Date
May 13, 2025, 12:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 22.083925] ================================================================== [ 22.084026] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 22.084521] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.086015] [ 22.086107] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.086221] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.086256] Hardware name: linux,dummy-virt (DT) [ 22.086296] Call trace: [ 22.086328] show_stack+0x20/0x38 (C) [ 22.086396] dump_stack_lvl+0x8c/0xd0 [ 22.086465] print_report+0x118/0x608 [ 22.086524] kasan_report+0xdc/0x128 [ 22.086581] kasan_check_range+0x100/0x1a8 [ 22.086637] __kasan_check_write+0x20/0x30 [ 22.086693] kasan_atomics_helper+0x154c/0x4858 [ 22.086751] kasan_atomics+0x198/0x2e0 [ 22.086806] kunit_try_run_case+0x170/0x3f0 [ 22.086863] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.086925] kthread+0x328/0x630 [ 22.086988] ret_from_fork+0x10/0x20 [ 22.087052] [ 22.087077] Allocated by task 265: [ 22.087113] kasan_save_stack+0x3c/0x68 [ 22.088819] kasan_save_track+0x20/0x40 [ 22.088930] kasan_save_alloc_info+0x40/0x58 [ 22.089037] __kasan_kmalloc+0xd4/0xd8 [ 22.089117] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.089166] kasan_atomics+0xb8/0x2e0 [ 22.089224] kunit_try_run_case+0x170/0x3f0 [ 22.089325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.089428] kthread+0x328/0x630 [ 22.089526] ret_from_fork+0x10/0x20 [ 22.089572] [ 22.089605] The buggy address belongs to the object at fff00000c59de300 [ 22.089605] which belongs to the cache kmalloc-64 of size 64 [ 22.089685] The buggy address is located 0 bytes to the right of [ 22.089685] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.089759] [ 22.089786] The buggy address belongs to the physical page: [ 22.089850] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.089918] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.090021] page_type: f5(slab) [ 22.090076] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.090135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.090185] page dumped because: kasan: bad access detected [ 22.090225] [ 22.090249] Memory state around the buggy address: [ 22.090290] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.090370] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.090423] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.090491] ^ [ 22.090557] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.090612] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.090672] ================================================================== [ 22.091569] ================================================================== [ 22.091648] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 22.091727] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.091787] [ 22.091830] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.091927] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.091960] Hardware name: linux,dummy-virt (DT) [ 22.092018] Call trace: [ 22.092049] show_stack+0x20/0x38 (C) [ 22.092109] dump_stack_lvl+0x8c/0xd0 [ 22.092164] print_report+0x118/0x608 [ 22.092216] kasan_report+0xdc/0x128 [ 22.092270] kasan_check_range+0x100/0x1a8 [ 22.092323] __kasan_check_write+0x20/0x30 [ 22.092376] kasan_atomics_helper+0x15b4/0x4858 [ 22.092439] kasan_atomics+0x198/0x2e0 [ 22.092551] kunit_try_run_case+0x170/0x3f0 [ 22.092670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.092731] kthread+0x328/0x630 [ 22.092784] ret_from_fork+0x10/0x20 [ 22.092841] [ 22.092866] Allocated by task 265: [ 22.092902] kasan_save_stack+0x3c/0x68 [ 22.092953] kasan_save_track+0x20/0x40 [ 22.093014] kasan_save_alloc_info+0x40/0x58 [ 22.093062] __kasan_kmalloc+0xd4/0xd8 [ 22.093105] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.093151] kasan_atomics+0xb8/0x2e0 [ 22.093220] kunit_try_run_case+0x170/0x3f0 [ 22.093277] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.093338] kthread+0x328/0x630 [ 22.093391] ret_from_fork+0x10/0x20 [ 22.093445] [ 22.094009] The buggy address belongs to the object at fff00000c59de300 [ 22.094009] which belongs to the cache kmalloc-64 of size 64 [ 22.094085] The buggy address is located 0 bytes to the right of [ 22.094085] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.094161] [ 22.094707] The buggy address belongs to the physical page: [ 22.094805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.094876] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.095175] page_type: f5(slab) [ 22.095256] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.095325] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.095376] page dumped because: kasan: bad access detected [ 22.095425] [ 22.095457] Memory state around the buggy address: [ 22.095508] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.095561] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.096014] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.096100] ^ [ 22.096169] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.096264] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.096344] ================================================================== [ 21.835378] ================================================================== [ 21.835462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 21.835544] Read of size 4 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.835606] [ 21.835652] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.835758] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.835795] Hardware name: linux,dummy-virt (DT) [ 21.835878] Call trace: [ 21.835917] show_stack+0x20/0x38 (C) [ 21.835993] dump_stack_lvl+0x8c/0xd0 [ 21.836056] print_report+0x118/0x608 [ 21.836135] kasan_report+0xdc/0x128 [ 21.836198] __asan_report_load4_noabort+0x20/0x30 [ 21.836261] kasan_atomics_helper+0x3dcc/0x4858 [ 21.836324] kasan_atomics+0x198/0x2e0 [ 21.836376] kunit_try_run_case+0x170/0x3f0 [ 21.836455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.836527] kthread+0x328/0x630 [ 21.836583] ret_from_fork+0x10/0x20 [ 21.836643] [ 21.836670] Allocated by task 265: [ 21.836708] kasan_save_stack+0x3c/0x68 [ 21.836761] kasan_save_track+0x20/0x40 [ 21.836806] kasan_save_alloc_info+0x40/0x58 [ 21.836852] __kasan_kmalloc+0xd4/0xd8 [ 21.836897] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.836943] kasan_atomics+0xb8/0x2e0 [ 21.837001] kunit_try_run_case+0x170/0x3f0 [ 21.837078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.837131] kthread+0x328/0x630 [ 21.837173] ret_from_fork+0x10/0x20 [ 21.838105] [ 21.838168] The buggy address belongs to the object at fff00000c59de300 [ 21.838168] which belongs to the cache kmalloc-64 of size 64 [ 21.838249] The buggy address is located 0 bytes to the right of [ 21.838249] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 21.838325] [ 21.838359] The buggy address belongs to the physical page: [ 21.838409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 21.838658] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.838725] page_type: f5(slab) [ 21.838877] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.839165] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.839243] page dumped because: kasan: bad access detected [ 21.839388] [ 21.839418] Memory state around the buggy address: [ 21.839605] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.839792] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.841735] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 21.845951] kthread+0x328/0x630 [ 21.847457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.850843] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.854364] print_report+0x118/0x608 [ 21.857769] kasan_save_alloc_info+0x40/0x58 [ 21.859215] [ 21.861231] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.866995] [ 21.868774] ret_from_fork+0x10/0x20 [ 21.870195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.870620] page dumped because: kasan: bad access detected [ 21.870772] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.879072] kunit_try_run_case+0x170/0x3f0 [ 21.881700] page dumped because: kasan: bad access detected [ 21.882798] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.886526] Hardware name: linux,dummy-virt (DT) [ 21.887964] kasan_save_alloc_info+0x40/0x58 [ 21.889479] [ 21.889509] The buggy address belongs to the object at fff00000c59de300 [ 21.889509] which belongs to the cache kmalloc-64 of size 64 [ 21.891154] page dumped because: kasan: bad access detected [ 21.891319] [ 21.891384] Memory state around the buggy address: [ 21.891433] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.891487] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.891625] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.891676] ^ [ 21.892053] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.892234] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.892286] ================================================================== [ 21.977845] ================================================================== [ 21.977925] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 21.978015] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.978077] [ 21.978122] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.978224] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.978257] Hardware name: linux,dummy-virt (DT) [ 21.978299] Call trace: [ 21.978329] show_stack+0x20/0x38 (C) [ 21.978391] dump_stack_lvl+0x8c/0xd0 [ 21.978448] print_report+0x118/0x608 [ 21.978503] kasan_report+0xdc/0x128 [ 21.978557] kasan_check_range+0x100/0x1a8 [ 21.978615] __kasan_check_write+0x20/0x30 [ 21.978673] kasan_atomics_helper+0xf20/0x4858 [ 21.978731] kasan_atomics+0x198/0x2e0 [ 21.978785] kunit_try_run_case+0x170/0x3f0 [ 21.978840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.978903] kthread+0x328/0x630 [ 21.978957] ret_from_fork+0x10/0x20 [ 21.979471] [ 21.980061] Allocated by task 265: [ 21.980155] kasan_save_stack+0x3c/0x68 [ 21.980573] kasan_save_track+0x20/0x40 [ 21.980881] kasan_save_alloc_info+0x40/0x58 [ 21.981101] __kasan_kmalloc+0xd4/0xd8 [ 21.981469] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.981600] kasan_atomics+0xb8/0x2e0 [ 21.981656] kunit_try_run_case+0x170/0x3f0 [ 21.981705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.982003] kthread+0x328/0x630 [ 21.982250] ret_from_fork+0x10/0x20 [ 21.982592] [ 21.982636] The buggy address belongs to the object at fff00000c59de300 [ 21.982636] which belongs to the cache kmalloc-64 of size 64 [ 21.982722] The buggy address is located 0 bytes to the right of [ 21.982722] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 21.982801] [ 21.982829] The buggy address belongs to the physical page: [ 21.983257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 21.983398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.983479] page_type: f5(slab) [ 21.983560] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.983731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.983793] page dumped because: kasan: bad access detected [ 21.983994] [ 21.984073] Memory state around the buggy address: [ 21.984148] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.984459] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.984631] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.984693] ^ [ 21.984738] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.985067] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.985131] ================================================================== [ 21.995516] ================================================================== [ 21.995588] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 21.995659] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.995715] [ 21.995757] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.995853] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.995885] Hardware name: linux,dummy-virt (DT) [ 21.995924] Call trace: [ 21.995954] show_stack+0x20/0x38 (C) [ 21.996088] dump_stack_lvl+0x8c/0xd0 [ 21.996141] print_report+0x118/0x608 [ 21.996190] kasan_report+0xdc/0x128 [ 21.996238] kasan_check_range+0x100/0x1a8 [ 21.996291] __kasan_check_write+0x20/0x30 [ 21.996344] kasan_atomics_helper+0xff0/0x4858 [ 21.996399] kasan_atomics+0x198/0x2e0 [ 21.996449] kunit_try_run_case+0x170/0x3f0 [ 21.996500] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.996558] kthread+0x328/0x630 [ 21.996676] ret_from_fork+0x10/0x20 [ 21.996741] [ 21.996767] Allocated by task 265: [ 21.996801] kasan_save_stack+0x3c/0x68 [ 21.996853] kasan_save_track+0x20/0x40 [ 21.996898] kasan_save_alloc_info+0x40/0x58 [ 21.996945] __kasan_kmalloc+0xd4/0xd8 [ 21.997001] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.997051] kasan_atomics+0xb8/0x2e0 [ 21.997135] kunit_try_run_case+0x170/0x3f0 [ 21.997184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.997235] kthread+0x328/0x630 [ 21.997277] ret_from_fork+0x10/0x20 [ 21.997320] [ 21.997349] The buggy address belongs to the object at fff00000c59de300 [ 21.997349] which belongs to the cache kmalloc-64 of size 64 [ 21.997429] The buggy address is located 0 bytes to the right of [ 21.997429] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 21.997503] [ 21.997531] The buggy address belongs to the physical page: [ 21.997570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 21.997627] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.997682] page_type: f5(slab) [ 21.997730] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.997790] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.997867] page dumped because: kasan: bad access detected [ 21.997950] [ 21.998019] Memory state around the buggy address: [ 21.998063] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.998115] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.998166] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.998210] ^ [ 21.998253] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.998302] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.998347] ================================================================== [ 22.096606] ================================================================== [ 22.096665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 22.096742] Read of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.096801] [ 22.096843] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.096937] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.097006] Hardware name: linux,dummy-virt (DT) [ 22.097051] Call trace: [ 22.097080] show_stack+0x20/0x38 (C) [ 22.097139] dump_stack_lvl+0x8c/0xd0 [ 22.097195] print_report+0x118/0x608 [ 22.097254] kasan_report+0xdc/0x128 [ 22.097372] __asan_report_load8_noabort+0x20/0x30 [ 22.097496] kasan_atomics_helper+0x3db0/0x4858 [ 22.097551] kasan_atomics+0x198/0x2e0 [ 22.097611] kunit_try_run_case+0x170/0x3f0 [ 22.097719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.097857] kthread+0x328/0x630 [ 22.098205] ret_from_fork+0x10/0x20 [ 22.098469] [ 22.098500] Allocated by task 265: [ 22.098539] kasan_save_stack+0x3c/0x68 [ 22.098597] kasan_save_track+0x20/0x40 [ 22.098645] kasan_save_alloc_info+0x40/0x58 [ 22.098694] __kasan_kmalloc+0xd4/0xd8 [ 22.098739] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.098787] kasan_atomics+0xb8/0x2e0 [ 22.098832] kunit_try_run_case+0x170/0x3f0 [ 22.098969] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.099088] kthread+0x328/0x630 [ 22.099137] ret_from_fork+0x10/0x20 [ 22.099184] [ 22.099210] The buggy address belongs to the object at fff00000c59de300 [ 22.099210] which belongs to the cache kmalloc-64 of size 64 [ 22.099279] The buggy address is located 0 bytes to the right of [ 22.099279] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.099355] [ 22.099381] The buggy address belongs to the physical page: [ 22.099439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.099508] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.099613] page_type: f5(slab) [ 22.099687] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.099751] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.099801] page dumped because: kasan: bad access detected [ 22.099867] [ 22.099907] Memory state around the buggy address: [ 22.099949] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.100016] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.100069] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.100115] ^ [ 22.100156] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.100208] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.100286] ================================================================== [ 21.778836] ================================================================== [ 21.779182] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 21.779370] Read of size 4 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.779439] [ 21.779550] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.779654] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.779691] Hardware name: linux,dummy-virt (DT) [ 21.780126] Call trace: [ 21.780204] show_stack+0x20/0x38 (C) [ 21.780434] dump_stack_lvl+0x8c/0xd0 [ 21.780559] print_report+0x118/0x608 [ 21.780680] kasan_report+0xdc/0x128 [ 21.780925] __asan_report_load4_noabort+0x20/0x30 [ 21.781023] kasan_atomics_helper+0x42d8/0x4858 [ 21.781311] kasan_atomics+0x198/0x2e0 [ 21.781381] kunit_try_run_case+0x170/0x3f0 [ 21.781529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.781796] kthread+0x328/0x630 [ 21.781913] ret_from_fork+0x10/0x20 [ 21.781989] [ 21.782121] Allocated by task 265: [ 21.782180] kasan_save_stack+0x3c/0x68 [ 21.782242] kasan_save_track+0x20/0x40 [ 21.782447] kasan_save_alloc_info+0x40/0x58 [ 21.782501] __kasan_kmalloc+0xd4/0xd8 [ 21.782546] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.782596] kasan_atomics+0xb8/0x2e0 [ 21.782684] kunit_try_run_case+0x170/0x3f0 [ 21.782738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.782837] ret_from_fork+0x10/0x20 [ 21.783907] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.783994] page_type: f5(slab) [ 21.784046] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.784465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.784854] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.785156] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.785435] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.785730] ================================================================== [ 21.824896] ================================================================== [ 21.825511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 21.825614] Write of size 4 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.825979] [ 21.826042] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.826394] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.826606] Hardware name: linux,dummy-virt (DT) [ 21.826663] Call trace: [ 21.826827] show_stack+0x20/0x38 (C) [ 21.827008] dump_stack_lvl+0x8c/0xd0 [ 21.827125] print_report+0x118/0x608 [ 21.827229] kasan_report+0xdc/0x128 [ 21.827574] kasan_check_range+0x100/0x1a8 [ 21.827661] __kasan_check_write+0x20/0x30 [ 21.827722] kasan_atomics_helper+0xad4/0x4858 [ 21.827783] kasan_atomics+0x198/0x2e0 [ 21.827981] kunit_try_run_case+0x170/0x3f0 [ 21.828373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.828499] kthread+0x328/0x630 [ 21.828565] ret_from_fork+0x10/0x20 [ 21.828647] [ 21.828682] Allocated by task 265: [ 21.828900] kasan_save_stack+0x3c/0x68 [ 21.829169] kasan_save_track+0x20/0x40 [ 21.829341] kasan_save_alloc_info+0x40/0x58 [ 21.829412] __kasan_kmalloc+0xd4/0xd8 [ 21.829462] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.829744] kasan_atomics+0xb8/0x2e0 [ 21.829999] kunit_try_run_case+0x170/0x3f0 [ 21.830177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.830250] kthread+0x328/0x630 [ 21.830437] ret_from_fork+0x10/0x20 [ 21.830523] [ 21.830561] The buggy address belongs to the object at fff00000c59de300 [ 21.830561] which belongs to the cache kmalloc-64 of size 64 [ 21.830773] The buggy address is located 0 bytes to the right of [ 21.830773] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 21.830862] [ 21.830893] The buggy address belongs to the physical page: [ 21.831103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 21.831303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.831643] page_type: f5(slab) [ 21.831719] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.831782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.831831] page dumped because: kasan: bad access detected [ 21.831871] [ 21.832070] Memory state around the buggy address: [ 21.832281] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.832391] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.832450] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.832704] ^ [ 21.832868] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.833098] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.833293] ================================================================== [ 22.137206] ================================================================== [ 22.137454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 22.137675] Read of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.137768] [ 22.137822] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.137928] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.137966] Hardware name: linux,dummy-virt (DT) [ 22.138018] Call trace: [ 22.138318] show_stack+0x20/0x38 (C) [ 22.138432] dump_stack_lvl+0x8c/0xd0 [ 22.138596] print_report+0x118/0x608 [ 22.138660] kasan_report+0xdc/0x128 [ 22.138861] __asan_report_load8_noabort+0x20/0x30 [ 22.138930] kasan_atomics_helper+0x3e20/0x4858 [ 22.139025] kasan_atomics+0x198/0x2e0 [ 22.139138] kunit_try_run_case+0x170/0x3f0 [ 22.139250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.139316] kthread+0x328/0x630 [ 22.139412] ret_from_fork+0x10/0x20 [ 22.139502] [ 22.139557] Allocated by task 265: [ 22.139651] kasan_save_stack+0x3c/0x68 [ 22.139707] kasan_save_track+0x20/0x40 [ 22.139753] kasan_save_alloc_info+0x40/0x58 [ 22.139803] __kasan_kmalloc+0xd4/0xd8 [ 22.139875] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.139979] kasan_atomics+0xb8/0x2e0 [ 22.140089] kunit_try_run_case+0x170/0x3f0 [ 22.140177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.140229] kthread+0x328/0x630 [ 22.140271] ret_from_fork+0x10/0x20 [ 22.140322] [ 22.140348] The buggy address belongs to the object at fff00000c59de300 [ 22.140348] which belongs to the cache kmalloc-64 of size 64 [ 22.140439] The buggy address is located 0 bytes to the right of [ 22.140439] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.140517] [ 22.140546] The buggy address belongs to the physical page: [ 22.140599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.140734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.140797] page_type: f5(slab) [ 22.140848] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.140911] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.140960] page dumped because: kasan: bad access detected [ 22.141163] [ 22.141186] Memory state around the buggy address: [ 22.141226] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.141276] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.141669] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.141922] ^ [ 22.141985] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.142042] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.142087] ================================================================== [ 22.064787] ================================================================== [ 22.064851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 22.064923] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.064993] [ 22.065033] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.065130] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.065163] Hardware name: linux,dummy-virt (DT) [ 22.065201] Call trace: [ 22.065229] show_stack+0x20/0x38 (C) [ 22.065320] dump_stack_lvl+0x8c/0xd0 [ 22.065543] print_report+0x118/0x608 [ 22.065610] kasan_report+0xdc/0x128 [ 22.065860] kasan_check_range+0x100/0x1a8 [ 22.066055] __kasan_check_write+0x20/0x30 [ 22.066130] kasan_atomics_helper+0x147c/0x4858 [ 22.066206] kasan_atomics+0x198/0x2e0 [ 22.066262] kunit_try_run_case+0x170/0x3f0 [ 22.066318] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.066379] kthread+0x328/0x630 [ 22.066625] ret_from_fork+0x10/0x20 [ 22.067487] [ 22.067743] Allocated by task 265: [ 22.067836] kasan_save_stack+0x3c/0x68 [ 22.068105] kasan_save_track+0x20/0x40 [ 22.068252] kasan_save_alloc_info+0x40/0x58 [ 22.068303] __kasan_kmalloc+0xd4/0xd8 [ 22.068904] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.069283] kasan_atomics+0xb8/0x2e0 [ 22.069574] kunit_try_run_case+0x170/0x3f0 [ 22.069726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.070031] kthread+0x328/0x630 [ 22.070195] ret_from_fork+0x10/0x20 [ 22.070247] [ 22.070630] The buggy address belongs to the object at fff00000c59de300 [ 22.070630] which belongs to the cache kmalloc-64 of size 64 [ 22.070703] The buggy address is located 0 bytes to the right of [ 22.070703] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.071164] [ 22.071191] The buggy address belongs to the physical page: [ 22.071229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.071546] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.071612] page_type: f5(slab) [ 22.071858] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.072255] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.072379] page dumped because: kasan: bad access detected [ 22.072724] [ 22.072791] Memory state around the buggy address: [ 22.072834] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.073366] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.073464] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.073898] ^ [ 22.074011] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.074066] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.074109] ================================================================== [ 21.642326] ================================================================== [ 21.642415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 21.642618] Read of size 4 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.643180] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.643397] show_stack+0x20/0x38 (C) [ 21.644019] kasan_atomics+0x198/0x2e0 [ 21.645070] [ 21.646018] kunit_try_run_case+0x170/0x3f0 [ 21.647284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.648418] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.648595] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.648653] ^ [ 21.648816] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.648993] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.649111] ================================================================== [ 22.105402] ================================================================== [ 22.105457] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 22.105572] Read of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.105634] [ 22.105675] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.105771] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.105841] Hardware name: linux,dummy-virt (DT) [ 22.105892] Call trace: [ 22.105925] show_stack+0x20/0x38 (C) [ 22.106019] dump_stack_lvl+0x8c/0xd0 [ 22.106129] print_report+0x118/0x608 [ 22.106188] kasan_report+0xdc/0x128 [ 22.106265] __asan_report_load8_noabort+0x20/0x30 [ 22.106479] kasan_atomics_helper+0x3df4/0x4858 [ 22.106642] kasan_atomics+0x198/0x2e0 [ 22.106704] kunit_try_run_case+0x170/0x3f0 [ 22.106765] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.106827] kthread+0x328/0x630 [ 22.106883] ret_from_fork+0x10/0x20 [ 22.106941] [ 22.106965] Allocated by task 265: [ 22.107015] kasan_save_stack+0x3c/0x68 [ 22.107118] kasan_save_track+0x20/0x40 [ 22.107533] kasan_save_alloc_info+0x40/0x58 [ 22.108238] __kasan_kmalloc+0xd4/0xd8 [ 22.108321] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.108746] kasan_atomics+0xb8/0x2e0 [ 22.108832] kunit_try_run_case+0x170/0x3f0 [ 22.108895] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.109151] kthread+0x328/0x630 [ 22.109427] ret_from_fork+0x10/0x20 [ 22.109502] [ 22.109551] The buggy address belongs to the object at fff00000c59de300 [ 22.109551] which belongs to the cache kmalloc-64 of size 64 [ 22.109968] The buggy address is located 0 bytes to the right of [ 22.109968] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.110120] [ 22.110174] The buggy address belongs to the physical page: [ 22.110440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.110548] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.110611] page_type: f5(slab) [ 22.110662] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.110724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.110771] page dumped because: kasan: bad access detected [ 22.110850] [ 22.111240] Memory state around the buggy address: [ 22.111291] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.111367] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.111418] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.111599] ^ [ 22.112048] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.112137] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.112282] ================================================================== [ 22.041961] ================================================================== [ 22.042053] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 22.042129] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.042188] [ 22.042229] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.042328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.042362] Hardware name: linux,dummy-virt (DT) [ 22.042399] Call trace: [ 22.042427] show_stack+0x20/0x38 (C) [ 22.042605] dump_stack_lvl+0x8c/0xd0 [ 22.042765] print_report+0x118/0x608 [ 22.042824] kasan_report+0xdc/0x128 [ 22.042880] kasan_check_range+0x100/0x1a8 [ 22.043033] __kasan_check_write+0x20/0x30 [ 22.043099] kasan_atomics_helper+0x12d8/0x4858 [ 22.043151] kasan_atomics+0x198/0x2e0 [ 22.043200] kunit_try_run_case+0x170/0x3f0 [ 22.043252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.043308] kthread+0x328/0x630 [ 22.043360] ret_from_fork+0x10/0x20 [ 22.043415] [ 22.043438] Allocated by task 265: [ 22.043503] kasan_save_stack+0x3c/0x68 [ 22.043551] kasan_save_track+0x20/0x40 [ 22.043593] kasan_save_alloc_info+0x40/0x58 [ 22.043636] __kasan_kmalloc+0xd4/0xd8 [ 22.043676] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.043718] kasan_atomics+0xb8/0x2e0 [ 22.043786] kunit_try_run_case+0x170/0x3f0 [ 22.043857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.043907] kthread+0x328/0x630 [ 22.044045] ret_from_fork+0x10/0x20 [ 22.044281] [ 22.044326] The buggy address belongs to the object at fff00000c59de300 [ 22.044326] which belongs to the cache kmalloc-64 of size 64 [ 22.044389] The buggy address is located 0 bytes to the right of [ 22.044389] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.045050] [ 22.045229] The buggy address belongs to the physical page: [ 22.045273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.045529] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.045978] page_type: f5(slab) [ 22.046041] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.046552] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.046684] page dumped because: kasan: bad access detected [ 22.046792] [ 22.046845] Memory state around the buggy address: [ 22.046888] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.046946] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.047011] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.047059] ^ [ 22.047132] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.047196] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.047241] ================================================================== [ 22.121052] ================================================================== [ 22.121147] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 22.121235] Read of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.121296] [ 22.121339] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.121437] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.121471] Hardware name: linux,dummy-virt (DT) [ 22.121512] Call trace: [ 22.121541] show_stack+0x20/0x38 (C) [ 22.121602] dump_stack_lvl+0x8c/0xd0 [ 22.121659] print_report+0x118/0x608 [ 22.121712] kasan_report+0xdc/0x128 [ 22.121766] __asan_report_load8_noabort+0x20/0x30 [ 22.121838] kasan_atomics_helper+0x3e10/0x4858 [ 22.121903] kasan_atomics+0x198/0x2e0 [ 22.121958] kunit_try_run_case+0x170/0x3f0 [ 22.122029] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.122092] kthread+0x328/0x630 [ 22.122147] ret_from_fork+0x10/0x20 [ 22.123842] [ 22.124523] Allocated by task 265: [ 22.124601] kasan_save_stack+0x3c/0x68 [ 22.125138] kasan_save_track+0x20/0x40 [ 22.125449] kasan_save_alloc_info+0x40/0x58 [ 22.125665] __kasan_kmalloc+0xd4/0xd8 [ 22.125772] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.125836] kasan_atomics+0xb8/0x2e0 [ 22.125888] kunit_try_run_case+0x170/0x3f0 [ 22.125937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.126002] kthread+0x328/0x630 [ 22.126053] ret_from_fork+0x10/0x20 [ 22.126098] [ 22.126125] The buggy address belongs to the object at fff00000c59de300 [ 22.126125] which belongs to the cache kmalloc-64 of size 64 [ 22.126192] The buggy address is located 0 bytes to the right of [ 22.126192] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.126262] [ 22.126759] The buggy address belongs to the physical page: [ 22.126869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.127924] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.128887] page_type: f5(slab) [ 22.129222] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.129363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.129422] page dumped because: kasan: bad access detected [ 22.129475] [ 22.129654] Memory state around the buggy address: [ 22.129906] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.130335] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.130400] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.130625] ^ [ 22.130693] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.130749] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.130859] ================================================================== [ 21.915690] ================================================================== [ 21.916178] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 21.916555] Read of size 4 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.916641] [ 21.916690] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.916791] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.916827] Hardware name: linux,dummy-virt (DT) [ 21.917253] Call trace: [ 21.917314] show_stack+0x20/0x38 (C) [ 21.917388] dump_stack_lvl+0x8c/0xd0 [ 21.917448] print_report+0x118/0x608 [ 21.917873] kasan_report+0xdc/0x128 [ 21.917963] __asan_report_load4_noabort+0x20/0x30 [ 21.918047] kasan_atomics_helper+0x3e04/0x4858 [ 21.918363] kasan_atomics+0x198/0x2e0 [ 21.918540] kunit_try_run_case+0x170/0x3f0 [ 21.918699] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.918775] kthread+0x328/0x630 [ 21.918850] ret_from_fork+0x10/0x20 [ 21.919220] [ 21.919265] Allocated by task 265: [ 21.919351] kasan_save_stack+0x3c/0x68 [ 21.919460] kasan_save_track+0x20/0x40 [ 21.920343] kasan_save_alloc_info+0x40/0x58 [ 21.920440] __kasan_kmalloc+0xd4/0xd8 [ 21.920489] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.920554] kasan_atomics+0xb8/0x2e0 [ 21.920617] kunit_try_run_case+0x170/0x3f0 [ 21.920679] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.921051] kthread+0x328/0x630 [ 21.921168] ret_from_fork+0x10/0x20 [ 21.921220] [ 21.921249] The buggy address belongs to the object at fff00000c59de300 [ 21.921249] which belongs to the cache kmalloc-64 of size 64 [ 21.921732] The buggy address is located 0 bytes to the right of [ 21.921732] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 21.921846] [ 21.922036] The buggy address belongs to the physical page: [ 21.922103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 21.922392] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.922629] page_type: f5(slab) [ 21.922692] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.922887] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.922950] page dumped because: kasan: bad access detected [ 21.923007] [ 21.923033] Memory state around the buggy address: [ 21.923183] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.923292] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.923349] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.923396] ^ [ 21.923554] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.923614] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.923663] ================================================================== [ 21.798436] ================================================================== [ 21.798534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 21.798611] Write of size 4 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.798673] [ 21.799021] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.799375] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.799582] Hardware name: linux,dummy-virt (DT) [ 21.799753] Call trace: [ 21.799946] show_stack+0x20/0x38 (C) [ 21.800296] dump_stack_lvl+0x8c/0xd0 [ 21.800371] print_report+0x118/0x608 [ 21.800474] kasan_report+0xdc/0x128 [ 21.800535] kasan_check_range+0x100/0x1a8 [ 21.800760] __kasan_check_write+0x20/0x30 [ 21.800831] kasan_atomics_helper+0x99c/0x4858 [ 21.800891] kasan_atomics+0x198/0x2e0 [ 21.800946] kunit_try_run_case+0x170/0x3f0 [ 21.801118] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.801219] kthread+0x328/0x630 [ 21.801850] ret_from_fork+0x10/0x20 [ 21.802108] [ 21.802244] Allocated by task 265: [ 21.802313] kasan_save_stack+0x3c/0x68 [ 21.802389] kasan_save_track+0x20/0x40 [ 21.802442] kasan_save_alloc_info+0x40/0x58 [ 21.802507] __kasan_kmalloc+0xd4/0xd8 [ 21.802552] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.802601] kasan_atomics+0xb8/0x2e0 [ 21.802645] kunit_try_run_case+0x170/0x3f0 [ 21.802694] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.803129] kthread+0x328/0x630 [ 21.803282] ret_from_fork+0x10/0x20 [ 21.803339] [ 21.803378] The buggy address belongs to the object at fff00000c59de300 [ 21.803378] which belongs to the cache kmalloc-64 of size 64 [ 21.803753] The buggy address is located 0 bytes to the right of [ 21.803753] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 21.803832] [ 21.804129] The buggy address belongs to the physical page: [ 21.804183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 21.804268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.804330] page_type: f5(slab) [ 21.804546] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.804757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.804827] page dumped because: kasan: bad access detected [ 21.804886] [ 21.804988] Memory state around the buggy address: [ 21.805038] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.805098] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.805559] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.805629] ^ [ 21.805690] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.805745] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.805793] ================================================================== [ 22.025493] ================================================================== [ 22.026116] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 22.026408] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.026993] [ 22.027050] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.027166] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.027508] Hardware name: linux,dummy-virt (DT) [ 22.027608] Call trace: [ 22.027802] show_stack+0x20/0x38 (C) [ 22.028265] dump_stack_lvl+0x8c/0xd0 [ 22.028521] print_report+0x118/0x608 [ 22.028578] kasan_report+0xdc/0x128 [ 22.029181] kasan_check_range+0x100/0x1a8 [ 22.030021] __kasan_check_write+0x20/0x30 [ 22.030138] kasan_atomics_helper+0x1190/0x4858 [ 22.030202] kasan_atomics+0x198/0x2e0 [ 22.030255] kunit_try_run_case+0x170/0x3f0 [ 22.030312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.030373] kthread+0x328/0x630 [ 22.030643] ret_from_fork+0x10/0x20 [ 22.030739] [ 22.030766] Allocated by task 265: [ 22.030822] kasan_save_stack+0x3c/0x68 [ 22.030947] kasan_save_track+0x20/0x40 [ 22.031013] kasan_save_alloc_info+0x40/0x58 [ 22.031060] __kasan_kmalloc+0xd4/0xd8 [ 22.031113] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.031157] kasan_atomics+0xb8/0x2e0 [ 22.031198] kunit_try_run_case+0x170/0x3f0 [ 22.031255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.031304] kthread+0x328/0x630 [ 22.031347] ret_from_fork+0x10/0x20 [ 22.031440] [ 22.031471] The buggy address belongs to the object at fff00000c59de300 [ 22.031471] which belongs to the cache kmalloc-64 of size 64 [ 22.031544] The buggy address is located 0 bytes to the right of [ 22.031544] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.031688] [ 22.031719] The buggy address belongs to the physical page: [ 22.031756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.031815] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.031868] page_type: f5(slab) [ 22.031915] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.032007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.032116] page dumped because: kasan: bad access detected [ 22.032178] [ 22.032200] Memory state around the buggy address: [ 22.032249] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.032317] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.032366] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.032431] ^ [ 22.032516] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.032568] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.032616] ================================================================== [ 22.075803] ================================================================== [ 22.075878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 22.075950] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.076022] [ 22.076063] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.076156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.076189] Hardware name: linux,dummy-virt (DT) [ 22.076228] Call trace: [ 22.076257] show_stack+0x20/0x38 (C) [ 22.076316] dump_stack_lvl+0x8c/0xd0 [ 22.077313] print_report+0x118/0x608 [ 22.077412] kasan_report+0xdc/0x128 [ 22.077489] kasan_check_range+0x100/0x1a8 [ 22.077548] __kasan_check_write+0x20/0x30 [ 22.077956] kasan_atomics_helper+0x14e4/0x4858 [ 22.078059] kasan_atomics+0x198/0x2e0 [ 22.078198] kunit_try_run_case+0x170/0x3f0 [ 22.078263] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.078529] kthread+0x328/0x630 [ 22.078597] ret_from_fork+0x10/0x20 [ 22.078992] [ 22.079036] Allocated by task 265: [ 22.079082] kasan_save_stack+0x3c/0x68 [ 22.079154] kasan_save_track+0x20/0x40 [ 22.079345] kasan_save_alloc_info+0x40/0x58 [ 22.079581] __kasan_kmalloc+0xd4/0xd8 [ 22.079766] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.079830] kasan_atomics+0xb8/0x2e0 [ 22.079877] kunit_try_run_case+0x170/0x3f0 [ 22.080099] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.080181] kthread+0x328/0x630 [ 22.080234] ret_from_fork+0x10/0x20 [ 22.080477] [ 22.080513] The buggy address belongs to the object at fff00000c59de300 [ 22.080513] which belongs to the cache kmalloc-64 of size 64 [ 22.080587] The buggy address is located 0 bytes to the right of [ 22.080587] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.080676] [ 22.080706] The buggy address belongs to the physical page: [ 22.081054] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.081143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.081343] page_type: f5(slab) [ 22.081412] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.081831] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.081905] page dumped because: kasan: bad access detected [ 22.082257] [ 22.082302] Memory state