Date
May 15, 2025, 10:38 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 20.641031] ================================================================== [ 20.641272] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 20.641428] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.641514] [ 20.641566] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.641669] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.641772] Hardware name: linux,dummy-virt (DT) [ 20.641847] Call trace: [ 20.641872] show_stack+0x20/0x38 (C) [ 20.641923] dump_stack_lvl+0x8c/0xd0 [ 20.641973] print_report+0x118/0x608 [ 20.642129] kasan_report+0xdc/0x128 [ 20.642198] kasan_check_range+0x100/0x1a8 [ 20.642284] __kasan_check_write+0x20/0x30 [ 20.642373] kasan_atomics_helper+0x1414/0x4858 [ 20.642490] kasan_atomics+0x198/0x2e0 [ 20.642590] kunit_try_run_case+0x170/0x3f0 [ 20.642950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.643018] kthread+0x328/0x630 [ 20.643064] ret_from_fork+0x10/0x20 [ 20.643409] [ 20.643522] Allocated by task 265: [ 20.643822] kasan_save_stack+0x3c/0x68 [ 20.643925] kasan_save_track+0x20/0x40 [ 20.644057] kasan_save_alloc_info+0x40/0x58 [ 20.644136] __kasan_kmalloc+0xd4/0xd8 [ 20.644200] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.644241] kasan_atomics+0xb8/0x2e0 [ 20.644474] kunit_try_run_case+0x170/0x3f0 [ 20.644602] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.644703] kthread+0x328/0x630 [ 20.644893] ret_from_fork+0x10/0x20 [ 20.645067] [ 20.645139] The buggy address belongs to the object at fff00000c7832f80 [ 20.645139] which belongs to the cache kmalloc-64 of size 64 [ 20.645309] The buggy address is located 0 bytes to the right of [ 20.645309] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.645404] [ 20.645426] The buggy address belongs to the physical page: [ 20.645679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.645821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.645957] page_type: f5(slab) [ 20.646103] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.646312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.646367] page dumped because: kasan: bad access detected [ 20.646465] [ 20.646544] Memory state around the buggy address: [ 20.646579] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.646647] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.646691] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.646734] ^ [ 20.646768] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.646813] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.646852] ================================================================== [ 20.610772] ================================================================== [ 20.610852] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 20.610926] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.610994] [ 20.611042] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.611149] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.611439] Hardware name: linux,dummy-virt (DT) [ 20.611472] Call trace: [ 20.611503] show_stack+0x20/0x38 (C) [ 20.611572] dump_stack_lvl+0x8c/0xd0 [ 20.611627] print_report+0x118/0x608 [ 20.611704] kasan_report+0xdc/0x128 [ 20.611786] kasan_check_range+0x100/0x1a8 [ 20.611867] __kasan_check_write+0x20/0x30 [ 20.611921] kasan_atomics_helper+0x1128/0x4858 [ 20.612013] kasan_atomics+0x198/0x2e0 [ 20.612103] kunit_try_run_case+0x170/0x3f0 [ 20.612180] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.612281] kthread+0x328/0x630 [ 20.612330] ret_from_fork+0x10/0x20 [ 20.612379] [ 20.612401] Allocated by task 265: [ 20.612686] kasan_save_stack+0x3c/0x68 [ 20.612730] kasan_save_track+0x20/0x40 [ 20.612787] kasan_save_alloc_info+0x40/0x58 [ 20.612849] __kasan_kmalloc+0xd4/0xd8 [ 20.612896] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.612939] kasan_atomics+0xb8/0x2e0 [ 20.612975] kunit_try_run_case+0x170/0x3f0 [ 20.613020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.613075] kthread+0x328/0x630 [ 20.613112] ret_from_fork+0x10/0x20 [ 20.613151] [ 20.613180] The buggy address belongs to the object at fff00000c7832f80 [ 20.613180] which belongs to the cache kmalloc-64 of size 64 [ 20.613239] The buggy address is located 0 bytes to the right of [ 20.613239] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.613314] [ 20.613337] The buggy address belongs to the physical page: [ 20.613369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.613436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.613492] page_type: f5(slab) [ 20.613530] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.613581] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.613621] page dumped because: kasan: bad access detected [ 20.613656] [ 20.613676] Memory state