.645565] kasan_save_track+0x18/0x40 [ 20.645910] kasan_save_alloc_info+0x3b/0x50 [ 20.646277] __kasan_kmalloc+0xb7/0xc0 [ 20.646480] __kmalloc_cache_noprof+0x189/0x420 [ 20.646734] kasan_atomics+0x95/0x310 [ 20.646921] kunit_try_run_case+0x1a5/0x480 [ 20.647138] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.647616] kthread+0x337/0x6f0 [ 20.648048] ret_from_fork+0x116/0x1d0 [ 20.648434] ret_from_fork_asm+0x1a/0x30 [ 20.648864] [ 20.649056] The buggy address belongs to the object at ffff888102b66500 [ 20.649056] which belongs to the cache kmalloc-64 of size 64 [ 20.649850] The buggy address is located 0 bytes to the right of [ 20.649850] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 20.650579] [ 20.650824] The buggy address belongs to the physical page: [ 20.651285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 20.651894] flags: 0x200000000000000(node=0|zone=2) [ 20.652138] page_type: f5(slab) [ 20.652501] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.653141] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.653779] page dumped because: kasan: bad access detected [ 20.654189] [ 20.654391] Memory state around the buggy address: [ 20.654751] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.655302] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.655834] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.656285] ^ [ 20.656685] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.657141] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.657598] ================================================================== [ 21.313225] ================================================================== [ 21.313606] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 21.314190] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282 [ 21.314513] [ 21.314719] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 21.314827] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.314857] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.314906] Call Trace: [ 21.314947] <TASK> [ 21.314983] dump_stack_lvl+0x73/0xb0 [ 21.315055] print_report+0xd1/0x650 [ 21.315103] ? __virt_addr_valid+0x1db/0x2d0 [ 21.315150] ? kasan_atomics_helper+0x1b22/0x5450 [ 21.315191] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.315234] ? kasan_atomics_helper+0x1b22/0x5450 [ 21.315293] kasan_report+0x141/0x180 [ 21.315343] ? kasan_atomics_helper+0x1b22/0x5450 [ 21.315391] kasan_check_range+0x10c/0x1c0 [ 21.315437] __kasan_check_write+0x18/0x20 [ 21.315476] kasan_atomics_helper+0x1b22/0x5450 [ 21.315519] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.315568] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.315616] ? kasan_atomics+0x152/0x310 [ 21.315673] kasan_atomics+0x1dc/0x310 [ 21.315724] ? __pfx_kasan_atomics+0x10/0x10 [ 21.315780] ? __pfx_read_tsc+0x10/0x10 [ 21.315828] ? ktime_get_ts64+0x86/0x230 [ 21.315880] kunit_try_run_case+0x1a5/0x480 [ 21.315930] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.315979] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.316032] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.316101] ? __kthread_parkme+0x82/0x180 [ 21.316145] ? preempt_count_sub+0x50/0x80 [ 21.316198] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.316241] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.316305] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.316359] kthread+0x337/0x6f0 [ 21.316404] ? trace_preempt_on+0x20/0xc0 [ 21.316459] ? __pfx_kthread+0x10/0x10 [ 21.316507] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.316557] ? calculate_sigpending+0x7b/0xa0 [ 21.316613] ? __pfx_kthread+0x10/0x10 [ 21.316655] ret_from_fork+0x116/0x1d0 [ 21.316714] ? __pfx_kthread+0x10/0x10 [ 21.316758] ret_from_fork_asm+0x1a/0x30 [ 21.316820] </TASK> [ 21.316847] [ 21.327233] Allocated by task 282: [ 21.327634] kasan_save_stack+0x45/0x70 [ 21.328049] kasan_save_track+0x18/0x40 [ 21.328408] kasan_save_alloc_info+0x3b/0x50 [ 21.328643] __kasan_kmalloc+0xb7/0xc0 [ 21.328897] __kmalloc_cache_noprof+0x189/0x420 [ 21.329115] kasan_atomics+0x95/0x310 [ 21.329321] kunit_try_run_case+0x1a5/0x480 [ 21.329682] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.330143] kthread+0x337/0x6f0 [ 21.330450] ret_from_fork+0x116/0x1d0 [ 21.330794] ret_from_fork_asm+0x1a/0x30 [ 21.331148] [ 21.331329] The buggy address belongs to the object at ffff888102b66500 [ 21.331329] which belongs to the cache kmalloc-64 of size 64 [ 21.332312] The buggy address is located 0 bytes to the right of [ 21.332312] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 21.335343] [ 21.335557] The buggy address belongs to the physical page: [ 21.336152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 21.336478] flags: 0x200000000000000(node=0|zone=2) [ 21.337299] page_type: f5(slab) [ 21.337660] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.338434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.339151] page dumped because: kasan: bad access detected [ 21.339570] [ 21.339759] Memory state around the buggy address: [ 21.340076] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.340433] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.340848] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.341276] ^ [ 21.341687] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.342046] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.342570] ================================================================== [ 20.919600] ================================================================== [ 20.920362] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 20.920799] Read of size 8 at addr ffff888102b66530 by task kunit_try_catch/282 [ 20.921155] [ 20.921373] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 20.921482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.921512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.921559] Call Trace: [ 20.921602] <TASK> [ 20.921641] dump_stack_lvl+0x73/0xb0 [ 20.921741] print_report+0xd1/0x650 [ 20.921788] ? __virt_addr_valid+0x1db/0x2d0 [ 20.921836] ? kasan_atomics_helper+0x4eae/0x5450 [ 20.921879] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.921930] ? kasan_atomics_helper+0x4eae/0x5450 [ 20.921976] kasan_report+0x141/0x180 [ 20.922018] ? kasan_atomics_helper+0x4eae/0x5450 [ 20.922064] __asan_report_load8_noabort+0x18/0x20 [ 20.922103] kasan_atomics_helper+0x4eae/0x5450 [ 20.922148] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.922197] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.922245] ? kasan_atomics+0x152/0x310 [ 20.922316] kasan_atomics+0x1dc/0x310 [ 20.922370] ? __pfx_kasan_atomics+0x10/0x10 [ 20.922424] ? __pfx_read_tsc+0x10/0x10 [ 20.922469] ? ktime_get_ts64+0x86/0x230 [ 20.922506] kunit_try_run_case+0x1a5/0x480 [ 20.922534] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.922561] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.922587] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.922612] ? __kthread_parkme+0x82/0x180 [ 20.922636] ? preempt_count_sub+0x50/0x80 [ 20.922686] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.922737] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.922764] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.922791] kthread+0x337/0x6f0 [ 20.922813] ? trace_preempt_on+0x20/0xc0 [ 20.922843] ? __pfx_kthread+0x10/0x10 [ 20.922865] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.922889] ? calculate_sigpending+0x7b/0xa0 [ 20.922917] ? __pfx_kthread+0x10/0x10 [ 20.922941] ret_from_fork+0x116/0x1d0 [ 20.922961] ? __pfx_kthread+0x10/0x10 [ 20.922985] ret_from_fork_asm+0x1a/0x30 [ 20.923031] </TASK> [ 20.923045] [ 20.932700] Allocated by task 282: [ 20.933015] kasan_save_stack+0x45/0x70 [ 20.933533] kasan_save_track+0x18/0x40 [ 20.933947] kasan_save_alloc_info+0x3b/0x50 [ 20.934196] __kasan_kmalloc+0xb7/0xc0 [ 20.934392] __kmalloc_cache_noprof+0x189/0x420 [ 20.934770] kasan_atomics+0x95/0x310 [ 20.935097] kunit_try_run_case+0x1a5/0x480 [ 20.935310] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.935661] kthread+0x337/0x6f0 [ 20.935941] ret_from_fork+0x116/0x1d0 [ 20.936141] ret_from_fork_asm+0x1a/0x30 [ 20.936442] [ 20.936567] The buggy address belongs to the object at ffff888102b66500 [ 20.936567] which belongs to the cache kmalloc-64 of size 64 [ 20.937021] The buggy address is located 0 bytes to the right of [ 20.937021] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 20.938057] [ 20.938251] The buggy address belongs to the physical page: [ 20.938525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 20.939280] flags: 0x200000000000000(node=0|zone=2) [ 20.939517] page_type: f5(slab) [ 20.939707] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.940493] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.941005] page dumped because: kasan: bad access detected [ 20.941230] [ 20.941363] Memory state around the buggy address: [ 20.941580] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.941851] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.942120] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.942534] ^ [ 20.942925] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.943719] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.944252] ================================================================== [ 21.688805] ================================================================== [ 21.689889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 21.690498] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282 [ 21.690925] [ 21.691102] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 21.691215] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.691246] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.691302] Call Trace: [ 21.691344] <TASK> [ 21.691384] dump_stack_lvl+0x73/0xb0 [ 21.691475] print_report+0xd1/0x650 [ 21.691536] ? __virt_addr_valid+0x1db/0x2d0 [ 21.691585] ? kasan_atomics_helper+0x218a/0x5450 [ 21.691635] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.691732] ? kasan_atomics_helper+0x218a/0x5450 [ 21.691777] kasan_report+0x141/0x180 [ 21.691822] ? kasan_atomics_helper+0x218a/0x5450 [ 21.691875] kasan_check_range+0x10c/0x1c0 [ 21.691925] __kasan_check_write+0x18/0x20 [ 21.691972] kasan_atomics_helper+0x218a/0x5450 [ 21.692026] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.692077] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.692116] ? kasan_atomics+0x152/0x310 [ 21.692172] kasan_atomics+0x1dc/0x310 [ 21.692214] ? __pfx_kasan_atomics+0x10/0x10 [ 21.692254] ? __pfx_read_tsc+0x10/0x10 [ 21.692306] ? ktime_get_ts64+0x86/0x230 [ 21.692335] kunit_try_run_case+0x1a5/0x480 [ 21.692365] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.692391] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.692418] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.692444] ? __kthread_parkme+0x82/0x180 [ 21.692468] ? preempt_count_sub+0x50/0x80 [ 21.692495] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.692522] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.692548] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.692574] kthread+0x337/0x6f0 [ 21.692597] ? trace_preempt_on+0x20/0xc0 [ 21.692623] ? __pfx_kthread+0x10/0x10 [ 21.692647] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.692724] ? calculate_sigpending+0x7b/0xa0 [ 21.692773] ? __pfx_kthread+0x10/0x10 [ 21.692818] ret_from_fork+0x116/0x1d0 [ 21.692860] ? __pfx_kthread+0x10/0x10 [ 21.692907] ret_from_fork_asm+0x1a/0x30 [ 21.692945] </TASK> [ 21.692960] [ 21.706431] Allocated by task 282: [ 21.707172] kasan_save_stack+0x45/0x70 [ 21.707673] kasan_save_track+0x18/0x40 [ 21.708128] kasan_save_alloc_info+0x3b/0x50 [ 21.708535] __kasan_kmalloc+0xb7/0xc0 [ 21.709073] __kmalloc_cache_noprof+0x189/0x420 [ 21.709324] kasan_atomics+0x95/0x310 [ 