around the buggy address: [ 22.082352] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.082409] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.082552] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.082608] ^ [ 22.082653] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.082918] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.083115] ================================================================== [ 22.013578] ================================================================== [ 22.013939] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 22.014073] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.014712] [ 22.014808] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.014923] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.016052] Hardware name: linux,dummy-virt (DT) [ 22.016187] Call trace: [ 22.016356] show_stack+0x20/0x38 (C) [ 22.017055] dump_stack_lvl+0x8c/0xd0 [ 22.017286] print_report+0x118/0x608 [ 22.017348] kasan_report+0xdc/0x128 [ 22.017402] kasan_check_range+0x100/0x1a8 [ 22.017460] __kasan_check_write+0x20/0x30 [ 22.017517] kasan_atomics_helper+0x1128/0x4858 [ 22.017577] kasan_atomics+0x198/0x2e0 [ 22.018632] kunit_try_run_case+0x170/0x3f0 [ 22.018728] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.018797] kthread+0x328/0x630 [ 22.019198] ret_from_fork+0x10/0x20 [ 22.019299] [ 22.019366] Allocated by task 265: [ 22.019458] kasan_save_stack+0x3c/0x68 [ 22.019559] kasan_save_track+0x20/0x40 [ 22.019856] kasan_save_alloc_info+0x40/0x58 [ 22.019980] __kasan_kmalloc+0xd4/0xd8 [ 22.020036] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.020093] kasan_atomics+0xb8/0x2e0 [ 22.020249] kunit_try_run_case+0x170/0x3f0 [ 22.020581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.020819] kthread+0x328/0x630 [ 22.020874] ret_from_fork+0x10/0x20 [ 22.020920] [ 22.020977] The buggy address belongs to the object at fff00000c59de300 [ 22.020977] which belongs to the cache kmalloc-64 of size 64 [ 22.021049] The buggy address is located 0 bytes to the right of [ 22.021049] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.021117] [ 22.021143] The buggy address belongs to the physical page: [ 22.021181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.021238] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.021292] page_type: f5(slab) [ 22.021337] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.021400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.021442] page dumped because: kasan: bad access detected [ 22.021479] [ 22.021501] Memory state around the buggy address: [ 22.021539] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.021590] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.022013] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.022203] ^ [ 22.022661] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.022809] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.022914] ================================================================== [ 22.037465] ================================================================== [ 22.037527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 22.037594] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.037653] [ 22.037693] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.037793] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.037846] Hardware name: linux,dummy-virt (DT) [ 22.037884] Call trace: [ 22.037913] show_stack+0x20/0x38 (C) [ 22.037987] dump_stack_lvl+0x8c/0xd0 [ 22.038047] print_report+0x118/0x608 [ 22.038102] kasan_report+0xdc/0x128 [ 22.038155] kasan_check_range+0x100/0x1a8 [ 22.038215] __kasan_check_write+0x20/0x30 [ 22.038270] kasan_atomics_helper+0x126c/0x4858 [ 22.038326] kasan_atomics+0x198/0x2e0 [ 22.038380] kunit_try_run_case+0x170/0x3f0 [ 22.038436] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.038553] kthread+0x328/0x630 [ 22.038613] ret_from_fork+0x10/0x20 [ 22.038764] [ 22.038808] Allocated by task 265: [ 22.038881] kasan_save_stack+0x3c/0x68 [ 22.038954] kasan_save_track+0x20/0x40 [ 22.039014] kasan_save_alloc_info+0x40/0x58 [ 22.039065] __kasan_kmalloc+0xd4/0xd8 [ 22.039111] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.039158] kasan_atomics+0xb8/0x2e0 [ 22.039228] kunit_try_run_case+0x170/0x3f0 [ 22.039344] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.039404] kthread+0x328/0x630 [ 22.039453] ret_from_fork+0x10/0x20 [ 22.039499] [ 22.039527] The buggy address belongs to the object at fff00000c59de300 [ 22.039527] which belongs to the cache kmalloc-64 of size 64 [ 22.039625] The buggy address is located 0 bytes to the right of [ 22.039625] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.039739] [ 22.039780] The buggy address belongs to the physical page: [ 22.039821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.039885] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.039943] page_type: f5(slab) [ 22.040000] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.040294] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.040347] page dumped because: kasan: bad access detected [ 22.040386] [ 22.040409] Memory state around the buggy address: [ 22.040462] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.040514] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.040688] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.040859] ^ [ 22.040904] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.040956] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.041013] ================================================================== [ 21.814905] ================================================================== [ 21.815715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 21.815814] Write of size 4 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.816116] [ 21.816168] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.816511] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.816553] Hardware name: linux,dummy-virt (DT) [ 21.816735] Call trace: [ 21.816778] show_stack+0x20/0x38 (C) [ 21.817162] dump_stack_lvl+0x8c/0xd0 [ 21.817389] print_report+0x118/0x608 [ 21.817472] kasan_report+0xdc/0x128 [ 21.817833] kasan_check_range+0x100/0x1a8 [ 21.817995] __kasan_check_write+0x20/0x30 [ 21.818224] kasan_atomics_helper+0xa6c/0x4858 [ 21.818299] kasan_atomics+0x198/0x2e0 [ 21.818685] kunit_try_run_case+0x170/0x3f0 [ 21.818781] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.818849] kthread+0x328/0x630 [ 21.818904] ret_from_fork+0x10/0x20 [ 21.819207] [ 21.819396] Allocated by task 265: [ 21.819538] kasan_save_stack+0x3c/0x68 [ 21.819654] kasan_save_track+0x20/0x40 [ 21.819712] kasan_save_alloc_info+0x40/0x58 [ 21.819782] __kasan_kmalloc+0xd4/0xd8 [ 21.819991] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.820202] kasan_atomics+0xb8/0x2e0 [ 21.820281] kunit_try_run_case+0x170/0x3f0 [ 21.820331] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.820589] kthread+0x328/0x630 [ 21.820826] ret_from_fork+0x10/0x20 [ 21.820881] [ 21.820913] The buggy address belongs to the object at fff00000c59de300 [ 21.820913] which belongs to the cache kmalloc-64 of size 64 [ 21.820996] The buggy address is located 0 bytes to the right of [ 21.820996] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 21.821251] [ 21.821381] The buggy address belongs to the physical page: [ 21.821430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 21.821497] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.821567] page_type: f5(slab) [ 21.821926] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.822155] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.822221] page dumped because: kasan: bad access detected [ 21.822371] [ 21.822401] Memory state around the buggy address: [ 21.822572] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.822644] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.822885] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.822948] ^ [ 21.823156] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.823219] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.823373] ================================================================== [ 21.808057] ================================================================== [ 21.808162] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 21.808361] Write of size 4 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.808433] [ 21.808482] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.808584] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.808889] Hardware name: linux,dummy-virt (DT) [ 21.809020] Call trace: [ 21.809055] show_stack+0x20/0x38 (C) [ 21.809143] dump_stack_lvl+0x8c/0xd0 [ 21.809207] print_report+0x118/0x608 [ 21.809264] kasan_report+0xdc/0x128 [ 21.809568] kasan_check_range+0x100/0x1a8 [ 21.809705] __kasan_check_write+0x20/0x30 [ 21.809772] kasan_atomics_helper+0xa04/0x4858 [ 21.809864] kasan_atomics+0x198/0x2e0 [ 21.809922] kunit_try_run_case+0x170/0x3f0 [ 21.809991] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.810577] kthread+0x328/0x630 [ 21.810793] ret_from_fork+0x10/0x20 [ 21.810896] [ 21.811023] Allocated by task 265: [ 21.811092] kasan_save_stack+0x3c/0x68 [ 21.811160] kasan_save_track+0x20/0x40 [ 21.811204] kasan_save_alloc_info+0x40/0x58 [ 21.811251] __kasan_kmalloc+0xd4/0xd8 [ 21.811294] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.811609] kasan_atomics+0xb8/0x2e0 [ 21.811777] kunit_try_run_case+0x170/0x3f0 [ 21.811829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.811928] kthread+0x328/0x630 [ 21.811988] ret_from_fork+0x10/0x20 [ 21.812054] [ 21.812087] The buggy address belongs to the object at fff00000c59de300 [ 21.812087] which belongs to the cache kmalloc-64 of size 64 [ 21.812151] The buggy address is located 0 bytes to the right of [ 21.812151] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 21.812235] [ 21.812262] The buggy address belongs to the physical page: [ 21.812301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 21.812357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.812412] page_type: f5(slab) [ 21.812458] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.812518] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.812564] page dumped because: kasan: bad access detected [ 21.812614] [ 21.812640] Memory state around the buggy address: [ 21.812679] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.812730] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.812778] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.812836] ^ [ 21.812889] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.812943] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.813006] ================================================================== [ 22.142840] ================================================================== [ 22.142913] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 22.143360] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.143431] [ 22.143475] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.143571] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.143604] Hardware name: linux,dummy-virt (DT) [ 22.143640] Call trace: [ 22.143695] show_stack+0x20/0x38 (C) [ 22.143810] dump_stack_lvl+0x8c/0xd0 [ 22.143917] print_report+0x118/0x608 [ 22.144043] kasan_report+0xdc/0x128 [ 22.144158] kasan_check_range+0x100/0x1a8 [ 22.144219] __kasan_check_write+0x20/0x30 [ 22.144319] kasan_atomics_helper+0x17ec/0x4858 [ 22.144375] kasan_atomics+0x198/0x2e0 [ 22.144435] kunit_try_run_case+0x170/0x3f0 [ 22.144541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.144652] kthread+0x328/0x630 [ 22.144731] ret_from_fork+0x10/0x20 [ 22.144786] [ 22.144809] Allocated by task 265: [ 22.144843] kasan_save_stack+0x3c/0x68 [ 22.144892] kasan_save_track+0x20/0x40 [ 22.144937] kasan_save_alloc_info+0x40/0x58 [ 22.144999] __kasan_kmalloc+0xd4/0xd8 [ 22.145045] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.145089] kasan_atomics+0xb8/0x2e0 [ 22.145131] kunit_try_run_case+0x170/0x3f0 [ 22.145175] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.145226] kthread+0x328/0x630 [ 22.145266] ret_from_fork+0x10/0x20 [ 22.145310] [ 22.145345] The buggy address belongs to the object at fff00000c59de300 [ 22.145345] which belongs to the cache kmalloc-64 of size 64 [ 22.145480] The buggy address is located 0 bytes to the right of [ 22.145480] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.145636] [ 22.145698] The buggy address belongs to the physical page: [ 22.145774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.145912] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.146013] page_type: f5(slab) [ 22.146064] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.146124] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.146228] page dumped because: kasan: bad access detected [ 22.146266] [ 22.146289] Memory state around the buggy address: [ 22.146330] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.146381] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.146431] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.146476] ^ [ 22.146514] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.146563] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.146607] ================================================================== [ 22.005757] ================================================================== [ 22.005860] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 22.005938] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.006012] [ 22.006052] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.006146] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.006179] Hardware name: linux,dummy-virt (DT) [ 22.006216] Call trace: [ 22.006247] show_stack+0x20/0x38 (C) [ 22.006307] dump_stack_lvl+0x8c/0xd0 [ 22.006361] print_report+0x118/0x608 [ 22.006412] kasan_report+0xdc/0x128 [ 22.006474] kasan_check_range+0x100/0x1a8 [ 22.006526] __kasan_check_write+0x20/0x30 [ 22.006578] kasan_atomics_helper+0x10c0/0x4858 [ 22.006631] kasan_atomics+0x198/0x2e0 [ 22.006717] kunit_try_run_case+0x170/0x3f0 [ 22.007003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.007089] kthread+0x328/0x630 [ 22.007148] ret_from_fork+0x10/0x20 [ 22.007206] [ 22.007234] Allocated by task 265: [ 22.007269] kasan_save_stack+0x3c/0x68 [ 22.007322] kasan_save_track+0x20/0x40 [ 22.007524] kasan_save_alloc_info+0x40/0x58 [ 22.007617] __kasan_kmalloc+0xd4/0xd8 [ 22.007926] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.007992] kasan_atomics+0xb8/0x2e0 [ 22.008038] kunit_try_run_case+0x170/0x3f0 [ 22.008220] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.008274] kthread+0x328/0x630 [ 22.008345] ret_from_fork+0x10/0x20 [ 22.008612] [ 22.008696] The buggy address belongs to the object at fff00000c59de300 [ 22.008696] which belongs to the cache kmalloc-64 of size 64 [ 22.009071] The buggy address is located 0 bytes to the right of [ 22.009071] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.009559] [ 22.009610] The buggy address belongs to the physical page: [ 22.009737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.009964] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.010381] page_type: f5(slab) [ 22.010636] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.011041] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.011197] page dumped because: kasan: bad access detected [ 22.011416] [ 22.011447] Memory state around the buggy address: [ 22.011640] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.011715] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.012053] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.012148] ^ [ 22.012233] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.012299] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.012533] ================================================================== [ 21.925792] ================================================================== [ 21.926184] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 21.926270] Read of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.926334] [ 21.926379] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.926608] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.926942] Hardware name: linux,dummy-virt (DT) [ 21.927054] Call trace: [ 21.927122] show_stack+0x20/0x38 (C) [ 21.927392] dump_stack_lvl+0x8c/0xd0 [ 21.927460] print_report+0x118/0x608 [ 21.927518] kasan_report+0xdc/0x128 [ 21.927574] kasan_check_range+0x100/0x1a8 [ 21.927631] __kasan_check_read+0x20/0x30 [ 21.927690] kasan_atomics_helper+0xdd4/0x4858 [ 21.927749] kasan_atomics+0x198/0x2e0 [ 21.927805] kunit_try_run_case+0x170/0x3f0 [ 21.927861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.927924] kthread+0x328/0x630 [ 21.927994] ret_from_fork+0x10/0x20 [ 21.928060] [ 21.928087] Allocated by task 265: [ 21.928125] kasan_save_stack+0x3c/0x68 [ 21.929901] kasan_save_track+0x20/0x40 [ 21.930146] kasan_save_alloc_info+0x40/0x58 [ 21.930982] __kasan_kmalloc+0xd4/0xd8 [ 21.931117] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.931172] kasan_atomics+0xb8/0x2e0 [ 21.931219] kunit_try_run_case+0x170/0x3f0 [ 21.931268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.931322] kthread+0x328/0x630 [ 21.932296] ret_from_fork+0x10/0x20 [ 21.932635] [ 21.932710] The buggy address belongs to the object at fff00000c59de300 [ 21.932710] which belongs to the cache kmalloc-64 of size 64 [ 21.932789] The buggy address is located 0 bytes to the right of [ 21.932789] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 21.932864] [ 21.932893] The buggy address belongs to the physical page: [ 21.932931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 21.933010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.933075] page_type: f5(slab) [ 21.933127] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.933189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.933867] page dumped because: kasan: bad access detected [ 21.935044] [ 21.935368] Memory state around the buggy address: [ 21.935443] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.935501] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.935552] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.935599] ^ [ 21.935743] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.936308] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.936481] ================================================================== [ 21.895260] ================================================================== [ 21.895346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 21.895424] Read of size 4 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.895812] [ 21.895880] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.896777] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.896842] Hardware name: linux,dummy-virt (DT) [ 21.896901] Call trace: [ 21.896940] show_stack+0x20/0x38 (C) [ 21.897372] dump_stack_lvl+0x8c/0xd0 [ 21.897465] print_report+0x118/0x608 [ 21.897526] kasan_report+0xdc/0x128 [ 21.897585] __asan_report_load4_noabort+0x20/0x30 [ 21.897648] kasan_atomics_helper+0x3dd8/0x4858 [ 21.898347] kasan_atomics+0x198/0x2e0 [ 21.898451] kunit_try_run_case+0x170/0x3f0 [ 21.898597] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.898962] kthread+0x328/0x630 [ 21.899054] ret_from_fork+0x10/0x20 [ 21.899121] [ 21.899147] Allocated by task 265: [ 21.899188] kasan_save_stack+0x3c/0x68 [ 21.899826] kasan_save_track+0x20/0x40 [ 21.899883] kasan_save_alloc_info+0x40/0x58 [ 21.900032] __kasan_kmalloc+0xd4/0xd8 [ 21.900090] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.900355] kasan_atomics+0xb8/0x2e0 [ 21.900528] kunit_try_run_case+0x170/0x3f0 [ 21.900743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.900923] kthread+0x328/0x630 [ 21.901057] ret_from_fork+0x10/0x20 [ 21.901387] [ 21.901437] The buggy address belongs to the object at fff00000c59de300 [ 21.901437] which belongs to the cache kmalloc-64 of size 64 [ 21.901513] The buggy address is located 0 bytes to the right of [ 21.901513] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 21.902027] [ 21.902168] The buggy address belongs to the physical page: [ 21.902220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 21.902292] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.902355] page_type: f5(slab) [ 21.902408] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.902904] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.903137] page dumped because: kasan: bad access detected [ 21.903252] [ 21.903281] Memory state around the buggy address: [ 21.903349] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.903676] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.903864] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.904059] ^ [ 21.904114] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.904327] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.904682] ================================================================== [ 21.956416] ================================================================== [ 21.956503] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 21.956586] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.956646] [ 21.956695] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.956797] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.956831] Hardware name: linux,dummy-virt (DT) [ 21.956872] Call trace: [ 21.956903] show_stack+0x20/0x38 (C) [ 21.956964] dump_stack_lvl+0x8c/0xd0 [ 21.957042] print_report+0x118/0x608 [ 21.957098] kasan_report+0xdc/0x128 [ 21.957152] kasan_check_range+0x100/0x1a8 [ 21.957209] __kasan_check_write+0x20/0x30 [ 21.957264] kasan_atomics_helper+0xe44/0x4858 [ 21.957320] kasan_atomics+0x198/0x2e0 [ 21.957374] kunit_try_run_case+0x170/0x3f0 [ 21.957430] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.957489] kthread+0x328/0x630 [ 21.957541] ret_from_fork+0x10/0x20 [ 21.957601] [ 21.957626] Allocated by task 265: [ 21.958462] kasan_save_stack+0x3c/0x68 [ 21.958683] kasan_save_track+0x20/0x40 [ 21.959357] kasan_save_alloc_info+0x40/0x58 [ 21.959846] __kasan_kmalloc+0xd4/0xd8 [ 21.960285] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.960682] kasan_atomics+0xb8/0x2e0 [ 21.961178] kunit_try_run_case+0x170/0x3f0 [ 21.961558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.962103] kthread+0x328/0x630 [ 21.962785] ret_from_fork+0x10/0x20 [ 21.963121] [ 21.963226] The buggy address belongs to the object at fff00000c59de300 [ 21.963226] which belongs to the cache kmalloc-64 of size 64 [ 21.963582] The buggy address is located 0 bytes to the right of [ 21.963582] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 21.963692] [ 21.964004] The buggy address belongs to the physical page: [ 21.964131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 21.964202] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.964264] page_type: f5(slab) [ 21.964317] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.964377] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.964425] page dumped because: kasan: bad access detected [ 21.965756] [ 21.965798] Memory state around the buggy address: [ 21.965871] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.965931] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.966875] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.967255] ^ [ 21.967355] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.967647] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.967733] ================================================================== [ 21.906659] ================================================================== [ 21.906763] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 21.906852] Write of size 4 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.906914] [ 21.907611] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.907794] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.907904] Hardware name: linux,dummy-virt (DT) [ 21.907985] Call trace: [ 21.908177] show_stack+0x20/0x38 (C) [ 21.908292] dump_stack_lvl+0x8c/0xd0 [ 21.908369] print_report+0x118/0x608 [ 21.908705] kasan_report+0xdc/0x128 [ 21.909044] kasan_check_range+0x100/0x1a8 [ 21.909255] __kasan_check_write+0x20/0x30 [ 21.909370] kasan_atomics_helper+0xd3c/0x4858 [ 21.909465] kasan_atomics+0x198/0x2e0 [ 21.909852] kunit_try_run_case+0x170/0x3f0 [ 21.910103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.910181] kthread+0x328/0x630 [ 21.910243] ret_from_fork+0x10/0x20 [ 21.910731] [ 21.910828] Allocated by task 265: [ 21.910928] kasan_save_stack+0x3c/0x68 [ 21.911006] kasan_save_track+0x20/0x40 [ 21.911261] kasan_save_alloc_info+0x40/0x58 [ 21.911457] __kasan_kmalloc+0xd4/0xd8 [ 21.911522] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.911638] kasan_atomics+0xb8/0x2e0 [ 21.911693] kunit_try_run_case+0x170/0x3f0 [ 21.911761] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.912039] kthread+0x328/0x630 [ 21.912090] ret_from_fork+0x10/0x20 [ 21.912138] [ 21.912379] The buggy address belongs to the object at fff00000c59de300 [ 21.912379] which belongs to the cache kmalloc-64 of size 64 [ 21.912457] The buggy address is located 0 bytes to the right of [ 21.912457] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 21.912530] [ 21.912561] The buggy address belongs to the physical page: [ 21.912601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 21.912662] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.912723] page_type: f5(slab) [ 21.912773] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.913346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.913429] page dumped because: kasan: bad access detected [ 21.913475] [ 21.913562] Memory state around the buggy address: [ 21.913613] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.913668] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.914002] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.914058] ^ [ 21.914103] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.914530] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.914602] ================================================================== [ 21.939962] ================================================================== [ 21.940083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 21.940164] Read of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.940226] [ 21.940273] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.940372] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.940407] Hardware name: linux,dummy-virt (DT) [ 21.940449] Call trace: [ 21.940481] show_stack+0x20/0x38 (C) [ 21.940544] dump_stack_lvl+0x8c/0xd0 [ 21.940600] print_report+0x118/0x608 [ 21.940654] kasan_report+0xdc/0x128 [ 21.940708] __asan_report_load8_noabort+0x20/0x30 [ 21.940768] kasan_atomics_helper+0x3f58/0x4858 [ 21.941487] kasan_atomics+0x198/0x2e0 [ 21.942103] kunit_try_run_case+0x170/0x3f0 [ 21.942592] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.943163] kthread+0x328/0x630 [ 21.943634] ret_from_fork+0x10/0x20 [ 21.944371] [ 21.944484] Allocated by task 265: [ 21.944531] kasan_save_stack+0x3c/0x68 [ 21.944753] kasan_save_track+0x20/0x40 [ 21.945155] kasan_save_alloc_info+0x40/0x58 [ 21.945408] __kasan_kmalloc+0xd4/0xd8 [ 21.945543] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.945606] kasan_atomics+0xb8/0x2e0 [ 21.945660] kunit_try_run_case+0x170/0x3f0 [ 21.946291] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.946541] kthread+0x328/0x630 [ 21.946595] ret_from_fork+0x10/0x20 [ 21.946642] [ 21.946670] The buggy address belongs to the object at fff00000c59de300 [ 21.946670] which belongs to the cache kmalloc-64 of size 64 [ 21.946744] The buggy address is located 0 bytes to the right of [ 21.946744] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 21.947593] [ 21.947735] The buggy address belongs to the physical page: [ 21.947784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 21.947858] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.947921] page_type: f5(slab) [ 21.947989] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.948055] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.948105] page dumped because: kasan: bad access detected [ 21.948145] [ 21.948172] Memory state around the buggy address: [ 21.950232] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.950765] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.950995] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.951343] ^ [ 21.951640] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.951888] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.951942] ================================================================== [ 22.053703] ================================================================== [ 22.054153] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 22.054268] Read of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.054342] [ 22.054384] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.054490] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.054526] Hardware name: linux,dummy-virt (DT) [ 22.054567] Call trace: [ 22.054596] show_stack+0x20/0x38 (C) [ 22.055008] dump_stack_lvl+0x8c/0xd0 [ 22.055138] print_report+0x118/0x608 [ 22.055301] kasan_report+0xdc/0x128 [ 22.055652] __asan_report_load8_noabort+0x20/0x30 [ 22.055729] kasan_atomics_helper+0x3f04/0x4858 [ 22.055789] kasan_atomics+0x198/0x2e0 [ 22.055845] kunit_try_run_case+0x170/0x3f0 [ 22.055904] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.056004] kthread+0x328/0x630 [ 22.056064] ret_from_fork+0x10/0x20 [ 22.056124] [ 22.056179] Allocated by task 265: [ 22.056222] kasan_save_stack+0x3c/0x68 [ 22.056291] kasan_save_track+0x20/0x40 [ 22.056338] kasan_save_alloc_info+0x40/0x58 [ 22.056386] __kasan_kmalloc+0xd4/0xd8 [ 22.056430] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.056477] kasan_atomics+0xb8/0x2e0 [ 22.056522] kunit_try_run_case+0x170/0x3f0 [ 22.056580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.056656] kthread+0x328/0x630 [ 22.056709] ret_from_fork+0x10/0x20 [ 22.056803] [ 22.056871] The buggy address belongs to the object at fff00000c59de300 [ 22.056871] which belongs to the cache kmalloc-64 of size 64 [ 22.056945] The buggy address is located 0 bytes to the right of [ 22.056945] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.057034] [ 22.057063] The buggy address belongs to the physical page: [ 22.057118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.057254] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.057316] page_type: f5(slab) [ 22.057366] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.057428] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.057479] page dumped because: kasan: bad access detected [ 22.057518] [ 22.057540] Memory state around the buggy address: [ 22.057579] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.057633] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.057758] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.057855] ^ [ 22.057955] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.058752] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.058844] ================================================================== [ 22.033545] ================================================================== [ 22.033618] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 22.033690] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.033749] [ 22.033789] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.033923] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.033958] Hardware name: linux,dummy-virt (DT) [ 22.034010] Call trace: [ 22.034041] show_stack+0x20/0x38 (C) [ 22.034104] dump_stack_lvl+0x8c/0xd0 [ 22.034153] print_report+0x118/0x608 [ 22.034204] kasan_report+0xdc/0x128 [ 22.034252] kasan_check_range+0x100/0x1a8 [ 22.034307] __kasan_check_write+0x20/0x30 [ 22.034369] kasan_atomics_helper+0x11f8/0x4858 [ 22.034518] kasan_atomics+0x198/0x2e0 [ 22.034576] kunit_try_run_case+0x170/0x3f0 [ 22.034692] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.034817] kthread+0x328/0x630 [ 22.034877] ret_from_fork+0x10/0x20 [ 22.034935] [ 22.034960] Allocated by task 265: [ 22.035008] kasan_save_stack+0x3c/0x68 [ 22.035072] kasan_save_track+0x20/0x40 [ 22.035169] kasan_save_alloc_info+0x40/0x58 [ 22.035298] __kasan_kmalloc+0xd4/0xd8 [ 22.035351] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.035420] kasan_atomics+0xb8/0x2e0 [ 22.035468] kunit_try_run_case+0x170/0x3f0 [ 22.035639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.035696] kthread+0x328/0x630 [ 22.035743] ret_from_fork+0x10/0x20 [ 22.035788] [ 22.035815] The buggy address belongs to the object at fff00000c59de300 [ 22.035815] which belongs to the cache kmalloc-64 of size 64 [ 22.035953] The buggy address is located 0 bytes to the right of [ 22.035953] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.036102] [ 22.036157] The buggy address belongs to the physical page: [ 22.036219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.036334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.036389] page_type: f5(slab) [ 22.036471] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.036573] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.036624] page dumped because: kasan: bad access detected [ 22.036664] [ 22.036688] Memory state around the buggy address: [ 22.036725] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.036776] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.036828] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.036874] ^ [ 22.036933] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.037025] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.037131] ================================================================== [ 22.101225] ================================================================== [ 22.101316] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 22.101391] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.101451] [ 22.101532] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.101652] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.101690] Hardware name: linux,dummy-virt (DT) [ 22.101730] Call trace: [ 22.101786] show_stack+0x20/0x38 (C) [ 22.101926] dump_stack_lvl+0x8c/0xd0 [ 22.101994] print_report+0x118/0x608 [ 22.102118] kasan_report+0xdc/0x128 [ 22.102381] kasan_check_range+0x100/0x1a8 [ 22.102693] __kasan_check_write+0x20/0x30 [ 22.102810] kasan_atomics_helper+0x1644/0x4858 [ 22.102880] kasan_atomics+0x198/0x2e0 [ 22.102947] kunit_try_run_case+0x170/0x3f0 [ 22.103103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.103174] kthread+0x328/0x630 [ 22.103231] ret_from_fork+0x10/0x20 [ 22.103313] [ 22.103339] Allocated by task 265: [ 22.103378] kasan_save_stack+0x3c/0x68 [ 22.103431] kasan_save_track+0x20/0x40 [ 22.103477] kasan_save_alloc_info+0x40/0x58 [ 22.103562] __kasan_kmalloc+0xd4/0xd8 [ 22.103622] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.103670] kasan_atomics+0xb8/0x2e0 [ 22.103713] kunit_try_run_case+0x170/0x3f0 [ 22.103758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.103808] kthread+0x328/0x630 [ 22.103883] ret_from_fork+0x10/0x20 [ 22.103937] [ 22.103965] The buggy address belongs to the object at fff00000c59de300 [ 22.103965] which belongs to the cache kmalloc-64 of size 64 [ 22.104045] The buggy address is located 0 bytes to the right of [ 22.104045] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.104121] [ 22.104161] The buggy address belongs to the physical page: [ 22.104205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.104302] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.104373] page_type: f5(slab) [ 22.104423] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.104483] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.104591] page dumped because: kasan: bad access detected [ 22.104640] [ 22.104693] Memory state around the buggy address: [ 22.104778] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.104881] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.104935] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.104989] ^ [ 22.105031] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.105106] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.105158] ================================================================== [ 21.998708] ================================================================== [ 21.998769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 21.998838] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.998919] [ 21.998959] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.999069] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.999120] Hardware name: linux,dummy-virt (DT) [ 21.999157] Call trace: [ 21.999186] show_stack+0x20/0x38 (C) [ 21.999246] dump_stack_lvl+0x8c/0xd0 [ 21.999318] print_report+0x118/0x608 [ 21.999378] kasan_report+0xdc/0x128 [ 21.999432] kasan_check_range+0x100/0x1a8 [ 21.999487] __kasan_check_write+0x20/0x30 [ 21.999545] kasan_atomics_helper+0x1058/0x4858 [ 21.999639] kasan_atomics+0x198/0x2e0 [ 21.999747] kunit_try_run_case+0x170/0x3f0 [ 21.999857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.999990] kthread+0x328/0x630 [ 22.000109] ret_from_fork+0x10/0x20 [ 22.000226] [ 22.000272] Allocated by task 265: [ 22.000345] kasan_save_stack+0x3c/0x68 [ 22.000420] kasan_save_track+0x20/0x40 [ 22.000469] kasan_save_alloc_info+0x40/0x58 [ 22.000548] __kasan_kmalloc+0xd4/0xd8 [ 22.000624] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.000706] kasan_atomics+0xb8/0x2e0 [ 22.000784] kunit_try_run_case+0x170/0x3f0 [ 22.000867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.000958] kthread+0x328/0x630 [ 22.001102] ret_from_fork+0x10/0x20 [ 22.001148] [ 22.001273] The buggy address belongs to the object at fff00000c59de300 [ 22.001273] which belongs to the cache kmalloc-64 of size 64 [ 22.001340] The buggy address is located 0 bytes to the right of [ 22.001340] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.001602] [ 22.001632] The buggy address belongs to the physical page: [ 22.001672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.001914] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.002192] page_type: f5(slab) [ 22.002494] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.002581] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.002952] page dumped because: kasan: bad access detected [ 22.003055] [ 22.003279] Memory state around the buggy address: [ 22.003328] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.003827] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.004114] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.004178] ^ [ 22.004224] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.004473] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.004627] ================================================================== [ 21.986271] ================================================================== [ 21.986549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 21.986705] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.986828] [ 21.986880] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.986991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.987029] Hardware name: linux,dummy-virt (DT) [ 21.987095] Call trace: [ 21.987130] show_stack+0x20/0x38 (C) [ 21.987193] dump_stack_lvl+0x8c/0xd0 [ 21.987246] print_report+0x118/0x608 [ 21.987489] kasan_report+0xdc/0x128 [ 21.987622] kasan_check_range+0x100/0x1a8 [ 21.987699] __kasan_check_write+0x20/0x30 [ 21.987810] kasan_atomics_helper+0xf88/0x4858 [ 21.987876] kasan_atomics+0x198/0x2e0 [ 21.987930] kunit_try_run_case+0x170/0x3f0 [ 21.987998] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.988065] kthread+0x328/0x630 [ 21.988185] ret_from_fork+0x10/0x20 [ 21.988247] [ 21.988348] Allocated by task 265: [ 21.988530] kasan_save_stack+0x3c/0x68 [ 21.988588] kasan_save_track+0x20/0x40 [ 21.988635] kasan_save_alloc_info+0x40/0x58 [ 21.988684] __kasan_kmalloc+0xd4/0xd8 [ 21.988728] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.988777] kasan_atomics+0xb8/0x2e0 [ 21.989431] kunit_try_run_case+0x170/0x3f0 [ 21.990194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.990411] kthread+0x328/0x630 [ 21.990612] ret_from_fork+0x10/0x20 [ 21.991046] [ 21.991283] The buggy address belongs to the object at fff00000c59de300 [ 21.991283] which belongs to the cache kmalloc-64 of size 64 [ 21.991365] The buggy address is located 0 bytes to the right of [ 21.991365] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 21.991440] [ 21.991470] The buggy address belongs to the physical page: [ 21.991507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 21.991567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.991622] page_type: f5(slab) [ 21.993035] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.993376] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.993432] page dumped because: kasan: bad access detected [ 21.993580] [ 21.993670] Memory state around the buggy address: [ 21.993712] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.993946] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.994276] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.994465] ^ [ 21.994521] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.994575] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.994621] ================================================================== [ 21.968634] ================================================================== [ 21.968733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 21.968823] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.968886] [ 21.968940] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.969097] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.969162] Hardware name: linux,dummy-virt (DT) [ 21.969211] Call trace: [ 21.969292] show_stack+0x20/0x38 (C) [ 21.969385] dump_stack_lvl+0x8c/0xd0 [ 21.969779] print_report+0x118/0x608 [ 21.969906] kasan_report+0xdc/0x128 [ 21.969965] __asan_report_store8_noabort+0x20/0x30 [ 21.970046] kasan_atomics_helper+0x3e5c/0x4858 [ 21.970109] kasan_atomics+0x198/0x2e0 [ 21.970164] kunit_try_run_case+0x170/0x3f0 [ 21.970222] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.970299] kthread+0x328/0x630 [ 21.970366] ret_from_fork+0x10/0x20 [ 21.970450] [ 21.970481] Allocated by task 265: [ 21.970519] kasan_save_stack+0x3c/0x68 [ 21.970574] kasan_save_track+0x20/0x40 [ 21.970634] kasan_save_alloc_info+0x40/0x58 [ 21.970691] __kasan_kmalloc+0xd4/0xd8 [ 21.970736] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.970784] kasan_atomics+0xb8/0x2e0 [ 21.970849] kunit_try_run_case+0x170/0x3f0 [ 21.970902] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.970955] kthread+0x328/0x630 [ 21.971009] ret_from_fork+0x10/0x20 [ 21.971055] [ 21.971080] The buggy address belongs to the object at fff00000c59de300 [ 21.971080] which belongs to the cache kmalloc-64 of size 64 [ 21.971150] The buggy address is located 0 bytes to the right of [ 21.971150] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 21.971222] [ 21.971250] The buggy address belongs to the physical page: [ 21.971290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 21.971355] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.971415] page_type: f5(slab) [ 21.971463] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.971523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.971572] page dumped because: kasan: bad access detected [ 21.971610] [ 21.971632] Memory state around the buggy address: [ 21.971671] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.971723] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.971774] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.971819] ^ [ 21.971857] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.971907] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.971952] ================================================================== [ 21.972130] ================================================================== [ 21.972184] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 21.972240] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 21.972297] [ 21.972338] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.972534] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.972589] Hardware name: linux,dummy-virt (DT) [ 21.972629] Call trace: [ 21.972659] show_stack+0x20/0x38 (C) [ 21.972773] dump_stack_lvl+0x8c/0xd0 [ 21.972883] print_report+0x118/0x608 [ 21.973728] kasan_report+0xdc/0x128 [ 21.973923] kasan_check_range+0x100/0x1a8 [ 21.974080] __kasan_check_write+0x20/0x30 [ 21.974200] kasan_atomics_helper+0xeb8/0x4858 [ 21.974259] kasan_atomics+0x198/0x2e0 [ 21.974320] kunit_try_run_case+0x170/0x3f0 [ 21.974375] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.974462] kthread+0x328/0x630 [ 21.974517] ret_from_fork+0x10/0x20 [ 21.974574] [ 21.974599] Allocated by task 265: [ 21.974636] kasan_save_stack+0x3c/0x68 [ 21.974823] kasan_save_track+0x20/0x40 [ 21.974908] kasan_save_alloc_info+0x40/0x58 [ 21.974960] __kasan_kmalloc+0xd4/0xd8 [ 21.975031] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.975079] kasan_atomics+0xb8/0x2e0 [ 21.975124] kunit_try_run_case+0x170/0x3f0 [ 21.975171] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.975222] kthread+0x328/0x630 [ 21.975268] ret_from_fork+0x10/0x20 [ 21.975315] [ 21.975346] The buggy address belongs to the object at fff00000c59de300 [ 21.975346] which belongs to the cache kmalloc-64 of size 64 [ 21.975416] The buggy address is located 0 bytes to the right of [ 21.975416] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 21.975486] [ 21.975511] The buggy address belongs to the physical page: [ 21.975550] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 21.975608] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.975663] page_type: f5(slab) [ 21.975711] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.975769] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.975814] page dumped because: kasan: bad access detected [ 21.975848] [ 21.975871] Memory state around the buggy address: [ 21.975908] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.975956] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.976024] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.976070] ^ [ 21.976111] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.976160] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.976205] ================================================================== [ 22.047798] ================================================================== [ 22.047861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 22.047933] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.048009] [ 22.048052] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.048151] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.048185] Hardware name: linux,dummy-virt (DT) [ 22.048223] Call trace: [ 22.048253] show_stack+0x20/0x38 (C) [ 22.048315] dump_stack_lvl+0x8c/0xd0 [ 22.048369] print_report+0x118/0x608 [ 22.048425] kasan_report+0xdc/0x128 [ 22.048478] kasan_check_range+0x100/0x1a8 [ 22.048536] __kasan_check_write+0x20/0x30 [ 22.048592] kasan_atomics_helper+0x1384/0x4858 [ 22.048649] kasan_atomics+0x198/0x2e0 [ 22.048703] kunit_try_run_case+0x170/0x3f0 [ 22.048760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.048824] kthread+0x328/0x630 [ 22.048922] ret_from_fork+0x10/0x20 [ 22.049026] [ 22.049052] Allocated by task 265: [ 22.049089] kasan_save_stack+0x3c/0x68 [ 22.049215] kasan_save_track+0x20/0x40 [ 22.049364] kasan_save_alloc_info+0x40/0x58 [ 22.049475] __kasan_kmalloc+0xd4/0xd8 [ 22.049538] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.049590] kasan_atomics+0xb8/0x2e0 [ 22.049633] kunit_try_run_case+0x170/0x3f0 [ 22.049679] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.049733] kthread+0x328/0x630 [ 22.049777] ret_from_fork+0x10/0x20 [ 22.049845] [ 22.049876] The buggy address belongs to the object at fff00000c59de300 [ 22.049876] which belongs to the cache kmalloc-64 of size 64 [ 22.049947] The buggy address is located 0 bytes to the right of [ 22.049947] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.050064] [ 22.050097] The buggy address belongs to the physical page: [ 22.050185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.050278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.050337] page_type: f5(slab) [ 22.050388] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.050454] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.050541] page dumped because: kasan: bad access detected [ 22.050614] [ 22.050663] Memory state around the buggy address: [ 22.050705] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.050759] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.050808] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.050852] ^ [ 22.050893] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.050944] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.051001] ================================================================== [ 22.059361] ================================================================== [ 22.059429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 22.059498] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.059556] [ 22.059594] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.059692] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.059725] Hardware name: linux,dummy-virt (DT) [ 22.059761] Call trace: [ 22.059790] show_stack+0x20/0x38 (C) [ 22.059850] dump_stack_lvl+0x8c/0xd0 [ 22.059903] print_report+0x118/0x608 [ 22.059959] kasan_report+0xdc/0x128 [ 22.060027] kasan_check_range+0x100/0x1a8 [ 22.060085] __kasan_check_write+0x20/0x30 [ 22.060140] kasan_atomics_helper+0x1414/0x4858 [ 22.060194] kasan_atomics+0x198/0x2e0 [ 22.060247] kunit_try_run_case+0x170/0x3f0 [ 22.060300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.060361] kthread+0x328/0x630 [ 22.060414] ret_from_fork+0x10/0x20 [ 22.060471] [ 22.060495] Allocated by task 265: [ 22.060530] kasan_save_stack+0x3c/0x68 [ 22.060581] kasan_save_track+0x20/0x40 [ 22.060627] kasan_save_alloc_info+0x40/0x58 [ 22.060675] __kasan_kmalloc+0xd4/0xd8 [ 22.060719] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.060765] kasan_atomics+0xb8/0x2e0 [ 22.060806] kunit_try_run_case+0x170/0x3f0 [ 22.060854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.060905] kthread+0x328/0x630 [ 22.060949] ret_from_fork+0x10/0x20 [ 22.061977] [ 22.062040] The buggy address belongs to the object at fff00000c59de300 [ 22.062040] which belongs to the cache kmalloc-64 of size 64 [ 22.062172] The buggy address is located 0 bytes to the right of [ 22.062172] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.062353] [ 22.062405] The buggy address belongs to the physical page: [ 22.062511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.062720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.062780] page_type: f5(slab) [ 22.062829] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.062883] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.062929] page dumped because: kasan: bad access detected [ 22.063558] [ 22.063589] Memory state around the buggy address: [ 22.063634] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.063688] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.063736] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.063781] ^ [ 22.063822] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.063917] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.063964] ================================================================== [ 22.113023] ================================================================== [ 22.113092] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 22.113564] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.113670] [ 22.113728] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.113841] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.113878] Hardware name: linux,dummy-virt (DT) [ 22.113919] Call trace: [ 22.113951] show_stack+0x20/0x38 (C) [ 22.114031] dump_stack_lvl+0x8c/0xd0 [ 22.114089] print_report+0x118/0x608 [ 22.114142] kasan_report+0xdc/0x128 [ 22.114195] kasan_check_range+0x100/0x1a8 [ 22.114251] __kasan_check_write+0x20/0x30 [ 22.114308] kasan_atomics_helper+0x16d0/0x4858 [ 22.114363] kasan_atomics+0x198/0x2e0 [ 22.114411] kunit_try_run_case+0x170/0x3f0 [ 22.115491] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.115613] kthread+0x328/0x630 [ 22.115673] ret_from_fork+0x10/0x20 [ 22.115775] [ 22.115804] Allocated by task 265: [ 22.115839] kasan_save_stack+0x3c/0x68 [ 22.115894] kasan_save_track+0x20/0x40 [ 22.115940] kasan_save_alloc_info+0x40/0x58 [ 22.116011] __kasan_kmalloc+0xd4/0xd8 [ 22.116060] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.116263] kasan_atomics+0xb8/0x2e0 [ 22.116421] kunit_try_run_case+0x170/0x3f0 [ 22.116565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.116895] kthread+0x328/0x630 [ 22.116981] ret_from_fork+0x10/0x20 [ 22.117036] [ 22.117141] The buggy address belongs to the object at fff00000c59de300 [ 22.117141] which belongs to the cache kmalloc-64 of size 64 [ 22.117209] The buggy address is located 0 bytes to the right of [ 22.117209] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.117283] [ 22.117308] The buggy address belongs to the physical page: [ 22.117348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.117409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.117692] page_type: f5(slab) [ 22.117816] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.118207] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.118307] page dumped because: kasan: bad access detected [ 22.118365] [ 22.118392] Memory state around the buggy address: [ 22.118662] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.119063] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.119180] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.119524] ^ [ 22.119738] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.119858] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.119923] ================================================================== [ 22.131862] ================================================================== [ 22.131944] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 22.132042] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265 [ 22.132103] [ 22.132148] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 22.132247] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.132280] Hardware name: linux,dummy-virt (DT) [ 22.132315] Call trace: [ 22.132343] show_stack+0x20/0x38 (C) [ 22.132402] dump_stack_lvl+0x8c/0xd0 [ 22.132453] print_report+0x118/0x608 [ 22.132505] kasan_report+0xdc/0x128 [ 22.132554] kasan_check_range+0x100/0x1a8 [ 22.132607] __kasan_check_write+0x20/0x30 [ 22.132661] kasan_atomics_helper+0x175c/0x4858 [ 22.132715] kasan_atomics+0x198/0x2e0 [ 22.132762] kunit_try_run_case+0x170/0x3f0 [ 22.132815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.132873] kthread+0x328/0x630 [ 22.132926] ret_from_fork+0x10/0x20 [ 22.133003] [ 22.133146] Allocated by task 265: [ 22.133193] kasan_save_stack+0x3c/0x68 [ 22.133258] kasan_save_track+0x20/0x40 [ 22.133305] kasan_save_alloc_info+0x40/0x58 [ 22.133354] __kasan_kmalloc+0xd4/0xd8 [ 22.133398] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.133456] kasan_atomics+0xb8/0x2e0 [ 22.133507] kunit_try_run_case+0x170/0x3f0 [ 22.133553] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.133605] kthread+0x328/0x630 [ 22.133883] ret_from_fork+0x10/0x20 [ 22.133988] [ 22.134111] The buggy address belongs to the object at fff00000c59de300 [ 22.134111] which belongs to the cache kmalloc-64 of size 64 [ 22.134485] The buggy address is located 0 bytes to the right of [ 22.134485] allocated 48-byte region [fff00000c59de300, fff00000c59de330) [ 22.134564] [ 22.134592] The buggy address belongs to the physical page: [ 22.134731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de [ 22.135063] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.135353] page_type: f5(slab) [ 22.135481] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.135543] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.135592] page dumped because: kasan: bad access detected [ 22.135633] [ 22.135659] Memory state around the buggy address: [ 22.135699] fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.135750] fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.135800] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.135845] ^ [ 22.135887] fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.136194] fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.136252] ==================================================================
[ 14.245634] ================================================================== [ 14.245920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 14.246243] Read of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.246584] [ 14.246708] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.246757] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.246770] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.246792] Call Trace: [ 14.246805] <TASK> [ 14.246821] dump_stack_lvl+0x73/0xb0 [ 14.246848] print_report+0xd1/0x650 [ 14.246871] ? __virt_addr_valid+0x1db/0x2d0 [ 14.246897] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.246920] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.246944] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.246968] kasan_report+0x141/0x180 [ 14.246992] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.247020] __asan_report_load4_noabort+0x18/0x20 [ 14.247041] kasan_atomics_helper+0x4a1c/0x5450 [ 14.247066] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.247089] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.247112] ? kasan_atomics+0x152/0x310 [ 14.247136] kasan_atomics+0x1dc/0x310 [ 14.247157] ? __pfx_kasan_atomics+0x10/0x10 [ 14.247180] ? __pfx_read_tsc+0x10/0x10 [ 14.247217] ? ktime_get_ts64+0x86/0x230 [ 14.247244] kunit_try_run_case+0x1a5/0x480 [ 14.247269] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.247291] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.247315] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.247338] ? __kthread_parkme+0x82/0x180 [ 14.247360] ? preempt_count_sub+0x50/0x80 [ 14.247385] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.247410] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.247433] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.247458] kthread+0x337/0x6f0 [ 14.247479] ? trace_preempt_on+0x20/0xc0 [ 14.247502] ? __pfx_kthread+0x10/0x10 [ 14.247525] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.247553] ? calculate_sigpending+0x7b/0xa0 [ 14.247577] ? __pfx_kthread+0x10/0x10 [ 14.247603] ret_from_fork+0x116/0x1d0 [ 14.247632] ? __pfx_kthread+0x10/0x10 [ 14.247655] ret_from_fork_asm+0x1a/0x30 [ 14.247688] </TASK> [ 14.247699] [ 14.255472] Allocated by task 282: [ 14.255603] kasan_save_stack+0x45/0x70 [ 14.255942] kasan_save_track+0x18/0x40 [ 14.256136] kasan_save_alloc_info+0x3b/0x50 [ 14.256576] __kasan_kmalloc+0xb7/0xc0 [ 14.256847] __kmalloc_cache_noprof+0x189/0x420 [ 14.257039] kasan_atomics+0x95/0x310 [ 14.257255] kunit_try_run_case+0x1a5/0x480 [ 14.257424] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.257792] kthread+0x337/0x6f0 [ 14.257926] ret_from_fork+0x116/0x1d0 [ 14.258109] ret_from_fork_asm+0x1a/0x30 [ 14.258291] [ 14.258364] The buggy address belongs to the object at ffff8881029e5b80 [ 14.258364] which belongs to the cache kmalloc-64 of size 64 [ 14.258845] The buggy address is located 0 bytes to the right of [ 14.258845] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.259558] [ 14.259664] The buggy address belongs to the physical page: [ 14.259969] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.260325] flags: 0x200000000000000(node=0|zone=2) [ 14.260488] page_type: f5(slab) [ 14.261374] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.262442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.263432] page dumped because: kasan: bad access detected [ 14.263685] [ 14.263792] Memory state around the buggy address: [ 14.264024] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.264788] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.265204] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.265640] ^ [ 14.265835] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.266400] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.266823] ================================================================== [ 14.728889] ================================================================== [ 14.729304] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 14.729678] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.730012] [ 14.730130] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.730199] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.730213] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.730234] Call Trace: [ 14.730249] <TASK> [ 14.730264] dump_stack_lvl+0x73/0xb0 [ 14.730302] print_report+0xd1/0x650 [ 14.730325] ? __virt_addr_valid+0x1db/0x2d0 [ 14.730349] ? kasan_atomics_helper+0x1c18/0x5450 [ 14.730383] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.730407] ? kasan_atomics_helper+0x1c18/0x5450 [ 14.730431] kasan_report+0x141/0x180 [ 14.730465] ? kasan_atomics_helper+0x1c18/0x5450 [ 14.730494] kasan_check_range+0x10c/0x1c0 [ 14.730530] __kasan_check_write+0x18/0x20 [ 14.730553] kasan_atomics_helper+0x1c18/0x5450 [ 14.730578] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.730602] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.730640] ? kasan_atomics+0x152/0x310 [ 14.730665] kasan_atomics+0x1dc/0x310 [ 14.730695] ? __pfx_kasan_atomics+0x10/0x10 [ 14.730717] ? __pfx_read_tsc+0x10/0x10 [ 14.730739] ? ktime_get_ts64+0x86/0x230 [ 14.730766] kunit_try_run_case+0x1a5/0x480 [ 14.730790] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.730822] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.730845] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.730868] ? __kthread_parkme+0x82/0x180 [ 14.730900] ? preempt_count_sub+0x50/0x80 [ 14.730925] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.730950] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.730973] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.731007] kthread+0x337/0x6f0 [ 14.731028] ? trace_preempt_on+0x20/0xc0 [ 14.731052] ? __pfx_kthread+0x10/0x10 [ 14.731085] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.731107] ? calculate_sigpending+0x7b/0xa0 [ 14.731132] ? __pfx_kthread+0x10/0x10 [ 14.731179] ret_from_fork+0x116/0x1d0 [ 14.731199] ? __pfx_kthread+0x10/0x10 [ 14.731231] ret_from_fork_asm+0x1a/0x30 [ 14.731264] </TASK> [ 14.731276] [ 14.738865] Allocated by task 282: [ 14.738994] kasan_save_stack+0x45/0x70 [ 14.739137] kasan_save_track+0x18/0x40 [ 14.739326] kasan_save_alloc_info+0x3b/0x50 [ 14.739568] __kasan_kmalloc+0xb7/0xc0 [ 14.739769] __kmalloc_cache_noprof+0x189/0x420 [ 14.739990] kasan_atomics+0x95/0x310 [ 14.740191] kunit_try_run_case+0x1a5/0x480 [ 14.740400] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.740659] kthread+0x337/0x6f0 [ 14.740828] ret_from_fork+0x116/0x1d0 [ 14.741019] ret_from_fork_asm+0x1a/0x30 [ 14.741223] [ 14.741333] The buggy address belongs to the object at ffff8881029e5b80 [ 14.741333] which belongs to the cache kmalloc-64 of size 64 [ 14.741768] The buggy address is located 0 bytes to the right of [ 14.741768] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.742327] [ 14.742437] The buggy address belongs to the physical page: [ 14.742688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.743036] flags: 0x200000000000000(node=0|zone=2) [ 14.743294] page_type: f5(slab) [ 14.743460] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.743804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.744118] page dumped because: kasan: bad access detected [ 14.744415] [ 14.744526] Memory state around the buggy address: [ 14.744756] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.744994] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.745267] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.745595] ^ [ 14.745826] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.746131] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.746386] ================================================================== [ 14.017013] ================================================================== [ 14.017424] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 14.017840] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.018143] [ 14.018294] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.018342] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.018354] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.018377] Call Trace: [ 14.018392] <TASK> [ 14.018408] dump_stack_lvl+0x73/0xb0 [ 14.018436] print_report+0xd1/0x650 [ 14.018460] ? __virt_addr_valid+0x1db/0x2d0 [ 14.018487] ? kasan_atomics_helper+0xc70/0x5450 [ 14.018510] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.018534] ? kasan_atomics_helper+0xc70/0x5450 [ 14.018557] kasan_report+0x141/0x180 [ 14.018580] ? kasan_atomics_helper+0xc70/0x5450 [ 14.018608] kasan_check_range+0x10c/0x1c0 [ 14.018646] __kasan_check_write+0x18/0x20 [ 14.018666] kasan_atomics_helper+0xc70/0x5450 [ 14.018690] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.018714] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.018736] ? kasan_atomics+0x152/0x310 [ 14.018761] kasan_atomics+0x1dc/0x310 [ 14.018831] ? __pfx_kasan_atomics+0x10/0x10 [ 14.018856] ? __pfx_read_tsc+0x10/0x10 [ 14.018878] ? ktime_get_ts64+0x86/0x230 [ 14.018904] kunit_try_run_case+0x1a5/0x480 [ 14.018929] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.018953] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.018975] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.018999] ? __kthread_parkme+0x82/0x180 [ 14.019021] ? preempt_count_sub+0x50/0x80 [ 14.019045] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.019069] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.019093] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.019117] kthread+0x337/0x6f0 [ 14.019138] ? trace_preempt_on+0x20/0xc0 [ 14.019162] ? __pfx_kthread+0x10/0x10 [ 14.019185] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.019207] ? calculate_sigpending+0x7b/0xa0 [ 14.019241] ? __pfx_kthread+0x10/0x10 [ 14.019264] ret_from_fork+0x116/0x1d0 [ 14.019283] ? __pfx_kthread+0x10/0x10 [ 14.019305] ret_from_fork_asm+0x1a/0x30 [ 14.019339] </TASK> [ 14.019352] [ 14.027661] Allocated by task 282: [ 14.027795] kasan_save_stack+0x45/0x70 [ 14.027939] kasan_save_track+0x18/0x40 [ 14.028092] kasan_save_alloc_info+0x3b/0x50 [ 14.028726] __kasan_kmalloc+0xb7/0xc0 [ 14.028949] __kmalloc_cache_noprof+0x189/0x420 [ 14.029176] kasan_atomics+0x95/0x310 [ 14.029367] kunit_try_run_case+0x1a5/0x480 [ 14.029683] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.029952] kthread+0x337/0x6f0 [ 14.030086] ret_from_fork+0x116/0x1d0 [ 14.030236] ret_from_fork_asm+0x1a/0x30 [ 14.030434] [ 14.030545] The buggy address belongs to the object at ffff8881029e5b80 [ 14.030545] which belongs to the cache kmalloc-64 of size 64 [ 14.031054] The buggy address is located 0 bytes to the right of [ 14.031054] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.031445] [ 14.031542] The buggy address belongs to the physical page: [ 14.031817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.032231] flags: 0x200000000000000(node=0|zone=2) [ 14.032406] page_type: f5(slab) [ 14.032709] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.033073] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.033511] page dumped because: kasan: bad access detected [ 14.033788] [ 14.033892] Memory state around the buggy address: [ 14.034071] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.034342] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.034683] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.035090] ^ [ 14.035355] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.035750] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.035972] ================================================================== [ 14.710754] ================================================================== [ 14.711215] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 14.711601] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.711968] [ 14.712076] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.712131] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.712145] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.712190] Call Trace: [ 14.712203] <TASK> [ 14.712218] dump_stack_lvl+0x73/0xb0 [ 14.712247] print_report+0xd1/0x650 [ 14.712272] ? __virt_addr_valid+0x1db/0x2d0 [ 14.712295] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.712318] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.712352] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.712376] kasan_report+0x141/0x180 [ 14.712399] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.712438] kasan_check_range+0x10c/0x1c0 [ 14.712463] __kasan_check_write+0x18/0x20 [ 14.712484] kasan_atomics_helper+0x1b22/0x5450 [ 14.712508] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.712531] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.712563] ? kasan_atomics+0x152/0x310 [ 14.712587] kasan_atomics+0x1dc/0x310 [ 14.712607] ? __pfx_kasan_atomics+0x10/0x10 [ 14.712646] ? __pfx_read_tsc+0x10/0x10 [ 14.712668] ? ktime_get_ts64+0x86/0x230 [ 14.712693] kunit_try_run_case+0x1a5/0x480 [ 14.712719] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.712741] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.712763] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.712787] ? __kthread_parkme+0x82/0x180 [ 14.712807] ? preempt_count_sub+0x50/0x80 [ 14.712832] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.712866] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.712890] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.712914] kthread+0x337/0x6f0 [ 14.712945] ? trace_preempt_on+0x20/0xc0 [ 14.712970] ? __pfx_kthread+0x10/0x10 [ 14.712992] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.713013] ? calculate_sigpending+0x7b/0xa0 [ 14.713038] ? __pfx_kthread+0x10/0x10 [ 14.713061] ret_from_fork+0x116/0x1d0 [ 14.713081] ? __pfx_kthread+0x10/0x10 [ 14.713103] ret_from_fork_asm+0x1a/0x30 [ 14.713142] </TASK> [ 14.713153] [ 14.720813] Allocated by task 282: [ 14.720995] kasan_save_stack+0x45/0x70 [ 14.721219] kasan_save_track+0x18/0x40 [ 14.721400] kasan_save_alloc_info+0x3b/0x50 [ 14.721549] __kasan_kmalloc+0xb7/0xc0 [ 14.721734] __kmalloc_cache_noprof+0x189/0x420 [ 14.721960] kasan_atomics+0x95/0x310 [ 14.722186] kunit_try_run_case+0x1a5/0x480 [ 14.722404] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.722653] kthread+0x337/0x6f0 [ 14.722842] ret_from_fork+0x116/0x1d0 [ 14.723025] ret_from_fork_asm+0x1a/0x30 [ 14.723239] [ 14.723337] The buggy address belongs to the object at ffff8881029e5b80 [ 14.723337] which belongs to the cache kmalloc-64 of size 64 [ 14.723845] The buggy address is located 0 bytes to the right of [ 14.723845] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.724397] [ 14.724497] The buggy address belongs to the physical page: [ 14.724745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.725051] flags: 0x200000000000000(node=0|zone=2) [ 14.725239] page_type: f5(slab) [ 14.725362] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.725701] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.726099] page dumped because: kasan: bad access detected [ 14.726347] [ 14.726432] Memory state around the buggy address: [ 14.726632] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.726963] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.727290] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.727604] ^ [ 14.727788] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.728111] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.728453] ================================================================== [ 13.679377] ================================================================== [ 13.679943] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 13.680476] Read of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 13.680927] [ 13.681047] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 13.681097] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.681112] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.681135] Call Trace: [ 13.681151] <TASK> [ 13.681167] dump_stack_lvl+0x73/0xb0 [ 13.681394] print_report+0xd1/0x650 [ 13.681420] ? __virt_addr_valid+0x1db/0x2d0 [ 13.681444] ? kasan_atomics_helper+0x3df/0x5450 [ 13.681466] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.681491] ? kasan_atomics_helper+0x3df/0x5450 [ 13.681514] kasan_report+0x141/0x180 [ 13.681595] ? kasan_atomics_helper+0x3df/0x5450 [ 13.681637] kasan_check_range+0x10c/0x1c0 [ 13.681663] __kasan_check_read+0x15/0x20 [ 13.681683] kasan_atomics_helper+0x3df/0x5450 [ 13.681707] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.681731] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.681756] ? kasan_atomics+0x152/0x310 [ 13.681780] kasan_atomics+0x1dc/0x310 [ 13.681801] ? __pfx_kasan_atomics+0x10/0x10 [ 13.681824] ? __pfx_read_tsc+0x10/0x10 [ 13.681846] ? ktime_get_ts64+0x86/0x230 [ 13.681872] kunit_try_run_case+0x1a5/0x480 [ 13.681897] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.681920] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.681942] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.681966] ? __kthread_parkme+0x82/0x180 [ 13.681987] ? preempt_count_sub+0x50/0x80 [ 13.682012] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.682037] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.682061] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.682085] kthread+0x337/0x6f0 [ 13.682106] ? trace_preempt_on+0x20/0xc0 [ 13.682131] ? __pfx_kthread+0x10/0x10 [ 13.682153] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.682175] ? calculate_sigpending+0x7b/0xa0 [ 13.682200] ? __pfx_kthread+0x10/0x10 [ 13.682223] ret_from_fork+0x116/0x1d0 [ 13.682242] ? __pfx_kthread+0x10/0x10 [ 13.682264] ret_from_fork_asm+0x1a/0x30 [ 13.682297] </TASK> [ 13.682308] [ 13.692553] Allocated by task 282: [ 13.692748] kasan_save_stack+0x45/0x70 [ 13.693074] kasan_save_track+0x18/0x40 [ 13.693266] kasan_save_alloc_info+0x3b/0x50 [ 13.693415] __kasan_kmalloc+0xb7/0xc0 [ 13.693728] __kmalloc_cache_noprof+0x189/0x420 [ 13.693958] kasan_atomics+0x95/0x310 [ 13.694145] kunit_try_run_case+0x1a5/0x480 [ 13.694446] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.694689] kthread+0x337/0x6f0 [ 13.695002] ret_from_fork+0x116/0x1d0 [ 13.695208] ret_from_fork_asm+0x1a/0x30 [ 13.695411] [ 13.695486] The buggy address belongs to the object at ffff8881029e5b80 [ 13.695486] which belongs to the cache kmalloc-64 of size 64 [ 13.696041] The buggy address is located 0 bytes to the right of [ 13.696041] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 13.696555] [ 13.696659] The buggy address belongs to the physical page: [ 13.696886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 13.697247] flags: 0x200000000000000(node=0|zone=2) [ 13.697445] page_type: f5(slab) [ 13.697686] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.697950] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.698177] page dumped because: kasan: bad access detected [ 13.698402] [ 13.698566] Memory state around the buggy address: [ 13.698809] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.699078] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.699293] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.699954] ^ [ 13.700194] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.700517] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.700874] ================================================================== [ 14.119665] ================================================================== [ 14.120460] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 14.121196] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.121488] [ 14.121640] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.121689] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.121702] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.121725] Call Trace: [ 14.121739] <TASK> [ 14.121754] dump_stack_lvl+0x73/0xb0 [ 14.121782] print_report+0xd1/0x650 [ 14.121806] ? __virt_addr_valid+0x1db/0x2d0 [ 14.121830] ? kasan_atomics_helper+0xf10/0x5450 [ 14.121852] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.121877] ? kasan_atomics_helper+0xf10/0x5450 [ 14.121900] kasan_report+0x141/0x180 [ 14.121924] ? kasan_atomics_helper+0xf10/0x5450 [ 14.121952] kasan_check_range+0x10c/0x1c0 [ 14.121977] __kasan_check_write+0x18/0x20 [ 14.121998] kasan_atomics_helper+0xf10/0x5450 [ 14.122023] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.122047] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.122069] ? kasan_atomics+0x152/0x310 [ 14.122094] kasan_atomics+0x1dc/0x310 [ 14.122114] ? __pfx_kasan_atomics+0x10/0x10 [ 14.122136] ? __pfx_read_tsc+0x10/0x10 [ 14.122158] ? ktime_get_ts64+0x86/0x230 [ 14.122201] kunit_try_run_case+0x1a5/0x480 [ 14.122226] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.122250] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.122273] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.122297] ? __kthread_parkme+0x82/0x180 [ 14.122318] ? preempt_count_sub+0x50/0x80 [ 14.122343] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.122368] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.122394] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.122418] kthread+0x337/0x6f0 [ 14.122439] ? trace_preempt_on+0x20/0xc0 [ 14.122469] ? __pfx_kthread+0x10/0x10 [ 14.122491] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.122513] ? calculate_sigpending+0x7b/0xa0 [ 14.122580] ? __pfx_kthread+0x10/0x10 [ 14.122604] ret_from_fork+0x116/0x1d0 [ 14.122635] ? __pfx_kthread+0x10/0x10 [ 14.122657] ret_from_fork_asm+0x1a/0x30 [ 14.122690] </TASK> [ 14.122701] [ 14.137477] Allocated by task 282: [ 14.137902] kasan_save_stack+0x45/0x70 [ 14.138305] kasan_save_track+0x18/0x40 [ 14.138745] kasan_save_alloc_info+0x3b/0x50 [ 14.138942] __kasan_kmalloc+0xb7/0xc0 [ 14.139077] __kmalloc_cache_noprof+0x189/0x420 [ 14.139323] kasan_atomics+0x95/0x310 [ 14.139836] kunit_try_run_case+0x1a5/0x480 [ 14.140264] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.140832] kthread+0x337/0x6f0 [ 14.141154] ret_from_fork+0x116/0x1d0 [ 14.141575] ret_from_fork_asm+0x1a/0x30 [ 14.141949] [ 14.142037] The buggy address belongs to the object at ffff8881029e5b80 [ 14.142037] which belongs to the cache kmalloc-64 of size 64 [ 14.142723] The buggy address is located 0 bytes to the right of [ 14.142723] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.143984] [ 14.144153] The buggy address belongs to the physical page: [ 14.144467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.145319] flags: 0x200000000000000(node=0|zone=2) [ 14.145826] page_type: f5(slab) [ 14.146188] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.146794] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.147028] page dumped because: kasan: bad access detected [ 14.147242] [ 14.147405] Memory state around the buggy address: [ 14.147887] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.148672] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.149302] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.150113] ^ [ 14.150822] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.151101] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.151648] ================================================================== [ 14.634972] ================================================================== [ 14.635342] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 14.635684] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.636166] [ 14.636297] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.636343] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.636355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.636376] Call Trace: [ 14.636391] <TASK> [ 14.636406] dump_stack_lvl+0x73/0xb0 [ 14.636433] print_report+0xd1/0x650 [ 14.636456] ? __virt_addr_valid+0x1db/0x2d0 [ 14.636480] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.636502] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.636526] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.636550] kasan_report+0x141/0x180 [ 14.636574] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.636602] kasan_check_range+0x10c/0x1c0 [ 14.636638] __kasan_check_write+0x18/0x20 [ 14.636659] kasan_atomics_helper+0x18b1/0x5450 [ 14.636683] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.636707] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.636730] ? kasan_atomics+0x152/0x310 [ 14.636756] kasan_atomics+0x1dc/0x310 [ 14.636777] ? __pfx_kasan_atomics+0x10/0x10 [ 14.636799] ? __pfx_read_tsc+0x10/0x10 [ 14.636820] ? ktime_get_ts64+0x86/0x230 [ 14.636846] kunit_try_run_case+0x1a5/0x480 [ 14.636871] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.636895] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.636918] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.636941] ? __kthread_parkme+0x82/0x180 [ 14.636963] ? preempt_count_sub+0x50/0x80 [ 14.636989] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.637014] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.637038] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.637062] kthread+0x337/0x6f0 [ 14.637083] ? trace_preempt_on+0x20/0xc0 [ 14.637108] ? __pfx_kthread+0x10/0x10 [ 14.637129] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.637151] ? calculate_sigpending+0x7b/0xa0 [ 14.637176] ? __pfx_kthread+0x10/0x10 [ 14.637210] ret_from_fork+0x116/0x1d0 [ 14.637229] ? __pfx_kthread+0x10/0x10 [ 14.637252] ret_from_fork_asm+0x1a/0x30 [ 14.637285] </TASK> [ 14.637296] [ 14.644738] Allocated by task 282: [ 14.644893] kasan_save_stack+0x45/0x70 [ 14.645075] kasan_save_track+0x18/0x40 [ 14.645279] kasan_save_alloc_info+0x3b/0x50 [ 14.645469] __kasan_kmalloc+0xb7/0xc0 [ 14.645646] __kmalloc_cache_noprof+0x189/0x420 [ 14.645799] kasan_atomics+0x95/0x310 [ 14.645931] kunit_try_run_case+0x1a5/0x480 [ 14.646079] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.646499] kthread+0x337/0x6f0 [ 14.646690] ret_from_fork+0x116/0x1d0 [ 14.646887] ret_from_fork_asm+0x1a/0x30 [ 14.647086] [ 14.647192] The buggy address belongs to the object at ffff8881029e5b80 [ 14.647192] which belongs to the cache kmalloc-64 of size 64 [ 14.647651] The buggy address is located 0 bytes to the right of [ 14.647651] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.648063] [ 14.648161] The buggy address belongs to the physical page: [ 14.648434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.648800] flags: 0x200000000000000(node=0|zone=2) [ 14.649011] page_type: f5(slab) [ 14.649159] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.649422] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.649658] page dumped because: kasan: bad access detected [ 14.649893] [ 14.649966] Memory state around the buggy address: [ 14.650147] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.650469] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.650811] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.651097] ^ [ 14.651292] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.651560] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.651889] ================================================================== [ 14.671908] ================================================================== [ 14.672456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 14.672788] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.673074] [ 14.673175] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.673241] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.673255] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.673276] Call Trace: [ 14.673291] <TASK> [ 14.673323] dump_stack_lvl+0x73/0xb0 [ 14.673351] print_report+0xd1/0x650 [ 14.673392] ? __virt_addr_valid+0x1db/0x2d0 [ 14.673417] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.673439] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.673463] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.673487] kasan_report+0x141/0x180 [ 14.673511] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.673539] kasan_check_range+0x10c/0x1c0 [ 14.673565] __kasan_check_write+0x18/0x20 [ 14.673585] kasan_atomics_helper+0x19e3/0x5450 [ 14.673638] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.673664] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.673685] ? kasan_atomics+0x152/0x310 [ 14.673727] kasan_atomics+0x1dc/0x310 [ 14.673748] ? __pfx_kasan_atomics+0x10/0x10 [ 14.673770] ? __pfx_read_tsc+0x10/0x10 [ 14.673792] ? ktime_get_ts64+0x86/0x230 [ 14.673818] kunit_try_run_case+0x1a5/0x480 [ 14.673843] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.673883] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.673907] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.673931] ? __kthread_parkme+0x82/0x180 [ 14.673951] ? preempt_count_sub+0x50/0x80 [ 14.673977] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.674002] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.674043] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.674068] kthread+0x337/0x6f0 [ 14.674089] ? trace_preempt_on+0x20/0xc0 [ 14.674113] ? __pfx_kthread+0x10/0x10 [ 14.674136] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.674158] ? calculate_sigpending+0x7b/0xa0 [ 14.674225] ? __pfx_kthread+0x10/0x10 [ 14.674248] ret_from_fork+0x116/0x1d0 [ 14.674283] ? __pfx_kthread+0x10/0x10 [ 14.674306] ret_from_fork_asm+0x1a/0x30 [ 14.674339] </TASK> [ 14.674350] [ 14.682133] Allocated by task 282: [ 14.682260] kasan_save_stack+0x45/0x70 [ 14.682404] kasan_save_track+0x18/0x40 [ 14.682579] kasan_save_alloc_info+0x3b/0x50 [ 14.682778] __kasan_kmalloc+0xb7/0xc0 [ 14.682956] __kmalloc_cache_noprof+0x189/0x420 [ 14.683144] kasan_atomics+0x95/0x310 [ 14.683307] kunit_try_run_case+0x1a5/0x480 [ 14.683493] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.685583] kthread+0x337/0x6f0 [ 14.685740] ret_from_fork+0x116/0x1d0 [ 14.685880] ret_from_fork_asm+0x1a/0x30 [ 14.686021] [ 14.686099] The buggy address belongs to the object at ffff8881029e5b80 [ 14.686099] which belongs to the cache kmalloc-64 of size 64 [ 14.686606] The buggy address is located 0 bytes to the right of [ 14.686606] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.687112] [ 14.687228] The buggy address belongs to the physical page: [ 14.687490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.687842] flags: 0x200000000000000(node=0|zone=2) [ 14.688036] page_type: f5(slab) [ 14.688251] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.688587] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.688927] page dumped because: kasan: bad access detected [ 14.689160] [ 14.689281] Memory state around the buggy address: [ 14.689528] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.689849] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.690182] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.690525] ^ [ 14.690782] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.691113] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.691478] ================================================================== [ 14.989868] ================================================================== [ 14.990270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 14.990659] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.991017] [ 14.991134] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.991222] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.991235] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.991258] Call Trace: [ 14.991284] <TASK> [ 14.991298] dump_stack_lvl+0x73/0xb0 [ 14.991356] print_report+0xd1/0x650 [ 14.991381] ? __virt_addr_valid+0x1db/0x2d0 [ 14.991405] ? kasan_atomics_helper+0x224c/0x5450 [ 14.991439] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.991463] ? kasan_atomics_helper+0x224c/0x5450 [ 14.991486] kasan_report+0x141/0x180 [ 14.991510] ? kasan_atomics_helper+0x224c/0x5450 [ 14.991538] kasan_check_range+0x10c/0x1c0 [ 14.991563] __kasan_check_write+0x18/0x20 [ 14.991584] kasan_atomics_helper+0x224c/0x5450 [ 14.991609] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.991641] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.991664] ? kasan_atomics+0x152/0x310 [ 14.991688] kasan_atomics+0x1dc/0x310 [ 14.991708] ? __pfx_kasan_atomics+0x10/0x10 [ 14.991760] ? __pfx_read_tsc+0x10/0x10 [ 14.991795] ? ktime_get_ts64+0x86/0x230 [ 14.991832] kunit_try_run_case+0x1a5/0x480 [ 14.991856] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.991879] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.991903] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.991927] ? __kthread_parkme+0x82/0x180 [ 14.991948] ? preempt_count_sub+0x50/0x80 [ 14.991973] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.991998] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.992022] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.992047] kthread+0x337/0x6f0 [ 14.992068] ? trace_preempt_on+0x20/0xc0 [ 14.992092] ? __pfx_kthread+0x10/0x10 [ 14.992114] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.992135] ? calculate_sigpending+0x7b/0xa0 [ 14.992179] ? __pfx_kthread+0x10/0x10 [ 14.992203] ret_from_fork+0x116/0x1d0 [ 14.992223] ? __pfx_kthread+0x10/0x10 [ 14.992246] ret_from_fork_asm+0x1a/0x30 [ 14.992279] </TASK> [ 14.992290] [ 15.000180] Allocated by task 282: [ 15.000317] kasan_save_stack+0x45/0x70 [ 15.000516] kasan_save_track+0x18/0x40 [ 15.000762] kasan_save_alloc_info+0x3b/0x50 [ 15.000978] __kasan_kmalloc+0xb7/0xc0 [ 15.001231] __kmalloc_cache_noprof+0x189/0x420 [ 15.001572] kasan_atomics+0x95/0x310 [ 15.001762] kunit_try_run_case+0x1a5/0x480 [ 15.001911] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.002086] kthread+0x337/0x6f0 [ 15.002269] ret_from_fork+0x116/0x1d0 [ 15.002510] ret_from_fork_asm+0x1a/0x30 [ 15.002717] [ 15.002814] The buggy address belongs to the object at ffff8881029e5b80 [ 15.002814] which belongs to the cache kmalloc-64 of size 64 [ 15.003469] The buggy address is located 0 bytes to the right of [ 15.003469] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 15.004024] [ 15.004129] The buggy address belongs to the physical page: [ 15.004501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 15.004787] flags: 0x200000000000000(node=0|zone=2) [ 15.005028] page_type: f5(slab) [ 15.005185] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.005516] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.005860] page dumped because: kasan: bad access detected [ 15.006098] [ 15.006187] Memory state around the buggy address: [ 15.006401] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.006791] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.007099] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.007438] ^ [ 15.007598] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.007824] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.008143] ================================================================== [ 15.008798] ================================================================== [ 15.009095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 15.009556] Read of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 15.009795] [ 15.009883] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 15.009930] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.009943] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.009965] Call Trace: [ 15.009981] <TASK> [ 15.009997] dump_stack_lvl+0x73/0xb0 [ 15.010024] print_report+0xd1/0x650 [ 15.010047] ? __virt_addr_valid+0x1db/0x2d0 [ 15.010108] ? kasan_atomics_helper+0x5115/0x5450 [ 15.010133] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.010187] ? kasan_atomics_helper+0x5115/0x5450 [ 15.010240] kasan_report+0x141/0x180 [ 15.010267] ? kasan_atomics_helper+0x5115/0x5450 [ 15.010296] __asan_report_load8_noabort+0x18/0x20 [ 15.010328] kasan_atomics_helper+0x5115/0x5450 [ 15.010352] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.010376] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.010398] ? kasan_atomics+0x152/0x310 [ 15.010422] kasan_atomics+0x1dc/0x310 [ 15.010443] ? __pfx_kasan_atomics+0x10/0x10 [ 15.010471] ? __pfx_read_tsc+0x10/0x10 [ 15.010493] ? ktime_get_ts64+0x86/0x230 [ 15.010519] kunit_try_run_case+0x1a5/0x480 [ 15.010571] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.010594] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.010634] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.010658] ? __kthread_parkme+0x82/0x180 [ 15.010680] ? preempt_count_sub+0x50/0x80 [ 15.010705] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.010730] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.010754] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.010778] kthread+0x337/0x6f0 [ 15.010799] ? trace_preempt_on+0x20/0xc0 [ 15.010824] ? __pfx_kthread+0x10/0x10 [ 15.010846] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.010867] ? calculate_sigpending+0x7b/0xa0 [ 15.010892] ? __pfx_kthread+0x10/0x10 [ 15.010915] ret_from_fork+0x116/0x1d0 [ 15.010935] ? __pfx_kthread+0x10/0x10 [ 15.010957] ret_from_fork_asm+0x1a/0x30 [ 15.010989] </TASK> [ 15.011000] [ 15.019118] Allocated by task 282: [ 15.019273] kasan_save_stack+0x45/0x70 [ 15.019420] kasan_save_track+0x18/0x40 [ 15.019602] kasan_save_alloc_info+0x3b/0x50 [ 15.019800] __kasan_kmalloc+0xb7/0xc0 [ 15.020009] __kmalloc_cache_noprof+0x189/0x420 [ 15.020206] kasan_atomics+0x95/0x310 [ 15.020423] kunit_try_run_case+0x1a5/0x480 [ 15.020602] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.020786] kthread+0x337/0x6f0 [ 15.020915] ret_from_fork+0x116/0x1d0 [ 15.021108] ret_from_fork_asm+0x1a/0x30 [ 15.021428] [ 15.021551] The buggy address belongs to the object at ffff8881029e5b80 [ 15.021551] which belongs to the cache kmalloc-64 of size 64 [ 15.022065] The buggy address is located 0 bytes to the right of [ 15.022065] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 15.022601] [ 15.022713] The buggy address belongs to the physical page: [ 15.023080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 15.023513] flags: 0x200000000000000(node=0|zone=2) [ 15.023691] page_type: f5(slab) [ 15.023861] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.024274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.024607] page dumped because: kasan: bad access detected [ 15.025233] [ 15.025507] Memory state around the buggy address: [ 15.025977] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.026840] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.027314] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.027937] ^ [ 15.028558] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.029157] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.029703] ================================================================== [ 13.626388] ================================================================== [ 13.626858] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 13.627746] Read of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 13.628424] [ 13.628523] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 13.628597] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.628610] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.628643] Call Trace: [ 13.628656] <TASK> [ 13.628670] dump_stack_lvl+0x73/0xb0 [ 13.628831] print_report+0xd1/0x650 [ 13.628863] ? __virt_addr_valid+0x1db/0x2d0 [ 13.628886] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.628907] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.628931] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.628953] kasan_report+0x141/0x180 [ 13.628975] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.629002] __asan_report_load4_noabort+0x18/0x20 [ 13.629023] kasan_atomics_helper+0x4b88/0x5450 [ 13.629046] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.629069] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.629091] ? kasan_atomics+0x152/0x310 [ 13.629114] kasan_atomics+0x1dc/0x310 [ 13.629134] ? __pfx_kasan_atomics+0x10/0x10 [ 13.629155] ? __pfx_read_tsc+0x10/0x10 [ 13.629183] ? ktime_get_ts64+0x86/0x230 [ 13.629208] kunit_try_run_case+0x1a5/0x480 [ 13.629231] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.629252] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.629274] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.629297] ? __kthread_parkme+0x82/0x180 [ 13.629317] ? preempt_count_sub+0x50/0x80 [ 13.629341] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.629365] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.629389] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.629412] kthread+0x337/0x6f0 [ 13.629433] ? trace_preempt_on+0x20/0xc0 [ 13.629455] ? __pfx_kthread+0x10/0x10 [ 13.629476] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.629497] ? calculate_sigpending+0x7b/0xa0 [ 13.629529] ? __pfx_kthread+0x10/0x10 [ 13.629551] ret_from_fork+0x116/0x1d0 [ 13.629569] ? __pfx_kthread+0x10/0x10 [ 13.629590] ret_from_fork_asm+0x1a/0x30 [ 13.629633] </TASK> [ 13.629644] [ 13.641514] Allocated by task 282: [ 13.641926] kasan_save_stack+0x45/0x70 [ 13.642105] kasan_save_track+0x18/0x40 [ 13.642439] kasan_save_alloc_info+0x3b/0x50 [ 13.642855] __kasan_kmalloc+0xb7/0xc0 [ 13.643118] __kmalloc_cache_noprof+0x189/0x420 [ 13.643344] kasan_atomics+0x95/0x310 [ 13.643530] kunit_try_run_case+0x1a5/0x480 [ 13.643935] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.644307] kthread+0x337/0x6f0 [ 13.644576] ret_from_fork+0x116/0x1d0 [ 13.644953] ret_from_fork_asm+0x1a/0x30 [ 13.645150] [ 13.645270] The buggy address belongs to the object at ffff8881029e5b80 [ 13.645270] which belongs to the cache kmalloc-64 of size 64 [ 13.646109] The buggy address is located 0 bytes to the right of [ 13.646109] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 13.647225] [ 13.647378] The buggy address belongs to the physical page: [ 13.647820] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 13.648073] flags: 0x200000000000000(node=0|zone=2) [ 13.648349] page_type: f5(slab) [ 13.648849] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.649164] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.649519] page dumped because: kasan: bad access detected [ 13.650039] [ 13.650141] Memory state around the buggy address: [ 13.650410] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.651080] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.651523] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.652293] ^ [ 13.652795] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.653105] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.653700] ================================================================== [ 13.858234] ================================================================== [ 13.859177] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 13.859417] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 13.860034] [ 13.860279] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 13.860329] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.860344] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.860367] Call Trace: [ 13.860382] <TASK> [ 13.860399] dump_stack_lvl+0x73/0xb0 [ 13.860457] print_report+0xd1/0x650 [ 13.860483] ? __virt_addr_valid+0x1db/0x2d0 [ 13.860507] ? kasan_atomics_helper+0x7c7/0x5450 [ 13.860581] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.860606] ? kasan_atomics_helper+0x7c7/0x5450 [ 13.860639] kasan_report+0x141/0x180 [ 13.860664] ? kasan_atomics_helper+0x7c7/0x5450 [ 13.860692] kasan_check_range+0x10c/0x1c0 [ 13.860718] __kasan_check_write+0x18/0x20 [ 13.860738] kasan_atomics_helper+0x7c7/0x5450 [ 13.860762] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.860786] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.860808] ? kasan_atomics+0x152/0x310 [ 13.860834] kasan_atomics+0x1dc/0x310 [ 13.860854] ? __pfx_kasan_atomics+0x10/0x10 [ 13.860876] ? __pfx_read_tsc+0x10/0x10 [ 13.860897] ? ktime_get_ts64+0x86/0x230 [ 13.860924] kunit_try_run_case+0x1a5/0x480 [ 13.860948] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.860971] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.860995] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.861017] ? __kthread_parkme+0x82/0x180 [ 13.861039] ? preempt_count_sub+0x50/0x80 [ 13.861065] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.861089] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.861113] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.861137] kthread+0x337/0x6f0 [ 13.861157] ? trace_preempt_on+0x20/0xc0 [ 13.861195] ? __pfx_kthread+0x10/0x10 [ 13.861217] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.861239] ? calculate_sigpending+0x7b/0xa0 [ 13.861263] ? __pfx_kthread+0x10/0x10 [ 13.861287] ret_from_fork+0x116/0x1d0 [ 13.861306] ? __pfx_kthread+0x10/0x10 [ 13.861328] ret_from_fork_asm+0x1a/0x30 [ 13.861361] </TASK> [ 13.861372] [ 13.871405] Allocated by task 282: [ 13.871568] kasan_save_stack+0x45/0x70 [ 13.871838] kasan_save_track+0x18/0x40 [ 13.872043] kasan_save_alloc_info+0x3b/0x50 [ 13.872343] __kasan_kmalloc+0xb7/0xc0 [ 13.872566] __kmalloc_cache_noprof+0x189/0x420 [ 13.872773] kasan_atomics+0x95/0x310 [ 13.872946] kunit_try_run_case+0x1a5/0x480 [ 13.873096] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.873314] kthread+0x337/0x6f0 [ 13.873808] ret_from_fork+0x116/0x1d0 [ 13.874023] ret_from_fork_asm+0x1a/0x30 [ 13.874223] [ 13.874319] The buggy address belongs to the object at ffff8881029e5b80 [ 13.874319] which belongs to the cache kmalloc-64 of size 64 [ 13.874860] The buggy address is located 0 bytes to the right of [ 13.874860] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 13.875457] [ 13.875586] The buggy address belongs to the physical page: [ 13.875791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 13.876138] flags: 0x200000000000000(node=0|zone=2) [ 13.876361] page_type: f5(slab) [ 13.876580] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.876843] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.877072] page dumped because: kasan: bad access detected [ 13.877297] [ 13.877392] Memory state around the buggy address: [ 13.877797] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.878127] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.878361] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.878580] ^ [ 13.879000] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.879579] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.879927] ================================================================== [ 14.296030] ================================================================== [ 14.296591] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 14.297276] Read of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.297891] [ 14.298178] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.298228] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.298242] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.298263] Call Trace: [ 14.298281] <TASK> [ 14.298296] dump_stack_lvl+0x73/0xb0 [ 14.298326] print_report+0xd1/0x650 [ 14.298349] ? __virt_addr_valid+0x1db/0x2d0 [ 14.298375] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.298398] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.298423] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.298446] kasan_report+0x141/0x180 [ 14.298477] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.298505] __asan_report_load4_noabort+0x18/0x20 [ 14.298655] kasan_atomics_helper+0x4a02/0x5450 [ 14.298686] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.298711] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.298734] ? kasan_atomics+0x152/0x310 [ 14.298758] kasan_atomics+0x1dc/0x310 [ 14.298779] ? __pfx_kasan_atomics+0x10/0x10 [ 14.298802] ? __pfx_read_tsc+0x10/0x10 [ 14.298824] ? ktime_get_ts64+0x86/0x230 [ 14.298850] kunit_try_run_case+0x1a5/0x480 [ 14.298874] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.298898] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.298921] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.298944] ? __kthread_parkme+0x82/0x180 [ 14.298965] ? preempt_count_sub+0x50/0x80 [ 14.298990] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.299015] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.299038] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.299062] kthread+0x337/0x6f0 [ 14.299083] ? trace_preempt_on+0x20/0xc0 [ 14.299108] ? __pfx_kthread+0x10/0x10 [ 14.299129] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.299151] ? calculate_sigpending+0x7b/0xa0 [ 14.299175] ? __pfx_kthread+0x10/0x10 [ 14.299198] ret_from_fork+0x116/0x1d0 [ 14.299217] ? __pfx_kthread+0x10/0x10 [ 14.299239] ret_from_fork_asm+0x1a/0x30 [ 14.299271] </TASK> [ 14.299282] [ 14.311148] Allocated by task 282: [ 14.311483] kasan_save_stack+0x45/0x70 [ 14.311703] kasan_save_track+0x18/0x40 [ 14.312211] kasan_save_alloc_info+0x3b/0x50 [ 14.312514] __kasan_kmalloc+0xb7/0xc0 [ 14.312893] __kmalloc_cache_noprof+0x189/0x420 [ 14.313058] kasan_atomics+0x95/0x310 [ 14.313280] kunit_try_run_case+0x1a5/0x480 [ 14.313888] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.314147] kthread+0x337/0x6f0 [ 14.314385] ret_from_fork+0x116/0x1d0 [ 14.314730] ret_from_fork_asm+0x1a/0x30 [ 14.314895] [ 14.314995] The buggy address belongs to the object at ffff8881029e5b80 [ 14.314995] which belongs to the cache kmalloc-64 of size 64 [ 14.315770] The buggy address is located 0 bytes to the right of [ 14.315770] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.316440] [ 14.316765] The buggy address belongs to the physical page: [ 14.317099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.317538] flags: 0x200000000000000(node=0|zone=2) [ 14.317877] page_type: f5(slab) [ 14.318056] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.318630] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.319193] page dumped because: kasan: bad access detected [ 14.319516] [ 14.319637] Memory state around the buggy address: [ 14.320130] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.320535] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.321033] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.321375] ^ [ 14.321547] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.322078] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.322472] ================================================================== [ 13.739918] ================================================================== [ 13.740314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 13.740732] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 13.741089] [ 13.741200] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 13.741284] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.741301] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.741335] Call Trace: [ 13.741349] <TASK> [ 13.741364] dump_stack_lvl+0x73/0xb0 [ 13.741394] print_report+0xd1/0x650 [ 13.741418] ? __virt_addr_valid+0x1db/0x2d0 [ 13.741445] ? kasan_atomics_helper+0x4b3a/0x5450 [ 13.741493] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.741579] ? kasan_atomics_helper+0x4b3a/0x5450 [ 13.741609] kasan_report+0x141/0x180 [ 13.741646] ? kasan_atomics_helper+0x4b3a/0x5450 [ 13.741678] __asan_report_store4_noabort+0x1b/0x30 [ 13.741704] kasan_atomics_helper+0x4b3a/0x5450 [ 13.741731] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.741758] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.741784] ? kasan_atomics+0x152/0x310 [ 13.741832] kasan_atomics+0x1dc/0x310 [ 13.741856] ? __pfx_kasan_atomics+0x10/0x10 [ 13.741880] ? __pfx_read_tsc+0x10/0x10 [ 13.741919] ? ktime_get_ts64+0x86/0x230 [ 13.741946] kunit_try_run_case+0x1a5/0x480 [ 13.741974] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.741999] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.742025] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.742052] ? __kthread_parkme+0x82/0x180 [ 13.742075] ? preempt_count_sub+0x50/0x80 [ 13.742103] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.742131] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.742195] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.742226] kthread+0x337/0x6f0 [ 13.742247] ? trace_preempt_on+0x20/0xc0 [ 13.742274] ? __pfx_kthread+0x10/0x10 [ 13.742298] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.742340] ? calculate_sigpending+0x7b/0xa0 [ 13.742367] ? __pfx_kthread+0x10/0x10 [ 13.742392] ret_from_fork+0x116/0x1d0 [ 13.742413] ? __pfx_kthread+0x10/0x10 [ 13.742436] ret_from_fork_asm+0x1a/0x30 [ 13.742482] </TASK> [ 13.742494] [ 13.751246] Allocated by task 282: [ 13.751441] kasan_save_stack+0x45/0x70 [ 13.751739] kasan_save_track+0x18/0x40 [ 13.751966] kasan_save_alloc_info+0x3b/0x50 [ 13.752150] __kasan_kmalloc+0xb7/0xc0 [ 13.752371] __kmalloc_cache_noprof+0x189/0x420 [ 13.752695] kasan_atomics+0x95/0x310 [ 13.752876] kunit_try_run_case+0x1a5/0x480 [ 13.753114] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.753304] kthread+0x337/0x6f0 [ 13.753477] ret_from_fork+0x116/0x1d0 [ 13.753746] ret_from_fork_asm+0x1a/0x30 [ 13.753955] [ 13.754053] The buggy address belongs to the object at ffff8881029e5b80 [ 13.754053] which belongs to the cache kmalloc-64 of size 64 [ 13.754649] The buggy address is located 0 bytes to the right of [ 13.754649] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 13.755216] [ 13.755340] The buggy address belongs to the physical page: [ 13.755942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 13.756343] flags: 0x200000000000000(node=0|zone=2) [ 13.756643] page_type: f5(slab) [ 13.756821] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.757195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.757503] page dumped because: kasan: bad access detected [ 13.757792] [ 13.757919] Memory state around the buggy address: [ 13.758191] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.758495] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.758913] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.759286] ^ [ 13.759587] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.759940] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.760225] ================================================================== [ 13.781931] ================================================================== [ 13.782306] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 13.782954] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 13.783370] [ 13.783484] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 13.783588] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.783603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.783634] Call Trace: [ 13.783646] <TASK> [ 13.783660] dump_stack_lvl+0x73/0xb0 [ 13.783689] print_report+0xd1/0x650 [ 13.783736] ? __virt_addr_valid+0x1db/0x2d0 [ 13.783760] ? kasan_atomics_helper+0x5fe/0x5450 [ 13.783782] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.783822] ? kasan_atomics_helper+0x5fe/0x5450 [ 13.783845] kasan_report+0x141/0x180 [ 13.783881] ? kasan_atomics_helper+0x5fe/0x5450 [ 13.783910] kasan_check_range+0x10c/0x1c0 [ 13.783934] __kasan_check_write+0x18/0x20 [ 13.783955] kasan_atomics_helper+0x5fe/0x5450 [ 13.783980] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.784004] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.784026] ? kasan_atomics+0x152/0x310 [ 13.784051] kasan_atomics+0x1dc/0x310 [ 13.784070] ? __pfx_kasan_atomics+0x10/0x10 [ 13.784092] ? __pfx_read_tsc+0x10/0x10 [ 13.784113] ? ktime_get_ts64+0x86/0x230 [ 13.784140] kunit_try_run_case+0x1a5/0x480 [ 13.784182] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.784206] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.784229] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.784251] ? __kthread_parkme+0x82/0x180 [ 13.784272] ? preempt_count_sub+0x50/0x80 [ 13.784297] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.784322] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.784346] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.784370] kthread+0x337/0x6f0 [ 13.784390] ? trace_preempt_on+0x20/0xc0 [ 13.784415] ? __pfx_kthread+0x10/0x10 [ 13.784437] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.784458] ? calculate_sigpending+0x7b/0xa0 [ 13.784483] ? __pfx_kthread+0x10/0x10 [ 13.784552] ret_from_fork+0x116/0x1d0 [ 13.784576] ? __pfx_kthread+0x10/0x10 [ 13.784598] ret_from_fork_asm+0x1a/0x30 [ 13.784641] </TASK> [ 13.784652] [ 13.792979] Allocated by task 282: [ 13.793145] kasan_save_stack+0x45/0x70 [ 13.793313] kasan_save_track+0x18/0x40 [ 13.793450] kasan_save_alloc_info+0x3b/0x50 [ 13.793892] __kasan_kmalloc+0xb7/0xc0 [ 13.794130] __kmalloc_cache_noprof+0x189/0x420 [ 13.794418] kasan_atomics+0x95/0x310 [ 13.794712] kunit_try_run_case+0x1a5/0x480 [ 13.794945] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.795228] kthread+0x337/0x6f0 [ 13.795425] ret_from_fork+0x116/0x1d0 [ 13.795697] ret_from_fork_asm+0x1a/0x30 [ 13.795894] [ 13.795994] The buggy address belongs to the object at ffff8881029e5b80 [ 13.795994] which belongs to the cache kmalloc-64 of size 64 [ 13.796384] The buggy address is located 0 bytes to the right of [ 13.796384] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 13.797051] [ 13.797173] The buggy address belongs to the physical page: [ 13.797470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 13.797897] flags: 0x200000000000000(node=0|zone=2) [ 13.798100] page_type: f5(slab) [ 13.798257] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.798840] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.799153] page dumped because: kasan: bad access detected [ 13.799426] [ 13.799516] Memory state around the buggy address: [ 13.799817] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.800186] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.800498] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.800806] ^ [ 13.801034] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.801395] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.801759] ================================================================== [ 13.899692] ================================================================== [ 13.899999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 13.900266] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 13.900787] [ 13.900895] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 13.900942] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.900955] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.900977] Call Trace: [ 13.900991] <TASK> [ 13.901007] dump_stack_lvl+0x73/0xb0 [ 13.901034] print_report+0xd1/0x650 [ 13.901057] ? __virt_addr_valid+0x1db/0x2d0 [ 13.901082] ? kasan_atomics_helper+0x8f9/0x5450 [ 13.901105] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.901128] ? kasan_atomics_helper+0x8f9/0x5450 [ 13.901152] kasan_report+0x141/0x180 [ 13.901177] ? kasan_atomics_helper+0x8f9/0x5450 [ 13.901206] kasan_check_range+0x10c/0x1c0 [ 13.901232] __kasan_check_write+0x18/0x20 [ 13.901253] kasan_atomics_helper+0x8f9/0x5450 [ 13.901278] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.901301] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.901323] ? kasan_atomics+0x152/0x310 [ 13.901348] kasan_atomics+0x1dc/0x310 [ 13.901367] ? __pfx_kasan_atomics+0x10/0x10 [ 13.901390] ? __pfx_read_tsc+0x10/0x10 [ 13.901411] ? ktime_get_ts64+0x86/0x230 [ 13.901438] kunit_try_run_case+0x1a5/0x480 [ 13.901461] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.901485] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.901508] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.901532] ? __kthread_parkme+0x82/0x180 [ 13.901553] ? preempt_count_sub+0x50/0x80 [ 13.901578] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.901603] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.901682] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.901709] kthread+0x337/0x6f0 [ 13.901730] ? trace_preempt_on+0x20/0xc0 [ 13.901756] ? __pfx_kthread+0x10/0x10 [ 13.901777] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.901799] ? calculate_sigpending+0x7b/0xa0 [ 13.901824] ? __pfx_kthread+0x10/0x10 [ 13.901847] ret_from_fork+0x116/0x1d0 [ 13.901866] ? __pfx_kthread+0x10/0x10 [ 13.901888] ret_from_fork_asm+0x1a/0x30 [ 13.901921] </TASK> [ 13.901933] [ 13.910416] Allocated by task 282: [ 13.910607] kasan_save_stack+0x45/0x70 [ 13.910875] kasan_save_track+0x18/0x40 [ 13.911313] kasan_save_alloc_info+0x3b/0x50 [ 13.911499] __kasan_kmalloc+0xb7/0xc0 [ 13.911720] __kmalloc_cache_noprof+0x189/0x420 [ 13.911916] kasan_atomics+0x95/0x310 [ 13.912079] kunit_try_run_case+0x1a5/0x480 [ 13.912316] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.912497] kthread+0x337/0x6f0 [ 13.912629] ret_from_fork+0x116/0x1d0 [ 13.912821] ret_from_fork_asm+0x1a/0x30 [ 13.913017] [ 13.913114] The buggy address belongs to the object at ffff8881029e5b80 [ 13.913114] which belongs to the cache kmalloc-64 of size 64 [ 13.913528] The buggy address is located 0 bytes to the right of [ 13.913528] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 13.914278] [ 13.914379] The buggy address belongs to the physical page: [ 13.914590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 13.914840] flags: 0x200000000000000(node=0|zone=2) [ 13.915004] page_type: f5(slab) [ 13.915128] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.915420] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.915844] page dumped because: kasan: bad access detected [ 13.916093] [ 13.916185] Memory state around the buggy address: [ 13.916408] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.916917] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.917333] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.917715] ^ [ 13.917913] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.918171] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.918480] ================================================================== [ 14.616952] ================================================================== [ 14.617242] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 14.617577] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.617859] [ 14.617945] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.617989] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.618002] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.618024] Call Trace: [ 14.618037] <TASK> [ 14.618051] dump_stack_lvl+0x73/0xb0 [ 14.618077] print_report+0xd1/0x650 [ 14.618100] ? __virt_addr_valid+0x1db/0x2d0 [ 14.618124] ? kasan_atomics_helper+0x1818/0x5450 [ 14.618148] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.618170] ? kasan_atomics_helper+0x1818/0x5450 [ 14.618203] kasan_report+0x141/0x180 [ 14.618227] ? kasan_atomics_helper+0x1818/0x5450 [ 14.618255] kasan_check_range+0x10c/0x1c0 [ 14.618280] __kasan_check_write+0x18/0x20 [ 14.618301] kasan_atomics_helper+0x1818/0x5450 [ 14.618326] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.618350] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.618372] ? kasan_atomics+0x152/0x310 [ 14.618397] kasan_atomics+0x1dc/0x310 [ 14.618418] ? __pfx_kasan_atomics+0x10/0x10 [ 14.618440] ? __pfx_read_tsc+0x10/0x10 [ 14.618468] ? ktime_get_ts64+0x86/0x230 [ 14.618495] kunit_try_run_case+0x1a5/0x480 [ 14.618519] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.618542] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.618566] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.618590] ? __kthread_parkme+0x82/0x180 [ 14.618622] ? preempt_count_sub+0x50/0x80 [ 14.618648] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.618673] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.618697] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.618722] kthread+0x337/0x6f0 [ 14.618743] ? trace_preempt_on+0x20/0xc0 [ 14.618769] ? __pfx_kthread+0x10/0x10 [ 14.618792] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.618813] ? calculate_sigpending+0x7b/0xa0 [ 14.618838] ? __pfx_kthread+0x10/0x10 [ 14.618862] ret_from_fork+0x116/0x1d0 [ 14.618882] ? __pfx_kthread+0x10/0x10 [ 14.618904] ret_from_fork_asm+0x1a/0x30 [ 14.618937] </TASK> [ 14.618948] [ 14.626694] Allocated by task 282: [ 14.626876] kasan_save_stack+0x45/0x70 [ 14.627046] kasan_save_track+0x18/0x40 [ 14.627192] kasan_save_alloc_info+0x3b/0x50 [ 14.627403] __kasan_kmalloc+0xb7/0xc0 [ 14.627590] __kmalloc_cache_noprof+0x189/0x420 [ 14.627787] kasan_atomics+0x95/0x310 [ 14.627959] kunit_try_run_case+0x1a5/0x480 [ 14.628109] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.628566] kthread+0x337/0x6f0 [ 14.628736] ret_from_fork+0x116/0x1d0 [ 14.628873] ret_from_fork_asm+0x1a/0x30 [ 14.629016] [ 14.629088] The buggy address belongs to the object at ffff8881029e5b80 [ 14.629088] which belongs to the cache kmalloc-64 of size 64 [ 14.629722] The buggy address is located 0 bytes to the right of [ 14.629722] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.630182] [ 14.630259] The buggy address belongs to the physical page: [ 14.630432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.630686] flags: 0x200000000000000(node=0|zone=2) [ 14.630850] page_type: f5(slab) [ 14.630972] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.631478] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.631835] page dumped because: kasan: bad access detected [ 14.632086] [ 14.632179] Memory state around the buggy address: [ 14.632406] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.632735] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.633157] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.633447] ^ [ 14.633633] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.633848] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.634481] ================================================================== [ 14.934315] ================================================================== [ 14.934850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 14.935182] Read of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.935586] [ 14.935716] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.935764] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.935777] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.935799] Call Trace: [ 14.935814] <TASK> [ 14.935830] dump_stack_lvl+0x73/0xb0 [ 14.935856] print_report+0xd1/0x650 [ 14.935880] ? __virt_addr_valid+0x1db/0x2d0 [ 14.935904] ? kasan_atomics_helper+0x4fb2/0x5450 [ 14.935927] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.935950] ? kasan_atomics_helper+0x4fb2/0x5450 [ 14.935973] kasan_report+0x141/0x180 [ 14.935997] ? kasan_atomics_helper+0x4fb2/0x5450 [ 14.936025] __asan_report_load8_noabort+0x18/0x20 [ 14.936047] kasan_atomics_helper+0x4fb2/0x5450 [ 14.936071] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.936095] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.936117] ? kasan_atomics+0x152/0x310 [ 14.936142] kasan_atomics+0x1dc/0x310 [ 14.936185] ? __pfx_kasan_atomics+0x10/0x10 [ 14.936207] ? __pfx_read_tsc+0x10/0x10 [ 14.936229] ? ktime_get_ts64+0x86/0x230 [ 14.936255] kunit_try_run_case+0x1a5/0x480 [ 14.936279] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.936302] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.936335] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.936360] ? __kthread_parkme+0x82/0x180 [ 14.936381] ? preempt_count_sub+0x50/0x80 [ 14.936416] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.936440] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.936466] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.936490] kthread+0x337/0x6f0 [ 14.936511] ? trace_preempt_on+0x20/0xc0 [ 14.936535] ? __pfx_kthread+0x10/0x10 [ 14.936558] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.936579] ? calculate_sigpending+0x7b/0xa0 [ 14.936604] ? __pfx_kthread+0x10/0x10 [ 14.936636] ret_from_fork+0x116/0x1d0 [ 14.936654] ? __pfx_kthread+0x10/0x10 [ 14.936676] ret_from_fork_asm+0x1a/0x30 [ 14.936708] </TASK> [ 14.936719] [ 14.944179] Allocated by task 282: [ 14.944381] kasan_save_stack+0x45/0x70 [ 14.944585] kasan_save_track+0x18/0x40 [ 14.944814] kasan_save_alloc_info+0x3b/0x50 [ 14.945008] __kasan_kmalloc+0xb7/0xc0 [ 14.945224] __kmalloc_cache_noprof+0x189/0x420 [ 14.945409] kasan_atomics+0x95/0x310 [ 14.945543] kunit_try_run_case+0x1a5/0x480 [ 14.945701] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.945876] kthread+0x337/0x6f0 [ 14.945999] ret_from_fork+0x116/0x1d0 [ 14.946144] ret_from_fork_asm+0x1a/0x30 [ 14.946395] [ 14.946514] The buggy address belongs to the object at ffff8881029e5b80 [ 14.946514] which belongs to the cache kmalloc-64 of size 64 [ 14.947060] The buggy address is located 0 bytes to the right of [ 14.947060] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.947660] [ 14.947760] The buggy address belongs to the physical page: [ 14.948040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.948434] flags: 0x200000000000000(node=0|zone=2) [ 14.948645] page_type: f5(slab) [ 14.948835] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.949156] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.949449] page dumped because: kasan: bad access detected [ 14.949630] [ 14.949748] Memory state around the buggy address: [ 14.949977] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.950286] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.950527] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.950852] ^ [ 14.951069] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.951346] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.951559] ================================================================== [ 14.442187] ================================================================== [ 14.443020] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 14.443471] Read of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.443778] [ 14.443931] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.443980] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.443992] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.444014] Call Trace: [ 14.444030] <TASK> [ 14.444045] dump_stack_lvl+0x73/0xb0 [ 14.444073] print_report+0xd1/0x650 [ 14.444098] ? __virt_addr_valid+0x1db/0x2d0 [ 14.444123] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.444146] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.444169] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.444465] kasan_report+0x141/0x180 [ 14.444492] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.444521] __asan_report_load8_noabort+0x18/0x20 [ 14.444543] kasan_atomics_helper+0x4eae/0x5450 [ 14.444569] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.444592] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.444638] ? kasan_atomics+0x152/0x310 [ 14.444664] kasan_atomics+0x1dc/0x310 [ 14.444685] ? __pfx_kasan_atomics+0x10/0x10 [ 14.444707] ? __pfx_read_tsc+0x10/0x10 [ 14.444729] ? ktime_get_ts64+0x86/0x230 [ 14.444755] kunit_try_run_case+0x1a5/0x480 [ 14.444780] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.444803] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.444827] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.444850] ? __kthread_parkme+0x82/0x180 [ 14.444872] ? preempt_count_sub+0x50/0x80 [ 14.444897] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.444921] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.444945] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.444968] kthread+0x337/0x6f0 [ 14.444989] ? trace_preempt_on+0x20/0xc0 [ 14.445014] ? __pfx_kthread+0x10/0x10 [ 14.445036] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.445058] ? calculate_sigpending+0x7b/0xa0 [ 14.445082] ? __pfx_kthread+0x10/0x10 [ 14.445105] ret_from_fork+0x116/0x1d0 [ 14.445124] ? __pfx_kthread+0x10/0x10 [ 14.445146] ret_from_fork_asm+0x1a/0x30 [ 14.445180] </TASK> [ 14.445192] [ 14.456017] Allocated by task 282: [ 14.456468] kasan_save_stack+0x45/0x70 [ 14.456770] kasan_save_track+0x18/0x40 [ 14.456960] kasan_save_alloc_info+0x3b/0x50 [ 14.457173] __kasan_kmalloc+0xb7/0xc0 [ 14.457342] __kmalloc_cache_noprof+0x189/0x420 [ 14.457564] kasan_atomics+0x95/0x310 [ 14.457795] kunit_try_run_case+0x1a5/0x480 [ 14.457967] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.458216] kthread+0x337/0x6f0 [ 14.458828] ret_from_fork+0x116/0x1d0 [ 14.458988] ret_from_fork_asm+0x1a/0x30 [ 14.459439] [ 14.459523] The buggy address belongs to the object at ffff8881029e5b80 [ 14.459523] which belongs to the cache kmalloc-64 of size 64 [ 14.460378] The buggy address is located 0 bytes to the right of [ 14.460378] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.461094] [ 14.461207] The buggy address belongs to the physical page: [ 14.461653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.462127] flags: 0x200000000000000(node=0|zone=2) [ 14.462384] page_type: f5(slab) [ 14.462774] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.463084] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.463699] page dumped because: kasan: bad access detected [ 14.463905] [ 14.464100] Memory state around the buggy address: [ 14.464275] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.464857] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.465296] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.465764] ^ [ 14.466022] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.466422] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.466895] ================================================================== [ 14.094411] ================================================================== [ 14.094985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 14.095332] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.095556] [ 14.095653] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.095701] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.095715] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.095737] Call Trace: [ 14.095752] <TASK> [ 14.095768] dump_stack_lvl+0x73/0xb0 [ 14.095795] print_report+0xd1/0x650 [ 14.095818] ? __virt_addr_valid+0x1db/0x2d0 [ 14.095842] ? kasan_atomics_helper+0xe78/0x5450 [ 14.095865] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.095889] ? kasan_atomics_helper+0xe78/0x5450 [ 14.095912] kasan_report+0x141/0x180 [ 14.095935] ? kasan_atomics_helper+0xe78/0x5450 [ 14.095964] kasan_check_range+0x10c/0x1c0 [ 14.095989] __kasan_check_write+0x18/0x20 [ 14.096009] kasan_atomics_helper+0xe78/0x5450 [ 14.096033] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.096057] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.096080] ? kasan_atomics+0x152/0x310 [ 14.096104] kasan_atomics+0x1dc/0x310 [ 14.096191] ? __pfx_kasan_atomics+0x10/0x10 [ 14.096214] ? __pfx_read_tsc+0x10/0x10 [ 14.096236] ? ktime_get_ts64+0x86/0x230 [ 14.096262] kunit_try_run_case+0x1a5/0x480 [ 14.096287] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.096311] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.096334] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.096358] ? __kthread_parkme+0x82/0x180 [ 14.096380] ? preempt_count_sub+0x50/0x80 [ 14.096405] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.096429] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.096453] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.096478] kthread+0x337/0x6f0 [ 14.096498] ? trace_preempt_on+0x20/0xc0 [ 14.096523] ? __pfx_kthread+0x10/0x10 [ 14.096557] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.096578] ? calculate_sigpending+0x7b/0xa0 [ 14.096603] ? __pfx_kthread+0x10/0x10 [ 14.096637] ret_from_fork+0x116/0x1d0 [ 14.096657] ? __pfx_kthread+0x10/0x10 [ 14.096679] ret_from_fork_asm+0x1a/0x30 [ 14.096711] </TASK> [ 14.096722] [ 14.105395] Allocated by task 282: [ 14.105656] kasan_save_stack+0x45/0x70 [ 14.105859] kasan_save_track+0x18/0x40 [ 14.106043] kasan_save_alloc_info+0x3b/0x50 [ 14.106248] __kasan_kmalloc+0xb7/0xc0 [ 14.106443] __kmalloc_cache_noprof+0x189/0x420 [ 14.106780] kasan_atomics+0x95/0x310 [ 14.106946] kunit_try_run_case+0x1a5/0x480 [ 14.107137] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.107371] kthread+0x337/0x6f0 [ 14.107512] ret_from_fork+0x116/0x1d0 [ 14.108432] ret_from_fork_asm+0x1a/0x30 [ 14.108976] [ 14.109163] The buggy address belongs to the object at ffff8881029e5b80 [ 14.109163] which belongs to the cache kmalloc-64 of size 64 [ 14.109797] The buggy address is located 0 bytes to the right of [ 14.109797] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.110978] [ 14.111192] The buggy address belongs to the physical page: [ 14.111727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.112572] flags: 0x200000000000000(node=0|zone=2) [ 14.112937] page_type: f5(slab) [ 14.113066] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.113565] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.114317] page