around the buggy address: [ 20.613714] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.613788] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.613832] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.613872] ^ [ 20.613905] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.613948] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.613990] ================================================================== [ 20.614185] ================================================================== [ 20.614232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 20.614280] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.614331] [ 20.614361] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.614464] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.614592] Hardware name: linux,dummy-virt (DT) [ 20.614628] Call trace: [ 20.614668] show_stack+0x20/0x38 (C) [ 20.614975] dump_stack_lvl+0x8c/0xd0 [ 20.615070] print_report+0x118/0x608 [ 20.615147] kasan_report+0xdc/0x128 [ 20.615279] kasan_check_range+0x100/0x1a8 [ 20.615347] __kasan_check_write+0x20/0x30 [ 20.615403] kasan_atomics_helper+0x1190/0x4858 [ 20.615517] kasan_atomics+0x198/0x2e0 [ 20.615594] kunit_try_run_case+0x170/0x3f0 [ 20.615659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.615720] kthread+0x328/0x630 [ 20.615808] ret_from_fork+0x10/0x20 [ 20.615885] [ 20.615925] Allocated by task 265: [ 20.615981] kasan_save_stack+0x3c/0x68 [ 20.616099] kasan_save_track+0x20/0x40 [ 20.616138] kasan_save_alloc_info+0x40/0x58 [ 20.616189] __kasan_kmalloc+0xd4/0xd8 [ 20.616227] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.616268] kasan_atomics+0xb8/0x2e0 [ 20.616306] kunit_try_run_case+0x170/0x3f0 [ 20.616345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.616641] kthread+0x328/0x630 [ 20.616687] ret_from_fork+0x10/0x20 [ 20.616775] [ 20.616858] The buggy address belongs to the object at fff00000c7832f80 [ 20.616858] which belongs to the cache kmalloc-64 of size 64 [ 20.616924] The buggy address is located 0 bytes to the right of [ 20.616924] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.617015] [ 20.617039] The buggy address belongs to the physical page: [ 20.617334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.617429] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.617495] page_type: f5(slab) [ 20.617534] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.617623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.617667] page dumped because: kasan: bad access detected [ 20.617717] [ 20.617813] Memory state around the buggy address: [ 20.617854] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.617898] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.617943] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.617982] ^ [ 20.618017] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.618457] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.618586] ================================================================== [ 20.546513] ================================================================== [ 20.546559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 20.546607] Read of size 4 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.546658] [ 20.546687] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.546783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.546813] Hardware name: linux,dummy-virt (DT) [ 20.546846] Call trace: [ 20.546869] show_stack+0x20/0x38 (C) [ 20.546919] dump_stack_lvl+0x8c/0xd0 [ 20.547670] print_report+0x118/0x608 [ 20.547783] kasan_report+0xdc/0x128 [ 20.547833] __asan_report_load4_noabort+0x20/0x30 [ 20.547887] kasan_atomics_helper+0x3e04/0x4858 [ 20.547937] kasan_atomics+0x198/0x2e0 [ 20.547984] kunit_try_run_case+0x170/0x3f0 [ 20.548034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.548089] kthread+0x328/0x630 [ 20.548140] ret_from_fork+0x10/0x20 [ 20.548716] [ 20.549051] Allocated by task 265: [ 20.549227] kasan_save_stack+0x3c/0x68 [ 20.549330] kasan_save_track+0x20/0x40 [ 20.549371] kasan_save_alloc_info+0x40/0x58 [ 20.549413] __kasan_kmalloc+0xd4/0xd8 [ 20.549667] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.549809] kasan_atomics+0xb8/0x2e0 [ 20.549846] kunit_try_run_case+0x170/0x3f0 [ 20.549886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.550220] kthread+0x328/0x630 [ 20.550267] ret_from_fork+0x10/0x20 [ 20.550339] [ 20.550361] The buggy address belongs to the object at fff00000c7832f80 [ 20.550361] which belongs to the cache kmalloc-64 of size 64 [ 20.550432] The buggy address is located 0 bytes to the right of [ 20.550432] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.550499] [ 20.550520] The buggy address belongs to the physical page: [ 