21.709556] kunit_try_run_case+0x1a5/0x480 [ 21.710184] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.710660] kthread+0x337/0x6f0 [ 21.711124] ret_from_fork+0x116/0x1d0 [ 21.711322] ret_from_fork_asm+0x1a/0x30 [ 21.711555] [ 21.712092] The buggy address belongs to the object at ffff888102b66500 [ 21.712092] which belongs to the cache kmalloc-64 of size 64 [ 21.712788] The buggy address is located 0 bytes to the right of [ 21.712788] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 21.713432] [ 21.713634] The buggy address belongs to the physical page: [ 21.714124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 21.714982] flags: 0x200000000000000(node=0|zone=2) [ 21.715351] page_type: f5(slab) [ 21.715566] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.716379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.716961] page dumped because: kasan: bad access detected [ 21.717174] [ 21.717354] Memory state around the buggy address: [ 21.717727] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.718181] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.718611] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.719358] ^ [ 21.719646] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.720274] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.720541] ================================================================== [ 19.846511] ================================================================== [ 19.847323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 19.847930] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282 [ 19.848476] [ 19.848955] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 19.849125] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.849199] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.849242] Call Trace: [ 19.849291] <TASK> [ 19.849328] dump_stack_lvl+0x73/0xb0 [ 19.849395] print_report+0xd1/0x650 [ 19.849442] ? __virt_addr_valid+0x1db/0x2d0 [ 19.849529] ? kasan_atomics_helper+0x4b6e/0x5450 [ 19.849618] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.849707] ? kasan_atomics_helper+0x4b6e/0x5450 [ 19.849761] kasan_report+0x141/0x180 [ 19.849806] ? kasan_atomics_helper+0x4b6e/0x5450 [ 19.849866] __asan_report_store4_noabort+0x1b/0x30 [ 19.849915] kasan_atomics_helper+0x4b6e/0x5450 [ 19.849968] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.850021] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.850101] ? kasan_atomics+0x152/0x310 [ 19.850165] kasan_atomics+0x1dc/0x310 [ 19.850220] ? __pfx_kasan_atomics+0x10/0x10 [ 19.850288] ? __pfx_read_tsc+0x10/0x10 [ 19.850340] ? ktime_get_ts64+0x86/0x230 [ 19.850397] kunit_try_run_case+0x1a5/0x480 [ 19.850454] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.850505] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.850558] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.850612] ? __kthread_parkme+0x82/0x180 [ 19.850687] ? preempt_count_sub+0x50/0x80 [ 19.850747] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.850802] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.850857] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.850904] kthread+0x337/0x6f0 [ 19.850946] ? trace_preempt_on+0x20/0xc0 [ 19.851005] ? __pfx_kthread+0x10/0x10 [ 19.851093] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.851159] ? calculate_sigpending+0x7b/0xa0 [ 19.851216] ? __pfx_kthread+0x10/0x10 [ 19.851276] ret_from_fork+0x116/0x1d0 [ 19.851323] ? __pfx_kthread+0x10/0x10 [ 19.851372] ret_from_fork_asm+0x1a/0x30 [ 19.851459] </TASK> [ 19.851483] [ 19.864073] Allocated by task 282: [ 19.864379] kasan_save_stack+0x45/0x70 [ 19.864774] kasan_save_track+0x18/0x40 [ 19.864977] kasan_save_alloc_info+0x3b/0x50 [ 19.865500] __kasan_kmalloc+0xb7/0xc0 [ 19.865900] __kmalloc_cache_noprof+0x189/0x420 [ 19.866240] kasan_atomics+0x95/0x310 [ 19.866545] kunit_try_run_case+0x1a5/0x480 [ 19.866921] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.867206] kthread+0x337/0x6f0 [ 19.867509] ret_from_fork+0x116/0x1d0 [ 19.867896] ret_from_fork_asm+0x1a/0x30 [ 19.868333] [ 19.868508] The buggy address belongs to the object at ffff888102b66500 [ 19.868508] which belongs to the cache kmalloc-64 of size 64 [ 19.869098] The buggy address is located 0 bytes to the right of [ 19.869098] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 19.869968] [ 19.870219] The buggy address belongs to the physical page: [ 19.870916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 19.871559] flags: 0x200000000000000(node=0|zone=2) [ 19.871906] page_type: f5(slab) [ 19.872096] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.872618] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.873255] page dumped because: kasan: bad access detected [ 19.873678] [ 19.873873] Memory state around the buggy address: [ 19.874324] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.874915] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.875507] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.875887] ^ [ 19.876394] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.877244] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.877546] ================================================================== [ 21.658317] ================================================================== [ 21.658891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 21.659529] Read of size 8 at addr ffff888102b66530 by task kunit_try_catch/282 [ 21.660043] [ 21.660303] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 21.660426] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.660459] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.660516] Call Trace: [ 21.660559] <TASK> [ 21.660605] dump_stack_lvl+0x73/0xb0 [ 21.660674] print_report+0xd1/0x650 [ 21.660729] ? __virt_addr_valid+0x1db/0x2d0 [ 21.660777] ? kasan_atomics_helper+0x4fb2/0x5450 [ 21.660818] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.660860] ? kasan_atomics_helper+0x4fb2/0x5450 [ 21.660907] kasan_report+0x141/0x180 [ 21.660951] ? kasan_atomics_helper+0x4fb2/0x5450 [ 21.661007] __asan_report_load8_noabort+0x18/0x20 [ 21.661053] kasan_atomics_helper+0x4fb2/0x5450 [ 21.661099] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.661139] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.661179] ? kasan_atomics+0x152/0x310 [ 21.661232] kasan_atomics+0x1dc/0x310 [ 21.661296] ? __pfx_kasan_atomics+0x10/0x10 [ 21.661353] ? __pfx_read_tsc+0x10/0x10 [ 21.661401] ? ktime_get_ts64+0x86/0x230 [ 21.661436] kunit_try_run_case+0x1a5/0x480 [ 21.661466] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.661495] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.661522] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.661548] ? __kthread_parkme+0x82/0x180 [ 21.661571] ? preempt_count_sub+0x50/0x80 [ 21.661598] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.661624] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.661650] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.661689] kthread+0x337/0x6f0 [ 21.661720] ? trace_preempt_on+0x20/0xc0 [ 21.661748] ? __pfx_kthread+0x10/0x10 [ 21.661771] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.661794] ? calculate_sigpending+0x7b/0xa0 [ 21.661822] ? __pfx_kthread+0x10/0x10 [ 21.661846] ret_from_fork+0x116/0x1d0 [ 21.661867] ? __pfx_kthread+0x10/0x10 [ 21.661891] ret_from_fork_asm+0x1a/0x30 [ 21.661924] </TASK> [ 21.661939] [ 21.674893] Allocated by task 282: [ 21.675267] kasan_save_stack+0x45/0x70 [ 21.675650] kasan_save_track+0x18/0x40 [ 21.675864] kasan_save_alloc_info+0x3b/0x50 [ 21.676116] __kasan_kmalloc+0xb7/0xc0 [ 21.677089] __kmalloc_cache_noprof+0x189/0x420 [ 21.677642] kasan_atomics+0x95/0x310 [ 21.677969] kunit_try_run_case+0x1a5/0x480 [ 21.678266] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.678600] kthread+0x337/0x6f0 [ 21.678934] ret_from_fork+0x116/0x1d0 [ 21.679322] ret_from_fork_asm+0x1a/0x30 [ 21.679591] [ 21.679759] The buggy address belongs to the object at ffff888102b66500 [ 21.679759] which belongs to the cache kmalloc-64 of size 64 [ 21.680437] The buggy address is located 0 bytes to the right of [ 21.680437] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 21.681252] [ 21.681454] The buggy address belongs to the physical page: [ 21.681780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 21.682432] flags: 0x200000000000000(node=0|zone=2) [ 21.682859] page_type: f5(slab) [ 21.683111] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.683479] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.684077] page dumped because: kasan: bad access detected [ 21.684407] [ 21.684531] Memory state around the buggy address: [ 21.684941] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.685496] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.685849] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.686383] ^ [ 21.686847] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.687174] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.687736] ================================================================== [ 20.776804] ================================================================== [ 20.777404] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 20.777866] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282 [ 20.778290] [ 20.778453] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 20.778565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.778595] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.778641] Call Trace: [ 20.778712] <TASK> [ 20.778749] dump_stack_lvl+0x73/0xb0 [ 20.778828] print_report+0xd1/0x650 [ 20.778867] ? __virt_addr_valid+0x1db/0x2d0 [ 20.778905] ? kasan_atomics_helper+0x1217/0x5450 [ 20.778939] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.778973] ? kasan_atomics_helper+0x1217/0x5450 [ 20.779020] kasan_report+0x141/0x180 [ 20.779084] ? kasan_atomics_helper+0x1217/0x5450 [ 20.779131] kasan_check_range+0x10c/0x1c0 [ 20.779176] __kasan_check_write+0x18/0x20 [ 20.779216] kasan_atomics_helper+0x1217/0x5450 [ 20.779271] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.779326] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.779377] ? kasan_atomics+0x152/0x310 [ 20.779438] kasan_atomics+0x1dc/0x310 [ 20.779493] ? __pfx_kasan_atomics+0x10/0x10 [ 20.779550] ? __pfx_read_tsc+0x10/0x10 [ 20.779599] ? ktime_get_ts64+0x86/0x230 [ 20.779654] kunit_try_run_case+0x1a5/0x480 [ 20.779741] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.779795] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.779850] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.779889] ? __kthread_parkme+0x82/0x180 [ 20.779922] ? preempt_count_sub+0x50/0x80 [ 20.779960] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.779996] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.780033] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.780072] kthread+0x337/0x6f0 [ 20.780105] ? trace_preempt_on+0x20/0xc0 [ 20.780142] ? __pfx_kthread+0x10/0x10 [ 20.780175] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.780210] ? calculate_sigpending+0x7b/0xa0 [ 20.780247] ? __pfx_kthread+0x10/0x10 [ 20.780299] ret_from_fork+0x116/0x1d0 [ 20.780328] ? __pfx_kthread+0x10/0x10 [ 20.780352] ret_from_fork_asm+0x1a/0x30 [ 20.780386] </TASK> [ 20.780401] [ 20.793883] Allocated by task 282: [ 20.794245] kasan_save_stack+0x45/0x70 [ 20.794649] kasan_save_track+0x18/0x40 [ 20.795019] kasan_save_alloc_info+0x3b/0x50 [ 20.795422] __kasan_kmalloc+0xb7/0xc0 [ 20.795617] __kmalloc_cache_noprof+0x189/0x420 [ 20.795961] kasan_atomics+0x95/0x310 [ 20.796207] kunit_try_run_case+0x1a5/0x480 [ 20.797770] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.798057] kthread+0x337/0x6f0 [ 20.798240] ret_from_fork+0x116/0x1d0 [ 20.798563] ret_from_fork_asm+0x1a/0x30 [ 20.798935] [ 20.799122] The buggy address