dumped because: kasan: bad access detected [ 14.114861] [ 14.115087] Memory state around the buggy address: [ 14.115502] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.116087] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.116595] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.117370] ^ [ 14.117832] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.118434] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.118825] ================================================================== [ 14.515117] ================================================================== [ 14.515346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 14.516282] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.516690] [ 14.516893] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.516945] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.516959] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.516981] Call Trace: [ 14.516997] <TASK> [ 14.517014] dump_stack_lvl+0x73/0xb0 [ 14.517134] print_report+0xd1/0x650 [ 14.517159] ? __virt_addr_valid+0x1db/0x2d0 [ 14.517197] ? kasan_atomics_helper+0x151d/0x5450 [ 14.517220] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.517245] ? kasan_atomics_helper+0x151d/0x5450 [ 14.517268] kasan_report+0x141/0x180 [ 14.517292] ? kasan_atomics_helper+0x151d/0x5450 [ 14.517321] kasan_check_range+0x10c/0x1c0 [ 14.517348] __kasan_check_write+0x18/0x20 [ 14.517369] kasan_atomics_helper+0x151d/0x5450 [ 14.517394] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.517418] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.517440] ? kasan_atomics+0x152/0x310 [ 14.517464] kasan_atomics+0x1dc/0x310 [ 14.517485] ? __pfx_kasan_atomics+0x10/0x10 [ 14.517506] ? __pfx_read_tsc+0x10/0x10 [ 14.517528] ? ktime_get_ts64+0x86/0x230 [ 14.517554] kunit_try_run_case+0x1a5/0x480 [ 14.517578] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.517601] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.517635] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.517659] ? __kthread_parkme+0x82/0x180 [ 14.517682] ? preempt_count_sub+0x50/0x80 [ 14.517706] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.517731] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.517755] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.517779] kthread+0x337/0x6f0 [ 14.517800] ? trace_preempt_on+0x20/0xc0 [ 14.517824] ? __pfx_kthread+0x10/0x10 [ 14.517846] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.517867] ? calculate_sigpending+0x7b/0xa0 [ 14.517891] ? __pfx_kthread+0x10/0x10 [ 14.517914] ret_from_fork+0x116/0x1d0 [ 14.517933] ? __pfx_kthread+0x10/0x10 [ 14.517955] ret_from_fork_asm+0x1a/0x30 [ 14.517988] </TASK> [ 14.518000] [ 14.528492] Allocated by task 282: [ 14.528674] kasan_save_stack+0x45/0x70 [ 14.528966] kasan_save_track+0x18/0x40 [ 14.529155] kasan_save_alloc_info+0x3b/0x50 [ 14.529453] __kasan_kmalloc+0xb7/0xc0 [ 14.529597] __kmalloc_cache_noprof+0x189/0x420 [ 14.529958] kasan_atomics+0x95/0x310 [ 14.530238] kunit_try_run_case+0x1a5/0x480 [ 14.530459] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.530672] kthread+0x337/0x6f0 [ 14.530849] ret_from_fork+0x116/0x1d0 [ 14.531026] ret_from_fork_asm+0x1a/0x30 [ 14.531211] [ 14.531637] The buggy address belongs to the object at ffff8881029e5b80 [ 14.531637] which belongs to the cache kmalloc-64 of size 64 [ 14.532287] The buggy address is located 0 bytes to the right of [ 14.532287] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.532919] [ 14.533008] The buggy address belongs to the physical page: [ 14.533398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.533836] flags: 0x200000000000000(node=0|zone=2) [ 14.534065] page_type: f5(slab) [ 14.534410] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.534765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.535163] page dumped because: kasan: bad access detected [ 14.535505] [ 14.535585] Memory state around the buggy address: [ 14.535950] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.536376] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.536743] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.537049] ^ [ 14.537388] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.537764] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.538111] ================================================================== [ 14.652313] ================================================================== [ 14.653076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 14.653469] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.653827] [ 14.653937] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.653983] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.653995] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.654016] Call Trace: [ 14.654030] <TASK> [ 14.654045] dump_stack_lvl+0x73/0xb0 [ 14.654093] print_report+0xd1/0x650 [ 14.654116] ? __virt_addr_valid+0x1db/0x2d0 [ 14.654140] ? kasan_atomics_helper+0x194a/0x5450 [ 14.654191] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.654214] ? kasan_atomics_helper+0x194a/0x5450 [ 14.654237] kasan_report+0x141/0x180 [ 14.654262] ? kasan_atomics_helper+0x194a/0x5450 [ 14.654290] kasan_check_range+0x10c/0x1c0 [ 14.654332] __kasan_check_write+0x18/0x20 [ 14.654354] kasan_atomics_helper+0x194a/0x5450 [ 14.654378] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.654401] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.654425] ? kasan_atomics+0x152/0x310 [ 14.654449] kasan_atomics+0x1dc/0x310 [ 14.654500] ? __pfx_kasan_atomics+0x10/0x10 [ 14.654523] ? __pfx_read_tsc+0x10/0x10 [ 14.654546] ? ktime_get_ts64+0x86/0x230 [ 14.654572] kunit_try_run_case+0x1a5/0x480 [ 14.654597] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.654632] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.654656] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.654696] ? __kthread_parkme+0x82/0x180 [ 14.654731] ? preempt_count_sub+0x50/0x80 [ 14.654779] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.654818] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.654842] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.654866] kthread+0x337/0x6f0 [ 14.654887] ? trace_preempt_on+0x20/0xc0 [ 14.654912] ? __pfx_kthread+0x10/0x10 [ 14.654934] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.654956] ? calculate_sigpending+0x7b/0xa0 [ 14.654981] ? __pfx_kthread+0x10/0x10 [ 14.655004] ret_from_fork+0x116/0x1d0 [ 14.655024] ? __pfx_kthread+0x10/0x10 [ 14.655046] ret_from_fork_asm+0x1a/0x30 [ 14.655078] </TASK> [ 14.655089] [ 14.663391] Allocated by task 282: [ 14.663594] kasan_save_stack+0x45/0x70 [ 14.663842] kasan_save_track+0x18/0x40 [ 14.664048] kasan_save_alloc_info+0x3b/0x50 [ 14.664265] __kasan_kmalloc+0xb7/0xc0 [ 14.664460] __kmalloc_cache_noprof+0x189/0x420 [ 14.664645] kasan_atomics+0x95/0x310 [ 14.664854] kunit_try_run_case+0x1a5/0x480 [ 14.665082] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.665348] kthread+0x337/0x6f0 [ 14.665524] ret_from_fork+0x116/0x1d0 [ 14.665746] ret_from_fork_asm+0x1a/0x30 [ 14.665945] [ 14.666041] The buggy address belongs to the object at ffff8881029e5b80 [ 14.666041] which belongs to the cache kmalloc-64 of size 64 [ 14.666563] The buggy address is located 0 bytes to the right of [ 14.666563] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.667113] [ 14.667231] The buggy address belongs to the physical page: [ 14.667478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.667821] flags: 0x200000000000000(node=0|zone=2) [ 14.668050] page_type: f5(slab) [ 14.668308] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.668665] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.668914] page dumped because: kasan: bad access detected [ 14.669107] [ 14.669276] Memory state around the buggy address: [ 14.669515] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.669887] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.670253] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.670483] ^ [ 14.670706] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.671048] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.671441] ================================================================== [ 14.350831] ================================================================== [ 14.351087] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 14.351766] Read of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.352052] [ 14.352157] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.352207] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.352221] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.352245] Call Trace: [ 14.352260] <TASK> [ 14.352276] dump_stack_lvl+0x73/0xb0 [ 14.352306] print_report+0xd1/0x650 [ 14.352329] ? __virt_addr_valid+0x1db/0x2d0 [ 14.352354] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.352412] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.352437] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.352461] kasan_report+0x141/0x180 [ 14.352486] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.352514] __asan_report_load4_noabort+0x18/0x20 [ 14.352536] kasan_atomics_helper+0x49e8/0x5450 [ 14.352560] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.352584] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.352606] ? kasan_atomics+0x152/0x310 [ 14.352641] kasan_atomics+0x1dc/0x310 [ 14.352674] ? __pfx_kasan_atomics+0x10/0x10 [ 14.352695] ? __pfx_read_tsc+0x10/0x10 [ 14.352717] ? ktime_get_ts64+0x86/0x230 [ 14.352744] kunit_try_run_case+0x1a5/0x480 [ 14.352768] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.352790] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.352814] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.352837] ? __kthread_parkme+0x82/0x180 [ 14.352859] ? preempt_count_sub+0x50/0x80 [ 14.352884] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.352908] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.352932] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.352957] kthread+0x337/0x6f0 [ 14.352977] ? trace_preempt_on+0x20/0xc0 [ 14.353001] ? __pfx_kthread+0x10/0x10 [ 14.353023] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.353045] ? calculate_sigpending+0x7b/0xa0 [ 14.353069] ? __pfx_kthread+0x10/0x10 [ 14.353092] ret_from_fork+0x116/0x1d0 [ 14.353111] ? __pfx_kthread+0x10/0x10 [ 14.353136] ret_from_fork_asm+0x1a/0x30 [ 14.353171] </TASK> [ 14.353194] [ 14.360993] Allocated by task 282: [ 14.361175] kasan_save_stack+0x45/0x70 [ 14.361352] kasan_save_track+0x18/0x40 [ 14.361547] kasan_save_alloc_info+0x3b/0x50 [ 14.361770] __kasan_kmalloc+0xb7/0xc0 [ 14.361907] __kmalloc_cache_noprof+0x189/0x420 [ 14.362060] kasan_atomics+0x95/0x310 [ 14.362242] kunit_try_run_case+0x1a5/0x480 [ 14.362664] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.362918] kthread+0x337/0x6f0 [ 14.363099] ret_from_fork+0x116/0x1d0 [ 14.363288] ret_from_fork_asm+0x1a/0x30 [ 14.363583] [ 14.363685] The buggy address belongs to the object at ffff8881029e5b80 [ 14.363685] which belongs to the cache kmalloc-64 of size 64 [ 14.364149] The buggy address is located 0 bytes to the right of [ 14.364149] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.364610] [ 14.364727] The buggy address belongs to the physical page: [ 14.365105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.365494] flags: 0x200000000000000(node=0|zone=2) [ 14.365816] page_type: f5(slab) [ 14.365970] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.366206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.366434] page dumped because: kasan: bad access detected [ 14.366620] [ 14.366692] Memory state around the buggy address: [ 14.366854] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.367190] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.367653] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.367911] ^ [ 14.368067] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.368571] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.368897] ================================================================== [ 14.915957] ================================================================== [ 14.916588] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 14.916936] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.917293] [ 14.917419] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.917476] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.917489] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.917511] Call Trace: [ 14.917524] <TASK> [ 14.917540] dump_stack_lvl+0x73/0xb0 [ 14.917567] print_report+0xd1/0x650 [ 14.917590] ? __virt_addr_valid+0x1db/0x2d0 [ 14.917623] ? kasan_atomics_helper+0x20c8/0x5450 [ 14.917646] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.917670] ? kasan_atomics_helper+0x20c8/0x5450 [ 14.917693] kasan_report+0x141/0x180 [ 14.917717] ? kasan_atomics_helper+0x20c8/0x5450 [ 14.917755] kasan_check_range+0x10c/0x1c0 [ 14.917780] __kasan_check_write+0x18/0x20 [ 14.917801] kasan_atomics_helper+0x20c8/0x5450 [ 14.917836] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.917860] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.917882] ? kasan_atomics+0x152/0x310 [ 14.917915] kasan_atomics+0x1dc/0x310 [ 14.917936] ? __pfx_kasan_atomics+0x10/0x10 [ 14.917959] ? __pfx_read_tsc+0x10/0x10 [ 14.917990] ? ktime_get_ts64+0x86/0x230 [ 14.918017] kunit_try_run_case+0x1a5/0x480 [ 14.918042] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.918073] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.918097] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.918120] ? __kthread_parkme+0x82/0x180 [ 14.918152] ? preempt_count_sub+0x50/0x80 [ 14.918195] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.918228] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.918252] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.918278] kthread+0x337/0x6f0 [ 14.918309] ? trace_preempt_on+0x20/0xc0 [ 14.918334] ? __pfx_kthread+0x10/0x10 [ 14.918356] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.918386] ? calculate_sigpending+0x7b/0xa0 [ 14.918411] ? __pfx_kthread+0x10/0x10 [ 14.918433] ret_from_fork+0x116/0x1d0 [ 14.918469] ? __pfx_kthread+0x10/0x10 [ 14.918491] ret_from_fork_asm+0x1a/0x30 [ 14.918524] </TASK> [ 14.918535] [ 14.926190] Allocated by task 282: [ 14.926400] kasan_save_stack+0x45/0x70 [ 14.926610] kasan_save_track+0x18/0x40 [ 14.926819] kasan_save_alloc_info+0x3b/0x50 [ 14.927014] __kasan_kmalloc+0xb7/0xc0 [ 14.927149] __kmalloc_cache_noprof+0x189/0x420 [ 14.927323] kasan_atomics+0x95/0x310 [ 14.927454] kunit_try_run_case+0x1a5/0x480 [ 14.927602] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.927890] kthread+0x337/0x6f0 [ 14.928060] ret_from_fork+0x116/0x1d0 [ 14.928273] ret_from_fork_asm+0x1a/0x30 [ 14.928471] [ 14.928568] The buggy address belongs to the object at ffff8881029e5b80 [ 14.928568] which belongs to the cache kmalloc-64 of size 64 [ 14.929138] The buggy address is located 0 bytes to the right of [ 14.929138] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.929677] [ 14.929751] The buggy address belongs to the physical page: [ 14.929927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.930183] flags: 0x200000000000000(node=0|zone=2) [ 14.930412] page_type: f5(slab) [ 14.930591] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.930970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.931388] page dumped because: kasan: bad access detected [ 14.931672] [ 14.931765] Memory state around the buggy address: [ 14.931975] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.932246] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.932604] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.932907] ^ [ 14.933126] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.933448] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.933764] ================================================================== [ 13.944053] ================================================================== [ 13.944415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 13.944815] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 13.945401] [ 13.945510] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 13.945557] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.945570] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.945592] Call Trace: [ 13.945606] <TASK> [ 13.945643] dump_stack_lvl+0x73/0xb0 [ 13.945672] print_report+0xd1/0x650 [ 13.945716] ? __virt_addr_valid+0x1db/0x2d0 [ 13.945741] ? kasan_atomics_helper+0xa2b/0x5450 [ 13.945764] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.945914] ? kasan_atomics_helper+0xa2b/0x5450 [ 13.945943] kasan_report+0x141/0x180 [ 13.945968] ? kasan_atomics_helper+0xa2b/0x5450 [ 13.945997] kasan_check_range+0x10c/0x1c0 [ 13.946022] __kasan_check_write+0x18/0x20 [ 13.946043] kasan_atomics_helper+0xa2b/0x5450 [ 13.946067] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.946091] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.946114] ? kasan_atomics+0x152/0x310 [ 13.946139] kasan_atomics+0x1dc/0x310 [ 13.946206] ? __pfx_kasan_atomics+0x10/0x10 [ 13.946228] ? __pfx_read_tsc+0x10/0x10 [ 13.946250] ? ktime_get_ts64+0x86/0x230 [ 13.946278] kunit_try_run_case+0x1a5/0x480 [ 13.946302] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.946325] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.946381] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.946405] ? __kthread_parkme+0x82/0x180 [ 13.946426] ? preempt_count_sub+0x50/0x80 [ 13.946452] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.946482] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.946507] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.946531] kthread+0x337/0x6f0 [ 13.946593] ? trace_preempt_on+0x20/0xc0 [ 13.946631] ? __pfx_kthread+0x10/0x10 [ 13.946654] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.946676] ? calculate_sigpending+0x7b/0xa0 [ 13.946701] ? __pfx_kthread+0x10/0x10 [ 13.946725] ret_from_fork+0x116/0x1d0 [ 13.946744] ? __pfx_kthread+0x10/0x10 [ 13.946766] ret_from_fork_asm+0x1a/0x30 [ 13.946799] </TASK> [ 13.946811] [ 13.955809] Allocated by task 282: [ 13.955941] kasan_save_stack+0x45/0x70 [ 13.956403] kasan_save_track+0x18/0x40 [ 13.956785] kasan_save_alloc_info+0x3b/0x50 [ 13.957038] __kasan_kmalloc+0xb7/0xc0 [ 13.957290] __kmalloc_cache_noprof+0x189/0x420 [ 13.957579] kasan_atomics+0x95/0x310 [ 13.957782] kunit_try_run_case+0x1a5/0x480 [ 13.957961] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.958220] kthread+0x337/0x6f0 [ 13.958381] ret_from_fork+0x116/0x1d0 [ 13.958518] ret_from_fork_asm+0x1a/0x30 [ 13.958820] [ 13.958977] The buggy address belongs to the object at ffff8881029e5b80 [ 13.958977] which belongs to the cache kmalloc-64 of size 64 [ 13.959570] The buggy address is located 0 bytes to the right of [ 13.959570] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 13.960065] [ 13.960143] The buggy address belongs to the physical page: [ 13.960549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 13.961279] flags: 0x200000000000000(node=0|zone=2) [ 13.961473] page_type: f5(slab) [ 13.961594] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.961838] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.962247] page dumped because: kasan: bad access detected [ 13.962827] [ 13.962934] Memory state around the buggy address: [ 13.963205] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.963525] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.963926] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.964274] ^ [ 13.964483] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.964927] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.965312] ================================================================== [ 13.701220] ================================================================== [ 13.701673] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 13.701996] Read of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 13.702333] [ 13.702440] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 13.702494] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.702507] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.702528] Call Trace: [ 13.702541] <TASK> [ 13.702555] dump_stack_lvl+0x73/0xb0 [ 13.702581] print_report+0xd1/0x650 [ 13.702605] ? __virt_addr_valid+0x1db/0x2d0 [ 13.702641] ? kasan_atomics_helper+0x4b54/0x5450 [ 13.702663] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.702686] ? kasan_atomics_helper+0x4b54/0x5450 [ 13.702710] kasan_report+0x141/0x180 [ 13.702734] ? kasan_atomics_helper+0x4b54/0x5450 [ 13.702762] __asan_report_load4_noabort+0x18/0x20 [ 13.702784] kasan_atomics_helper+0x4b54/0x5450 [ 13.702808] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.702831] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.702854] ? kasan_atomics+0x152/0x310 [ 13.702878] kasan_atomics+0x1dc/0x310 [ 13.702899] ? __pfx_kasan_atomics+0x10/0x10 [ 13.702920] ? __pfx_read_tsc+0x10/0x10 [ 13.702942] ? ktime_get_ts64+0x86/0x230 [ 13.702968] kunit_try_run_case+0x1a5/0x480 [ 13.702993] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.703016] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.703039] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.703062] ? __kthread_parkme+0x82/0x180 [ 13.703084] ? preempt_count_sub+0x50/0x80 [ 13.703108] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.703133] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.703156] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.703180] kthread+0x337/0x6f0 [ 13.703201] ? trace_preempt_on+0x20/0xc0 [ 13.703226] ? __pfx_kthread+0x10/0x10 [ 13.703247] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.703269] ? calculate_sigpending+0x7b/0xa0 [ 13.703294] ? __pfx_kthread+0x10/0x10 [ 13.703318] ret_from_fork+0x116/0x1d0 [ 13.703337] ? __pfx_kthread+0x10/0x10 [ 13.703359] ret_from_fork_asm+0x1a/0x30 [ 13.703392] </TASK> [ 13.703403] [ 13.711410] Allocated by task 282: [ 13.711576] kasan_save_stack+0x45/0x70 [ 13.711803] kasan_save_track+0x18/0x40 [ 13.711977] kasan_save_alloc_info+0x3b/0x50 [ 13.712156] __kasan_kmalloc+0xb7/0xc0 [ 13.712297] __kmalloc_cache_noprof+0x189/0x420 [ 13.712586] kasan_atomics+0x95/0x310 [ 13.712785] kunit_try_run_case+0x1a5/0x480 [ 13.712992] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.713166] kthread+0x337/0x6f0 [ 13.713288] ret_from_fork+0x116/0x1d0 [ 13.713524] ret_from_fork_asm+0x1a/0x30 [ 13.713782] [ 13.713882] The buggy address belongs to the object at ffff8881029e5b80 [ 13.713882] which belongs to the cache kmalloc-64 of size 64 [ 13.714466] The buggy address is located 0 bytes to the right of [ 13.714466] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 13.715095] [ 13.715214] The buggy address belongs to the physical page: [ 13.715437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 13.715894] flags: 0x200000000000000(node=0|zone=2) [ 13.716068] page_type: f5(slab) [ 13.716204] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.716563] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.716921] page dumped because: kasan: bad access detected [ 13.717177] [ 13.717326] Memory state around the buggy address: [ 13.717572] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.717872] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.718112] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.718325] ^ [ 13.718512] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.718860] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.719179] ================================================================== [ 14.765457] ================================================================== [ 14.765847] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 14.766251] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.766561] [ 14.766664] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.766710] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.766723] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.766743] Call Trace: [ 14.766759] <TASK> [ 14.766775] dump_stack_lvl+0x73/0xb0 [ 14.766801] print_report+0xd1/0x650 [ 14.766824] ? __virt_addr_valid+0x1db/0x2d0 [ 14.766848] ? kasan_atomics_helper+0x1ce1/0x5450 [ 14.766872] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.766896] ? kasan_atomics_helper+0x1ce1/0x5450 [ 14.766956] kasan_report+0x141/0x180 [ 14.766981] ? kasan_atomics_helper+0x1ce1/0x5450 [ 14.767032] kasan_check_range+0x10c/0x1c0 [ 14.767057] __kasan_check_write+0x18/0x20 [ 14.767092] kasan_atomics_helper+0x1ce1/0x5450 [ 14.767116] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.767139] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.767198] ? kasan_atomics+0x152/0x310 [ 14.767236] kasan_atomics+0x1dc/0x310 [ 14.767267] ? __pfx_kasan_atomics+0x10/0x10 [ 14.767289] ? __pfx_read_tsc+0x10/0x10 [ 14.767310] ? ktime_get_ts64+0x86/0x230 [ 14.767337] kunit_try_run_case+0x1a5/0x480 [ 14.767361] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.767384] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.767407] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.767430] ? __kthread_parkme+0x82/0x180 [ 14.767451] ? preempt_count_sub+0x50/0x80 [ 14.767476] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.767530] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.767555] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.767579] kthread+0x337/0x6f0 [ 14.767648] ? trace_preempt_on+0x20/0xc0 [ 14.767684] ? __pfx_kthread+0x10/0x10 [ 14.767743] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.767766] ? calculate_sigpending+0x7b/0xa0 [ 14.767791] ? __pfx_kthread+0x10/0x10 [ 14.767823] ret_from_fork+0x116/0x1d0 [ 14.767843] ? __pfx_kthread+0x10/0x10 [ 14.767865] ret_from_fork_asm+0x1a/0x30 [ 14.767898] </TASK> [ 14.767909] [ 14.776025] Allocated by task 282: [ 14.776279] kasan_save_stack+0x45/0x70 [ 14.776561] kasan_save_track+0x18/0x40 [ 14.776821] kasan_save_alloc_info+0x3b/0x50 [ 14.777029] __kasan_kmalloc+0xb7/0xc0 [ 14.777240] __kmalloc_cache_noprof+0x189/0x420 [ 14.777409] kasan_atomics+0x95/0x310 [ 14.777596] kunit_try_run_case+0x1a5/0x480 [ 14.777814] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.778035] kthread+0x337/0x6f0 [ 14.778240] ret_from_fork+0x116/0x1d0 [ 14.778459] ret_from_fork_asm+0x1a/0x30 [ 14.778695] [ 14.778769] The buggy address belongs to the object at ffff8881029e5b80 [ 14.778769] which belongs to the cache kmalloc-64 of size 64 [ 14.779232] The buggy address is located 0 bytes to the right of [ 14.779232] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.779719] [ 14.779817] The buggy address belongs to the physical page: [ 14.780073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.780462] flags: 0x200000000000000(node=0|zone=2) [ 14.780739] page_type: f5(slab) [ 14.780889] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.781122] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.781478] page dumped because: kasan: bad access detected [ 14.781782] [ 14.781879] Memory state around the buggy address: [ 14.782153] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.782490] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.782746] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.783042] ^ [ 14.783393] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.783715] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.783967] ================================================================== [ 14.581319] ================================================================== [ 14.581819] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 14.582157] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.582480] [ 14.582594] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.582649] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.582662] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.582684] Call Trace: [ 14.582698] <TASK> [ 14.582713] dump_stack_lvl+0x73/0xb0 [ 14.582739] print_report+0xd1/0x650 [ 14.582763] ? __virt_addr_valid+0x1db/0x2d0 [ 14.582789] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.582811] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.582835] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.582858] kasan_report+0x141/0x180 [ 14.582882] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.582910] kasan_check_range+0x10c/0x1c0 [ 14.582936] __kasan_check_write+0x18/0x20 [ 14.582956] kasan_atomics_helper+0x16e7/0x5450 [ 14.582980] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.583004] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.583026] ? kasan_atomics+0x152/0x310 [ 14.583050] kasan_atomics+0x1dc/0x310 [ 14.583070] ? __pfx_kasan_atomics+0x10/0x10 [ 14.583092] ? __pfx_read_tsc+0x10/0x10 [ 14.583115] ? ktime_get_ts64+0x86/0x230 [ 14.583143] kunit_try_run_case+0x1a5/0x480 [ 14.583168] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.583202] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.583225] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.583249] ? __kthread_parkme+0x82/0x180 [ 14.583270] ? preempt_count_sub+0x50/0x80 [ 14.583296] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.583320] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.583344] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.583368] kthread+0x337/0x6f0 [ 14.583389] ? trace_preempt_on+0x20/0xc0 [ 14.583414] ? __pfx_kthread+0x10/0x10 [ 14.583436] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.583457] ? calculate_sigpending+0x7b/0xa0 [ 14.583482] ? __pfx_kthread+0x10/0x10 [ 14.583505] ret_from_fork+0x116/0x1d0 [ 14.583524] ? __pfx_kthread+0x10/0x10 [ 14.583546] ret_from_fork_asm+0x1a/0x30 [ 14.583579] </TASK> [ 14.583590] [ 14.591109] Allocated by task 282: [ 14.591293] kasan_save_stack+0x45/0x70 [ 14.591462] kasan_save_track+0x18/0x40 [ 14.591651] kasan_save_alloc_info+0x3b/0x50 [ 14.591825] __kasan_kmalloc+0xb7/0xc0 [ 14.591960] __kmalloc_cache_noprof+0x189/0x420 [ 14.592112] kasan_atomics+0x95/0x310 [ 14.592242] kunit_try_run_case+0x1a5/0x480 [ 14.592455] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.592718] kthread+0x337/0x6f0 [ 14.592889] ret_from_fork+0x116/0x1d0 [ 14.593269] ret_from_fork_asm+0x1a/0x30 [ 14.593468] [ 14.593550] The buggy address belongs to the object at ffff8881029e5b80 [ 14.593550] which belongs to the cache kmalloc-64 of size 64 [ 14.593907] The buggy address is located 0 bytes to the right of [ 14.593907] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.594809] [ 14.594888] The buggy address belongs to the physical page: [ 14.595123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.595363] flags: 0x200000000000000(node=0|zone=2) [ 14.595524] page_type: f5(slab) [ 14.595656] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.595903] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.596319] page dumped because: kasan: bad access detected [ 14.596570] [ 14.596677] Memory state around the buggy address: [ 14.596905] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.597250] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.597470] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.597692] ^ [ 14.597848] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.598099] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.598729] ================================================================== [ 13.802335] ================================================================== [ 13.802714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 13.803048] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 13.803395] [ 13.803577] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 13.803662] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.803677] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.803716] Call Trace: [ 13.803746] <TASK> [ 13.803762] dump_stack_lvl+0x73/0xb0 [ 13.803792] print_report+0xd1/0x650 [ 13.803816] ? __virt_addr_valid+0x1db/0x2d0 [ 13.803840] ? kasan_atomics_helper+0x697/0x5450 [ 13.803863] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.803886] ? kasan_atomics_helper+0x697/0x5450 [ 13.803909] kasan_report+0x141/0x180 [ 13.803933] ? kasan_atomics_helper+0x697/0x5450 [ 13.803960] kasan_check_range+0x10c/0x1c0 [ 13.803985] __kasan_check_write+0x18/0x20 [ 13.804007] kasan_atomics_helper+0x697/0x5450 [ 13.804030] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.804054] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.804076] ? kasan_atomics+0x152/0x310 [ 13.804100] kasan_atomics+0x1dc/0x310 [ 13.804120] ? __pfx_kasan_atomics+0x10/0x10 [ 13.804141] ? __pfx_read_tsc+0x10/0x10 [ 13.804182] ? ktime_get_ts64+0x86/0x230 [ 13.804226] kunit_try_run_case+0x1a5/0x480 [ 13.804251] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.804274] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.804312] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.804336] ? __kthread_parkme+0x82/0x180 [ 13.804357] ? preempt_count_sub+0x50/0x80 [ 13.804381] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.804406] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.804430] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.804453] kthread+0x337/0x6f0 [ 13.804476] ? trace_preempt_on+0x20/0xc0 [ 13.804500] ? __pfx_kthread+0x10/0x10 [ 13.804577] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.804600] ? calculate_sigpending+0x7b/0xa0 [ 13.804634] ? __pfx_kthread+0x10/0x10 [ 13.804657] ret_from_fork+0x116/0x1d0 [ 13.804676] ? __pfx_kthread+0x10/0x10 [ 13.804698] ret_from_fork_asm+0x1a/0x30 [ 13.804731] </TASK> [ 13.804742] [ 13.813128] Allocated by task 282: [ 13.813339] kasan_save_stack+0x45/0x70 [ 13.813839] kasan_save_track+0x18/0x40 [ 13.814041] kasan_save_alloc_info+0x3b/0x50 [ 13.814235] __kasan_kmalloc+0xb7/0xc0 [ 13.814367] __kmalloc_cache_noprof+0x189/0x420 [ 13.814591] kasan_atomics+0x95/0x310 [ 13.814792] kunit_try_run_case+0x1a5/0x480 [ 13.815025] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.815352] kthread+0x337/0x6f0 [ 13.815646] ret_from_fork+0x116/0x1d0 [ 13.815859] ret_from_fork_asm+0x1a/0x30 [ 13.816033] [ 13.816134] The buggy address belongs to the object at ffff8881029e5b80 [ 13.816134] which belongs to the cache kmalloc-64 of size 64 [ 13.816694] The buggy address is located 0 bytes to the right of [ 13.816694] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 13.817307] [ 13.817409] The buggy address belongs to the physical page: [ 13.817728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 13.818080] flags: 0x200000000000000(node=0|zone=2) [ 13.818264] page_type: f5(slab) [ 13.818386] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.819370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.820429] page dumped because: kasan: bad access detected [ 13.821181] [ 13.821605] Memory state around the buggy address: [ 13.822267] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.822894] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.823118] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.824206] ^ [ 13.824975] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.825991] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.826603] ================================================================== [ 14.599324] ================================================================== [ 14.599764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 14.600123] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.600376] [ 14.600461] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.600507] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.600520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.600541] Call Trace: [ 14.600556] <TASK> [ 14.600572] dump_stack_lvl+0x73/0xb0 [ 14.600601] print_report+0xd1/0x650 [ 14.600637] ? __virt_addr_valid+0x1db/0x2d0 [ 14.600662] ? kasan_atomics_helper+0x177f/0x5450 [ 14.600685] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.600709] ? kasan_atomics_helper+0x177f/0x5450 [ 14.600733] kasan_report+0x141/0x180 [ 14.600757] ? kasan_atomics_helper+0x177f/0x5450 [ 14.600785] kasan_check_range+0x10c/0x1c0 [ 14.600811] __kasan_check_write+0x18/0x20 [ 14.600832] kasan_atomics_helper+0x177f/0x5450 [ 14.600856] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.600880] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.600902] ? kasan_atomics+0x152/0x310 [ 14.600927] kasan_atomics+0x1dc/0x310 [ 14.600948] ? __pfx_kasan_atomics+0x10/0x10 [ 14.600970] ? __pfx_read_tsc+0x10/0x10 [ 14.600992] ? ktime_get_ts64+0x86/0x230 [ 14.601019] kunit_try_run_case+0x1a5/0x480 [ 14.601044] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.601067] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.601091] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.601114] ? __kthread_parkme+0x82/0x180 [ 14.601136] ? preempt_count_sub+0x50/0x80 [ 14.601161] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.601197] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.601221] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.601246] kthread+0x337/0x6f0 [ 14.601267] ? trace_preempt_on+0x20/0xc0 [ 14.601292] ? __pfx_kthread+0x10/0x10 [ 14.601314] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.601336] ? calculate_sigpending+0x7b/0xa0 [ 14.601361] ? __pfx_kthread+0x10/0x10 [ 14.601384] ret_from_fork+0x116/0x1d0 [ 14.601404] ? __pfx_kthread+0x10/0x10 [ 14.601426] ret_from_fork_asm+0x1a/0x30 [ 14.601459] </TASK> [ 14.601471] [ 14.609085] Allocated by task 282: [ 14.609217] kasan_save_stack+0x45/0x70 [ 14.609361] kasan_save_track+0x18/0x40 [ 14.609500] kasan_save_alloc_info+0x3b/0x50 [ 14.609705] __kasan_kmalloc+0xb7/0xc0 [ 14.609893] __kmalloc_cache_noprof+0x189/0x420 [ 14.610113] kasan_atomics+0x95/0x310 [ 14.610466] kunit_try_run_case+0x1a5/0x480 [ 14.610689] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.610944] kthread+0x337/0x6f0 [ 14.611084] ret_from_fork+0x116/0x1d0 [ 14.611297] ret_from_fork_asm+0x1a/0x30 [ 14.611439] [ 14.611512] The buggy address belongs to the object at ffff8881029e5b80 [ 14.611512] which belongs to the cache kmalloc-64 of size 64 [ 14.611875] The buggy address is located 0 bytes to the right of [ 14.611875] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.612399] [ 14.612498] The buggy address belongs to the physical page: [ 14.612767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.613367] flags: 0x200000000000000(node=0|zone=2) [ 14.613547] page_type: f5(slab) [ 14.613687] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.614025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.614341] page dumped because: kasan: bad access detected [ 14.614547] [ 14.614629] Memory state around the buggy address: [ 14.614786] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.615007] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.615250] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.615574] ^ [ 14.615807] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.616242] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.616515] ================================================================== [ 14.216039] ================================================================== [ 14.216877] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 14.217268] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.217837] [ 14.217949] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.217998] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.218012] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.218034] Call Trace: [ 14.218049] <TASK> [ 14.218065] dump_stack_lvl+0x73/0xb0 [ 14.218095] print_report+0xd1/0x650 [ 14.218121] ? __virt_addr_valid+0x1db/0x2d0 [ 14.218145] ? kasan_atomics_helper+0x1079/0x5450 [ 14.218167] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.218352] ? kasan_atomics_helper+0x1079/0x5450 [ 14.218381] kasan_report+0x141/0x180 [ 14.218406] ? kasan_atomics_helper+0x1079/0x5450 [ 14.218436] kasan_check_range+0x10c/0x1c0 [ 14.218461] __kasan_check_write+0x18/0x20 [ 14.218523] kasan_atomics_helper+0x1079/0x5450 [ 14.218628] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.218653] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.218675] ? kasan_atomics+0x152/0x310 [ 14.218700] kasan_atomics+0x1dc/0x310 [ 14.218721] ? __pfx_kasan_atomics+0x10/0x10 [ 14.218743] ? __pfx_read_tsc+0x10/0x10 [ 14.218764] ? ktime_get_ts64+0x86/0x230 [ 14.218793] kunit_try_run_case+0x1a5/0x480 [ 14.218818] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.218842] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.218865] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.218888] ? __kthread_parkme+0x82/0x180 [ 14.218910] ? preempt_count_sub+0x50/0x80 [ 14.218935] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.218959] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.218983] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.219007] kthread+0x337/0x6f0 [ 14.219029] ? trace_preempt_on+0x20/0xc0 [ 14.219053] ? __pfx_kthread+0x10/0x10 [ 14.219076] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.219097] ? calculate_sigpending+0x7b/0xa0 [ 14.219122] ? __pfx_kthread+0x10/0x10 [ 14.219145] ret_from_fork+0x116/0x1d0 [ 14.219164] ? __pfx_kthread+0x10/0x10 [ 14.219194] ret_from_fork_asm+0x1a/0x30 [ 14.219226] </TASK> [ 14.219239] [ 14.232289] Allocated by task 282: [ 14.232493] kasan_save_stack+0x45/0x70 [ 14.232864] kasan_save_track+0x18/0x40 [ 14.233053] kasan_save_alloc_info+0x3b/0x50 [ 14.233402] __kasan_kmalloc+0xb7/0xc0 [ 14.233841] __kmalloc_cache_noprof+0x189/0x420 [ 14.234089] kasan_atomics+0x95/0x310 [ 14.234530] kunit_try_run_case+0x1a5/0x480 [ 14.235096] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.235501] kthread+0x337/0x6f0 [ 14.235684] ret_from_fork+0x116/0x1d0 [ 14.236174] ret_from_fork_asm+0x1a/0x30 [ 14.236466] [ 14.236692] The buggy address belongs to the object at ffff8881029e5b80 [ 14.236692] which belongs to the cache kmalloc-64 of size 64 [ 14.237624] The buggy address is located 0 bytes to the right of [ 14.237624] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.238529] [ 14.238646] The buggy address belongs to the physical page: [ 14.239187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.239813] flags: 0x200000000000000(node=0|zone=2) [ 14.240158] page_type: f5(slab) [ 14.240534] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.240867] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.241150] page dumped because: kasan: bad access detected [ 14.241684] [ 14.241934] Memory state around the buggy address: [ 14.242351] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.242988] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.243455] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.243902] ^ [ 14.244116] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.244692] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.245206] ================================================================== [ 14.952003] ================================================================== [ 14.952371] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 14.952738] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.953064] [ 14.953148] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.953214] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.953227] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.953250] Call Trace: [ 14.953263] <TASK> [ 14.953277] dump_stack_lvl+0x73/0xb0 [ 14.953304] print_report+0xd1/0x650 [ 14.953327] ? __virt_addr_valid+0x1db/0x2d0 [ 14.953352] ? kasan_atomics_helper+0x218a/0x5450 [ 14.953375] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.953398] ? kasan_atomics_helper+0x218a/0x5450 [ 14.953422] kasan_report+0x141/0x180 [ 14.953446] ? kasan_atomics_helper+0x218a/0x5450 [ 14.953474] kasan_check_range+0x10c/0x1c0 [ 14.953499] __kasan_check_write+0x18/0x20 [ 14.953531] kasan_atomics_helper+0x218a/0x5450 [ 14.953555] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.953579] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.953627] ? kasan_atomics+0x152/0x310 [ 14.953652] kasan_atomics+0x1dc/0x310 [ 14.953671] ? __pfx_kasan_atomics+0x10/0x10 [ 14.953704] ? __pfx_read_tsc+0x10/0x10 [ 14.953725] ? ktime_get_ts64+0x86/0x230 [ 14.953751] kunit_try_run_case+0x1a5/0x480 [ 14.953776] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.953799] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.953823] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.953846] ? __kthread_parkme+0x82/0x180 [ 14.953867] ? preempt_count_sub+0x50/0x80 [ 14.953893] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.953918] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.953942] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.953966] kthread+0x337/0x6f0 [ 14.953987] ? trace_preempt_on+0x20/0xc0 [ 14.954012] ? __pfx_kthread+0x10/0x10 [ 14.954034] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.954056] ? calculate_sigpending+0x7b/0xa0 [ 14.954080] ? __pfx_kthread+0x10/0x10 [ 14.954103] ret_from_fork+0x116/0x1d0 [ 14.954122] ? __pfx_kthread+0x10/0x10 [ 14.954145] ret_from_fork_asm+0x1a/0x30 [ 14.954205] </TASK> [ 14.954216] [ 14.962123] Allocated by task 282: [ 14.962392] kasan_save_stack+0x45/0x70 [ 14.962661] kasan_save_track+0x18/0x40 [ 14.962850] kasan_save_alloc_info+0x3b/0x50 [ 14.963053] __kasan_kmalloc+0xb7/0xc0 [ 14.963215] __kmalloc_cache_noprof+0x189/0x420 [ 14.963370] kasan_atomics+0x95/0x310 [ 14.963502] kunit_try_run_case+0x1a5/0x480 [ 14.963752] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.964026] kthread+0x337/0x6f0 [ 14.964227] ret_from_fork+0x116/0x1d0 [ 14.964478] ret_from_fork_asm+0x1a/0x30 [ 14.964744] [ 14.964830] The buggy address belongs to the object at ffff8881029e5b80 [ 14.964830] which belongs to the cache kmalloc-64 of size 64 [ 14.965250] The buggy address is located 0 bytes to the right of [ 14.965250] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.965732] [ 14.965877] The buggy address belongs to the physical page: [ 14.966139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.966554] flags: 0x200000000000000(node=0|zone=2) [ 14.966856] page_type: f5(slab) [ 14.967122] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.967433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.967670] page dumped because: kasan: bad access detected [ 14.967843] [ 14.967941] Memory state around the buggy address: [ 14.968206] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.968556] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.968891] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.969276] ^ [ 14.969511] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.969857] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.970155] ================================================================== [ 14.822800] ================================================================== [ 14.823308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 14.823703] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.824055] [ 14.824284] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.824332] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.824345] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.824368] Call Trace: [ 14.824382] <TASK> [ 14.824398] dump_stack_lvl+0x73/0xb0 [ 14.824426] print_report+0xd1/0x650 [ 14.824450] ? __virt_addr_valid+0x1db/0x2d0 [ 14.824476] ? kasan_atomics_helper+0x1eaa/0x5450 [ 14.824499] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.824523] ? kasan_atomics_helper+0x1eaa/0x5450 [ 14.824546] kasan_report+0x141/0x180 [ 14.824570] ? kasan_atomics_helper+0x1eaa/0x5450 [ 14.824598] kasan_check_range+0x10c/0x1c0 [ 14.824634] __kasan_check_write+0x18/0x20 [ 14.824654] kasan_atomics_helper+0x1eaa/0x5450 [ 14.824678] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.824702] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.824724] ? kasan_atomics+0x152/0x310 [ 14.824748] kasan_atomics+0x1dc/0x310 [ 14.824768] ? __pfx_kasan_atomics+0x10/0x10 [ 14.824790] ? __pfx_read_tsc+0x10/0x10 [ 14.824812] ? ktime_get_ts64+0x86/0x230 [ 14.824838] kunit_try_run_case+0x1a5/0x480 [ 14.824862] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.824885] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.824908] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.824931] ? __kthread_parkme+0x82/0x180 [ 14.824953] ? preempt_count_sub+0x50/0x80 [ 14.824978] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.825002] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.825026] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.825049] kthread+0x337/0x6f0 [ 14.825070] ? trace_preempt_on+0x20/0xc0 [ 14.825094] ? __pfx_kthread+0x10/0x10 [ 14.825116] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.825138] ? calculate_sigpending+0x7b/0xa0 [ 14.825162] ? __pfx_kthread+0x10/0x10 [ 14.825185] ret_from_fork+0x116/0x1d0 [ 14.825204] ? __pfx_kthread+0x10/0x10 [ 14.825226] ret_from_fork_asm+0x1a/0x30 [ 14.825259] </TASK> [ 14.825270] [ 14.833428] Allocated by task 282: [ 14.833660] kasan_save_stack+0x45/0x70 [ 14.833880] kasan_save_track+0x18/0x40 [ 14.834133] kasan_save_alloc_info+0x3b/0x50 [ 14.834353] __kasan_kmalloc+0xb7/0xc0 [ 14.834589] __kmalloc_cache_noprof+0x189/0x420 [ 14.834757] kasan_atomics+0x95/0x310 [ 14.834936] kunit_try_run_case+0x1a5/0x480 [ 14.835287] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.835572] kthread+0x337/0x6f0 [ 14.835710] ret_from_fork+0x116/0x1d0 [ 14.835875] ret_from_fork_asm+0x1a/0x30 [ 14.836121] [ 14.836280] The buggy address belongs to the object at ffff8881029e5b80 [ 14.836280] which belongs to the cache kmalloc-64 of size 64 [ 14.836891] The buggy address is located 0 bytes to the right of [ 14.836891] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.837403] [ 14.837506] The buggy address belongs to the physical page: [ 14.837820] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.838230] flags: 0x200000000000000(node=0|zone=2) [ 14.838400] page_type: f5(slab) [ 14.838606] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.838973] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.839329] page dumped because: kasan: bad access detected [ 14.839590] [ 14.839698] Memory state around the buggy address: [ 14.839883] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.840341] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.840733] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.840983] ^ [ 14.841325] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.841582] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.841943] ================================================================== [ 13.719659] ================================================================== [ 13.720132] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 13.720491] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 13.720731] [ 13.720830] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 13.720878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.720890] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.720911] Call Trace: [ 13.720971] <TASK> [ 13.720989] dump_stack_lvl+0x73/0xb0 [ 13.721019] print_report+0xd1/0x650 [ 13.721042] ? __virt_addr_valid+0x1db/0x2d0 [ 13.721066] ? kasan_atomics_helper+0x4a0/0x5450 [ 13.721088] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.721112] ? kasan_atomics_helper+0x4a0/0x5450 [ 13.721134] kasan_report+0x141/0x180 [ 13.721158] ? kasan_atomics_helper+0x4a0/0x5450 [ 13.721186] kasan_check_range+0x10c/0x1c0 [ 13.721212] __kasan_check_write+0x18/0x20 [ 13.721233] kasan_atomics_helper+0x4a0/0x5450 [ 13.721258] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.721282] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.721304] ? kasan_atomics+0x152/0x310 [ 13.721328] kasan_atomics+0x1dc/0x310 [ 13.721349] ? __pfx_kasan_atomics+0x10/0x10 [ 13.721372] ? __pfx_read_tsc+0x10/0x10 [ 13.721393] ? ktime_get_ts64+0x86/0x230 [ 13.721418] kunit_try_run_case+0x1a5/0x480 [ 13.721443] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.721466] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.721490] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.721513] ? __kthread_parkme+0x82/0x180 [ 13.721534] ? preempt_count_sub+0x50/0x80 [ 13.721602] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.721639] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.721664] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.721688] kthread+0x337/0x6f0 [ 13.721709] ? trace_preempt_on+0x20/0xc0 [ 13.721732] ? __pfx_kthread+0x10/0x10 [ 13.721754] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.721777] ? calculate_sigpending+0x7b/0xa0 [ 13.721801] ? __pfx_kthread+0x10/0x10 [ 13.721824] ret_from_fork+0x116/0x1d0 [ 13.721843] ? __pfx_kthread+0x10/0x10 [ 13.721865] ret_from_fork_asm+0x1a/0x30 [ 13.721898] </TASK> [ 13.721908] [ 13.730185] Allocated by task 282: [ 13.730390] kasan_save_stack+0x45/0x70 [ 13.730648] kasan_save_track+0x18/0x40 [ 13.730863] kasan_save_alloc_info+0x3b/0x50 [ 13.731060] __kasan_kmalloc+0xb7/0xc0 [ 13.731355] __kmalloc_cache_noprof+0x189/0x420 [ 13.731715] kasan_atomics+0x95/0x310 [ 13.731928] kunit_try_run_case+0x1a5/0x480 [ 13.732166] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.732481] kthread+0x337/0x6f0 [ 13.732785] ret_from_fork+0x116/0x1d0 [ 13.732989] ret_from_fork_asm+0x1a/0x30 [ 13.733198] [ 13.733293] The buggy address belongs to the object at ffff8881029e5b80 [ 13.733293] which belongs to the cache kmalloc-64 of size 64 [ 13.733916] The buggy address is located 0 bytes to the right of [ 13.733916] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 13.734466] [ 13.734609] The buggy address belongs to the physical page: [ 13.734901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 13.735323] flags: 0x200000000000000(node=0|zone=2) [ 13.735673] page_type: f5(slab) [ 13.735901] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.736285] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.736855] page dumped because: kasan: bad access detected [ 13.737116] [ 13.737243] Memory state around the buggy address: [ 13.737470] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.737816] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.738158] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.738475] ^ [ 13.738773] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.739089] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.739329] ================================================================== [ 14.267681] ================================================================== [ 14.267979] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 14.268452] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.269321] [ 14.269457] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.269632] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.269649] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.269671] Call Trace: [ 14.269684] <TASK> [ 14.269700] dump_stack_lvl+0x73/0xb0 [ 14.269833] print_report+0xd1/0x650 [ 14.269857] ? __virt_addr_valid+0x1db/0x2d0 [ 14.269881] ? kasan_atomics_helper+0x1148/0x5450 [ 14.269904] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.269927] ? kasan_atomics_helper+0x1148/0x5450 [ 14.269950] kasan_report+0x141/0x180 [ 14.269974] ? kasan_atomics_helper+0x1148/0x5450 [ 14.270002] kasan_check_range+0x10c/0x1c0 [ 14.270027] __kasan_check_write+0x18/0x20 [ 14.270048] kasan_atomics_helper+0x1148/0x5450 [ 14.270072] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.270097] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.270118] ? kasan_atomics+0x152/0x310 [ 14.270142] kasan_atomics+0x1dc/0x310 [ 14.270162] ? __pfx_kasan_atomics+0x10/0x10 [ 14.270194] ? __pfx_read_tsc+0x10/0x10 [ 14.270215] ? ktime_get_ts64+0x86/0x230 [ 14.270240] kunit_try_run_case+0x1a5/0x480 [ 14.270266] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.270289] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.270312] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.270335] ? __kthread_parkme+0x82/0x180 [ 14.270356] ? preempt_count_sub+0x50/0x80 [ 14.270381] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.270405] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.270430] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.270453] kthread+0x337/0x6f0 [ 14.270481] ? trace_preempt_on+0x20/0xc0 [ 14.270505] ? __pfx_kthread+0x10/0x10 [ 14.270539] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.270561] ? calculate_sigpending+0x7b/0xa0 [ 14.270585] ? __pfx_kthread+0x10/0x10 [ 14.270608] ret_from_fork+0x116/0x1d0 [ 14.270640] ? __pfx_kthread+0x10/0x10 [ 14.270662] ret_from_fork_asm+0x1a/0x30 [ 14.270694] </TASK> [ 14.270706] [ 14.282934] Allocated by task 282: [ 14.283121] kasan_save_stack+0x45/0x70 [ 14.283290] kasan_save_track+0x18/0x40 [ 14.283523] kasan_save_alloc_info+0x3b/0x50 [ 14.284150] __kasan_kmalloc+0xb7/0xc0 [ 14.284476] __kmalloc_cache_noprof+0x189/0x420 [ 14.285016] kasan_atomics+0x95/0x310 [ 14.285189] kunit_try_run_case+0x1a5/0x480 [ 14.285422] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.285866] kthread+0x337/0x6f0 [ 14.286148] ret_from_fork+0x116/0x1d0 [ 14.286472] ret_from_fork_asm+0x1a/0x30 [ 14.286872] [ 14.287024] The buggy address belongs to the object at ffff8881029e5b80 [ 14.287024] which belongs to the cache kmalloc-64 of size 64 [ 14.287999] The buggy address is located 0 bytes to the right of [ 14.287999] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.288708] [ 14.288816] The buggy address belongs to the physical page: [ 14.289322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.289832] flags: 0x200000000000000(node=0|zone=2) [ 14.290283] page_type: f5(slab) [ 14.290460] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.291018] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.291565] page dumped because: kasan: bad access detected [ 14.292048] [ 14.292128] Memory state around the buggy address: [ 14.292664] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.292956] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.293438] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.293927] ^ [ 14.294240] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.294779] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.295382] ================================================================== [ 14.369319] ================================================================== [ 14.369582] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 14.369827] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.370058] [ 14.370162] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.370206] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.370220] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.370241] Call Trace: [ 14.370255] <TASK> [ 14.370269] dump_stack_lvl+0x73/0xb0 [ 14.370295] print_report+0xd1/0x650 [ 14.370317] ? __virt_addr_valid+0x1db/0x2d0 [ 14.370341] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.370364] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.370387] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.370412] kasan_report+0x141/0x180 [ 14.370451] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.370488] kasan_check_range+0x10c/0x1c0 [ 14.370514] __kasan_check_write+0x18/0x20 [ 14.370535] kasan_atomics_helper+0x12e6/0x5450 [ 14.370559] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.370583] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.370606] ? kasan_atomics+0x152/0x310 [ 14.370640] kasan_atomics+0x1dc/0x310 [ 14.370661] ? __pfx_kasan_atomics+0x10/0x10 [ 14.370695] ? __pfx_read_tsc+0x10/0x10 [ 14.370716] ? ktime_get_ts64+0x86/0x230 [ 14.370742] kunit_try_run_case+0x1a5/0x480 [ 14.370767] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.370790] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.370812] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.370836] ? __kthread_parkme+0x82/0x180 [ 14.370857] ? preempt_count_sub+0x50/0x80 [ 14.370882] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.370906] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.370930] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.370954] kthread+0x337/0x6f0 [ 14.370975] ? trace_preempt_on+0x20/0xc0 [ 14.370999] ? __pfx_kthread+0x10/0x10 [ 14.371022] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.371043] ? calculate_sigpending+0x7b/0xa0 [ 14.371068] ? __pfx_kthread+0x10/0x10 [ 14.371091] ret_from_fork+0x116/0x1d0 [ 14.371110] ? __pfx_kthread+0x10/0x10 [ 14.371134] ret_from_fork_asm+0x1a/0x30 [ 14.371166] </TASK> [ 14.371177] [ 14.379815] Allocated by task 282: [ 14.379980] kasan_save_stack+0x45/0x70 [ 14.380363] kasan_save_track+0x18/0x40 [ 14.380563] kasan_save_alloc_info+0x3b/0x50 [ 14.380782] __kasan_kmalloc+0xb7/0xc0 [ 14.380969] __kmalloc_cache_noprof+0x189/0x420 [ 14.381190] kasan_atomics+0x95/0x310 [ 14.381375] kunit_try_run_case+0x1a5/0x480 [ 14.381692] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.381883] kthread+0x337/0x6f0 [ 14.382006] ret_from_fork+0x116/0x1d0 [ 14.382139] ret_from_fork_asm+0x1a/0x30 [ 14.382560] [ 14.382668] The buggy address belongs to the object at ffff8881029e5b80 [ 14.382668] which belongs to the cache kmalloc-64 of size 64 [ 14.383144] The buggy address is located 0 bytes to the right of [ 14.383144] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.383520] [ 14.383598] The buggy address belongs to the physical page: [ 14.383861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.384222] flags: 0x200000000000000(node=0|zone=2) [ 14.384503] page_type: f5(slab) [ 14.384704] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.384989] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.386020] page dumped because: kasan: bad access detected [ 14.386302] [ 14.386382] Memory state around the buggy address: [ 14.386552] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.386781] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.387356] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.387980] ^ [ 14.388442] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.388963] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.389637] ================================================================== [ 14.861600] ================================================================== [ 14.862059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 14.862454] Read of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.862839] [ 14.862945] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.862992] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.863005] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.863027] Call Trace: [ 14.863040] <TASK> [ 14.863055] dump_stack_lvl+0x73/0xb0 [ 14.863083] print_report+0xd1/0x650 [ 14.863106] ? __virt_addr_valid+0x1db/0x2d0 [ 14.863131] ? kasan_atomics_helper+0x4f71/0x5450 [ 14.863155] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.863201] ? kasan_atomics_helper+0x4f71/0x5450 [ 14.863225] kasan_report+0x141/0x180 [ 14.863248] ? kasan_atomics_helper+0x4f71/0x5450 [ 14.863276] __asan_report_load8_noabort+0x18/0x20 [ 14.863299] kasan_atomics_helper+0x4f71/0x5450 [ 14.863324] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.863347] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.863370] ? kasan_atomics+0x152/0x310 [ 14.863431] kasan_atomics+0x1dc/0x310 [ 14.863452] ? __pfx_kasan_atomics+0x10/0x10 [ 14.863486] ? __pfx_read_tsc+0x10/0x10 [ 14.863507] ? ktime_get_ts64+0x86/0x230 [ 14.863533] kunit_try_run_case+0x1a5/0x480 [ 14.863558] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.863580] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.863603] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.863635] ? __kthread_parkme+0x82/0x180 [ 14.863656] ? preempt_count_sub+0x50/0x80 [ 14.863681] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.863705] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.863729] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.863753] kthread+0x337/0x6f0 [ 14.863774] ? trace_preempt_on+0x20/0xc0 [ 14.863831] ? __pfx_kthread+0x10/0x10 [ 14.863852] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.863886] ? calculate_sigpending+0x7b/0xa0 [ 14.863911] ? __pfx_kthread+0x10/0x10 [ 14.863933] ret_from_fork+0x116/0x1d0 [ 14.863953] ? __pfx_kthread+0x10/0x10 [ 14.863975] ret_from_fork_asm+0x1a/0x30 [ 14.864008] </TASK> [ 14.864019] [ 14.872081] Allocated by task 282: [ 14.872234] kasan_save_stack+0x45/0x70 [ 14.872435] kasan_save_track+0x18/0x40 [ 14.872687] kasan_save_alloc_info+0x3b/0x50 [ 14.872941] __kasan_kmalloc+0xb7/0xc0 [ 14.873132] __kmalloc_cache_noprof+0x189/0x420 [ 14.873392] kasan_atomics+0x95/0x310 [ 14.873556] kunit_try_run_case+0x1a5/0x480 [ 14.873886] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.874095] kthread+0x337/0x6f0 [ 14.874324] ret_from_fork+0x116/0x1d0 [ 14.874633] ret_from_fork_asm+0x1a/0x30 [ 14.874797] [ 14.874870] The buggy address belongs to the object at ffff8881029e5b80 [ 14.874870] which belongs to the cache kmalloc-64 of size 64 [ 14.875400] The buggy address is located 0 bytes to the right of [ 14.875400] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.875929] [ 14.876003] The buggy address belongs to the physical page: [ 14.876229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.876639] flags: 0x200000000000000(node=0|zone=2) [ 14.876931] page_type: f5(slab) [ 14.877187] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.877469] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.877724] page dumped because: kasan: bad access detected [ 14.878010] [ 14.878121] Memory state around the buggy address: [ 14.878379] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.878753] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.879017] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.879349] ^ [ 14.879669] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.879920] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.880298] ================================================================== [ 13.654288] ================================================================== [ 13.654959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 13.655436] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 13.656041] [ 13.656161] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 13.656213] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.656227] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.656251] Call Trace: [ 13.656266] <TASK> [ 13.656282] dump_stack_lvl+0x73/0xb0 [ 13.656312] print_report+0xd1/0x650 [ 13.656335] ? __virt_addr_valid+0x1db/0x2d0 [ 13.656361] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.656385] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.656408] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.656432] kasan_report+0x141/0x180 [ 13.656457] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.656486] __asan_report_store4_noabort+0x1b/0x30 [ 13.656509] kasan_atomics_helper+0x4b6e/0x5450 [ 13.656727] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.656755] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.656778] ? kasan_atomics+0x152/0x310 [ 13.656802] kasan_atomics+0x1dc/0x310 [ 13.656823] ? __pfx_kasan_atomics+0x10/0x10 [ 13.656845] ? __pfx_read_tsc+0x10/0x10 [ 13.656867] ? ktime_get_ts64+0x86/0x230 [ 13.656894] kunit_try_run_case+0x1a5/0x480 [ 13.656919] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.656942] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.656966] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.656990] ? __kthread_parkme+0x82/0x180 [ 13.657011] ? preempt_count_sub+0x50/0x80 [ 13.657038] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.657062] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.657086] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.657110] kthread+0x337/0x6f0 [ 13.657131] ? trace_preempt_on+0x20/0xc0 [ 13.657155] ? __pfx_kthread+0x10/0x10 [ 13.657177] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.657199] ? calculate_sigpending+0x7b/0xa0 [ 13.657224] ? __pfx_kthread+0x10/0x10 [ 13.657247] ret_from_fork+0x116/0x1d0 [ 13.657268] ? __pfx_kthread+0x10/0x10 [ 13.657290] ret_from_fork_asm+0x1a/0x30 [ 13.657324] </TASK> [ 13.657335] [ 13.668065] Allocated by task 282: [ 13.668368] kasan_save_stack+0x45/0x70 [ 13.668802] kasan_save_track+0x18/0x40 [ 13.668983] kasan_save_alloc_info+0x3b/0x50 [ 13.669322] __kasan_kmalloc+0xb7/0xc0 [ 13.669512] __kmalloc_cache_noprof+0x189/0x420 [ 13.669811] kasan_atomics+0x95/0x310 [ 13.669989] kunit_try_run_case+0x1a5/0x480 [ 13.670401] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.670918] kthread+0x337/0x6f0 [ 13.671104] ret_from_fork+0x116/0x1d0 [ 13.671475] ret_from_fork_asm+0x1a/0x30 [ 13.671760] [ 13.671848] The buggy address belongs to the object at ffff8881029e5b80 [ 13.671848] which belongs to the cache kmalloc-64 of size 64 [ 13.672512] The buggy address is located 0 bytes to the right of [ 13.672512] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 13.673124] [ 13.673436] The buggy address belongs to the physical page: [ 13.673763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 13.674160] flags: 0x200000000000000(node=0|zone=2) [ 13.674371] page_type: f5(slab) [ 13.674748] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.675149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.675782] page dumped because: kasan: bad access detected [ 13.676036] [ 13.676133] Memory state around the buggy address: [ 13.676591] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.676933] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.677355] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.677711] ^ [ 13.677932] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.678219] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.678826] ================================================================== [ 14.880896] ================================================================== [ 14.881196] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 14.881601] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.881962] [ 14.882074] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.882147] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.882198] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.882221] Call Trace: [ 14.882234] <TASK> [ 14.882259] dump_stack_lvl+0x73/0xb0 [ 14.882287] print_report+0xd1/0x650 [ 14.882310] ? __virt_addr_valid+0x1db/0x2d0 [ 14.882335] ? kasan_atomics_helper+0x2006/0x5450 [ 14.882357] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.882381] ? kasan_atomics_helper+0x2006/0x5450 [ 14.882405] kasan_report+0x141/0x180 [ 14.882429] ? kasan_atomics_helper+0x2006/0x5450 [ 14.882458] kasan_check_range+0x10c/0x1c0 [ 14.882487] __kasan_check_write+0x18/0x20 [ 14.882508] kasan_atomics_helper+0x2006/0x5450 [ 14.882533] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.882572] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.882595] ? kasan_atomics+0x152/0x310 [ 14.882629] kasan_atomics+0x1dc/0x310 [ 14.882650] ? __pfx_kasan_atomics+0x10/0x10 [ 14.882673] ? __pfx_read_tsc+0x10/0x10 [ 14.882694] ? ktime_get_ts64+0x86/0x230 [ 14.882721] kunit_try_run_case+0x1a5/0x480 [ 14.882746] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.882769] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.882792] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.882815] ? __kthread_parkme+0x82/0x180 [ 14.882836] ? preempt_count_sub+0x50/0x80 [ 14.882860] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.882885] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.882910] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.882934] kthread+0x337/0x6f0 [ 14.882955] ? trace_preempt_on+0x20/0xc0 [ 14.882981] ? __pfx_kthread+0x10/0x10 [ 14.883004] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.883024] ? calculate_sigpending+0x7b/0xa0 [ 14.883049] ? __pfx_kthread+0x10/0x10 [ 14.883072] ret_from_fork+0x116/0x1d0 [ 14.883091] ? __pfx_kthread+0x10/0x10 [ 14.883113] ret_from_fork_asm+0x1a/0x30 [ 14.883146] </TASK> [ 14.883157] [ 14.890666] Allocated by task 282: [ 14.890847] kasan_save_stack+0x45/0x70 [ 14.891045] kasan_save_track+0x18/0x40 [ 14.891218] kasan_save_alloc_info+0x3b/0x50 [ 14.891455] __kasan_kmalloc+0xb7/0xc0 [ 14.891654] __kmalloc_cache_noprof+0x189/0x420 [ 14.891856] kasan_atomics+0x95/0x310 [ 14.892007] kunit_try_run_case+0x1a5/0x480 [ 14.892233] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.892480] kthread+0x337/0x6f0 [ 14.892605] ret_from_fork+0x116/0x1d0 [ 14.892747] ret_from_fork_asm+0x1a/0x30 [ 14.892887] [ 14.892958] The buggy address belongs to the object at ffff8881029e5b80 [ 14.892958] which belongs to the cache kmalloc-64 of size 64 [ 14.893494] The buggy address is located 0 bytes to the right of [ 14.893494] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.894051] [ 14.894150] The buggy address belongs to the physical page: [ 14.894416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.894680] flags: 0x200000000000000(node=0|zone=2) [ 14.894844] page_type: f5(slab) [ 14.895004] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.895401] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.895767] page dumped because: kasan: bad access detected [ 14.895970] [ 14.896042] Memory state around the buggy address: [ 14.896220] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.896543] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.896869] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.897228] ^ [ 14.897453] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.897686] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.897968] ================================================================== [ 13.760989] ================================================================== [ 13.761266] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 13.761553] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 13.762148] [ 13.762290] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 13.762358] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.762371] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.762406] Call Trace: [ 13.762421] <TASK> [ 13.762436] dump_stack_lvl+0x73/0xb0 [ 13.762486] print_report+0xd1/0x650 [ 13.762583] ? __virt_addr_valid+0x1db/0x2d0 [ 13.762610] ? kasan_atomics_helper+0x565/0x5450 [ 13.762643] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.762667] ? kasan_atomics_helper+0x565/0x5450 [ 13.762693] kasan_report+0x141/0x180 [ 13.762716] ? kasan_atomics_helper+0x565/0x5450 [ 13.762744] kasan_check_range+0x10c/0x1c0 [ 13.762768] __kasan_check_write+0x18/0x20 [ 13.762789] kasan_atomics_helper+0x565/0x5450 [ 13.762813] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.762837] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.762861] ? kasan_atomics+0x152/0x310 [ 13.762885] kasan_atomics+0x1dc/0x310 [ 13.762905] ? __pfx_kasan_atomics+0x10/0x10 [ 13.762928] ? __pfx_read_tsc+0x10/0x10 [ 13.762949] ? ktime_get_ts64+0x86/0x230 [ 13.762974] kunit_try_run_case+0x1a5/0x480 [ 13.762999] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.763021] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.763044] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.763067] ? __kthread_parkme+0x82/0x180 [ 13.763088] ? preempt_count_sub+0x50/0x80 [ 13.763113] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.763138] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.763180] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.763204] kthread+0x337/0x6f0 [ 13.763226] ? trace_preempt_on+0x20/0xc0 [ 13.763250] ? __pfx_kthread+0x10/0x10 [ 13.763272] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.763293] ? calculate_sigpending+0x7b/0xa0 [ 13.763317] ? __pfx_kthread+0x10/0x10 [ 13.763340] ret_from_fork+0x116/0x1d0 [ 13.763360] ? __pfx_kthread+0x10/0x10 [ 13.763381] ret_from_fork_asm+0x1a/0x30 [ 13.763413] </TASK> [ 13.763425] [ 13.772314] Allocated by task 282: [ 13.772503] kasan_save_stack+0x45/0x70 [ 13.772780] kasan_save_track+0x18/0x40 [ 13.772952] kasan_save_alloc_info+0x3b/0x50 [ 13.773164] __kasan_kmalloc+0xb7/0xc0 [ 13.773385] __kmalloc_cache_noprof+0x189/0x420 [ 13.773734] kasan_atomics+0x95/0x310 [ 13.773931] kunit_try_run_case+0x1a5/0x480 [ 13.774140] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.774398] kthread+0x337/0x6f0 [ 13.774573] ret_from_fork+0x116/0x1d0 [ 13.774772] ret_from_fork_asm+0x1a/0x30 [ 13.774949] [ 13.775022] The buggy address belongs to the object at ffff8881029e5b80 [ 13.775022] which belongs to the cache kmalloc-64 of size 64 [ 13.775834] The buggy address is located 0 bytes to the right of [ 13.775834] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 13.776326] [ 13.776445] The buggy address belongs to the physical page: [ 13.776806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 13.777138] flags: 0x200000000000000(node=0|zone=2) [ 13.777386] page_type: f5(slab) [ 13.777634] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.777986] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.778359] page dumped because: kasan: bad access detected [ 13.778696] [ 13.778791] Memory state around the buggy address: [ 13.779002] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.779351] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.779774] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.780097] ^ [ 13.780349] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.780827] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.781141] ================================================================== [ 13.880373] ================================================================== [ 13.880902] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 13.881148] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 13.881562] [ 13.881696] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 13.881746] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.881759] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.881781] Call Trace: [ 13.881796] <TASK> [ 13.881812] dump_stack_lvl+0x73/0xb0 [ 13.881840] print_report+0xd1/0x650 [ 13.881864] ? __virt_addr_valid+0x1db/0x2d0 [ 13.881889] ? kasan_atomics_helper+0x860/0x5450 [ 13.881912] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.881936] ? kasan_atomics_helper+0x860/0x5450 [ 13.881960] kasan_report+0x141/0x180 [ 13.881984] ? kasan_atomics_helper+0x860/0x5450 [ 13.882012] kasan_check_range+0x10c/0x1c0 [ 13.882038] __kasan_check_write+0x18/0x20 [ 13.882059] kasan_atomics_helper+0x860/0x5450 [ 13.882082] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.882107] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.882129] ? kasan_atomics+0x152/0x310 [ 13.882153] kasan_atomics+0x1dc/0x310 [ 13.882173] ? __pfx_kasan_atomics+0x10/0x10 [ 13.882260] ? __pfx_read_tsc+0x10/0x10 [ 13.882284] ? ktime_get_ts64+0x86/0x230 [ 13.882310] kunit_try_run_case+0x1a5/0x480 [ 13.882336] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.882358] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.882381] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.882404] ? __kthread_parkme+0x82/0x180 [ 13.882426] ? preempt_count_sub+0x50/0x80 [ 13.882452] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.882482] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.882505] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.882560] kthread+0x337/0x6f0 [ 13.882584] ? trace_preempt_on+0x20/0xc0 [ 13.882609] ? __pfx_kthread+0x10/0x10 [ 13.882641] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.882663] ? calculate_sigpending+0x7b/0xa0 [ 13.882688] ? __pfx_kthread+0x10/0x10 [ 13.882711] ret_from_fork+0x116/0x1d0 [ 13.882731] ? __pfx_kthread+0x10/0x10 [ 13.882754] ret_from_fork_asm+0x1a/0x30 [ 13.882786] </TASK> [ 13.882797] [ 13.890981] Allocated by task 282: [ 13.891151] kasan_save_stack+0x45/0x70 [ 13.891295] kasan_save_track+0x18/0x40 [ 13.891433] kasan_save_alloc_info+0x3b/0x50 [ 13.891939] __kasan_kmalloc+0xb7/0xc0 [ 13.892109] __kmalloc_cache_noprof+0x189/0x420 [ 13.892331] kasan_atomics+0x95/0x310 [ 13.892513] kunit_try_run_case+0x1a5/0x480 [ 13.892750] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.892988] kthread+0x337/0x6f0 [ 13.893135] ret_from_fork+0x116/0x1d0 [ 13.893420] ret_from_fork_asm+0x1a/0x30 [ 13.893609] [ 13.893701] The buggy address belongs to the object at ffff8881029e5b80 [ 13.893701] which belongs to the cache kmalloc-64 of size 64 [ 13.894051] The buggy address is located 0 bytes to the right of [ 13.894051] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 13.894423] [ 13.894523] The buggy address belongs to the physical page: [ 13.894975] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 13.895333] flags: 0x200000000000000(node=0|zone=2) [ 13.895570] page_type: f5(slab) [ 13.895886] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.896290] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.896519] page dumped because: kasan: bad access detected [ 13.896823] [ 13.896920] Memory state around the buggy address: [ 13.897146] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.897488] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.897882] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.898100] ^ [ 13.898336] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.898940] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.899266] ================================================================== [ 14.491650] ================================================================== [ 14.491930] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 14.492218] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.492591] [ 14.493008] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.493061] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.493075] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.493097] Call Trace: [ 14.493114] <TASK> [ 14.493129] dump_stack_lvl+0x73/0xb0 [ 14.493159] print_report+0xd1/0x650 [ 14.493465] ? __virt_addr_valid+0x1db/0x2d0 [ 14.493496] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.493520] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.493545] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.493568] kasan_report+0x141/0x180 [ 14.493592] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.493633] __asan_report_store8_noabort+0x1b/0x30 [ 14.493657] kasan_atomics_helper+0x50d4/0x5450 [ 14.493682] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.493705] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.493728] ? kasan_atomics+0x152/0x310 [ 14.493752] kasan_atomics+0x1dc/0x310 [ 14.493773] ? __pfx_kasan_atomics+0x10/0x10 [ 14.493795] ? __pfx_read_tsc+0x10/0x10 [ 14.493817] ? ktime_get_ts64+0x86/0x230 [ 14.493842] kunit_try_run_case+0x1a5/0x480 [ 14.493867] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.493890] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.493913] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.493936] ? __kthread_parkme+0x82/0x180 [ 14.493957] ? preempt_count_sub+0x50/0x80 [ 14.493982] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.494007] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.494031] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.494055] kthread+0x337/0x6f0 [ 14.494075] ? trace_preempt_on+0x20/0xc0 [ 14.494100] ? __pfx_kthread+0x10/0x10 [ 14.494121] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.494143] ? calculate_sigpending+0x7b/0xa0 [ 14.494168] ? __pfx_kthread+0x10/0x10 [ 14.494200] ret_from_fork+0x116/0x1d0 [ 14.494219] ? __pfx_kthread+0x10/0x10 [ 14.494240] ret_from_fork_asm+0x1a/0x30 [ 14.494272] </TASK> [ 14.494284] [ 14.504149] Allocated by task 282: [ 14.504323] kasan_save_stack+0x45/0x70 [ 14.504903] kasan_save_track+0x18/0x40 [ 14.505062] kasan_save_alloc_info+0x3b/0x50 [ 14.505421] __kasan_kmalloc+0xb7/0xc0 [ 14.505702] __kmalloc_cache_noprof+0x189/0x420 [ 14.505978] kasan_atomics+0x95/0x310 [ 14.506251] kunit_try_run_case+0x1a5/0x480 [ 14.506552] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.506874] kthread+0x337/0x6f0 [ 14.507010] ret_from_fork+0x116/0x1d0 [ 14.507347] ret_from_fork_asm+0x1a/0x30 [ 14.507641] [ 14.507720] The buggy address belongs to the object at ffff8881029e5b80 [ 14.507720] which belongs to the cache kmalloc-64 of size 64 [ 14.508470] The buggy address is located 0 bytes to the right of [ 14.508470] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.509027] [ 14.509133] The buggy address belongs to the physical page: [ 14.509600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.510026] flags: 0x200000000000000(node=0|zone=2) [ 14.510390] page_type: f5(slab) [ 14.510656] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.511048] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.511569] page dumped because: kasan: bad access detected [ 14.511906] [ 14.511985] Memory state around the buggy address: [ 14.512332] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.512686] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.512936] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.513490] ^ [ 14.513788] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.514155] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.514591] ================================================================== [ 14.746857] ================================================================== [ 14.747242] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 14.747649] Read of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.747979] [ 14.748070] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.748115] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.748127] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.748149] Call Trace: [ 14.748183] <TASK> [ 14.748199] dump_stack_lvl+0x73/0xb0 [ 14.748227] print_report+0xd1/0x650 [ 14.748250] ? __virt_addr_valid+0x1db/0x2d0 [ 14.748274] ? kasan_atomics_helper+0x4f30/0x5450 [ 14.748296] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.748320] ? kasan_atomics_helper+0x4f30/0x5450 [ 14.748344] kasan_report+0x141/0x180 [ 14.748368] ? kasan_atomics_helper+0x4f30/0x5450 [ 14.748396] __asan_report_load8_noabort+0x18/0x20 [ 14.748418] kasan_atomics_helper+0x4f30/0x5450 [ 14.748442] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.748465] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.748488] ? kasan_atomics+0x152/0x310 [ 14.748522] kasan_atomics+0x1dc/0x310 [ 14.748542] ? __pfx_kasan_atomics+0x10/0x10 [ 14.748564] ? __pfx_read_tsc+0x10/0x10 [ 14.748596] ? ktime_get_ts64+0x86/0x230 [ 14.748629] kunit_try_run_case+0x1a5/0x480 [ 14.748654] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.748677] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.748700] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.748723] ? __kthread_parkme+0x82/0x180 [ 14.748745] ? preempt_count_sub+0x50/0x80 [ 14.748769] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.748794] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.748817] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.748841] kthread+0x337/0x6f0 [ 14.748862] ? trace_preempt_on+0x20/0xc0 [ 14.748887] ? __pfx_kthread+0x10/0x10 [ 14.748908] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.748930] ? calculate_sigpending+0x7b/0xa0 [ 14.748955] ? __pfx_kthread+0x10/0x10 [ 14.748978] ret_from_fork+0x116/0x1d0 [ 14.748998] ? __pfx_kthread+0x10/0x10 [ 14.749020] ret_from_fork_asm+0x1a/0x30 [ 14.749052] </TASK> [ 14.749064] [ 14.756740] Allocated by task 282: [ 14.756874] kasan_save_stack+0x45/0x70 [ 14.757066] kasan_save_track+0x18/0x40 [ 14.757313] kasan_save_alloc_info+0x3b/0x50 [ 14.757528] __kasan_kmalloc+0xb7/0xc0 [ 14.757727] __kmalloc_cache_noprof+0x189/0x420 [ 14.757953] kasan_atomics+0x95/0x310 [ 14.758134] kunit_try_run_case+0x1a5/0x480 [ 14.758314] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.758496] kthread+0x337/0x6f0 [ 14.758670] ret_from_fork+0x116/0x1d0 [ 14.758893] ret_from_fork_asm+0x1a/0x30 [ 14.759187] [ 14.759290] The buggy address belongs to the object at ffff8881029e5b80 [ 14.759290] which belongs to the cache kmalloc-64 of size 64 [ 14.759879] The buggy address is located 0 bytes to the right of [ 14.759879] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.760275] [ 14.760353] The buggy address belongs to the physical page: [ 14.760605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.761018] flags: 0x200000000000000(node=0|zone=2) [ 14.761317] page_type: f5(slab) [ 14.761540] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.762022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.762470] page dumped because: kasan: bad access detected [ 14.762709] [ 14.762781] Memory state around the buggy address: [ 14.762938] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.763156] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.763498] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.763866] ^ [ 14.764096] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.764483] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.764897] ================================================================== [ 13.826981] ================================================================== [ 13.827476] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 13.828694] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 13.829701] [ 13.830002] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 13.830054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.830068] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.830090] Call Trace: [ 13.830105] <TASK> [ 13.830122] dump_stack_lvl+0x73/0xb0 [ 13.830151] print_report+0xd1/0x650 [ 13.830174] ? __virt_addr_valid+0x1db/0x2d0 [ 13.830199] ? kasan_atomics_helper+0x72f/0x5450 [ 13.830222] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.830245] ? kasan_atomics_helper+0x72f/0x5450 [ 13.830268] kasan_report+0x141/0x180 [ 13.830292] ? kasan_atomics_helper+0x72f/0x5450 [ 13.830319] kasan_check_range+0x10c/0x1c0 [ 13.830344] __kasan_check_write+0x18/0x20 [ 13.830366] kasan_atomics_helper+0x72f/0x5450 [ 13.830390] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.830413] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.830436] ? kasan_atomics+0x152/0x310 [ 13.830460] kasan_atomics+0x1dc/0x310 [ 13.830487] ? __pfx_kasan_atomics+0x10/0x10 [ 13.830509] ? __pfx_read_tsc+0x10/0x10 [ 13.830666] ? ktime_get_ts64+0x86/0x230 [ 13.830696] kunit_try_run_case+0x1a5/0x480 [ 13.830722] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.830745] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.830804] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.830827] ? __kthread_parkme+0x82/0x180 [ 13.830849] ? preempt_count_sub+0x50/0x80 [ 13.830876] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.830900] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.830924] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.830948] kthread+0x337/0x6f0 [ 13.830969] ? trace_preempt_on+0x20/0xc0 [ 13.830993] ? __pfx_kthread+0x10/0x10 [ 13.831015] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.831036] ? calculate_sigpending+0x7b/0xa0 [ 13.831061] ? __pfx_kthread+0x10/0x10 [ 13.831084] ret_from_fork+0x116/0x1d0 [ 13.831102] ? __pfx_kthread+0x10/0x10 [ 13.831125] ret_from_fork_asm+0x1a/0x30 [ 13.831159] </TASK> [ 13.831171] [ 13.846115] Allocated by task 282: [ 13.846281] kasan_save_stack+0x45/0x70 [ 13.846427] kasan_save_track+0x18/0x40 [ 13.846782] kasan_save_alloc_info+0x3b/0x50 [ 13.847000] __kasan_kmalloc+0xb7/0xc0 [ 13.847196] __kmalloc_cache_noprof+0x189/0x420 [ 13.847394] kasan_atomics+0x95/0x310 [ 13.847635] kunit_try_run_case+0x1a5/0x480 [ 13.847822] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.848050] kthread+0x337/0x6f0 [ 13.848245] ret_from_fork+0x116/0x1d0 [ 13.848391] ret_from_fork_asm+0x1a/0x30 [ 13.848830] [ 13.848931] The buggy address belongs to the object at ffff8881029e5b80 [ 13.848931] which belongs to the cache kmalloc-64 of size 64 [ 13.849442] The buggy address is located 0 bytes to the right of [ 13.849442] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 13.850021] [ 13.850101] The buggy address belongs to the physical page: [ 13.850963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 13.851986] flags: 0x200000000000000(node=0|zone=2) [ 13.852245] page_type: f5(slab) [ 13.852371] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.852607] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.853084] page dumped because: kasan: bad access detected [ 13.853928] [ 13.854133] Memory state around the buggy address: [ 13.854690] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.855447] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.856194] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.856740] ^ [ 13.856904] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.857120] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.857357] ================================================================== [ 13.574263] ================================================================== [ 13.575120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 13.575552] Read of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 13.576023] [ 13.576121] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 13.576170] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.576183] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.576204] Call Trace: [ 13.576217] <TASK> [ 13.576439] dump_stack_lvl+0x73/0xb0 [ 13.576472] print_report+0xd1/0x650 [ 13.576495] ? __virt_addr_valid+0x1db/0x2d0 [ 13.576561] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.576586] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.576609] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.576645] kasan_report+0x141/0x180 [ 13.576668] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.576696] __asan_report_load4_noabort+0x18/0x20 [ 13.576717] kasan_atomics_helper+0x4bbc/0x5450 [ 13.576740] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.576763] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.576785] ? kasan_atomics+0x152/0x310 [ 13.576808] kasan_atomics+0x1dc/0x310 [ 13.576828] ? __pfx_kasan_atomics+0x10/0x10 [ 13.576849] ? __pfx_read_tsc+0x10/0x10 [ 13.576869] ? ktime_get_ts64+0x86/0x230 [ 13.576894] kunit_try_run_case+0x1a5/0x480 [ 13.576919] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.576941] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.576964] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.576987] ? __kthread_parkme+0x82/0x180 [ 13.577008] ? preempt_count_sub+0x50/0x80 [ 13.577034] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.577057] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.577081] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.577104] kthread+0x337/0x6f0 [ 13.577124] ? trace_preempt_on+0x20/0xc0 [ 13.577149] ? __pfx_kthread+0x10/0x10 [ 13.577170] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.577191] ? calculate_sigpending+0x7b/0xa0 [ 13.577215] ? __pfx_kthread+0x10/0x10 [ 13.577237] ret_from_fork+0x116/0x1d0 [ 13.577256] ? __pfx_kthread+0x10/0x10 [ 13.577277] ret_from_fork_asm+0x1a/0x30 [ 13.577309] </TASK> [ 13.577320] [ 13.587915] Allocated by task 282: [ 13.588084] kasan_save_stack+0x45/0x70 [ 13.588285] kasan_save_track+0x18/0x40 [ 13.588798] kasan_save_alloc_info+0x3b/0x50 [ 13.588998] __kasan_kmalloc+0xb7/0xc0 [ 13.589170] __kmalloc_cache_noprof+0x189/0x420 [ 13.589588] kasan_atomics+0x95/0x310 [ 13.589966] kunit_try_run_case+0x1a5/0x480 [ 13.590208] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.590630] kthread+0x337/0x6f0 [ 13.591033] ret_from_fork+0x116/0x1d0 [ 13.591207] ret_from_fork_asm+0x1a/0x30 [ 13.591553] [ 13.591810] The buggy address belongs to the object at ffff8881029e5b80 [ 13.591810] which belongs to the cache kmalloc-64 of size 64 [ 13.592327] The buggy address is located 0 bytes to the right of [ 13.592327] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 13.593199] [ 13.593375] The buggy address belongs to the physical page: [ 13.593813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 13.594291] flags: 0x200000000000000(node=0|zone=2) [ 13.594517] page_type: f5(slab) [ 13.594794] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.595270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.595737] page dumped because: kasan: bad access detected [ 13.596198] [ 13.596362] Memory state around the buggy address: [ 13.596592] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.597176] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.597682] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.598109] ^ [ 13.598514] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.598965] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.599492] ================================================================== [ 14.691974] ================================================================== [ 14.692363] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 14.692804] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.693119] [ 14.693274] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.693331] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.693344] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.693366] Call Trace: [ 14.693388] <TASK> [ 14.693404] dump_stack_lvl+0x73/0xb0 [ 14.693431] print_report+0xd1/0x650 [ 14.693465] ? __virt_addr_valid+0x1db/0x2d0 [ 14.693489] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.693512] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.693544] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.693567] kasan_report+0x141/0x180 [ 14.693591] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.693635] kasan_check_range+0x10c/0x1c0 [ 14.693660] __kasan_check_write+0x18/0x20 [ 14.693681] kasan_atomics_helper+0x1a7f/0x5450 [ 14.693704] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.693728] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.693750] ? kasan_atomics+0x152/0x310 [ 14.693775] kasan_atomics+0x1dc/0x310 [ 14.693795] ? __pfx_kasan_atomics+0x10/0x10 [ 14.693817] ? __pfx_read_tsc+0x10/0x10 [ 14.693847] ? ktime_get_ts64+0x86/0x230 [ 14.693873] kunit_try_run_case+0x1a5/0x480 [ 14.693898] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.693931] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.693953] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.693977] ? __kthread_parkme+0x82/0x180 [ 14.693999] ? preempt_count_sub+0x50/0x80 [ 14.694024] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.694049] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.694073] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.694096] kthread+0x337/0x6f0 [ 14.694117] ? trace_preempt_on+0x20/0xc0 [ 14.694143] ? __pfx_kthread+0x10/0x10 [ 14.694183] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.694214] ? calculate_sigpending+0x7b/0xa0 [ 14.694239] ? __pfx_kthread+0x10/0x10 [ 14.694262] ret_from_fork+0x116/0x1d0 [ 14.694292] ? __pfx_kthread+0x10/0x10 [ 14.694314] ret_from_fork_asm+0x1a/0x30 [ 14.694347] </TASK> [ 14.694358] [ 14.701844] Allocated by task 282: [ 14.702023] kasan_save_stack+0x45/0x70 [ 14.702275] kasan_save_track+0x18/0x40 [ 14.702514] kasan_save_alloc_info+0x3b/0x50 [ 14.702721] __kasan_kmalloc+0xb7/0xc0 [ 14.702861] __kmalloc_cache_noprof+0x189/0x420 [ 14.703091] kasan_atomics+0x95/0x310 [ 14.703339] kunit_try_run_case+0x1a5/0x480 [ 14.703522] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.703801] kthread+0x337/0x6f0 [ 14.703959] ret_from_fork+0x116/0x1d0 [ 14.704097] ret_from_fork_asm+0x1a/0x30 [ 14.704262] [ 14.704334] The buggy address belongs to the object at ffff8881029e5b80 [ 14.704334] which belongs to the cache kmalloc-64 of size 64 [ 14.704749] The buggy address is located 0 bytes to the right of [ 14.704749] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.705327] [ 14.705424] The buggy address belongs to the physical page: [ 14.705687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.706043] flags: 0x200000000000000(node=0|zone=2) [ 14.706291] page_type: f5(slab) [ 14.706413] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.706672] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.707017] page dumped because: kasan: bad access detected [ 14.707323] [ 14.707439] Memory state around the buggy address: [ 14.707694] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.708030] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.708292] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.708558] ^ [ 14.708788] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.709136] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.709398] ================================================================== [ 13.918977] ================================================================== [ 13.919322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 13.919564] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 13.919801] [ 13.919885] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 13.919931] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.919944] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.919967] Call Trace: [ 13.919981] <TASK> [ 13.919998] dump_stack_lvl+0x73/0xb0 [ 13.920024] print_report+0xd1/0x650 [ 13.920048] ? __virt_addr_valid+0x1db/0x2d0 [ 13.920072] ? kasan_atomics_helper+0x992/0x5450 [ 13.920094] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.920118] ? kasan_atomics_helper+0x992/0x5450 [ 13.920383] kasan_report+0x141/0x180 [ 13.920409] ? kasan_atomics_helper+0x992/0x5450 [ 13.920477] kasan_check_range+0x10c/0x1c0 [ 13.920504] __kasan_check_write+0x18/0x20 [ 13.920565] kasan_atomics_helper+0x992/0x5450 [ 13.920592] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.920634] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.920658] ? kasan_atomics+0x152/0x310 [ 13.920683] kasan_atomics+0x1dc/0x310 [ 13.920704] ? __pfx_kasan_atomics+0x10/0x10 [ 13.920726] ? __pfx_read_tsc+0x10/0x10 [ 13.920748] ? ktime_get_ts64+0x86/0x230 [ 13.920775] kunit_try_run_case+0x1a5/0x480 [ 13.920799] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.920823] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.920847] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.920871] ? __kthread_parkme+0x82/0x180 [ 13.920895] ? preempt_count_sub+0x50/0x80 [ 13.920922] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.920947] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.920972] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.920996] kthread+0x337/0x6f0 [ 13.921018] ? trace_preempt_on+0x20/0xc0 [ 13.921043] ? __pfx_kthread+0x10/0x10 [ 13.921066] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.921088] ? calculate_sigpending+0x7b/0xa0 [ 13.921113] ? __pfx_kthread+0x10/0x10 [ 13.921137] ret_from_fork+0x116/0x1d0 [ 13.921156] ? __pfx_kthread+0x10/0x10 [ 13.921179] ret_from_fork_asm+0x1a/0x30 [ 13.921220] </TASK> [ 13.921231] [ 13.931763] Allocated by task 282: [ 13.931962] kasan_save_stack+0x45/0x70 [ 13.932168] kasan_save_track+0x18/0x40 [ 13.932728] kasan_save_alloc_info+0x3b/0x50 [ 13.933072] __kasan_kmalloc+0xb7/0xc0 [ 13.933417] __kmalloc_cache_noprof+0x189/0x420 [ 13.933946] kasan_atomics+0x95/0x310 [ 13.934205] kunit_try_run_case+0x1a5/0x480 [ 13.934580] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.934992] kthread+0x337/0x6f0 [ 13.935117] ret_from_fork+0x116/0x1d0 [ 13.935249] ret_from_fork_asm+0x1a/0x30 [ 13.935386] [ 13.935533] The buggy address belongs to the object at ffff8881029e5b80 [ 13.935533] which belongs to the cache kmalloc-64 of size 64 [ 13.936300] The buggy address is located 0 bytes to the right of [ 13.936300] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 13.936889] [ 13.936966] The buggy address belongs to the physical page: [ 13.937541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 13.937898] flags: 0x200000000000000(node=0|zone=2) [ 13.938112] page_type: f5(slab) [ 13.938941] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.939452] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.939992] page dumped because: kasan: bad access detected [ 13.940400] [ 13.940866] Memory state around the buggy address: [ 13.941106] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.941427] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.941998] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.942389] ^ [ 13.942734] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.943057] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.943456] ================================================================== [ 13.600215] ================================================================== [ 13.600749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 13.601328] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 13.601787] [ 13.601973] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 13.602023] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.602035] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.602079] Call Trace: [ 13.602091] <TASK> [ 13.602105] dump_stack_lvl+0x73/0xb0 [ 13.602133] print_report+0xd1/0x650 [ 13.602281] ? __virt_addr_valid+0x1db/0x2d0 [ 13.602309] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.602332] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.602355] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.602398] kasan_report+0x141/0x180 [ 13.602422] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.602449] __asan_report_store4_noabort+0x1b/0x30 [ 13.602476] kasan_atomics_helper+0x4ba2/0x5450 [ 13.602499] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.602521] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.602680] ? kasan_atomics+0x152/0x310 [ 13.602708] kasan_atomics+0x1dc/0x310 [ 13.602728] ? __pfx_kasan_atomics+0x10/0x10 [ 13.602749] ? __pfx_read_tsc+0x10/0x10 [ 13.602770] ? ktime_get_ts64+0x86/0x230 [ 13.602796] kunit_try_run_case+0x1a5/0x480 [ 13.602820] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.602842] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.602864] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.602886] ? __kthread_parkme+0x82/0x180 [ 13.602907] ? preempt_count_sub+0x50/0x80 [ 13.602932] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.602955] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.602978] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.603002] kthread+0x337/0x6f0 [ 13.603022] ? trace_preempt_on+0x20/0xc0 [ 13.603045] ? __pfx_kthread+0x10/0x10 [ 13.603066] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.603087] ? calculate_sigpending+0x7b/0xa0 [ 13.603110] ? __pfx_kthread+0x10/0x10 [ 13.603132] ret_from_fork+0x116/0x1d0 [ 13.603150] ? __pfx_kthread+0x10/0x10 [ 13.603171] ret_from_fork_asm+0x1a/0x30 [ 13.603202] </TASK> [ 13.603213] [ 13.614736] Allocated by task 282: [ 13.614928] kasan_save_stack+0x45/0x70 [ 13.615103] kasan_save_track+0x18/0x40 [ 13.615635] kasan_save_alloc_info+0x3b/0x50 [ 13.615794] __kasan_kmalloc+0xb7/0xc0 [ 13.616131] __kmalloc_cache_noprof+0x189/0x420 [ 13.616462] kasan_atomics+0x95/0x310 [ 13.616692] kunit_try_run_case+0x1a5/0x480 [ 13.616906] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.617374] kthread+0x337/0x6f0 [ 13.617570] ret_from_fork+0x116/0x1d0 [ 13.617887] ret_from_fork_asm+0x1a/0x30 [ 13.618046] [ 13.618321] The buggy address belongs to the object at ffff8881029e5b80 [ 13.618321] which belongs to the cache kmalloc-64 of size 64 [ 13.618900] The buggy address is located 0 bytes to the right of [ 13.618900] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 13.619867] [ 13.619955] The buggy address belongs to the physical page: [ 13.620221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 13.620670] flags: 0x200000000000000(node=0|zone=2) [ 13.621175] page_type: f5(slab) [ 13.621439] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.622014] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.622468] page dumped because: kasan: bad access detected [ 13.622910] [ 13.623019] Memory state around the buggy address: [ 13.623345] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.623766] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.624113] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.624507] ^ [ 13.624946] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.625312] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.625818] ================================================================== [ 14.562848] ================================================================== [ 14.563479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 14.564073] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.564661] [ 14.564777] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.564828] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.564842] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.564866] Call Trace: [ 14.564881] <TASK> [ 14.564898] dump_stack_lvl+0x73/0xb0 [ 14.564928] print_report+0xd1/0x650 [ 14.564952] ? __virt_addr_valid+0x1db/0x2d0 [ 14.564976] ? kasan_atomics_helper+0x164f/0x5450 [ 14.564999] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.565023] ? kasan_atomics_helper+0x164f/0x5450 [ 14.565046] kasan_report+0x141/0x180 [ 14.565070] ? kasan_atomics_helper+0x164f/0x5450 [ 14.565099] kasan_check_range+0x10c/0x1c0 [ 14.565125] __kasan_check_write+0x18/0x20 [ 14.565145] kasan_atomics_helper+0x164f/0x5450 [ 14.565171] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.565197] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.565219] ? kasan_atomics+0x152/0x310 [ 14.565243] kasan_atomics+0x1dc/0x310 [ 14.565264] ? __pfx_kasan_atomics+0x10/0x10 [ 14.565285] ? __pfx_read_tsc+0x10/0x10 [ 14.565307] ? ktime_get_ts64+0x86/0x230 [ 14.565333] kunit_try_run_case+0x1a5/0x480 [ 14.565358] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.565381] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.565406] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.565429] ? __kthread_parkme+0x82/0x180 [ 14.565451] ? preempt_count_sub+0x50/0x80 [ 14.565476] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.565501] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.565525] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.565548] kthread+0x337/0x6f0 [ 14.565569] ? trace_preempt_on+0x20/0xc0 [ 14.565594] ? __pfx_kthread+0x10/0x10 [ 14.565627] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.565649] ? calculate_sigpending+0x7b/0xa0 [ 14.565675] ? __pfx_kthread+0x10/0x10 [ 14.565697] ret_from_fork+0x116/0x1d0 [ 14.565717] ? __pfx_kthread+0x10/0x10 [ 14.565739] ret_from_fork_asm+0x1a/0x30 [ 14.565773] </TASK> [ 14.565784] [ 14.573317] Allocated by task 282: [ 14.573499] kasan_save_stack+0x45/0x70 [ 14.573710] kasan_save_track+0x18/0x40 [ 14.573847] kasan_save_alloc_info+0x3b/0x50 [ 14.573994] __kasan_kmalloc+0xb7/0xc0 [ 14.574130] __kmalloc_cache_noprof+0x189/0x420 [ 14.574347] kasan_atomics+0x95/0x310 [ 14.574538] kunit_try_run_case+0x1a5/0x480 [ 14.574795] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.575052] kthread+0x337/0x6f0 [ 14.575238] ret_from_fork+0x116/0x1d0 [ 14.575416] ret_from_fork_asm+0x1a/0x30 [ 14.575579] [ 14.575662] The buggy address belongs to the object at ffff8881029e5b80 [ 14.575662] which belongs to the cache kmalloc-64 of size 64 [ 14.576138] The buggy address is located 0 bytes to the right of [ 14.576138] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.576564] [ 14.576645] The buggy address belongs to the physical page: [ 14.576820] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.577419] flags: 0x200000000000000(node=0|zone=2) [ 14.577664] page_type: f5(slab) [ 14.577833] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.578139] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.578582] page dumped because: kasan: bad access detected [ 14.578766] [ 14.578837] Memory state around the buggy address: [ 14.578994] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.579471] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.579808] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.580024] ^ [ 14.580182] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.580499] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.580927] ================================================================== [ 14.898487] ================================================================== [ 14.898860] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 14.899290] Read of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.899627] [ 14.899736] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.899783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.899808] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.899831] Call Trace: [ 14.899846] <TASK> [ 14.899861] dump_stack_lvl+0x73/0xb0 [ 14.899897] print_report+0xd1/0x650 [ 14.899921] ? __virt_addr_valid+0x1db/0x2d0 [ 14.899944] ? kasan_atomics_helper+0x4f98/0x5450 [ 14.899980] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.900004] ? kasan_atomics_helper+0x4f98/0x5450 [ 14.900028] kasan_report+0x141/0x180 [ 14.900052] ? kasan_atomics_helper+0x4f98/0x5450 [ 14.900089] __asan_report_load8_noabort+0x18/0x20 [ 14.900111] kasan_atomics_helper+0x4f98/0x5450 [ 14.900146] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.900188] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.900212] ? kasan_atomics+0x152/0x310 [ 14.900237] kasan_atomics+0x1dc/0x310 [ 14.900266] ? __pfx_kasan_atomics+0x10/0x10 [ 14.900289] ? __pfx_read_tsc+0x10/0x10 [ 14.900310] ? ktime_get_ts64+0x86/0x230 [ 14.900346] kunit_try_run_case+0x1a5/0x480 [ 14.900371] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.900394] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.900427] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.900450] ? __kthread_parkme+0x82/0x180 [ 14.900471] ? preempt_count_sub+0x50/0x80 [ 14.900507] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.900532] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.900555] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.900579] kthread+0x337/0x6f0 [ 14.900599] ? trace_preempt_on+0x20/0xc0 [ 14.900631] ? __pfx_kthread+0x10/0x10 [ 14.900654] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.900675] ? calculate_sigpending+0x7b/0xa0 [ 14.900700] ? __pfx_kthread+0x10/0x10 [ 14.900732] ret_from_fork+0x116/0x1d0 [ 14.900751] ? __pfx_kthread+0x10/0x10 [ 14.900773] ret_from_fork_asm+0x1a/0x30 [ 14.900815] </TASK> [ 14.900826] [ 14.908142] Allocated by task 282: [ 14.908353] kasan_save_stack+0x45/0x70 [ 14.908538] kasan_save_track+0x18/0x40 [ 14.908743] kasan_save_alloc_info+0x3b/0x50 [ 14.908943] __kasan_kmalloc+0xb7/0xc0 [ 14.909135] __kmalloc_cache_noprof+0x189/0x420 [ 14.909363] kasan_atomics+0x95/0x310 [ 14.909555] kunit_try_run_case+0x1a5/0x480 [ 14.909746] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.909998] kthread+0x337/0x6f0 [ 14.910186] ret_from_fork+0x116/0x1d0 [ 14.910367] ret_from_fork_asm+0x1a/0x30 [ 14.910571] [ 14.910677] The buggy address belongs to the object at ffff8881029e5b80 [ 14.910677] which belongs to the cache kmalloc-64 of size 64 [ 14.911187] The buggy address is located 0 bytes to the right of [ 14.911187] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.911553] [ 14.911635] The buggy address belongs to the physical page: [ 14.911807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.912212] flags: 0x200000000000000(node=0|zone=2) [ 14.912443] page_type: f5(slab) [ 14.912619] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.912964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.913303] page dumped because: kasan: bad access detected [ 14.913477] [ 14.913548] Memory state around the buggy address: [ 14.913756] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.914078] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.914458] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.914799] ^ [ 14.915022] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.915301] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.915517] ================================================================== [ 14.970604] ================================================================== [ 14.971019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 14.971419] Read of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.971781] [ 14.971892] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.971970] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.971983] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.972005] Call Trace: [ 14.972031] <TASK> [ 14.972046] dump_stack_lvl+0x73/0xb0 [ 14.972074] print_report+0xd1/0x650 [ 14.972097] ? __virt_addr_valid+0x1db/0x2d0 [ 14.972121] ? kasan_atomics_helper+0x4fa5/0x5450 [ 14.972145] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.972219] ? kasan_atomics_helper+0x4fa5/0x5450 [ 14.972256] kasan_report+0x141/0x180 [ 14.972318] ? kasan_atomics_helper+0x4fa5/0x5450 [ 14.972347] __asan_report_load8_noabort+0x18/0x20 [ 14.972404] kasan_atomics_helper+0x4fa5/0x5450 [ 14.972429] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.972453] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.972485] ? kasan_atomics+0x152/0x310 [ 14.972510] kasan_atomics+0x1dc/0x310 [ 14.972531] ? __pfx_kasan_atomics+0x10/0x10 [ 14.972553] ? __pfx_read_tsc+0x10/0x10 [ 14.972575] ? ktime_get_ts64+0x86/0x230 [ 14.972601] kunit_try_run_case+0x1a5/0x480 [ 14.972634] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.972687] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.972710] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.972772] ? __kthread_parkme+0x82/0x180 [ 14.972805] ? preempt_count_sub+0x50/0x80 [ 14.972867] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.972893] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.972917] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.972951] kthread+0x337/0x6f0 [ 14.972973] ? trace_preempt_on+0x20/0xc0 [ 14.972997] ? __pfx_kthread+0x10/0x10 [ 14.973020] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.973041] ? calculate_sigpending+0x7b/0xa0 [ 14.973066] ? __pfx_kthread+0x10/0x10 [ 14.973089] ret_from_fork+0x116/0x1d0 [ 14.973108] ? __pfx_kthread+0x10/0x10 [ 14.973130] ret_from_fork_asm+0x1a/0x30 [ 14.973181] </TASK> [ 14.973192] [ 14.981243] Allocated by task 282: [ 14.981374] kasan_save_stack+0x45/0x70 [ 14.981518] kasan_save_track+0x18/0x40 [ 14.981723] kasan_save_alloc_info+0x3b/0x50 [ 14.981935] __kasan_kmalloc+0xb7/0xc0 [ 14.982202] __kmalloc_cache_noprof+0x189/0x420 [ 14.982437] kasan_atomics+0x95/0x310 [ 14.982716] kunit_try_run_case+0x1a5/0x480 [ 14.982942] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.983119] kthread+0x337/0x6f0 [ 14.983268] ret_from_fork+0x116/0x1d0 [ 14.983458] ret_from_fork_asm+0x1a/0x30 [ 14.983709] [ 14.983810] The buggy address belongs to the object at ffff8881029e5b80 [ 14.983810] which belongs to the cache kmalloc-64 of size 64 [ 14.984461] The buggy address is located 0 bytes to the right of [ 14.984461] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.984885] [ 14.984960] The buggy address belongs to the physical page: [ 14.985215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.985629] flags: 0x200000000000000(node=0|zone=2) [ 14.985871] page_type: f5(slab) [ 14.986042] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.986378] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.986721] page dumped because: kasan: bad access detected [ 14.986900] [ 14.987039] Memory state around the buggy address: [ 14.987393] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.987691] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.987978] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.988393] ^ [ 14.988647] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.988906] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.989300] ================================================================== [ 14.036398] ================================================================== [ 14.036761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 14.037083] Read of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.037437] [ 14.037520] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.037564] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.037578] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.037598] Call Trace: [ 14.037610] <TASK> [ 14.037636] dump_stack_lvl+0x73/0xb0 [ 14.037711] print_report+0xd1/0x650 [ 14.037737] ? __virt_addr_valid+0x1db/0x2d0 [ 14.037763] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.037786] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.037809] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.037832] kasan_report+0x141/0x180 [ 14.037856] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.037885] __asan_report_load4_noabort+0x18/0x20 [ 14.037906] kasan_atomics_helper+0x4a84/0x5450 [ 14.037930] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.037954] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.037976] ? kasan_atomics+0x152/0x310 [ 14.038000] kasan_atomics+0x1dc/0x310 [ 14.038021] ? __pfx_kasan_atomics+0x10/0x10 [ 14.038042] ? __pfx_read_tsc+0x10/0x10 [ 14.038063] ? ktime_get_ts64+0x86/0x230 [ 14.038089] kunit_try_run_case+0x1a5/0x480 [ 14.038114] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.038136] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.038159] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.038182] ? __kthread_parkme+0x82/0x180 [ 14.038203] ? preempt_count_sub+0x50/0x80 [ 14.038228] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.038252] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.038277] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.038300] kthread+0x337/0x6f0 [ 14.038321] ? trace_preempt_on+0x20/0xc0 [ 14.038346] ? __pfx_kthread+0x10/0x10 [ 14.038367] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.038388] ? calculate_sigpending+0x7b/0xa0 [ 14.038413] ? __pfx_kthread+0x10/0x10 [ 14.038437] ret_from_fork+0x116/0x1d0 [ 14.038456] ? __pfx_kthread+0x10/0x10 [ 14.038485] ret_from_fork_asm+0x1a/0x30 [ 14.038517] </TASK> [ 14.038538] [ 14.046876] Allocated by task 282: [ 14.047034] kasan_save_stack+0x45/0x70 [ 14.047179] kasan_save_track+0x18/0x40 [ 14.047317] kasan_save_alloc_info+0x3b/0x50 [ 14.047485] __kasan_kmalloc+0xb7/0xc0 [ 14.047743] __kmalloc_cache_noprof+0x189/0x420 [ 14.047973] kasan_atomics+0x95/0x310 [ 14.048163] kunit_try_run_case+0x1a5/0x480 [ 14.048414] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.048590] kthread+0x337/0x6f0 [ 14.048771] ret_from_fork+0x116/0x1d0 [ 14.048963] ret_from_fork_asm+0x1a/0x30 [ 14.049209] [ 14.049282] The buggy address belongs to the object at ffff8881029e5b80 [ 14.049282] which belongs to the cache kmalloc-64 of size 64 [ 14.049898] The buggy address is located 0 bytes to the right of [ 14.049898] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.050265] [ 14.050339] The buggy address belongs to the physical page: [ 14.050755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.051109] flags: 0x200000000000000(node=0|zone=2) [ 14.051339] page_type: f5(slab) [ 14.051585] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.051824] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.052429] page dumped because: kasan: bad access detected [ 14.052933] [ 14.053020] Memory state around the buggy address: [ 14.053268] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.053629] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.053851] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.054062] ^ [ 14.054395] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.055044] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.055500] ================================================================== [ 14.467693] ================================================================== [ 14.468006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 14.468700] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.468992] [ 14.469187] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.469494] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.469511] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.469532] Call Trace: [ 14.469547] <TASK> [ 14.469562] dump_stack_lvl+0x73/0xb0 [ 14.469592] print_report+0xd1/0x650 [ 14.469629] ? __virt_addr_valid+0x1db/0x2d0 [ 14.469654] ? kasan_atomics_helper+0x1467/0x5450 [ 14.469677] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.469701] ? kasan_atomics_helper+0x1467/0x5450 [ 14.469724] kasan_report+0x141/0x180 [ 14.469748] ? kasan_atomics_helper+0x1467/0x5450 [ 14.469776] kasan_check_range+0x10c/0x1c0 [ 14.469801] __kasan_check_write+0x18/0x20 [ 14.469821] kasan_atomics_helper+0x1467/0x5450 [ 14.469846] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.469869] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.469892] ? kasan_atomics+0x152/0x310 [ 14.469916] kasan_atomics+0x1dc/0x310 [ 14.469937] ? __pfx_kasan_atomics+0x10/0x10 [ 14.469960] ? __pfx_read_tsc+0x10/0x10 [ 14.469983] ? ktime_get_ts64+0x86/0x230 [ 14.470009] kunit_try_run_case+0x1a5/0x480 [ 14.470033] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.470056] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.470080] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.470104] ? __kthread_parkme+0x82/0x180 [ 14.470125] ? preempt_count_sub+0x50/0x80 [ 14.470150] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.470184] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.470209] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.470234] kthread+0x337/0x6f0 [ 14.470255] ? trace_preempt_on+0x20/0xc0 [ 14.470280] ? __pfx_kthread+0x10/0x10 [ 14.470302] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.470323] ? calculate_sigpending+0x7b/0xa0 [ 14.470348] ? __pfx_kthread+0x10/0x10 [ 14.470371] ret_from_fork+0x116/0x1d0 [ 14.470389] ? __pfx_kthread+0x10/0x10 [ 14.470411] ret_from_fork_asm+0x1a/0x30 [ 14.470443] </TASK> [ 14.470454] [ 14.480834] Allocated by task 282: [ 14.481005] kasan_save_stack+0x45/0x70 [ 14.481200] kasan_save_track+0x18/0x40 [ 14.481517] kasan_save_alloc_info+0x3b/0x50 [ 14.481819] __kasan_kmalloc+0xb7/0xc0 [ 14.482083] __kmalloc_cache_noprof+0x189/0x420 [ 14.482482] kasan_atomics+0x95/0x310 [ 14.482768] kunit_try_run_case+0x1a5/0x480 [ 14.482946] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.483363] kthread+0x337/0x6f0 [ 14.483546] ret_from_fork+0x116/0x1d0 [ 14.483822] ret_from_fork_asm+0x1a/0x30 [ 14.484025] [ 14.484123] The buggy address belongs to the object at ffff8881029e5b80 [ 14.484123] which belongs to the cache kmalloc-64 of size 64 [ 14.484901] The buggy address is located 0 bytes to the right of [ 14.484901] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.485683] [ 14.485771] The buggy address belongs to the physical page: [ 14.486048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.486609] flags: 0x200000000000000(node=0|zone=2) [ 14.486933] page_type: f5(slab) [ 14.487178] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.487530] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.487871] page dumped because: kasan: bad access detected [ 14.488112] [ 14.488204] Memory state around the buggy address: [ 14.488719] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.489074] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.489497] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.489866] ^ [ 14.490152] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.490539] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.490911] ================================================================== [ 14.538845] ================================================================== [ 14.539100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 14.539536] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.540318] [ 14.540583] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.540648] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.540662] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.540685] Call Trace: [ 14.540698] <TASK> [ 14.540713] dump_stack_lvl+0x73/0xb0 [ 14.540742] print_report+0xd1/0x650 [ 14.540765] ? __virt_addr_valid+0x1db/0x2d0 [ 14.540790] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.540812] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.540836] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.540860] kasan_report+0x141/0x180 [ 14.540885] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.540913] kasan_check_range+0x10c/0x1c0 [ 14.540938] __kasan_check_write+0x18/0x20 [ 14.540959] kasan_atomics_helper+0x15b6/0x5450 [ 14.540984] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.541008] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.541030] ? kasan_atomics+0x152/0x310 [ 14.541055] kasan_atomics+0x1dc/0x310 [ 14.541075] ? __pfx_kasan_atomics+0x10/0x10 [ 14.541097] ? __pfx_read_tsc+0x10/0x10 [ 14.541120] ? ktime_get_ts64+0x86/0x230 [ 14.541148] kunit_try_run_case+0x1a5/0x480 [ 14.541172] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.541204] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.541228] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.541252] ? __kthread_parkme+0x82/0x180 [ 14.541274] ? preempt_count_sub+0x50/0x80 [ 14.541299] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.541323] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.541347] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.541372] kthread+0x337/0x6f0 [ 14.541393] ? trace_preempt_on+0x20/0xc0 [ 14.541417] ? __pfx_kthread+0x10/0x10 [ 14.541439] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.541461] ? calculate_sigpending+0x7b/0xa0 [ 14.541486] ? __pfx_kthread+0x10/0x10 [ 14.541509] ret_from_fork+0x116/0x1d0 [ 14.541527] ? __pfx_kthread+0x10/0x10 [ 14.541549] ret_from_fork_asm+0x1a/0x30 [ 14.541581] </TASK> [ 14.541592] [ 14.552035] Allocated by task 282: [ 14.552365] kasan_save_stack+0x45/0x70 [ 14.552570] kasan_save_track+0x18/0x40 [ 14.552907] kasan_save_alloc_info+0x3b/0x50 [ 14.553186] __kasan_kmalloc+0xb7/0xc0 [ 14.553475] __kmalloc_cache_noprof+0x189/0x420 [ 14.553772] kasan_atomics+0x95/0x310 [ 14.553934] kunit_try_run_case+0x1a5/0x480 [ 14.554149] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.554580] kthread+0x337/0x6f0 [ 14.554894] ret_from_fork+0x116/0x1d0 [ 14.555238] ret_from_fork_asm+0x1a/0x30 [ 14.555443] [ 14.555531] The buggy address belongs to the object at ffff8881029e5b80 [ 14.555531] which belongs to the cache kmalloc-64 of size 64 [ 14.556028] The buggy address is located 0 bytes to the right of [ 14.556028] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.556897] [ 14.557127] The buggy address belongs to the physical page: [ 14.557398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.557830] flags: 0x200000000000000(node=0|zone=2) [ 14.558136] page_type: f5(slab) [ 14.558425] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.558882] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.559195] page dumped because: kasan: bad access detected [ 14.559521] [ 14.559606] Memory state around the buggy address: [ 14.559832] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.560130] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.560682] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.561077] ^ [ 14.561420] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.561740] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.562109] ================================================================== [ 14.784665] ================================================================== [ 14.784999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 14.785400] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.785746] [ 14.785859] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.785939] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.785953] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.785987] Call Trace: [ 14.786001] <TASK> [ 14.786015] dump_stack_lvl+0x73/0xb0 [ 14.786058] print_report+0xd1/0x650 [ 14.786082] ? __virt_addr_valid+0x1db/0x2d0 [ 14.786106] ? kasan_atomics_helper+0x1d7a/0x5450 [ 14.786130] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.786154] ? kasan_atomics_helper+0x1d7a/0x5450 [ 14.786215] kasan_report+0x141/0x180 [ 14.786239] ? kasan_atomics_helper+0x1d7a/0x5450 [ 14.786304] kasan_check_range+0x10c/0x1c0 [ 14.786330] __kasan_check_write+0x18/0x20 [ 14.786351] kasan_atomics_helper+0x1d7a/0x5450 [ 14.786385] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.786409] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.786431] ? kasan_atomics+0x152/0x310 [ 14.786456] kasan_atomics+0x1dc/0x310 [ 14.786480] ? __pfx_kasan_atomics+0x10/0x10 [ 14.786502] ? __pfx_read_tsc+0x10/0x10 [ 14.786524] ? ktime_get_ts64+0x86/0x230 [ 14.786576] kunit_try_run_case+0x1a5/0x480 [ 14.786602] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.786640] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.786663] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.786687] ? __kthread_parkme+0x82/0x180 [ 14.786708] ? preempt_count_sub+0x50/0x80 [ 14.786734] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.786759] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.786783] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.786806] kthread+0x337/0x6f0 [ 14.786827] ? trace_preempt_on+0x20/0xc0 [ 14.786852] ? __pfx_kthread+0x10/0x10 [ 14.786874] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.786895] ? calculate_sigpending+0x7b/0xa0 [ 14.786921] ? __pfx_kthread+0x10/0x10 [ 14.786943] ret_from_fork+0x116/0x1d0 [ 14.786962] ? __pfx_kthread+0x10/0x10 [ 14.786984] ret_from_fork_asm+0x1a/0x30 [ 14.787016] </TASK> [ 14.787028] [ 14.794912] Allocated by task 282: [ 14.795041] kasan_save_stack+0x45/0x70 [ 14.795213] kasan_save_track+0x18/0x40 [ 14.795390] kasan_save_alloc_info+0x3b/0x50 [ 14.795645] __kasan_kmalloc+0xb7/0xc0 [ 14.795852] __kmalloc_cache_noprof+0x189/0x420 [ 14.796075] kasan_atomics+0x95/0x310 [ 14.796328] kunit_try_run_case+0x1a5/0x480 [ 14.796636] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.796922] kthread+0x337/0x6f0 [ 14.797057] ret_from_fork+0x116/0x1d0 [ 14.797292] ret_from_fork_asm+0x1a/0x30 [ 14.797524] [ 14.797598] The buggy address belongs to the object at ffff8881029e5b80 [ 14.797598] which belongs to the cache kmalloc-64 of size 64 [ 14.797962] The buggy address is located 0 bytes to the right of [ 14.797962] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.798627] [ 14.798731] The buggy address belongs to the physical page: [ 14.799004] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.799465] flags: 0x200000000000000(node=0|zone=2) [ 14.799643] page_type: f5(slab) [ 14.799775] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.800187] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.800510] page dumped because: kasan: bad access detected [ 14.800731] [ 14.800828] Memory state around the buggy address: [ 14.801031] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.801339] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.801723] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.802024] ^ [ 14.802294] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.802520] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.802835] ================================================================== [ 13.965992] ================================================================== [ 13.966431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 13.967027] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 13.968015] [ 13.968274] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 13.968326] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.968339] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.968361] Call Trace: [ 13.968377] <TASK> [ 13.968394] dump_stack_lvl+0x73/0xb0 [ 13.968424] print_report+0xd1/0x650 [ 13.968447] ? __virt_addr_valid+0x1db/0x2d0 [ 13.968472] ? kasan_atomics_helper+0xac7/0x5450 [ 13.968495] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.968527] ? kasan_atomics_helper+0xac7/0x5450 [ 13.968551] kasan_report+0x141/0x180 [ 13.968574] ? kasan_atomics_helper+0xac7/0x5450 [ 13.968602] kasan_check_range+0x10c/0x1c0 [ 13.968638] __kasan_check_write+0x18/0x20 [ 13.968658] kasan_atomics_helper+0xac7/0x5450 [ 13.968682] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.968706] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.968728] ? kasan_atomics+0x152/0x310 [ 13.968875] kasan_atomics+0x1dc/0x310 [ 13.968898] ? __pfx_kasan_atomics+0x10/0x10 [ 13.968919] ? __pfx_read_tsc+0x10/0x10 [ 13.968941] ? ktime_get_ts64+0x86/0x230 [ 13.968967] kunit_try_run_case+0x1a5/0x480 [ 13.968992] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.969015] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.969039] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.969062] ? __kthread_parkme+0x82/0x180 [ 13.969084] ? preempt_count_sub+0x50/0x80 [ 13.969110] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.969135] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.969159] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.969201] kthread+0x337/0x6f0 [ 13.969222] ? trace_preempt_on+0x20/0xc0 [ 13.969247] ? __pfx_kthread+0x10/0x10 [ 13.969269] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.969291] ? calculate_sigpending+0x7b/0xa0 [ 13.969316] ? __pfx_kthread+0x10/0x10 [ 13.969339] ret_from_fork+0x116/0x1d0 [ 13.969358] ? __pfx_kthread+0x10/0x10 [ 13.969380] ret_from_fork_asm+0x1a/0x30 [ 13.969413] </TASK> [ 13.969424] [ 13.978955] Allocated by task 282: [ 13.979337] kasan_save_stack+0x45/0x70 [ 13.980248] kasan_save_track+0x18/0x40 [ 13.980425] kasan_save_alloc_info+0x3b/0x50 [ 13.980788] __kasan_kmalloc+0xb7/0xc0 [ 13.980926] __kmalloc_cache_noprof+0x189/0x420 [ 13.981708] kasan_atomics+0x95/0x310 [ 13.981870] kunit_try_run_case+0x1a5/0x480 [ 13.982279] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.982666] kthread+0x337/0x6f0 [ 13.982855] ret_from_fork+0x116/0x1d0 [ 13.983036] ret_from_fork_asm+0x1a/0x30 [ 13.983400] [ 13.983698] The buggy address belongs to the object at ffff8881029e5b80 [ 13.983698] which belongs to the cache kmalloc-64 of size 64 [ 13.984361] The buggy address is located 0 bytes to the right of [ 13.984361] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 13.985123] [ 13.985242] The buggy address belongs to the physical page: [ 13.985677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 13.986107] flags: 0x200000000000000(node=0|zone=2) [ 13.986475] page_type: f5(slab) [ 13.986713] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.987201] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.987652] page dumped because: kasan: bad access detected [ 13.987966] [ 13.988047] Memory state around the buggy address: [ 13.988424] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.988956] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.989354] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.989804] ^ [ 13.990118] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.990425] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.990995] ================================================================== [ 14.803484] ================================================================== [ 14.803863] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 14.804191] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.804528] [ 14.804690] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.804737] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.804751] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.804773] Call Trace: [ 14.804787] <TASK> [ 14.804803] dump_stack_lvl+0x73/0xb0 [ 14.804832] print_report+0xd1/0x650 [ 14.804855] ? __virt_addr_valid+0x1db/0x2d0 [ 14.804880] ? kasan_atomics_helper+0x1e12/0x5450 [ 14.804936] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.804960] ? kasan_atomics_helper+0x1e12/0x5450 [ 14.804983] kasan_report+0x141/0x180 [ 14.805018] ? kasan_atomics_helper+0x1e12/0x5450 [ 14.805046] kasan_check_range+0x10c/0x1c0 [ 14.805072] __kasan_check_write+0x18/0x20 [ 14.805092] kasan_atomics_helper+0x1e12/0x5450 [ 14.805116] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.805140] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.805181] ? kasan_atomics+0x152/0x310 [ 14.805206] kasan_atomics+0x1dc/0x310 [ 14.805226] ? __pfx_kasan_atomics+0x10/0x10 [ 14.805247] ? __pfx_read_tsc+0x10/0x10 [ 14.805269] ? ktime_get_ts64+0x86/0x230 [ 14.805295] kunit_try_run_case+0x1a5/0x480 [ 14.805320] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.805375] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.805399] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.805432] ? __kthread_parkme+0x82/0x180 [ 14.805453] ? preempt_count_sub+0x50/0x80 [ 14.805508] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.805535] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.805571] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.805595] kthread+0x337/0x6f0 [ 14.805626] ? trace_preempt_on+0x20/0xc0 [ 14.805651] ? __pfx_kthread+0x10/0x10 [ 14.805674] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.805696] ? calculate_sigpending+0x7b/0xa0 [ 14.805721] ? __pfx_kthread+0x10/0x10 [ 14.805745] ret_from_fork+0x116/0x1d0 [ 14.805764] ? __pfx_kthread+0x10/0x10 [ 14.805787] ret_from_fork_asm+0x1a/0x30 [ 14.805819] </TASK> [ 14.805831] [ 14.814012] Allocated by task 282: [ 14.814142] kasan_save_stack+0x45/0x70 [ 14.814398] kasan_save_track+0x18/0x40 [ 14.814634] kasan_save_alloc_info+0x3b/0x50 [ 14.814909] __kasan_kmalloc+0xb7/0xc0 [ 14.815192] __kmalloc_cache_noprof+0x189/0x420 [ 14.815408] kasan_atomics+0x95/0x310 [ 14.815568] kunit_try_run_case+0x1a5/0x480 [ 14.815760] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.815987] kthread+0x337/0x6f0 [ 14.816113] ret_from_fork+0x116/0x1d0 [ 14.816303] ret_from_fork_asm+0x1a/0x30 [ 14.816507] [ 14.816647] The buggy address belongs to the object at ffff8881029e5b80 [ 14.816647] which belongs to the cache kmalloc-64 of size 64 [ 14.817081] The buggy address is located 0 bytes to the right of [ 14.817081] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.817643] [ 14.817754] The buggy address belongs to the physical page: [ 14.818095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.818471] flags: 0x200000000000000(node=0|zone=2) [ 14.818698] page_type: f5(slab) [ 14.818905] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.819302] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.819638] page dumped because: kasan: bad access detected [ 14.819865] [ 14.819974] Memory state around the buggy address: [ 14.820179] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.820496] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.820865] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.821148] ^ [ 14.821386] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.821762] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.822062] ================================================================== [ 14.415907] ================================================================== [ 14.416372] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 14.417020] Read of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.417564] [ 14.417707] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.417760] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.417773] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.417795] Call Trace: [ 14.417810] <TASK> [ 14.417828] dump_stack_lvl+0x73/0xb0 [ 14.417856] print_report+0xd1/0x650 [ 14.417880] ? __virt_addr_valid+0x1db/0x2d0 [ 14.417904] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.417927] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.417951] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.417974] kasan_report+0x141/0x180 [ 14.417999] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.418028] kasan_check_range+0x10c/0x1c0 [ 14.418053] __kasan_check_read+0x15/0x20 [ 14.418074] kasan_atomics_helper+0x13b5/0x5450 [ 14.418098] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.418122] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.418144] ? kasan_atomics+0x152/0x310 [ 14.418168] kasan_atomics+0x1dc/0x310 [ 14.418217] ? __pfx_kasan_atomics+0x10/0x10 [ 14.418241] ? __pfx_read_tsc+0x10/0x10 [ 14.418263] ? ktime_get_ts64+0x86/0x230 [ 14.418290] kunit_try_run_case+0x1a5/0x480 [ 14.418315] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.418338] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.418362] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.418386] ? __kthread_parkme+0x82/0x180 [ 14.418408] ? preempt_count_sub+0x50/0x80 [ 14.418434] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.418459] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.418489] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.418513] kthread+0x337/0x6f0 [ 14.418559] ? trace_preempt_on+0x20/0xc0 [ 14.418583] ? __pfx_kthread+0x10/0x10 [ 14.418606] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.418641] ? calculate_sigpending+0x7b/0xa0 [ 14.418668] ? __pfx_kthread+0x10/0x10 [ 14.418691] ret_from_fork+0x116/0x1d0 [ 14.418710] ? __pfx_kthread+0x10/0x10 [ 14.418732] ret_from_fork_asm+0x1a/0x30 [ 14.418765] </TASK> [ 14.418776] [ 14.429953] Allocated by task 282: [ 14.430118] kasan_save_stack+0x45/0x70 [ 14.430531] kasan_save_track+0x18/0x40 [ 14.430862] kasan_save_alloc_info+0x3b/0x50 [ 14.431379] __kasan_kmalloc+0xb7/0xc0 [ 14.431544] __kmalloc_cache_noprof+0x189/0x420 [ 14.432023] kasan_atomics+0x95/0x310 [ 14.432326] kunit_try_run_case+0x1a5/0x480 [ 14.432490] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.433019] kthread+0x337/0x6f0 [ 14.433166] ret_from_fork+0x116/0x1d0 [ 14.433576] ret_from_fork_asm+0x1a/0x30 [ 14.433776] [ 14.433879] The buggy address belongs to the object at ffff8881029e5b80 [ 14.433879] which belongs to the cache kmalloc-64 of size 64 [ 14.434780] The buggy address is located 0 bytes to the right of [ 14.434780] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.435282] [ 14.435836] The buggy address belongs to the physical page: [ 14.436083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.436635] flags: 0x200000000000000(node=0|zone=2) [ 14.436827] page_type: f5(slab) [ 14.437133] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.437699] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.438110] page dumped because: kasan: bad access detected [ 14.438428] [ 14.438513] Memory state around the buggy address: [ 14.438982] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.439459] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.440080] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.440471] ^ [ 14.440892] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.441164] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.441693] ================================================================== [ 14.842659] ================================================================== [ 14.842947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 14.843362] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.843745] [ 14.843837] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.843915] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.843930] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.843964] Call Trace: [ 14.843980] <TASK> [ 14.843996] dump_stack_lvl+0x73/0xb0 [ 14.844024] print_report+0xd1/0x650 [ 14.844047] ? __virt_addr_valid+0x1db/0x2d0 [ 14.844072] ? kasan_atomics_helper+0x1f43/0x5450 [ 14.844095] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.844119] ? kasan_atomics_helper+0x1f43/0x5450 [ 14.844143] kasan_report+0x141/0x180 [ 14.844204] ? kasan_atomics_helper+0x1f43/0x5450 [ 14.844233] kasan_check_range+0x10c/0x1c0 [ 14.844280] __kasan_check_write+0x18/0x20 [ 14.844302] kasan_atomics_helper+0x1f43/0x5450 [ 14.844327] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.844351] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.844374] ? kasan_atomics+0x152/0x310 [ 14.844399] kasan_atomics+0x1dc/0x310 [ 14.844420] ? __pfx_kasan_atomics+0x10/0x10 [ 14.844442] ? __pfx_read_tsc+0x10/0x10 [ 14.844463] ? ktime_get_ts64+0x86/0x230 [ 14.844520] kunit_try_run_case+0x1a5/0x480 [ 14.844545] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.844568] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.844601] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.844633] ? __kthread_parkme+0x82/0x180 [ 14.844683] ? preempt_count_sub+0x50/0x80 [ 14.844709] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.844733] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.844768] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.844792] kthread+0x337/0x6f0 [ 14.844813] ? trace_preempt_on+0x20/0xc0 [ 14.844837] ? __pfx_kthread+0x10/0x10 [ 14.844859] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.844880] ? calculate_sigpending+0x7b/0xa0 [ 14.844905] ? __pfx_kthread+0x10/0x10 [ 14.844927] ret_from_fork+0x116/0x1d0 [ 14.844947] ? __pfx_kthread+0x10/0x10 [ 14.844968] ret_from_fork_asm+0x1a/0x30 [ 14.845001] </TASK> [ 14.845012] [ 14.852706] Allocated by task 282: [ 14.852933] kasan_save_stack+0x45/0x70 [ 14.853136] kasan_save_track+0x18/0x40 [ 14.853404] kasan_save_alloc_info+0x3b/0x50 [ 14.853671] __kasan_kmalloc+0xb7/0xc0 [ 14.853863] __kmalloc_cache_noprof+0x189/0x420 [ 14.854067] kasan_atomics+0x95/0x310 [ 14.854226] kunit_try_run_case+0x1a5/0x480 [ 14.854435] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.854761] kthread+0x337/0x6f0 [ 14.854937] ret_from_fork+0x116/0x1d0 [ 14.855129] ret_from_fork_asm+0x1a/0x30 [ 14.855359] [ 14.855434] The buggy address belongs to the object at ffff8881029e5b80 [ 14.855434] which belongs to the cache kmalloc-64 of size 64 [ 14.856048] The buggy address is located 0 bytes to the right of [ 14.856048] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.856672] [ 14.856813] The buggy address belongs to the physical page: [ 14.857083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.857442] flags: 0x200000000000000(node=0|zone=2) [ 14.857689] page_type: f5(slab) [ 14.857903] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.858292] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.858624] page dumped because: kasan: bad access detected [ 14.858926] [ 14.859002] Memory state around the buggy address: [ 14.859309] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.859556] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.859891] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.860202] ^ [ 14.860416] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.860782] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.861074] ================================================================== [ 14.055947] ================================================================== [ 14.056413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 14.056914] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.057201] [ 14.057320] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.057368] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.057382] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.057404] Call Trace: [ 14.057419] <TASK> [ 14.057435] dump_stack_lvl+0x73/0xb0 [ 14.057463] print_report+0xd1/0x650 [ 14.057487] ? __virt_addr_valid+0x1db/0x2d0 [ 14.057511] ? kasan_atomics_helper+0xd47/0x5450 [ 14.057576] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.057604] ? kasan_atomics_helper+0xd47/0x5450 [ 14.057640] kasan_report+0x141/0x180 [ 14.057664] ? kasan_atomics_helper+0xd47/0x5450 [ 14.057692] kasan_check_range+0x10c/0x1c0 [ 14.057718] __kasan_check_write+0x18/0x20 [ 14.057740] kasan_atomics_helper+0xd47/0x5450 [ 14.057763] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.057787] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.057809] ? kasan_atomics+0x152/0x310 [ 14.057833] kasan_atomics+0x1dc/0x310 [ 14.057854] ? __pfx_kasan_atomics+0x10/0x10 [ 14.057875] ? __pfx_read_tsc+0x10/0x10 [ 14.057897] ? ktime_get_ts64+0x86/0x230 [ 14.057922] kunit_try_run_case+0x1a5/0x480 [ 14.057947] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.057970] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.057994] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.058017] ? __kthread_parkme+0x82/0x180 [ 14.058038] ? preempt_count_sub+0x50/0x80 [ 14.058063] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.058088] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.058112] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.058136] kthread+0x337/0x6f0 [ 14.058158] ? trace_preempt_on+0x20/0xc0 [ 14.058189] ? __pfx_kthread+0x10/0x10 [ 14.058212] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.058234] ? calculate_sigpending+0x7b/0xa0 [ 14.058258] ? __pfx_kthread+0x10/0x10 [ 14.058281] ret_from_fork+0x116/0x1d0 [ 14.058300] ? __pfx_kthread+0x10/0x10 [ 14.058323] ret_from_fork_asm+0x1a/0x30 [ 14.058355] </TASK> [ 14.058366] [ 14.066536] Allocated by task 282: [ 14.066733] kasan_save_stack+0x45/0x70 [ 14.067190] kasan_save_track+0x18/0x40 [ 14.067582] kasan_save_alloc_info+0x3b/0x50 [ 14.067793] __kasan_kmalloc+0xb7/0xc0 [ 14.067976] __kmalloc_cache_noprof+0x189/0x420 [ 14.068156] kasan_atomics+0x95/0x310 [ 14.068350] kunit_try_run_case+0x1a5/0x480 [ 14.068569] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.068778] kthread+0x337/0x6f0 [ 14.068953] ret_from_fork+0x116/0x1d0 [ 14.069130] ret_from_fork_asm+0x1a/0x30 [ 14.069395] [ 14.069473] The buggy address belongs to the object at ffff8881029e5b80 [ 14.069473] which belongs to the cache kmalloc-64 of size 64 [ 14.070052] The buggy address is located 0 bytes to the right of [ 14.070052] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.070592] [ 14.070696] The buggy address belongs to the physical page: [ 14.070910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.071269] flags: 0x200000000000000(node=0|zone=2) [ 14.071482] page_type: f5(slab) [ 14.071817] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.072111] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.072499] page dumped because: kasan: bad access detected [ 14.072809] [ 14.072898] Memory state around the buggy address: [ 14.073056] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.073274] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.073490] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.073862] ^ [ 14.074091] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.074710] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.074998] ================================================================== [ 14.075418] ================================================================== [ 14.075827] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 14.076136] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.076479] [ 14.076572] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.076635] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.076648] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.076671] Call Trace: [ 14.076686] <TASK> [ 14.076702] dump_stack_lvl+0x73/0xb0 [ 14.076729] print_report+0xd1/0x650 [ 14.076754] ? __virt_addr_valid+0x1db/0x2d0 [ 14.076779] ? kasan_atomics_helper+0xde0/0x5450 [ 14.076802] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.076827] ? kasan_atomics_helper+0xde0/0x5450 [ 14.076853] kasan_report+0x141/0x180 [ 14.076877] ? kasan_atomics_helper+0xde0/0x5450 [ 14.076905] kasan_check_range+0x10c/0x1c0 [ 14.076931] __kasan_check_write+0x18/0x20 [ 14.076953] kasan_atomics_helper+0xde0/0x5450 [ 14.076978] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.077002] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.077025] ? kasan_atomics+0x152/0x310 [ 14.077049] kasan_atomics+0x1dc/0x310 [ 14.077070] ? __pfx_kasan_atomics+0x10/0x10 [ 14.077093] ? __pfx_read_tsc+0x10/0x10 [ 14.077115] ? ktime_get_ts64+0x86/0x230 [ 14.077141] kunit_try_run_case+0x1a5/0x480 [ 14.077166] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.077189] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.077213] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.077236] ? __kthread_parkme+0x82/0x180 [ 14.077258] ? preempt_count_sub+0x50/0x80 [ 14.077283] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.077308] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.077332] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.077355] kthread+0x337/0x6f0 [ 14.077376] ? trace_preempt_on+0x20/0xc0 [ 14.077401] ? __pfx_kthread+0x10/0x10 [ 14.077422] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.077444] ? calculate_sigpending+0x7b/0xa0 [ 14.077469] ? __pfx_kthread+0x10/0x10 [ 14.077492] ret_from_fork+0x116/0x1d0 [ 14.077511] ? __pfx_kthread+0x10/0x10 [ 14.077533] ret_from_fork_asm+0x1a/0x30 [ 14.077565] </TASK> [ 14.077577] [ 14.086131] Allocated by task 282: [ 14.086329] kasan_save_stack+0x45/0x70 [ 14.086512] kasan_save_track+0x18/0x40 [ 14.086713] kasan_save_alloc_info+0x3b/0x50 [ 14.086902] __kasan_kmalloc+0xb7/0xc0 [ 14.087038] __kmalloc_cache_noprof+0x189/0x420 [ 14.087321] kasan_atomics+0x95/0x310 [ 14.087511] kunit_try_run_case+0x1a5/0x480 [ 14.087917] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.088121] kthread+0x337/0x6f0 [ 14.088353] ret_from_fork+0x116/0x1d0 [ 14.088630] ret_from_fork_asm+0x1a/0x30 [ 14.088777] [ 14.088851] The buggy address belongs to the object at ffff8881029e5b80 [ 14.088851] which belongs to the cache kmalloc-64 of size 64 [ 14.089212] The buggy address is located 0 bytes to the right of [ 14.089212] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.089775] [ 14.089875] The buggy address belongs to the physical page: [ 14.090162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.090673] flags: 0x200000000000000(node=0|zone=2) [ 14.090884] page_type: f5(slab) [ 14.091008] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.091239] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.091610] page dumped because: kasan: bad access detected [ 14.091872] [ 14.091945] Memory state around the buggy address: [ 14.092102] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.092431] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.092928] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.093236] ^ [ 14.093393] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.093610] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.093941] ================================================================== [ 14.323277] ================================================================== [ 14.323979] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 14.324450] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.325094] [ 14.325213] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.325262] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.325276] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.325297] Call Trace: [ 14.325312] <TASK> [ 14.325328] dump_stack_lvl+0x73/0xb0 [ 14.325356] print_report+0xd1/0x650 [ 14.325493] ? __virt_addr_valid+0x1db/0x2d0 [ 14.325520] ? kasan_atomics_helper+0x1217/0x5450 [ 14.325543] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.325569] ? kasan_atomics_helper+0x1217/0x5450 [ 14.325594] kasan_report+0x141/0x180 [ 14.325632] ? kasan_atomics_helper+0x1217/0x5450 [ 14.325661] kasan_check_range+0x10c/0x1c0 [ 14.325686] __kasan_check_write+0x18/0x20 [ 14.325707] kasan_atomics_helper+0x1217/0x5450 [ 14.325731] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.325756] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.325779] ? kasan_atomics+0x152/0x310 [ 14.325804] kasan_atomics+0x1dc/0x310 [ 14.325824] ? __pfx_kasan_atomics+0x10/0x10 [ 14.325846] ? __pfx_read_tsc+0x10/0x10 [ 14.325867] ? ktime_get_ts64+0x86/0x230 [ 14.325894] kunit_try_run_case+0x1a5/0x480 [ 14.325918] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.325940] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.325964] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.325988] ? __kthread_parkme+0x82/0x180 [ 14.326009] ? preempt_count_sub+0x50/0x80 [ 14.326034] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.326059] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.326083] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.326107] kthread+0x337/0x6f0 [ 14.326128] ? trace_preempt_on+0x20/0xc0 [ 14.326152] ? __pfx_kthread+0x10/0x10 [ 14.326174] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.326195] ? calculate_sigpending+0x7b/0xa0 [ 14.326220] ? __pfx_kthread+0x10/0x10 [ 14.326243] ret_from_fork+0x116/0x1d0 [ 14.326262] ? __pfx_kthread+0x10/0x10 [ 14.326284] ret_from_fork_asm+0x1a/0x30 [ 14.326316] </TASK> [ 14.326329] [ 14.338106] Allocated by task 282: [ 14.338437] kasan_save_stack+0x45/0x70 [ 14.338759] kasan_save_track+0x18/0x40 [ 14.338941] kasan_save_alloc_info+0x3b/0x50 [ 14.339152] __kasan_kmalloc+0xb7/0xc0 [ 14.339471] __kmalloc_cache_noprof+0x189/0x420 [ 14.339899] kasan_atomics+0x95/0x310 [ 14.340251] kunit_try_run_case+0x1a5/0x480 [ 14.340569] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.340937] kthread+0x337/0x6f0 [ 14.341103] ret_from_fork+0x116/0x1d0 [ 14.341518] ret_from_fork_asm+0x1a/0x30 [ 14.341799] [ 14.341886] The buggy address belongs to the object at ffff8881029e5b80 [ 14.341886] which belongs to the cache kmalloc-64 of size 64 [ 14.342629] The buggy address is located 0 bytes to the right of [ 14.342629] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.343387] [ 14.343480] The buggy address belongs to the physical page: [ 14.343738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.344435] flags: 0x200000000000000(node=0|zone=2) [ 14.344897] page_type: f5(slab) [ 14.345146] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.345552] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.346197] page dumped because: kasan: bad access detected [ 14.346635] [ 14.346715] Memory state around the buggy address: [ 14.347040] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.347501] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.348073] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.348473] ^ [ 14.348925] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.349412] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.350034] ================================================================== [ 14.152734] ================================================================== [ 14.153291] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 14.153533] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.154209] [ 14.154394] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.154456] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.154475] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.154499] Call Trace: [ 14.154516] <TASK> [ 14.154576] dump_stack_lvl+0x73/0xb0 [ 14.154606] print_report+0xd1/0x650 [ 14.154641] ? __virt_addr_valid+0x1db/0x2d0 [ 14.154666] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.154689] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.154713] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.154736] kasan_report+0x141/0x180 [ 14.154760] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.154788] kasan_check_range+0x10c/0x1c0 [ 14.154813] __kasan_check_write+0x18/0x20 [ 14.154834] kasan_atomics_helper+0xfa9/0x5450 [ 14.154859] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.154882] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.154905] ? kasan_atomics+0x152/0x310 [ 14.154929] kasan_atomics+0x1dc/0x310 [ 14.154949] ? __pfx_kasan_atomics+0x10/0x10 [ 14.154971] ? __pfx_read_tsc+0x10/0x10 [ 14.154994] ? ktime_get_ts64+0x86/0x230 [ 14.155020] kunit_try_run_case+0x1a5/0x480 [ 14.155044] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.155067] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.155092] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.155116] ? __kthread_parkme+0x82/0x180 [ 14.155138] ? preempt_count_sub+0x50/0x80 [ 14.155164] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.155199] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.155222] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.155247] kthread+0x337/0x6f0 [ 14.155267] ? trace_preempt_on+0x20/0xc0 [ 14.155293] ? __pfx_kthread+0x10/0x10 [ 14.155315] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.155336] ? calculate_sigpending+0x7b/0xa0 [ 14.155361] ? __pfx_kthread+0x10/0x10 [ 14.155385] ret_from_fork+0x116/0x1d0 [ 14.155404] ? __pfx_kthread+0x10/0x10 [ 14.155426] ret_from_fork_asm+0x1a/0x30 [ 14.155460] </TASK> [ 14.155473] [ 14.169856] Allocated by task 282: [ 14.170202] kasan_save_stack+0x45/0x70 [ 14.170675] kasan_save_track+0x18/0x40 [ 14.171030] kasan_save_alloc_info+0x3b/0x50 [ 14.171454] __kasan_kmalloc+0xb7/0xc0 [ 14.171795] __kmalloc_cache_noprof+0x189/0x420 [ 14.172268] kasan_atomics+0x95/0x310 [ 14.172666] kunit_try_run_case+0x1a5/0x480 [ 14.172854] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.173030] kthread+0x337/0x6f0 [ 14.173154] ret_from_fork+0x116/0x1d0 [ 14.173496] ret_from_fork_asm+0x1a/0x30 [ 14.173895] [ 14.174100] The buggy address belongs to the object at ffff8881029e5b80 [ 14.174100] which belongs to the cache kmalloc-64 of size 64 [ 14.175405] The buggy address is located 0 bytes to the right of [ 14.175405] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.176543] [ 14.176767] The buggy address belongs to the physical page: [ 14.176946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.177195] flags: 0x200000000000000(node=0|zone=2) [ 14.177621] page_type: f5(slab) [ 14.177987] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.178892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.179634] page dumped because: kasan: bad access detected [ 14.180459] [ 14.180698] Memory state around the buggy address: [ 14.180919] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.181140] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.181470] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.182241] ^ [ 14.182779] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.183500] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.184197] ================================================================== [ 14.390335] ================================================================== [ 14.390586] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 14.391057] Read of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.391444] [ 14.391741] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.391875] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.391893] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.391915] Call Trace: [ 14.391932] <TASK> [ 14.391948] dump_stack_lvl+0x73/0xb0 [ 14.391978] print_report+0xd1/0x650 [ 14.392002] ? __virt_addr_valid+0x1db/0x2d0 [ 14.392026] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.392048] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.392072] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.392195] kasan_report+0x141/0x180 [ 14.392397] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.392497] __asan_report_load4_noabort+0x18/0x20 [ 14.392521] kasan_atomics_helper+0x49ce/0x5450 [ 14.392546] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.392570] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.392676] ? kasan_atomics+0x152/0x310 [ 14.392702] kasan_atomics+0x1dc/0x310 [ 14.392723] ? __pfx_kasan_atomics+0x10/0x10 [ 14.392745] ? __pfx_read_tsc+0x10/0x10 [ 14.392766] ? ktime_get_ts64+0x86/0x230 [ 14.392793] kunit_try_run_case+0x1a5/0x480 [ 14.392818] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.392841] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.392865] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.392888] ? __kthread_parkme+0x82/0x180 [ 14.392910] ? preempt_count_sub+0x50/0x80 [ 14.392935] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.392959] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.392983] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.393007] kthread+0x337/0x6f0 [ 14.393028] ? trace_preempt_on+0x20/0xc0 [ 14.393053] ? __pfx_kthread+0x10/0x10 [ 14.393075] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.393096] ? calculate_sigpending+0x7b/0xa0 [ 14.393120] ? __pfx_kthread+0x10/0x10 [ 14.393143] ret_from_fork+0x116/0x1d0 [ 14.393162] ? __pfx_kthread+0x10/0x10 [ 14.393197] ret_from_fork_asm+0x1a/0x30 [ 14.393229] </TASK> [ 14.393241] [ 14.404115] Allocated by task 282: [ 14.404492] kasan_save_stack+0x45/0x70 [ 14.404801] kasan_save_track+0x18/0x40 [ 14.404969] kasan_save_alloc_info+0x3b/0x50 [ 14.405174] __kasan_kmalloc+0xb7/0xc0 [ 14.405872] __kmalloc_cache_noprof+0x189/0x420 [ 14.406221] kasan_atomics+0x95/0x310 [ 14.406580] kunit_try_run_case+0x1a5/0x480 [ 14.406797] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.407117] kthread+0x337/0x6f0 [ 14.407405] ret_from_fork+0x116/0x1d0 [ 14.407664] ret_from_fork_asm+0x1a/0x30 [ 14.407819] [ 14.408021] The buggy address belongs to the object at ffff8881029e5b80 [ 14.408021] which belongs to the cache kmalloc-64 of size 64 [ 14.408773] The buggy address is located 0 bytes to the right of [ 14.408773] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.409345] [ 14.409746] The buggy address belongs to the physical page: [ 14.410078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.410586] flags: 0x200000000000000(node=0|zone=2) [ 14.410869] page_type: f5(slab) [ 14.411047] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.411497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.412015] page dumped because: kasan: bad access detected [ 14.412237] [ 14.412479] Memory state around the buggy address: [ 14.412836] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.413433] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.413836] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.414264] ^ [ 14.414522] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.414829] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.415131] ================================================================== [ 14.185239] ================================================================== [ 14.185847] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 14.186090] Read of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 14.186602] [ 14.186846] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 14.186897] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.186911] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.186934] Call Trace: [ 14.186950] <TASK> [ 14.186968] dump_stack_lvl+0x73/0xb0 [ 14.186996] print_report+0xd1/0x650 [ 14.187019] ? __virt_addr_valid+0x1db/0x2d0 [ 14.187043] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.187066] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.187090] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.187115] kasan_report+0x141/0x180 [ 14.187139] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.187167] __asan_report_load4_noabort+0x18/0x20 [ 14.187199] kasan_atomics_helper+0x4a36/0x5450 [ 14.187224] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.187250] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.187274] ? kasan_atomics+0x152/0x310 [ 14.187298] kasan_atomics+0x1dc/0x310 [ 14.187318] ? __pfx_kasan_atomics+0x10/0x10 [ 14.187340] ? __pfx_read_tsc+0x10/0x10 [ 14.187362] ? ktime_get_ts64+0x86/0x230 [ 14.187389] kunit_try_run_case+0x1a5/0x480 [ 14.187413] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.187436] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.187461] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.187485] ? __kthread_parkme+0x82/0x180 [ 14.187507] ? preempt_count_sub+0x50/0x80 [ 14.187533] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.187557] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.187595] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.187631] kthread+0x337/0x6f0 [ 14.187652] ? trace_preempt_on+0x20/0xc0 [ 14.187677] ? __pfx_kthread+0x10/0x10 [ 14.187699] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.187722] ? calculate_sigpending+0x7b/0xa0 [ 14.187746] ? __pfx_kthread+0x10/0x10 [ 14.187770] ret_from_fork+0x116/0x1d0 [ 14.187789] ? __pfx_kthread+0x10/0x10 [ 14.187811] ret_from_fork_asm+0x1a/0x30 [ 14.187844] </TASK> [ 14.187855] [ 14.202204] Allocated by task 282: [ 14.202577] kasan_save_stack+0x45/0x70 [ 14.202922] kasan_save_track+0x18/0x40 [ 14.203063] kasan_save_alloc_info+0x3b/0x50 [ 14.203227] __kasan_kmalloc+0xb7/0xc0 [ 14.203575] __kmalloc_cache_noprof+0x189/0x420 [ 14.204042] kasan_atomics+0x95/0x310 [ 14.204496] kunit_try_run_case+0x1a5/0x480 [ 14.205159] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.205731] kthread+0x337/0x6f0 [ 14.205942] ret_from_fork+0x116/0x1d0 [ 14.206397] ret_from_fork_asm+0x1a/0x30 [ 14.206679] [ 14.206849] The buggy address belongs to the object at ffff8881029e5b80 [ 14.206849] which belongs to the cache kmalloc-64 of size 64 [ 14.207571] The buggy address is located 0 bytes to the right of [ 14.207571] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.207950] [ 14.208024] The buggy address belongs to the physical page: [ 14.208219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.208935] flags: 0x200000000000000(node=0|zone=2) [ 14.209453] page_type: f5(slab) [ 14.209812] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.210576] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.211365] page dumped because: kasan: bad access detected [ 14.211917] [ 14.212093] Memory state around the buggy address: [ 14.212594] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.213263] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.213747] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.213963] ^ [ 14.214119] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.214664] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.215174] ================================================================== [ 13.991745] ================================================================== [ 13.992456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 13.992958] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282 [ 13.993378] [ 13.993492] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 13.993813] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.993829] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.993853] Call Trace: [ 13.993869] <TASK> [ 13.993885] dump_stack_lvl+0x73/0xb0 [ 13.993915] print_report+0xd1/0x650 [ 13.993938] ? __virt_addr_valid+0x1db/0x2d0 [ 13.993963] ? kasan_atomics_helper+0xb6a/0x5450 [ 13.993986] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.994010] ? kasan_atomics_helper+0xb6a/0x5450 [ 13.994033] kasan_report+0x141/0x180 [ 13.994057] ? kasan_atomics_helper+0xb6a/0x5450 [ 13.994085] kasan_check_range+0x10c/0x1c0 [ 13.994109] __kasan_check_write+0x18/0x20 [ 13.994130] kasan_atomics_helper+0xb6a/0x5450 [ 13.994154] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.994202] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.994225] ? kasan_atomics+0x152/0x310 [ 13.994249] kasan_atomics+0x1dc/0x310 [ 13.994269] ? __pfx_kasan_atomics+0x10/0x10 [ 13.994291] ? __pfx_read_tsc+0x10/0x10 [ 13.994314] ? ktime_get_ts64+0x86/0x230 [ 13.994340] kunit_try_run_case+0x1a5/0x480 [ 13.994365] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.994388] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.994411] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.994434] ? __kthread_parkme+0x82/0x180 [ 13.994455] ? preempt_count_sub+0x50/0x80 [ 13.994487] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.994530] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.994555] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.994579] kthread+0x337/0x6f0 [ 13.994600] ? trace_preempt_on+0x20/0xc0 [ 13.994634] ? __pfx_kthread+0x10/0x10 [ 13.994656] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.994678] ? calculate_sigpending+0x7b/0xa0 [ 13.994702] ? __pfx_kthread+0x10/0x10 [ 13.994726] ret_from_fork+0x116/0x1d0 [ 13.994745] ? __pfx_kthread+0x10/0x10 [ 13.994768] ret_from_fork_asm+0x1a/0x30 [ 13.994801] </TASK> [ 13.994812] [ 14.005329] Allocated by task 282: [ 14.005510] kasan_save_stack+0x45/0x70 [ 14.006325] kasan_save_track+0x18/0x40 [ 14.006486] kasan_save_alloc_info+0x3b/0x50 [ 14.006899] __kasan_kmalloc+0xb7/0xc0 [ 14.007266] __kmalloc_cache_noprof+0x189/0x420 [ 14.007489] kasan_atomics+0x95/0x310 [ 14.007825] kunit_try_run_case+0x1a5/0x480 [ 14.008245] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.008486] kthread+0x337/0x6f0 [ 14.008792] ret_from_fork+0x116/0x1d0 [ 14.009126] ret_from_fork_asm+0x1a/0x30 [ 14.009317] [ 14.009572] The buggy address belongs to the object at ffff8881029e5b80 [ 14.009572] which belongs to the cache kmalloc-64 of size 64 [ 14.010047] The buggy address is located 0 bytes to the right of [ 14.010047] allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0) [ 14.010915] [ 14.011209] The buggy address belongs to the physical page: [ 14.011569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5 [ 14.011929] flags: 0x200000000000000(node=0|zone=2) [ 14.012239] page_type: f5(slab) [ 14.012501] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.012961] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.013427] page dumped because: kasan: bad access detected [ 14.013806] [ 14.013939] Memory state around the buggy address: [ 14.014311] ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.014697] ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.014998] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.015481] ^ [ 14.015779] ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.016086] ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.016325] ==================================================================