20.550553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.550775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.551113] page_type: f5(slab) [ 20.551251] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.551398] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.551467] page dumped because: kasan: bad access detected [ 20.551590] [ 20.551650] Memory state around the buggy address: [ 20.551684] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.551754] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.551798] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.551839] ^ [ 20.551875] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.551919] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.552010] ================================================================== [ 20.601124] ================================================================== [ 20.601188] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 20.601591] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.601684] [ 20.601835] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.602216] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.602252] Hardware name: linux,dummy-virt (DT) [ 20.602394] Call trace: [ 20.602553] show_stack+0x20/0x38 (C) [ 20.602654] dump_stack_lvl+0x8c/0xd0 [ 20.602752] print_report+0x118/0x608 [ 20.602826] kasan_report+0xdc/0x128 [ 20.602875] kasan_check_range+0x100/0x1a8 [ 20.602927] __kasan_check_write+0x20/0x30 [ 20.603122] kasan_atomics_helper+0x1058/0x4858 [ 20.603265] kasan_atomics+0x198/0x2e0 [ 20.603317] kunit_try_run_case+0x170/0x3f0 [ 20.603372] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.603654] kthread+0x328/0x630 [ 20.603762] ret_from_fork+0x10/0x20 [ 20.603812] [ 20.603834] Allocated by task 265: [ 20.603909] kasan_save_stack+0x3c/0x68 [ 20.604140] kasan_save_track+0x20/0x40 [ 20.604370] kasan_save_alloc_info+0x40/0x58 [ 20.604416] __kasan_kmalloc+0xd4/0xd8 [ 20.604455] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.604496] kasan_atomics+0xb8/0x2e0 [ 20.604534] kunit_try_run_case+0x170/0x3f0 [ 20.604574] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.604620] kthread+0x328/0x630 [ 20.604659] ret_from_fork+0x10/0x20 [ 20.604736] [ 20.604808] The buggy address belongs to the object at fff00000c7832f80 [ 20.604808] which belongs to the cache kmalloc-64 of size 64 [ 20.604874] The buggy address is located 0 bytes to the right of [ 20.604874] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.604939] [ 20.605011] The buggy address belongs to the physical page: [ 20.605047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.605115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.605205] page_type: f5(slab) [ 20.605243] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.605296] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.605337] page dumped because: kasan: bad access detected [ 20.605371] [ 20.605391] Memory state around the buggy address: [ 20.605424] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.605468] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.605512] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.605551] ^ [ 20.605586] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.606033] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.606105] ================================================================== [ 20.606596] ================================================================== [ 20.606650] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 20.606698] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.606774] [ 20.606819] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.607118] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.607166] Hardware name: linux,dummy-virt (DT) [ 20.607199] Call trace: [ 20.607241] show_stack+0x20/0x38 (C) [ 20.607296] dump_stack_lvl+0x8c/0xd0 [ 20.607431] print_report+0x118/0x608 [ 20.607509] kasan_report+0xdc/0x128 [ 20.607575] kasan_check_range+0x100/0x1a8 [ 20.607645] __kasan_check_write+0x20/0x30 [ 20.607712] kasan_atomics_helper+0x10c0/0x4858 [ 20.607829] kasan_atomics+0x198/0x2e0 [ 20.607878] kunit_try_run_case+0x170/0x3f0 [ 20.607935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.607991] kthread+0x328/0x630 [ 20.608038] ret_from_fork+0x10/0x20 [ 20.608087] [ 20.608214] Allocated by task 265: [ 20.608249] kasan_save_stack+0x3c/0x68 [ 20.608356] kasan_save_track+0x20/0x40 [ 20.608403] kasan_save_alloc_info+0x40/0x58 [ 20.608445] __kasan_kmalloc+0xd4/0xd8 [ 20.608484] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.608524] kasan_atomics+0xb8/0x2e0 [ 20.608563] kunit_try_run_case+0x170/0x3f0 [ 20.608612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.608658] kthread+0x328/0x630 [ 20.608774] ret_from_fork+0x10/0x20 [ 20.608814] [ 20.608876] The buggy address