belongs to the object at ffff888102b66500 [ 20.799122] which belongs to the cache kmalloc-64 of size 64 [ 20.799955] The buggy address is located 0 bytes to the right of [ 20.799955] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 20.800445] [ 20.800579] The buggy address belongs to the physical page: [ 20.801006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 20.801551] flags: 0x200000000000000(node=0|zone=2) [ 20.801936] page_type: f5(slab) [ 20.802189] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.802488] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.802807] page dumped because: kasan: bad access detected [ 20.803253] [ 20.803451] Memory state around the buggy address: [ 20.803853] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.804414] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.804761] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.805034] ^ [ 20.805395] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.805953] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.806492] ================================================================== [ 20.024604] ================================================================== [ 20.025498] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 20.026447] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282 [ 20.027024] [ 20.027426] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 20.027551] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.027583] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.027631] Call Trace: [ 20.027703] <TASK> [ 20.027747] dump_stack_lvl+0x73/0xb0 [ 20.027812] print_report+0xd1/0x650 [ 20.027861] ? __virt_addr_valid+0x1db/0x2d0 [ 20.027908] ? kasan_atomics_helper+0x565/0x5450 [ 20.027960] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.028025] ? kasan_atomics_helper+0x565/0x5450 [ 20.028202] kasan_report+0x141/0x180 [ 20.028250] ? kasan_atomics_helper+0x565/0x5450 [ 20.028312] kasan_check_range+0x10c/0x1c0 [ 20.028340] __kasan_check_write+0x18/0x20 [ 20.028363] kasan_atomics_helper+0x565/0x5450 [ 20.028388] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.028414] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.028439] ? kasan_atomics+0x152/0x310 [ 20.028468] kasan_atomics+0x1dc/0x310 [ 20.028494] ? __pfx_kasan_atomics+0x10/0x10 [ 20.028521] ? __pfx_read_tsc+0x10/0x10 [ 20.028546] ? ktime_get_ts64+0x86/0x230 [ 20.028573] kunit_try_run_case+0x1a5/0x480 [ 20.028600] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.028625] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.028651] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.028690] ? __kthread_parkme+0x82/0x180 [ 20.028716] ? preempt_count_sub+0x50/0x80 [ 20.028743] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.028769] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.028795] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.028821] kthread+0x337/0x6f0 [ 20.028844] ? trace_preempt_on+0x20/0xc0 [ 20.028870] ? __pfx_kthread+0x10/0x10 [ 20.028893] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.028917] ? calculate_sigpending+0x7b/0xa0 [ 20.028944] ? __pfx_kthread+0x10/0x10 [ 20.028968] ret_from_fork+0x116/0x1d0 [ 20.028988] ? __pfx_kthread+0x10/0x10 [ 20.029012] ret_from_fork_asm+0x1a/0x30 [ 20.029060] </TASK> [ 20.029081] [ 20.042194] Allocated by task 282: [ 20.042880] kasan_save_stack+0x45/0x70 [ 20.043294] kasan_save_track+0x18/0x40 [ 20.043641] kasan_save_alloc_info+0x3b/0x50 [ 20.044049] __kasan_kmalloc+0xb7/0xc0 [ 20.044501] __kmalloc_cache_noprof+0x189/0x420 [ 20.044841] kasan_atomics+0x95/0x310 [ 20.045450] kunit_try_run_case+0x1a5/0x480 [ 20.046321] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.046797] kthread+0x337/0x6f0 [ 20.047070] ret_from_fork+0x116/0x1d0 [ 20.047415] ret_from_fork_asm+0x1a/0x30 [ 20.047677] [ 20.047791] The buggy address belongs to the object at ffff888102b66500 [ 20.047791] which belongs to the cache kmalloc-64 of size 64 [ 20.048583] The buggy address is located 0 bytes to the right of [ 20.048583] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 20.049120] [ 20.049267] The buggy address belongs to the physical page: [ 20.049492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 20.050162] flags: 0x200000000000000(node=0|zone=2) [ 20.050699] page_type: f5(slab) [ 20.051052] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.051780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.052021] page dumped because: kasan: bad access detected [ 20.052510] [ 20.052738] Memory state around the buggy address: [ 20.053142] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.053632] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.053941] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.054198] ^ [ 20.054779] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.055608] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.056251] ================================================================== [ 20.307547] ================================================================== [ 20.308600] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 20.308963] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282 [ 20.309252] [ 20.309500] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 20.309604] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.309679] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.309749] Call Trace: [ 20.309793] <TASK> [ 20.309860] dump_stack_lvl+0x73/0xb0 [ 20.309927] print_report+0xd1/0x650 [ 20.309976] ? __virt_addr_valid+0x1db/0x2d0 [ 20.310028] ? kasan_atomics_helper+0xa2b/0x5450 [ 20.310078] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.310130] ? kasan_atomics_helper+0xa2b/0x5450 [ 20.310179] kasan_report+0x141/0x180 [ 20.310235] ? kasan_atomics_helper+0xa2b/0x5450 [ 20.310311] kasan_check_range+0x10c/0x1c0 [ 20.310369] __kasan_check_write+0x18/0x20 [ 20.310417] kasan_atomics_helper+0xa2b/0x5450 [ 20.310467] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.310516] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.310564] ? kasan_atomics+0x152/0x310 [ 20.310624] kasan_atomics+0x1dc/0x310 [ 20.310672] ? __pfx_kasan_atomics+0x10/0x10 [ 20.310721] ? __pfx_read_tsc+0x10/0x10 [ 20.310768] ? ktime_get_ts64+0x86/0x230 [ 20.310822] kunit_try_run_case+0x1a5/0x480 [ 20.310876] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.310927] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.310975] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.311057] ? __kthread_parkme+0x82/0x180 [ 20.311110] ? preempt_count_sub+0x50/0x80 [ 20.311138] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.311166] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.311196] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.311222] kthread+0x337/0x6f0 [ 20.311245] ? trace_preempt_on+0x20/0xc0 [ 20.311298] ? __pfx_kthread+0x10/0x10 [ 20.311341] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.311385] ? calculate_sigpending+0x7b/0xa0 [ 20.311438] ? __pfx_kthread+0x10/0x10 [ 20.311488] ret_from_fork+0x116/0x1d0 [ 20.311533] ? __pfx_kthread+0x10/0x10 [ 20.311583] ret_from_fork_asm+0x1a/0x30 [ 20.311664] </TASK> [ 20.311696] [ 20.323036] Allocated by task 282: [ 20.323351] kasan_save_stack+0x45/0x70 [ 20.323729] kasan_save_track+0x18/0x40 [ 20.323952] kasan_save_alloc_info+0x3b/0x50 [ 20.324224] __kasan_kmalloc+0xb7/0xc0 [ 20.324427] __kmalloc_cache_noprof+0x189/0x420 [ 20.324638] kasan_atomics+0x95/0x310 [ 20.324867] kunit_try_run_case+0x1a5/0x480 [ 20.325078] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.325328] kthread+0x337/0x6f0 [ 20.325625] ret_from_fork+0x116/0x1d0 [ 20.325989] ret_from_fork_asm+0x1a/0x30 [ 20.326341] [ 20.326515] The buggy address belongs to the object at ffff888102b66500 [ 20.326515] which belongs to the cache kmalloc-64 of size 64 [ 20.327447] The buggy address is located 0 bytes to the right of [ 20.327447] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 20.328514] [ 20.329837] The buggy address belongs to the physical page: [ 20.330397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 20.330895] flags: 0x200000000000000(node=0|zone=2) [ 20.331552] page_type: f5(slab) [ 20.331893] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.332401] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.332930] page dumped because: kasan: bad access detected [ 20.333382] [ 20.333555] Memory state around the buggy address: [ 20.333865] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.334306] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.334789] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.335287] ^ [ 20.335687] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.336154] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.336578] ================================================================== [ 20.890868] ================================================================== [ 20.891512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 20.892120] Read of size 8 at addr ffff888102b66530 by task kunit_try_catch/282 [ 20.893230] [ 20.893484] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 20.893596] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.893624] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.893699] Call Trace: [ 20.893742] <TASK> [ 20.893781] dump_stack_lvl+0x73/0xb0 [ 20.893849] print_report+0xd1/0x650 [ 20.893901] ? __virt_addr_valid+0x1db/0x2d0 [ 20.893953] ? kasan_atomics_helper+0x13b5/0x5450 [ 20.894001] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.894051] ? kasan_atomics_helper+0x13b5/0x5450 [ 20.894101] kasan_report+0x141/0x180 [ 20.894152] ? kasan_atomics_helper+0x13b5/0x5450 [ 20.894213] kasan_check_range+0x10c/0x1c0 [ 20.894280] __kasan_check_read+0x15/0x20 [ 20.894329] kasan_atomics_helper+0x13b5/0x5450 [ 20.894384] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.894437] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.894488] ? kasan_atomics+0x152/0x310 [ 20.894551] kasan_atomics+0x1dc/0x310 [ 20.894605] ? __pfx_kasan_atomics+0x10/0x10 [ 20.894688] ? __pfx_read_tsc+0x10/0x10 [ 20.894740] ? ktime_get_ts64+0x86/0x230 [ 20.894798] kunit_try_run_case+0x1a5/0x480 [ 20.894855] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.894902] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.894936] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.894962] ? __kthread_parkme+0x82/0x180 [ 20.894986] ? preempt_count_sub+0x50/0x80 [ 20.895031] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.895058] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.895084] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.895111] kthread+0x337/0x6f0 [ 20.895133] ? trace_preempt_on+0x20/0xc0 [ 20.895160] ? __pfx_kthread+0x10/0x10 [ 20.895183] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.895206] ? calculate_sigpending+0x7b/0xa0 [ 20.895233] ? __pfx_kthread+0x10/0x10 [ 20.895273] ret_from_fork+0x116/0x1d0 [ 20.895303] ? __pfx_kthread+0x10/0x10 [ 20.895326] ret_from_fork_asm+0x1a/0x30 [ 20.895359] </TASK> [ 20.895374] [ 20.904544] Allocated by task 282: [ 20.904921] kasan_save_stack+0x45/0x70 [ 20.905300] kasan_save_track+0x18/0x40 [ 20.905622] kasan_save_alloc_info+0x3b/0x50 [ 20.906014] __kasan_kmalloc+0xb7/0xc0 [ 20.906352] __kmalloc_cache_noprof+0x189/0x420 [ 20.906771] kasan_atomics+0x95/0x310 [ 20.907110] kunit_try_run_case+0x1a5/0x480 [ 20.907484] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.907942] kthread+0x337/0x6f0 [ 20.908242] ret_from_fork+0x116/0x1d0 [ 20.908482] ret_from_fork_asm+0x1a/0x30 [ 20.908800] [ 20.908985] The buggy address belongs to the object at ffff888102b66500 [ 20.908985] which belongs to the cache kmalloc-64 of size 64 [ 20.909577] The buggy address is located 0 bytes to the right of [ 20.909577] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 20.910102] [ 20.910308] The buggy address belongs to the physical page: [ 20.910643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 20.911034] flags: 0x200000000000000(node=0|zone=2) [ 20.911277] page_type: f5(slab) [ 20.911468] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.911789] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.912071] page dumped because: kasan: bad access detected [ 20.912295] [ 20.912452] Memory state around the buggy address: [ 20.912888] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.913457] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.914031] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.914534] ^ [ 20.914975] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.915551] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.917162] ================================================================== [ 21.343836] ================================================================== [ 21.344386] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 21.344708] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282 [ 21.345241] [ 21.345544] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 21.345656] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.345685] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.345735] Call Trace: [ 21.345779] <TASK> [ 21.345824] dump_stack_lvl+0x73/0xb0 [ 21.345893] print_report+0xd1/0x650 [ 21.345938] ? __virt_addr_valid+0x1db/0x2d0 [ 21.345986] ? kasan_atomics_helper+0x1c18/0x5450 [ 21.346031] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.346073] ? kasan_atomics_helper+0x1c18/0x5450 [ 21.346113] kasan_report+0x141/0x180 [ 21.346161] ? kasan_atomics_helper+0x1c18/0x5450 [ 21.346213] kasan_check_range+0x10c/0x1c0 [ 21.346278] __kasan_check_write+0x18/0x20 [ 21.346325] kasan_atomics_helper+0x1c18/0x5450 [ 21.346373] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.346417] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.346465] ? kasan_atomics+0x152/0x310 [ 21.346520] kasan_atomics+0x1dc/0x310 [ 21.346569] ? __pfx_kasan_atomics+0x10/0x10 [ 21.346619] ? __pfx_read_tsc+0x10/0x10 [ 21.346664] ? ktime_get_ts64+0x86/0x230 [ 21.346732] kunit_try_run_case+0x1a5/0x480 [ 21.346785] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.346829] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.346879] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.346924] ? __kthread_parkme+0x82/0x180 [ 21.346965] ? preempt_count_sub+0x50/0x80 [ 21.347029] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.347085] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.347139] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.347188] kthread+0x337/0x6f0 [ 21.347228] ? trace_preempt_on+0x20/0xc0 [ 21.347294] ? __pfx_kthread+0x10/0x10 [ 21.347339] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.347382] ? calculate_sigpending+0x7b/0xa0 [ 21.347431] ? __pfx_kthread+0x10/0x10 [ 21.347480] ret_from_fork+0x116/0x1d0 [ 21.347520] ? __pfx_kthread+0x10/0x10 [ 21.347564] ret_from_fork_asm+0x1a/0x30 [ 21.347628] </TASK> [ 21.347657] [ 21.357972] Allocated by task 282: [ 21.358369] kasan_save_stack+0x45/0x70 [ 21.358781] kasan_save_track+0x18/0x40 [ 21.359141] kasan_save_alloc_info+0x3b/0x50 [ 21.359384] __kasan_kmalloc+0xb7/0xc0 [ 21.359712] __kmalloc_cache_noprof+0x189/0x420 [ 21.359982] kasan_atomics+0x95/0x310 [ 21.360305] kunit_try_run_case+0x1a5/0x480 [ 21.360657] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.360914] kthread+0x337/0x6f0 [ 21.361107] ret_from_fork+0x116/0x1d0 [ 21.361450] ret_from_fork_asm+0x1a/0x30 [ 21.361834] [ 21.362004] The buggy address belongs to the object at ffff888102b66500 [ 21.362004] which belongs to the cache kmalloc-64 of size 64 [ 21.362619] The buggy address is located 0 bytes to the right of [ 21.362619] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 21.364702] [ 21.364855] The buggy address belongs to the physical page: [ 21.365088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 21.365436] flags: 0x200000000000000(node=0|zone=2) [ 21.366445] page_type: f5(slab) [ 21.366691] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.367307] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.368167] page dumped because: kasan: bad access detected [ 21.368726] [ 21.368855] Memory state around the buggy address: [ 21.369055] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.369628] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.370477] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.370819] ^ [ 21.371331] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.371844] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.372006] ================================================================== [ 20.370226] ================================================================== [ 20.370637] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 20.371091] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282 [ 20.371800] [ 20.372066] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 20.372176] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.372238] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.372296] Call Trace: [ 20.372340] <TASK> [ 20.372381] dump_stack_lvl+0x73/0xb0 [ 20.372452] print_report+0xd1/0x650 [ 20.372506] ? __virt_addr_valid+0x1db/0x2d0 [ 20.372551] ? kasan_atomics_helper+0xb6a/0x5450 [ 20.372594] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.372643] ? kasan_atomics_helper+0xb6a/0x5450 [ 20.372730] kasan_report+0x141/0x180 [ 20.372778] ? kasan_atomics_helper+0xb6a/0x5450 [ 20.372839] kasan_check_range+0x10c/0x1c0 [ 20.372894] __kasan_check_write+0x18/0x20 [ 20.372938] kasan_atomics_helper+0xb6a/0x5450 [ 20.373028] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.373081] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.373127] ? kasan_atomics+0x152/0x310 [ 20.373176] kasan_atomics+0x1dc/0x310 [ 20.373204] ? __pfx_kasan_atomics+0x10/0x10 [ 20.373232] ? __pfx_read_tsc+0x10/0x10 [ 20.373273] ? ktime_get_ts64+0x86/0x230 [ 20.373307] kunit_try_run_case+0x1a5/0x480 [ 20.373337] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.373363] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.373391] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.373416] ? __kthread_parkme+0x82/0x180 [ 20.373440] ? preempt_count_sub+0x50/0x80 [ 20.373466] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.373492] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.373518] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.373544] kthread+0x337/0x6f0 [ 20.373566] ? trace_preempt_on+0x20/0xc0 [ 20.373594] ? __pfx_kthread+0x10/0x10 [ 20.373618] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.373640] ? calculate_sigpending+0x7b/0xa0 [ 20.373677] ? __pfx_kthread+0x10/0x10 [ 20.373734] ret_from_fork+0x116/0x1d0 [ 20.373756] ? __pfx_kthread+0x10/0x10 [ 20.373780] ret_from_fork_asm+0x1a/0x30 [ 20.373814] </TASK> [ 20.373830] [ 20.387176] Allocated by task 282: [ 20.387408] kasan_save_stack+0x45/0x70 [ 20.387642] kasan_save_track+0x18/0x40 [ 20.388736] kasan_save_alloc_info+0x3b/0x50 [ 20.389108] __kasan_kmalloc+0xb7/0xc0 [ 20.389331] __kmalloc_cache_noprof+0x189/0x420 [ 20.389655] kasan_atomics+0x95/0x310 [ 20.390195] kunit_try_run_case+0x1a5/0x480 [ 20.390634] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.391517] kthread+0x337/0x6f0 [ 20.391815] ret_from_fork+0x116/0x1d0 [ 20.391995] ret_from_fork_asm+0x1a/0x30 [ 20.392557] [ 20.392734] The buggy address belongs to the object at ffff888102b66500 [ 20.392734] which belongs to the cache kmalloc-64 of size 64 [ 20.393532] The buggy address is located 0 bytes to the right of [ 20.393532] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 20.394316] [ 20.394887] The buggy address belongs to the physical page: [ 20.395127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 20.395656] flags: 0x200000000000000(node=0|zone=2) [ 20.395986] page_type: f5(slab) [ 20.396233] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.396571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.397118] page dumped because: kasan: bad access detected [ 20.397349] [ 20.397467] Memory state around the buggy address: [ 20.397679] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.397935] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.398458] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.399010] ^ [ 20.399487] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.400859] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.401189] ================================================================== [ 21.405011] ================================================================== [ 21.405627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 21.406173] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282 [ 21.406713] [ 21.406944] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 21.407087] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.407117] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.407162] Call Trace: [ 21.407204] <TASK> [ 21.407252] dump_stack_lvl+0x73/0xb0 [ 21.407339] print_report+0xd1/0x650 [ 21.407387] ? __virt_addr_valid+0x1db/0x2d0 [ 21.407433] ? kasan_atomics_helper+0x1ce1/0x5450 [ 21.407476] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.407523] ? kasan_atomics_helper+0x1ce1/0x5450 [ 21.407567] kasan_report+0x141/0x180 [ 21.407626] ? kasan_atomics_helper+0x1ce1/0x5450 [ 21.407728] kasan_check_range+0x10c/0x1c0 [ 21.407783] __kasan_check_write+0x18/0x20 [ 21.407826] kasan_atomics_helper+0x1ce1/0x5450 [ 21.407887] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.407950] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.407999] ? kasan_atomics+0x152/0x310 [ 21.408053] kasan_atomics+0x1dc/0x310 [ 21.408101] ? __pfx_kasan_atomics+0x10/0x10 [ 21.408163] ? __pfx_read_tsc+0x10/0x10 [ 21.408229] ? ktime_get_ts64+0x86/0x230 [ 21.408290] kunit_try_run_case+0x1a5/0x480 [ 21.408346] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.408399] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.408464] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.408515] ? __kthread_parkme+0x82/0x180 [ 21.408555] ? preempt_count_sub+0x50/0x80 [ 21.408606] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.408690] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.408749] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.408813] kthread+0x337/0x6f0 [ 21.408858] ? trace_preempt_on+0x20/0xc0 [ 21.408907] ? __pfx_kthread+0x10/0x10 [ 21.408951] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.409005] ? calculate_sigpending+0x7b/0xa0 [ 21.409074] ? __pfx_kthread+0x10/0x10 [ 21.409116] ret_from_fork+0x116/0x1d0 [ 21.409144] ? __pfx_kthread+0x10/0x10 [ 21.409168] ret_from_fork_asm+0x1a/0x30 [ 21.409203] </TASK> [ 21.409218] [ 21.419855] Allocated by task 282: [ 21.420187] kasan_save_stack+0x45/0x70 [ 21.420524] kasan_save_track+0x18/0x40 [ 21.420895] kasan_save_alloc_info+0x3b/0x50 [ 21.421213] __kasan_kmalloc+0xb7/0xc0 [ 21.421415] __kmalloc_cache_noprof+0x189/0x420 [ 21.421632] kasan_atomics+0x95/0x310 [ 21.421992] kunit_try_run_case+0x1a5/0x480 [ 21.422383] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.422862] kthread+0x337/0x6f0 [ 21.423173] ret_from_fork+0x116/0x1d0 [ 21.423487] ret_from_fork_asm+0x1a/0x30 [ 21.423816] [ 21.423996] The buggy address belongs to the object at ffff888102b66500 [ 21.423996] which belongs to the cache kmalloc-64 of size 64 [ 21.424699] The buggy address is located 0 bytes to the right of [ 21.424699] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 21.425420] [ 21.425597] The buggy address belongs to the physical page: [ 21.426046] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 