belongs to the object at fff00000c7832f80 [ 20.608876] which belongs to the cache kmalloc-64 of size 64 [ 20.608938] The buggy address is located 0 bytes to the right of [ 20.608938] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.609002] [ 20.609025] The buggy address belongs to the physical page: [ 20.609254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.609411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.609488] page_type: f5(slab) [ 20.609563] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.609616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.609685] page dumped because: kasan: bad access detected [ 20.610023] [ 20.610093] Memory state around the buggy address: [ 20.610129] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.610184] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.610228] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.610268] ^ [ 20.610305] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.610368] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.610409] ================================================================== [ 20.690979] ================================================================== [ 20.691024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 20.691071] Read of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.691121] [ 20.691167] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.691252] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.691281] Hardware name: linux,dummy-virt (DT) [ 20.691313] Call trace: [ 20.691336] show_stack+0x20/0x38 (C) [ 20.691384] dump_stack_lvl+0x8c/0xd0 [ 20.691617] print_report+0x118/0x608 [ 20.691698] kasan_report+0xdc/0x128 [ 20.691826] __asan_report_load8_noabort+0x20/0x30 [ 20.691879] kasan_atomics_helper+0x3e20/0x4858 [ 20.691956] kasan_atomics+0x198/0x2e0 [ 20.692124] kunit_try_run_case+0x170/0x3f0 [ 20.692184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.692259] kthread+0x328/0x630 [ 20.692334] ret_from_fork+0x10/0x20 [ 20.692401] [ 20.692457] Allocated by task 265: [ 20.692553] kasan_save_stack+0x3c/0x68 [ 20.692612] kasan_save_track+0x20/0x40 [ 20.692669] kasan_save_alloc_info+0x40/0x58 [ 20.692732] __kasan_kmalloc+0xd4/0xd8 [ 20.692844] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.692891] kasan_atomics+0xb8/0x2e0 [ 20.692948] kunit_try_run_case+0x170/0x3f0 [ 20.692987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.693057] kthread+0x328/0x630 [ 20.693141] ret_from_fork+0x10/0x20 [ 20.693247] [ 20.693270] The buggy address belongs to the object at fff00000c7832f80 [ 20.693270] which belongs to the cache kmalloc-64 of size 64 [ 20.693330] The buggy address is located 0 bytes to the right of [ 20.693330] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.693525] [ 20.693614] The buggy address belongs to the physical page: [ 20.693685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.693783] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.693902] page_type: f5(slab) [ 20.694039] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.694123] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.694218] page dumped because: kasan: bad access detected [ 20.694260] [ 20.694280] Memory state around the buggy address: [ 20.694328] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.694392] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.694437] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.694479] ^ [ 20.694901] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.694946] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.694986] ================================================================== [ 20.558770] ================================================================== [ 20.558837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 20.558889] Read of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.558942] [ 20.558972] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.559058] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.559088] Hardware name: linux,dummy-virt (DT) [ 20.559122] Call trace: [ 20.559146] show_stack+0x20/0x38 (C) [ 20.559211] dump_stack_lvl+0x8c/0xd0 [ 20.559285] print_report+0x118/0x608 [ 20.559338] kasan_report+0xdc/0x128 [ 20.559387] __asan_report_load8_noabort+0x20/0x30 [ 20.559749] kasan_atomics_helper+0x3f58/0x4858 [ 20.559813] kasan_atomics+0x198/0x2e0 [ 20.560031] kunit_try_run_case+0x170/0x3f0 [ 20.560278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.560852] kthread+0x328/0x630 [ 20.560914] ret_from_fork+0x10/0x20 [ 20.561098] [ 20.561121] Allocated by task 265: [ 20.561151] kasan_save_stack+0x3c/0x68 [ 20.561211] kasan_save_track+0x20/0x40 [ 20.561406] kasan_save_alloc_info+0x40/0x58 [ 20.561606] __kasan_kmalloc+0xd4/0xd8 [ 