21.426481] flags: 0x200000000000000(node=0|zone=2) [ 21.426910] page_type: f5(slab) [ 21.427117] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.427632] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.428227] page dumped because: kasan: bad access detected [ 21.428678] [ 21.428790] Memory state around the buggy address: [ 21.428978] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.429216] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.431229] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.431540] ^ [ 21.431760] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.432000] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.432243] ================================================================== [ 20.127919] ================================================================== [ 20.129120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 20.129817] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282 [ 20.130376] [ 20.130576] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 20.130709] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.130735] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.130775] Call Trace: [ 20.130814] <TASK> [ 20.130851] dump_stack_lvl+0x73/0xb0 [ 20.130916] print_report+0xd1/0x650 [ 20.131013] ? __virt_addr_valid+0x1db/0x2d0 [ 20.131099] ? kasan_atomics_helper+0x72f/0x5450 [ 20.131146] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.131185] ? kasan_atomics_helper+0x72f/0x5450 [ 20.131222] kasan_report+0x141/0x180 [ 20.131321] ? kasan_atomics_helper+0x72f/0x5450 [ 20.131377] kasan_check_range+0x10c/0x1c0 [ 20.131427] __kasan_check_write+0x18/0x20 [ 20.131501] kasan_atomics_helper+0x72f/0x5450 [ 20.131551] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.131623] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.131718] ? kasan_atomics+0x152/0x310 [ 20.131804] kasan_atomics+0x1dc/0x310 [ 20.131865] ? __pfx_kasan_atomics+0x10/0x10 [ 20.131917] ? __pfx_read_tsc+0x10/0x10 [ 20.131962] ? ktime_get_ts64+0x86/0x230 [ 20.132012] kunit_try_run_case+0x1a5/0x480 [ 20.132124] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.132190] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.132242] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.132295] ? __kthread_parkme+0x82/0x180 [ 20.132334] ? preempt_count_sub+0x50/0x80 [ 20.132375] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.132417] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.132461] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.132492] kthread+0x337/0x6f0 [ 20.132516] ? trace_preempt_on+0x20/0xc0 [ 20.132544] ? __pfx_kthread+0x10/0x10 [ 20.132568] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.132592] ? calculate_sigpending+0x7b/0xa0 [ 20.132619] ? __pfx_kthread+0x10/0x10 [ 20.132643] ret_from_fork+0x116/0x1d0 [ 20.132689] ? __pfx_kthread+0x10/0x10 [ 20.132722] ret_from_fork_asm+0x1a/0x30 [ 20.132756] </TASK> [ 20.132771] [ 20.148235] Allocated by task 282: [ 20.148982] kasan_save_stack+0x45/0x70 [ 20.149483] kasan_save_track+0x18/0x40 [ 20.150031] kasan_save_alloc_info+0x3b/0x50 [ 20.150491] __kasan_kmalloc+0xb7/0xc0 [ 20.150946] __kmalloc_cache_noprof+0x189/0x420 [ 20.151188] kasan_atomics+0x95/0x310 [ 20.151554] kunit_try_run_case+0x1a5/0x480 [ 20.152657] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.153291] kthread+0x337/0x6f0 [ 20.153899] ret_from_fork+0x116/0x1d0 [ 20.154284] ret_from_fork_asm+0x1a/0x30 [ 20.154954] [ 20.155106] The buggy address belongs to the object at ffff888102b66500 [ 20.155106] which belongs to the cache kmalloc-64 of size 64 [ 20.155981] The buggy address is located 0 bytes to the right of [ 20.155981] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 20.157160] [ 20.157588] The buggy address belongs to the physical page: [ 20.158046] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 20.159048] flags: 0x200000000000000(node=0|zone=2) [ 20.159444] page_type: f5(slab) [ 20.159996] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.161058] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.161392] page dumped because: kasan: bad access detected [ 20.162550] [ 20.162722] Memory state around the buggy address: [ 20.162938] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.163482] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.164453] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.165525] ^ [ 20.165834] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.166316] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.167053] ================================================================== [ 21.433078] ================================================================== [ 21.433787] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 21.434183] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282 [ 21.434724] [ 21.434852] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 21.434938] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.434959] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.435009] Call Trace: [ 21.435050] <TASK> [ 21.435088] dump_stack_lvl+0x73/0xb0 [ 21.435157] print_report+0xd1/0x650 [ 21.435211] ? __virt_addr_valid+0x1db/0x2d0 [ 21.435275] ? kasan_atomics_helper+0x1d7a/0x5450 [ 21.435316] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.435353] ? kasan_atomics_helper+0x1d7a/0x5450 [ 21.435393] kasan_report+0x141/0x180 [ 21.435436] ? kasan_atomics_helper+0x1d7a/0x5450 [ 21.435488] kasan_check_range+0x10c/0x1c0 [ 21.435536] __kasan_check_write+0x18/0x20 [ 21.435581] kasan_atomics_helper+0x1d7a/0x5450 [ 21.435631] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.435715] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.435765] ? kasan_atomics+0x152/0x310 [ 21.435825] kasan_atomics+0x1dc/0x310 [ 21.435876] ? __pfx_kasan_atomics+0x10/0x10 [ 21.435932] ? __pfx_read_tsc+0x10/0x10 [ 21.435979] ? ktime_get_ts64+0x86/0x230 [ 21.436033] kunit_try_run_case+0x1a5/0x480 [ 21.436076] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.436116] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.436158] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.436197] ? __kthread_parkme+0x82/0x180 [ 21.436238] ? preempt_count_sub+0x50/0x80 [ 21.436302] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.436354] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.436405] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.436449] kthread+0x337/0x6f0 [ 21.436486] ? trace_preempt_on+0x20/0xc0 [ 21.436534] ? __pfx_kthread+0x10/0x10 [ 21.436574] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.436622] ? calculate_sigpending+0x7b/0xa0 [ 21.436709] ? __pfx_kthread+0x10/0x10 [ 21.436763] ret_from_fork+0x116/0x1d0 [ 21.436809] ? __pfx_kthread+0x10/0x10 [ 21.436859] ret_from_fork_asm+0x1a/0x30 [ 21.436928] </TASK> [ 21.436957] [ 21.446994] Allocated by task 282: [ 21.447253] kasan_save_stack+0x45/0x70 [ 21.447630] kasan_save_track+0x18/0x40 [ 21.447934] kasan_save_alloc_info+0x3b/0x50 [ 21.448253] __kasan_kmalloc+0xb7/0xc0 [ 21.448574] __kmalloc_cache_noprof+0x189/0x420 [ 21.448843] kasan_atomics+0x95/0x310 [ 21.449165] kunit_try_run_case+0x1a5/0x480 [ 21.449390] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.449632] kthread+0x337/0x6f0 [ 21.449842] ret_from_fork+0x116/0x1d0 [ 21.450163] ret_from_fork_asm+0x1a/0x30 [ 21.450512] [ 21.450710] The buggy address belongs to the object at ffff888102b66500 [ 21.450710] which belongs to the cache kmalloc-64 of size 64 [ 21.451554] The buggy address is located 0 bytes to the right of [ 21.451554] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 21.452151] [ 21.452295] The buggy address belongs to the physical page: [ 21.452524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 21.452858] flags: 0x200000000000000(node=0|zone=2) [ 21.453090] page_type: f5(slab) [ 21.453289] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.453899] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.454491] page dumped because: kasan: bad access detected [ 21.454951] [ 21.455146] Memory state around the buggy address: [ 21.455555] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.456137] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.456698] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.457124] ^ [ 21.457424] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.457955] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.458232] ================================================================== [ 19.812576] ================================================================== [ 19.813729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 19.814208] Read of size 4 at addr ffff888102b66530 by task kunit_try_catch/282 [ 19.815468] [ 19.815642] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 19.816018] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.816544] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.816636] Call Trace: [ 19.816682] <TASK> [ 19.816718] dump_stack_lvl+0x73/0xb0 [ 19.816787] print_report+0xd1/0x650 [ 19.816841] ? __virt_addr_valid+0x1db/0x2d0 [ 19.816888] ? kasan_atomics_helper+0x4b88/0x5450 [ 19.816951] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.816995] ? kasan_atomics_helper+0x4b88/0x5450 [ 19.817036] kasan_report+0x141/0x180 [ 19.817107] ? kasan_atomics_helper+0x4b88/0x5450 [ 19.817156] __asan_report_load4_noabort+0x18/0x20 [ 19.817193] kasan_atomics_helper+0x4b88/0x5450 [ 19.817224] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.817250] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.817300] ? kasan_atomics+0x152/0x310 [ 19.817329] kasan_atomics+0x1dc/0x310 [ 19.817353] ? __pfx_kasan_atomics+0x10/0x10 [ 19.817379] ? __pfx_read_tsc+0x10/0x10 [ 19.817402] ? ktime_get_ts64+0x86/0x230 [ 19.817428] kunit_try_run_case+0x1a5/0x480 [ 19.817455] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.817479] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.817504] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.817529] ? __kthread_parkme+0x82/0x180 [ 19.817552] ? preempt_count_sub+0x50/0x80 [ 19.817577] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.817603] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.817628] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.817666] kthread+0x337/0x6f0 [ 19.817714] ? trace_preempt_on+0x20/0xc0 [ 19.817741] ? __pfx_kthread+0x10/0x10 [ 19.817763] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.817786] ? calculate_sigpending+0x7b/0xa0 [ 19.817813] ? __pfx_kthread+0x10/0x10 [ 19.817837] ret_from_fork+0x116/0x1d0 [ 19.817857] ? __pfx_kthread+0x10/0x10 [ 19.817879] ret_from_fork_asm+0x1a/0x30 [ 19.817912] </TASK> [ 19.817925] [ 19.833403] Allocated by task 282: [ 19.833766] kasan_save_stack+0x45/0x70 [ 19.834140] kasan_save_track+0x18/0x40 [ 19.834460] kasan_save_alloc_info+0x3b/0x50 [ 19.834762] __kasan_kmalloc+0xb7/0xc0 [ 19.834912] __kmalloc_cache_noprof+0x189/0x420 [ 19.835361] kasan_atomics+0x95/0x310 [ 19.835788] kunit_try_run_case+0x1a5/0x480 [ 19.836144] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.836393] kthread+0x337/0x6f0 [ 19.836562] ret_from_fork+0x116/0x1d0 [ 19.836779] ret_from_fork_asm+0x1a/0x30 [ 19.837156] [ 19.837396] The buggy address belongs to the object at ffff888102b66500 [ 19.837396] which belongs to the cache kmalloc-64 of size 64 [ 19.838344] The buggy address is located 0 bytes to the right of [ 19.838344] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 19.838842] [ 19.838967] The buggy address belongs to the physical page: [ 19.839197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 19.839958] flags: 0x200000000000000(node=0|zone=2) [ 19.840491] page_type: f5(slab) [ 19.840805] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.841458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.842087] page dumped because: kasan: bad access detected [ 19.842517] [ 19.842763] Memory state around the buggy address: [ 19.843070] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.843359] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.843634] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.843900] ^ [ 19.844106] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.844641] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.845247] ================================================================== [ 21.514396] ================================================================== [ 21.515101] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 21.515736] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282 [ 21.516316] [ 21.516527] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 21.516634] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.516695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.516743] Call Trace: [ 21.516786] <TASK> [ 21.516829] dump_stack_lvl+0x73/0xb0 [ 21.516894] print_report+0xd1/0x650 [ 21.516945] ? __virt_addr_valid+0x1db/0x2d0 [ 21.516991] ? kasan_atomics_helper+0x1f43/0x5450 [ 21.517037] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.517083] ? kasan_atomics_helper+0x1f43/0x5450 [ 21.517133] kasan_report+0x141/0x180 [ 21.517179] ? kasan_atomics_helper+0x1f43/0x5450 [ 21.517236] kasan_check_range+0x10c/0x1c0 [ 21.517298] __kasan_check_write+0x18/0x20 [ 21.517342] kasan_atomics_helper+0x1f43/0x5450 [ 21.517393] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.517438] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.517484] ? kasan_atomics+0x152/0x310 [ 21.517537] kasan_atomics+0x1dc/0x310 [ 21.517583] ? __pfx_kasan_atomics+0x10/0x10 [ 21.517635] ? __pfx_read_tsc+0x10/0x10 [ 21.517715] ? ktime_get_ts64+0x86/0x230 [ 21.517769] kunit_try_run_case+0x1a5/0x480 [ 21.517816] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.517863] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.517911] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.517958] ? __kthread_parkme+0x82/0x180 [ 21.518002] ? preempt_count_sub+0x50/0x80 [ 21.518051] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.518097] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.518145] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.518192] kthread+0x337/0x6f0 [ 21.518235] ? trace_preempt_on+0x20/0xc0 [ 21.518299] ? __pfx_kthread+0x10/0x10 [ 21.518346] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.518393] ? calculate_sigpending+0x7b/0xa0 [ 21.518448] ? __pfx_kthread+0x10/0x10 [ 21.518499] ret_from_fork+0x116/0x1d0 [ 21.518542] ? __pfx_kthread+0x10/0x10 [ 21.518591] ret_from_fork_asm+0x1a/0x30 [ 21.518688] </TASK> [ 21.518721] [ 21.529950] Allocated by task 282: [ 21.530175] kasan_save_stack+0x45/0x70 [ 21.530563] kasan_save_track+0x18/0x40 [ 21.530912] kasan_save_alloc_info+0x3b/0x50 [ 21.531272] __kasan_kmalloc+0xb7/0xc0 [ 21.531608] __kmalloc_cache_noprof+0x189/0x420 [ 21.531999] kasan_atomics+0x95/0x310 [ 21.532345] kunit_try_run_case+0x1a5/0x480 [ 21.533079] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.533532] kthread+0x337/0x6f0 [ 21.533851] ret_from_fork+0x116/0x1d0 [ 21.534129] ret_from_fork_asm+0x1a/0x30 [ 21.534405] [ 21.534544] The buggy address belongs to the object at ffff888102b66500 [ 21.534544] which belongs to the cache kmalloc-64 of size 64 [ 21.535133] The buggy address is located 0 bytes to the right of [ 21.535133] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 21.535876] [ 21.536009] The buggy address belongs to the physical page: [ 21.536368] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 21.536856] flags: 0x200000000000000(node=0|zone=2) [ 21.537241] page_type: f5(slab) [ 21.537441] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.537990] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.538299] page dumped because: kasan: bad access detected [ 21.538524] [ 21.538641] Memory state around the buggy address: [ 21.538885] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.539168] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.539448] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.539741] ^ [ 21.539954] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.540218] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.540790] ================================================================== [ 20.559816] ================================================================== [ 20.560247] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 20.560704] Write of size 4 at addr ffff888102b66530 by task kunit_try_catch/282 [ 20.561653] [ 20.561815] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 20.561882] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.561898] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.561925] Call Trace: [ 20.561949] <TASK> [ 20.561979] dump_stack_lvl+0x73/0xb0 [ 20.562019] print_report+0xd1/0x650 [ 20.562047] ? __virt_addr_valid+0x1db/0x2d0 [ 20.562074] ? kasan_atomics_helper+0xf10/0x5450 [ 20.562099] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.562125] ? kasan_atomics_helper+0xf10/0x5450 [ 20.562150] kasan_report+0x141/0x180 [ 20.562175] ? kasan_atomics_helper+0xf10/0x5450 [ 20.562203] kasan_check_range+0x10c/0x1c0 [ 20.562230] __kasan_check_write+0x18/0x20 [ 20.562252] kasan_atomics_helper+0xf10/0x5450 [ 20.562310] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 20.562352] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.562396] ? kasan_atomics+0x152/0x310 [ 20.562447] kasan_atomics+0x1dc/0x310 [ 20.562497] ? __pfx_kasan_atomics+0x10/0x10 [ 20.562549] ? __pfx_read_tsc+0x10/0x10 [ 20.562602] ? ktime_get_ts64+0x86/0x230 [ 20.562666] kunit_try_run_case+0x1a5/0x480 [ 20.562720] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.562775] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.562829] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.562872] ? __kthread_parkme+0x82/0x180 [ 20.562913] ? preempt_count_sub+0x50/0x80 [ 20.562950] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.562977] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.563018] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.563046] kthread+0x337/0x6f0 [ 20.563069] ? trace_preempt_on+0x20/0xc0 [ 20.563097] ? __pfx_kthread+0x10/0x10 [ 20.563120] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.563144] ? calculate_sigpending+0x7b/0xa0 [ 20.563171] ? __pfx_kthread+0x10/0x10 [ 20.563195] ret_from_fork+0x116/0x1d0 [ 20.563216] ? __pfx_kthread+0x10/0x10 [ 20.563239] ret_from_fork_asm+0x1a/0x30 [ 20.563285] </TASK> [ 20.563301] [ 20.576967] Allocated by task 282: [ 20.577298] kasan_save_stack+0x45/0x70 [ 20.577543] kasan_save_track+0x18/0x40 [ 20.578151] kasan_save_alloc_info+0x3b/0x50 [ 20.578494] __kasan_kmalloc+0xb7/0xc0 [ 20.578925] __kmalloc_cache_noprof+0x189/0x420 [ 20.579597] kasan_atomics+0x95/0x310 [ 20.580017] kunit_try_run_case+0x1a5/0x480 [ 20.580221] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.580427] kthread+0x337/0x6f0 [ 20.580614] ret_from_fork+0x116/0x1d0 [ 20.581212] ret_from_fork_asm+0x1a/0x30 [ 20.581902] [ 20.582022] The buggy address belongs to the object at ffff888102b66500 [ 20.582022] which belongs to the cache kmalloc-64 of size 64 [ 20.583388] The buggy address is located 0 bytes to the right of [ 20.583388] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 20.584313] [ 20.584524] The buggy address belongs to the physical page: [ 20.585016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 20.585884] flags: 0x200000000000000(node=0|zone=2) [ 20.586128] page_type: f5(slab) [ 20.586299] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 20.587439] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.587938] page dumped because: kasan: bad access detected [ 20.588466] [ 20.588646] Memory state around the buggy address: [ 20.589070] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.589352] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.590423] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.590794] ^ [ 20.591150] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.591544] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.592079] ================================================================== [ 19.918499] ================================================================== [ 19.919459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 19.919848] Read of size 4 at addr ffff888102b66530 by task kunit_try_catch/282 [ 19.920312] [ 19.920502] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 19.920603] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.920620] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.920650] Call Trace: [ 19.920689] <TASK> [ 19.920725] dump_stack_lvl+0x73/0xb0 [ 19.920788] print_report+0xd1/0x650 [ 19.920836] ? __virt_addr_valid+0x1db/0x2d0 [ 19.920887] ? kasan_atomics_helper+0x4b54/0x5450 [ 19.920932] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.920974] ? kasan_atomics_helper+0x4b54/0x5450 [ 19.921010] kasan_report+0x141/0x180 [ 19.921041] ? kasan_atomics_helper+0x4b54/0x5450 [ 19.921078] __asan_report_load4_noabort+0x18/0x20 [ 19.921104] kasan_atomics_helper+0x4b54/0x5450 [ 19.921129] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.921156] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.921180] ? kasan_atomics+0x152/0x310 [ 19.921208] kasan_atomics+0x1dc/0x310 [ 19.921233] ? __pfx_kasan_atomics+0x10/0x10 [ 19.921279] ? __pfx_read_tsc+0x10/0x10 [ 19.921307] ? ktime_get_ts64+0x86/0x230 [ 19.921335] kunit_try_run_case+0x1a5/0x480 [ 19.921362] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.921387] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.921413] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.921438] ? __kthread_parkme+0x82/0x180 [ 19.921462] ? preempt_count_sub+0x50/0x80 [ 19.921489] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.921515] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.921541] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.921566] kthread+0x337/0x6f0 [ 19.921588] ? trace_preempt_on+0x20/0xc0 [ 19.921614] ? __pfx_kthread+0x10/0x10 [ 19.921638] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.921667] ? calculate_sigpending+0x7b/0xa0 [ 19.922339] ? __pfx_kthread+0x10/0x10 [ 19.922369] ret_from_fork+0x116/0x1d0 [ 19.922394] ? __pfx_kthread+0x10/0x10 [ 19.922418] ret_from_fork_asm+0x1a/0x30 [ 19.922451] </TASK> [ 19.922465] [ 19.936612] Allocated by task 282: [ 19.937075] kasan_save_stack+0x45/0x70 [ 19.937793] kasan_save_track+0x18/0x40 [ 19.938023] kasan_save_alloc_info+0x3b/0x50 [ 19.938472] __kasan_kmalloc+0xb7/0xc0 [ 19.938985] __kmalloc_cache_noprof+0x189/0x420 [ 19.939616] kasan_atomics+0x95/0x310 [ 19.939881] kunit_try_run_case+0x1a5/0x480 [ 19.940768] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.941128] kthread+0x337/0x6f0 [ 19.941242] ret_from_fork+0x116/0x1d0 [ 19.941417] ret_from_fork_asm+0x1a/0x30 [ 19.941532] [ 19.941594] The buggy address belongs to the object at ffff888102b66500 [ 19.941594] which belongs to the cache kmalloc-64 of size 64 [ 19.942103] The buggy address is located 0 bytes to the right of [ 19.942103] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 19.943674] [ 19.943959] The buggy address belongs to the physical page: [ 19.944444] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 19.945417] flags: 0x200000000000000(node=0|zone=2) [ 19.945822] page_type: f5(slab) [ 19.946420] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.946913] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.947552] page dumped because: kasan: bad access detected [ 19.948462] [ 19.948850] Memory state around the buggy address: [ 