20.561651] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.561721] kasan_atomics+0xb8/0x2e0 [ 20.561797] kunit_try_run_case+0x170/0x3f0 [ 20.561838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.561882] kthread+0x328/0x630 [ 20.561920] ret_from_fork+0x10/0x20 [ 20.561958] [ 20.561981] The buggy address belongs to the object at fff00000c7832f80 [ 20.561981] which belongs to the cache kmalloc-64 of size 64 [ 20.562269] The buggy address is located 0 bytes to the right of [ 20.562269] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.562566] [ 20.562890] The buggy address belongs to the physical page: [ 20.562929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.562984] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.563034] page_type: f5(slab) [ 20.563092] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.563203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.563566] page dumped because: kasan: bad access detected [ 20.563604] [ 20.563626] Memory state around the buggy address: [ 20.563667] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.563841] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.563886] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.563926] ^ [ 20.564038] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.564167] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.564226] ================================================================== [ 20.665859] ================================================================== [ 20.665903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 20.665952] Read of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.666003] [ 20.666034] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.666118] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.666146] Hardware name: linux,dummy-virt (DT) [ 20.666193] Call trace: [ 20.666216] show_stack+0x20/0x38 (C) [ 20.666266] dump_stack_lvl+0x8c/0xd0 [ 20.666314] print_report+0x118/0x608 [ 20.666376] kasan_report+0xdc/0x128 [ 20.666472] __asan_report_load8_noabort+0x20/0x30 [ 20.666525] kasan_atomics_helper+0x3db0/0x4858 [ 20.666579] kasan_atomics+0x198/0x2e0 [ 20.666702] kunit_try_run_case+0x170/0x3f0 [ 20.666760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.666846] kthread+0x328/0x630 [ 20.666894] ret_from_fork+0x10/0x20 [ 20.667032] [ 20.667062] Allocated by task 265: [ 20.667094] kasan_save_stack+0x3c/0x68 [ 20.667136] kasan_save_track+0x20/0x40 [ 20.667209] kasan_save_alloc_info+0x40/0x58 [ 20.667356] __kasan_kmalloc+0xd4/0xd8 [ 20.667528] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.667628] kasan_atomics+0xb8/0x2e0 [ 20.667724] kunit_try_run_case+0x170/0x3f0 [ 20.667790] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.667866] kthread+0x328/0x630 [ 20.667929] ret_from_fork+0x10/0x20 [ 20.667995] [ 20.668035] The buggy address belongs to the object at fff00000c7832f80 [ 20.668035] which belongs to the cache kmalloc-64 of size 64 [ 20.668100] The buggy address is located 0 bytes to the right of [ 20.668100] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.668176] [ 20.668198] The buggy address belongs to the physical page: [ 20.668230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.668284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.668330] page_type: f5(slab) [ 20.668368] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.668419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.668479] page dumped because: kasan: bad access detected [ 20.668558] [ 20.668598] Memory state around the buggy address: [ 20.668647] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.668693] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.668745] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.668786] ^ [ 20.668820] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.668865] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.669109] ================================================================== [ 20.492101] ================================================================== [ 20.492169] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 20.492222] Write of size 4 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.492274] [ 20.492621] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.492793] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.492825] Hardware name: linux,dummy-virt (DT) [ 20.492857] Call trace: [ 20.492885] show_stack+0x20/0x38 (C) [ 20.493318] dump_stack_lvl+0x8c/0xd0 [ 20.493370] print_report+0x118/0x608 [ 20.493419] kasan_report+0xdc/0x128 [ 20.493973] kasan_check_range+0x100/0x1a8 [ 20.494043] __kasan_check_write+0x20/0x30 [ 20.494243] kasan_atomics_helper+0xad4/0x4858 [ 20.494330] kasan_atomics+0x198/0x2e0 [ 20.494473] kunit_try_run_case+0x170/0x3f0 [ 