19.949542] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.950326] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.950781] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.951323] ^ [ 19.952087] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.953326] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.953765] ================================================================== [ 21.542398] ================================================================== [ 21.543033] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 21.543681] Read of size 8 at addr ffff888102b66530 by task kunit_try_catch/282 [ 21.544217] [ 21.544453] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 21.544560] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.544588] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.544632] Call Trace: [ 21.544700] <TASK> [ 21.544746] dump_stack_lvl+0x73/0xb0 [ 21.544813] print_report+0xd1/0x650 [ 21.544867] ? __virt_addr_valid+0x1db/0x2d0 [ 21.544923] ? kasan_atomics_helper+0x4f71/0x5450 [ 21.544975] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.545028] ? kasan_atomics_helper+0x4f71/0x5450 [ 21.545079] kasan_report+0x141/0x180 [ 21.545132] ? kasan_atomics_helper+0x4f71/0x5450 [ 21.545198] __asan_report_load8_noabort+0x18/0x20 [ 21.545247] kasan_atomics_helper+0x4f71/0x5450 [ 21.545315] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.545368] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.545420] ? kasan_atomics+0x152/0x310 [ 21.545478] kasan_atomics+0x1dc/0x310 [ 21.545532] ? __pfx_kasan_atomics+0x10/0x10 [ 21.545588] ? __pfx_read_tsc+0x10/0x10 [ 21.545635] ? ktime_get_ts64+0x86/0x230 [ 21.545724] kunit_try_run_case+0x1a5/0x480 [ 21.545771] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.545815] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.545864] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.545912] ? __kthread_parkme+0x82/0x180 [ 21.545948] ? preempt_count_sub+0x50/0x80 [ 21.545993] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.546040] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.546080] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.546121] kthread+0x337/0x6f0 [ 21.546161] ? trace_preempt_on+0x20/0xc0 [ 21.546210] ? __pfx_kthread+0x10/0x10 [ 21.546249] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.546302] ? calculate_sigpending+0x7b/0xa0 [ 21.546352] ? __pfx_kthread+0x10/0x10 [ 21.546398] ret_from_fork+0x116/0x1d0 [ 21.546437] ? __pfx_kthread+0x10/0x10 [ 21.546480] ret_from_fork_asm+0x1a/0x30 [ 21.546544] </TASK> [ 21.546570] [ 21.556985] Allocated by task 282: [ 21.557200] kasan_save_stack+0x45/0x70 [ 21.557479] kasan_save_track+0x18/0x40 [ 21.557853] kasan_save_alloc_info+0x3b/0x50 [ 21.558231] __kasan_kmalloc+0xb7/0xc0 [ 21.558581] __kmalloc_cache_noprof+0x189/0x420 [ 21.558996] kasan_atomics+0x95/0x310 [ 21.559312] kunit_try_run_case+0x1a5/0x480 [ 21.559691] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.559963] kthread+0x337/0x6f0 [ 21.560270] ret_from_fork+0x116/0x1d0 [ 21.560482] ret_from_fork_asm+0x1a/0x30 [ 21.560810] [ 21.560978] The buggy address belongs to the object at ffff888102b66500 [ 21.560978] which belongs to the cache kmalloc-64 of size 64 [ 21.561531] The buggy address is located 0 bytes to the right of [ 21.561531] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 21.562213] [ 21.562424] The buggy address belongs to the physical page: [ 21.562763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 21.563182] flags: 0x200000000000000(node=0|zone=2) [ 21.563431] page_type: f5(slab) [ 21.563624] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.563950] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.564233] page dumped because: kasan: bad access detected [ 21.564647] [ 21.564842] Memory state around the buggy address: [ 21.565190] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.565706] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.566255] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.566820] ^ [ 21.567203] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.567775] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.568319] ================================================================== [ 21.219432] ================================================================== [ 21.220138] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 21.220599] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282 [ 21.221353] [ 21.221511] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 21.221597] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.221618] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.221678] Call Trace: [ 21.221719] <TASK> [ 21.221757] dump_stack_lvl+0x73/0xb0 [ 21.221820] print_report+0xd1/0x650 [ 21.221894] ? __virt_addr_valid+0x1db/0x2d0 [ 21.221939] ? kasan_atomics_helper+0x194a/0x5450 [ 21.221983] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.222030] ? kasan_atomics_helper+0x194a/0x5450 [ 21.222097] kasan_report+0x141/0x180 [ 21.222147] ? kasan_atomics_helper+0x194a/0x5450 [ 21.222207] kasan_check_range+0x10c/0x1c0 [ 21.222277] __kasan_check_write+0x18/0x20 [ 21.222321] kasan_atomics_helper+0x194a/0x5450 [ 21.222367] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.222416] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.222483] ? kasan_atomics+0x152/0x310 [ 21.222538] kasan_atomics+0x1dc/0x310 [ 21.222589] ? __pfx_kasan_atomics+0x10/0x10 [ 21.222642] ? __pfx_read_tsc+0x10/0x10 [ 21.222716] ? ktime_get_ts64+0x86/0x230 [ 21.222762] kunit_try_run_case+0x1a5/0x480 [ 21.222811] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.222858] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.222928] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.222998] ? __kthread_parkme+0x82/0x180 [ 21.223061] ? preempt_count_sub+0x50/0x80 [ 21.223125] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.223180] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.223244] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.223320] kthread+0x337/0x6f0 [ 21.223380] ? trace_preempt_on+0x20/0xc0 [ 21.223433] ? __pfx_kthread+0x10/0x10 [ 21.223492] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.223549] ? calculate_sigpending+0x7b/0xa0 [ 21.223612] ? __pfx_kthread+0x10/0x10 [ 21.223699] ret_from_fork+0x116/0x1d0 [ 21.223758] ? __pfx_kthread+0x10/0x10 [ 21.223807] ret_from_fork_asm+0x1a/0x30 [ 21.223898] </TASK> [ 21.223928] [ 21.234350] Allocated by task 282: [ 21.234618] kasan_save_stack+0x45/0x70 [ 21.234998] kasan_save_track+0x18/0x40 [ 21.235233] kasan_save_alloc_info+0x3b/0x50 [ 21.235484] __kasan_kmalloc+0xb7/0xc0 [ 21.235753] __kmalloc_cache_noprof+0x189/0x420 [ 21.235999] kasan_atomics+0x95/0x310 [ 21.236223] kunit_try_run_case+0x1a5/0x480 [ 21.236605] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.237088] kthread+0x337/0x6f0 [ 21.237429] ret_from_fork+0x116/0x1d0 [ 21.237784] ret_from_fork_asm+0x1a/0x30 [ 21.238145] [ 21.238390] The buggy address belongs to the object at ffff888102b66500 [ 21.238390] which belongs to the cache kmalloc-64 of size 64 [ 21.239735] The buggy address is located 0 bytes to the right of [ 21.239735] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 21.240506] [ 21.240636] The buggy address belongs to the physical page: [ 21.241836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 21.242161] flags: 0x200000000000000(node=0|zone=2) [ 21.242410] page_type: f5(slab) [ 21.242595] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.245609] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.246142] page dumped because: kasan: bad access detected [ 21.246518] [ 21.246648] Memory state around the buggy address: [ 21.247619] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.247934] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.248468] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.249009] ^ [ 21.249418] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.249922] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.250411] ================================================================== [ 21.190799] ================================================================== [ 21.191332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 21.191698] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282 [ 21.191990] [ 21.192138] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 21.192275] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.192298] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.192334] Call Trace: [ 21.192371] <TASK> [ 21.192406] dump_stack_lvl+0x73/0xb0 [ 21.192455] print_report+0xd1/0x650 [ 21.192492] ? __virt_addr_valid+0x1db/0x2d0 [ 21.192528] ? kasan_atomics_helper+0x18b1/0x5450 [ 21.192565] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.192608] ? kasan_atomics_helper+0x18b1/0x5450 [ 21.192707] kasan_report+0x141/0x180 [ 21.192758] ? kasan_atomics_helper+0x18b1/0x5450 [ 21.192812] kasan_check_range+0x10c/0x1c0 [ 21.192877] __kasan_check_write+0x18/0x20 [ 21.192918] kasan_atomics_helper+0x18b1/0x5450 [ 21.192962] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.193005] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.193050] ? kasan_atomics+0x152/0x310 [ 21.193097] kasan_atomics+0x1dc/0x310 [ 21.193138] ? __pfx_kasan_atomics+0x10/0x10 [ 21.193188] ? __pfx_read_tsc+0x10/0x10 [ 21.193268] ? ktime_get_ts64+0x86/0x230 [ 21.193323] kunit_try_run_case+0x1a5/0x480 [ 21.193373] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.193424] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.193476] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.193525] ? __kthread_parkme+0x82/0x180 [ 21.193574] ? preempt_count_sub+0x50/0x80 [ 21.193629] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.193732] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.193785] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.193835] kthread+0x337/0x6f0 [ 21.193879] ? trace_preempt_on+0x20/0xc0 [ 21.193930] ? __pfx_kthread+0x10/0x10 [ 21.193996] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.194044] ? calculate_sigpending+0x7b/0xa0 [ 21.194095] ? __pfx_kthread+0x10/0x10 [ 21.194143] ret_from_fork+0x116/0x1d0 [ 21.194186] ? __pfx_kthread+0x10/0x10 [ 21.194253] ret_from_fork_asm+0x1a/0x30 [ 21.194333] </TASK> [ 21.194359] [ 21.206166] Allocated by task 282: [ 21.206498] kasan_save_stack+0x45/0x70 [ 21.206848] kasan_save_track+0x18/0x40 [ 21.207118] kasan_save_alloc_info+0x3b/0x50 [ 21.207373] __kasan_kmalloc+0xb7/0xc0 [ 21.207567] __kmalloc_cache_noprof+0x189/0x420 [ 21.207834] kasan_atomics+0x95/0x310 [ 21.208062] kunit_try_run_case+0x1a5/0x480 [ 21.208317] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.208792] kthread+0x337/0x6f0 [ 21.209105] ret_from_fork+0x116/0x1d0 [ 21.209458] ret_from_fork_asm+0x1a/0x30 [ 21.209845] [ 21.210029] The buggy address belongs to the object at ffff888102b66500 [ 21.210029] which belongs to the cache kmalloc-64 of size 64 [ 21.210942] The buggy address is located 0 bytes to the right of [ 21.210942] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 21.211913] [ 21.212126] The buggy address belongs to the physical page: [ 21.212434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 21.212926] flags: 0x200000000000000(node=0|zone=2) [ 21.213317] page_type: f5(slab) [ 21.213616] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.214168] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.214568] page dumped because: kasan: bad access detected [ 21.214983] [ 21.215137] Memory state around the buggy address: [ 21.215452] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.215858] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.216407] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.216897] ^ [ 21.217199] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.217621] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.218156] ================================================================== [ 21.163168] ================================================================== [ 21.163783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 21.164349] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282 [ 21.164700] [ 21.164927] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 21.165010] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.165031] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.165068] Call Trace: [ 21.165104] <TASK> [ 21.165138] dump_stack_lvl+0x73/0xb0 [ 21.165189] print_report+0xd1/0x650 [ 21.165230] ? __virt_addr_valid+0x1db/0x2d0 [ 21.165288] ? kasan_atomics_helper+0x1818/0x5450 [ 21.165333] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.165383] ? kasan_atomics_helper+0x1818/0x5450 [ 21.165433] kasan_report+0x141/0x180 [ 21.165485] ? kasan_atomics_helper+0x1818/0x5450 [ 21.165542] kasan_check_range+0x10c/0x1c0 [ 21.165594] __kasan_check_write+0x18/0x20 [ 21.165632] kasan_atomics_helper+0x1818/0x5450 [ 21.165717] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.165790] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.165839] ? kasan_atomics+0x152/0x310 [ 21.165901] kasan_atomics+0x1dc/0x310 [ 21.165947] ? __pfx_kasan_atomics+0x10/0x10 [ 21.165996] ? __pfx_read_tsc+0x10/0x10 [ 21.166039] ? ktime_get_ts64+0x86/0x230 [ 21.166093] kunit_try_run_case+0x1a5/0x480 [ 21.166150] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.166194] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.166240] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.166302] ? __kthread_parkme+0x82/0x180 [ 21.166372] ? preempt_count_sub+0x50/0x80 [ 21.166421] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.166475] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.166522] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.166591] kthread+0x337/0x6f0 [ 21.166637] ? trace_preempt_on+0x20/0xc0 [ 21.166724] ? __pfx_kthread+0x10/0x10 [ 21.166766] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.166806] ? calculate_sigpending+0x7b/0xa0 [ 21.166842] ? __pfx_kthread+0x10/0x10 [ 21.166868] ret_from_fork+0x116/0x1d0 [ 21.166890] ? __pfx_kthread+0x10/0x10 [ 21.166914] ret_from_fork_asm+0x1a/0x30 [ 21.166949] </TASK> [ 21.166964] [ 21.177555] Allocated by task 282: [ 21.177960] kasan_save_stack+0x45/0x70 [ 21.178291] kasan_save_track+0x18/0x40 [ 21.178534] kasan_save_alloc_info+0x3b/0x50 [ 21.178803] __kasan_kmalloc+0xb7/0xc0 [ 21.179033] __kmalloc_cache_noprof+0x189/0x420 [ 21.179285] kasan_atomics+0x95/0x310 [ 21.179617] kunit_try_run_case+0x1a5/0x480 [ 21.180029] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.180490] kthread+0x337/0x6f0 [ 21.180828] ret_from_fork+0x116/0x1d0 [ 21.181166] ret_from_fork_asm+0x1a/0x30 [ 21.181525] [ 21.181746] The buggy address belongs to the object at ffff888102b66500 [ 21.181746] which belongs to the cache kmalloc-64 of size 64 [ 21.182470] The buggy address is located 0 bytes to the right of [ 21.182470] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 21.183067] [ 21.183283] The buggy address belongs to the physical page: [ 21.183752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 21.184189] flags: 0x200000000000000(node=0|zone=2) [ 21.184544] page_type: f5(slab) [ 21.184882] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.185214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.185824] page dumped because: kasan: bad access detected [ 21.186199] [ 21.186411] Memory state around the buggy address: [ 21.186722] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.187064] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.187425] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.187993] ^ [ 21.188409] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.188801] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.189329] ================================================================== [ 21.103193] ================================================================== [ 21.104787] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 21.105154] Write of size 8 at addr ffff888102b66530 by task kunit_try_catch/282 [ 21.105597] [ 21.105760] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 21.105892] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.105923] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.105979] Call Trace: [ 21.106020] <TASK> [ 21.106060] dump_stack_lvl+0x73/0xb0 [ 21.106122] print_report+0xd1/0x650 [ 21.106172] ? __virt_addr_valid+0x1db/0x2d0 [ 21.106243] ? kasan_atomics_helper+0x16e7/0x5450 [ 21.106302] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.106355] ? kasan_atomics_helper+0x16e7/0x5450 [ 21.106408] kasan_report+0x141/0x180 [ 21.106461] ? kasan_atomics_helper+0x16e7/0x5450 [ 21.106522] kasan_check_range+0x10c/0x1c0 [ 21.106573] __kasan_check_write+0x18/0x20 [ 21.106617] kasan_atomics_helper+0x16e7/0x5450 [ 21.106682] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.106726] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.106790] ? kasan_atomics+0x152/0x310 [ 21.106846] kasan_atomics+0x1dc/0x310 [ 21.106899] ? __pfx_kasan_atomics+0x10/0x10 [ 21.106936] ? __pfx_read_tsc+0x10/0x10 [ 21.106962] ? ktime_get_ts64+0x86/0x230 [ 21.106997] kunit_try_run_case+0x1a5/0x480 [ 21.107036] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.107062] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.107088] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.107113] ? __kthread_parkme+0x82/0x180 [ 21.107137] ? preempt_count_sub+0x50/0x80 [ 21.107164] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.107191] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.107218] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.107243] kthread+0x337/0x6f0 [ 21.107295] ? trace_preempt_on+0x20/0xc0 [ 21.107324] ? __pfx_kthread+0x10/0x10 [ 21.107347] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.107370] ? calculate_sigpending+0x7b/0xa0 [ 21.107447] ? __pfx_kthread+0x10/0x10 [ 21.107492] ret_from_fork+0x116/0x1d0 [ 21.107533] ? __pfx_kthread+0x10/0x10 [ 21.107566] ret_from_fork_asm+0x1a/0x30 [ 21.107611] </TASK> [ 21.107626] [ 21.118039] Allocated by task 282: [ 21.118456] kasan_save_stack+0x45/0x70 [ 21.118889] kasan_save_track+0x18/0x40 [ 21.119338] kasan_save_alloc_info+0x3b/0x50 [ 21.119824] __kasan_kmalloc+0xb7/0xc0 [ 21.120248] __kmalloc_cache_noprof+0x189/0x420 [ 21.120720] kasan_atomics+0x95/0x310 [ 21.121151] kunit_try_run_case+0x1a5/0x480 [ 21.121604] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.122144] kthread+0x337/0x6f0 [ 21.122458] ret_from_fork+0x116/0x1d0 [ 21.122872] ret_from_fork_asm+0x1a/0x30 [ 21.123282] [ 21.123440] The buggy address belongs to the object at ffff888102b66500 [ 21.123440] which belongs to the cache kmalloc-64 of size 64 [ 21.124034] The buggy address is located 0 bytes to the right of [ 21.124034] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 21.124843] [ 21.125013] The buggy address belongs to the physical page: [ 21.125255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 21.125911] flags: 0x200000000000000(node=0|zone=2) [ 21.126197] page_type: f5(slab) [ 21.126474] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.127012] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.127326] page dumped because: kasan: bad access detected [ 21.127773] [ 21.127964] Memory state around the buggy address: [ 21.128446] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.128919] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.129216] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.129801] ^ [ 21.130110] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.130398] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.131035] ================================================================== [ 21.596241] ================================================================== [ 21.596878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 21.597460] Read of size 8 at addr ffff888102b66530 by task kunit_try_catch/282 [ 21.597984] [ 21.598205] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 21.599566] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.599609] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.599688] Call Trace: [ 21.599734] <TASK> [ 21.599774] dump_stack_lvl+0x73/0xb0 [ 21.599849] print_report+0xd1/0x650 [ 21.599897] ? __virt_addr_valid+0x1db/0x2d0 [ 21.599946] ? kasan_atomics_helper+0x4f98/0x5450 [ 21.599992] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.600038] ? kasan_atomics_helper+0x4f98/0x5450 [ 21.600085] kasan_report+0x141/0x180 [ 21.600132] ? kasan_atomics_helper+0x4f98/0x5450 [ 21.600190] __asan_report_load8_noabort+0x18/0x20 [ 21.600239] kasan_atomics_helper+0x4f98/0x5450 [ 21.600306] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.600358] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.600410] ? kasan_atomics+0x152/0x310 [ 21.600471] kasan_atomics+0x1dc/0x310 [ 21.600525] ? __pfx_kasan_atomics+0x10/0x10 [ 21.600580] ? __pfx_read_tsc+0x10/0x10 [ 21.600628] ? ktime_get_ts64+0x86/0x230 [ 21.600720] kunit_try_run_case+0x1a5/0x480 [ 21.600778] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.600830] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.600883] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.600935] ? __kthread_parkme+0x82/0x180 [ 21.600983] ? preempt_count_sub+0x50/0x80 [ 21.601040] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.601092] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.601144] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.601195] kthread+0x337/0x6f0 [ 21.601240] ? trace_preempt_on+0x20/0xc0 [ 21.601301] ? __pfx_kthread+0x10/0x10 [ 21.601347] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.601387] ? calculate_sigpending+0x7b/0xa0 [ 21.601435] ? __pfx_kthread+0x10/0x10 [ 21.601479] ret_from_fork+0x116/0x1d0 [ 21.601522] ? __pfx_kthread+0x10/0x10 [ 21.601571] ret_from_fork_asm+0x1a/0x30 [ 21.601641] </TASK> [ 21.601701] [ 21.611387] Allocated by task 282: [ 21.611730] kasan_save_stack+0x45/0x70 [ 21.612103] kasan_save_track+0x18/0x40 [ 21.612434] kasan_save_alloc_info+0x3b/0x50 [ 21.612806] __kasan_kmalloc+0xb7/0xc0 [ 21.613009] __kmalloc_cache_noprof+0x189/0x420 [ 21.613223] kasan_atomics+0x95/0x310 [ 21.613561] kunit_try_run_case+0x1a5/0x480 [ 21.613969] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.614393] kthread+0x337/0x6f0 [ 21.615748] ret_from_fork+0x116/0x1d0 [ 21.616096] ret_from_fork_asm+0x1a/0x30 [ 21.616316] [ 21.616440] The buggy address belongs to the object at ffff888102b66500 [ 21.616440] which belongs to the cache kmalloc-64 of size 64 [ 21.616897] The buggy address is located 0 bytes to the right of [ 21.616897] allocated 48-byte region [ffff888102b66500, ffff888102b66530) [ 21.619217] [ 21.619430] The buggy address belongs to the physical page: [ 21.619865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b66 [ 21.620476] flags: 0x200000000000000(node=0|zone=2) [ 21.620922] page_type: f5(slab) [ 21.621126] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.621606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.622114] page dumped because: kasan: bad access detected [ 21.622374] [ 21.622491] Memory state around the buggy address: [ 21.622739] ffff888102b66400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.623023] ffff888102b66480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.623515] >ffff888102b66500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.624086] ^ [ 21.624480] ffff888102b66580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.625052] ffff888102b66600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.625429] ==================================================================