20.494523] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.494801] kthread+0x328/0x630 [ 20.495253] ret_from_fork+0x10/0x20 [ 20.495342] [ 20.495402] Allocated by task 265: [ 20.495431] kasan_save_stack+0x3c/0x68 [ 20.495507] kasan_save_track+0x20/0x40 [ 20.495547] kasan_save_alloc_info+0x40/0x58 [ 20.495589] __kasan_kmalloc+0xd4/0xd8 [ 20.495649] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.496004] kasan_atomics+0xb8/0x2e0 [ 20.496042] kunit_try_run_case+0x170/0x3f0 [ 20.496099] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.497166] [ 20.497225] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.497278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.497597] page_type: f5(slab) [ 20.497743] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.498332] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.498394] page dumped because: kasan: bad access detected [ 20.498452] [ 20.498475] Memory state around the buggy address: [ 20.498510] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.498554] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.498633] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.498719] ^ [ 20.498768] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.498990] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.499041] ================================================================== [ 20.624488] ================================================================== [ 20.624538] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 20.624586] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.624636] [ 20.624667] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.624752] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.624781] Hardware name: linux,dummy-virt (DT) [ 20.624812] Call trace: [ 20.624836] show_stack+0x20/0x38 (C) [ 20.624884] dump_stack_lvl+0x8c/0xd0 [ 20.624964] print_report+0x118/0x608 [ 20.625026] kasan_report+0xdc/0x128 [ 20.625091] kasan_check_range+0x100/0x1a8 [ 20.625142] __kasan_check_write+0x20/0x30 [ 20.625240] kasan_atomics_helper+0x126c/0x4858 [ 20.625408] kasan_atomics+0x198/0x2e0 [ 20.625562] kunit_try_run_case+0x170/0x3f0 [ 20.625631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.625704] kthread+0x328/0x630 [ 20.625943] ret_from_fork+0x10/0x20 [ 20.626101] [ 20.626224] Allocated by task 265: [ 20.626325] kasan_save_stack+0x3c/0x68 [ 20.626412] kasan_save_track+0x20/0x40 [ 20.626533] kasan_save_alloc_info+0x40/0x58 [ 20.626578] __kasan_kmalloc+0xd4/0xd8 [ 20.626640] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.626683] kasan_atomics+0xb8/0x2e0 [ 20.626721] kunit_try_run_case+0x170/0x3f0 [ 20.627043] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.627166] kthread+0x328/0x630 [ 20.627224] ret_from_fork+0x10/0x20 [ 20.627263] [ 20.627293] The buggy address belongs to the object at fff00000c7832f80 [ 20.627293] which belongs to the cache kmalloc-64 of size 64 [ 20.627353] The buggy address is located 0 bytes to the right of [ 20.627353] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.627435] [ 20.627459] The buggy address belongs to the physical page: [ 20.627491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.627554] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.627607] page_type: f5(slab) [ 20.627650] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.627702] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.627744] page dumped because: kasan: bad access detected [ 20.627794] [ 20.627815] Memory state around the buggy address: [ 20.627848] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.627898] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.627941] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.627995] ^ [ 20.628042] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.628108] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.628149] ================================================================== [ 20.674501] ================================================================== [ 20.674550] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 20.674599] Read of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.674649] [ 20.674681] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.674770] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.674801] Hardware name: linux,dummy-virt (DT) [ 20.674832] Call trace: [ 20.674857] show_stack+0x20/0x38 (C) [ 20.674905] dump_stack_lvl+0x8c/0xd0 [ 20.674954] print_report+0x118/0x608 [ 20.675001] kasan_report+0xdc/0x128 [ 20.675049] __asan_report_load8_noabort+0x20/0x30 [ 20.675102] kasan_atomics_helper+0x3df4/0x4858 [ 20.675150] kasan_atomics+0x198/0x2e0 [ 20.675223] kunit_try_run_case+0x170/0x3f0 [ 20.675294] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.675350] kthread+0x328/0x630 [ 20.675414] ret_from_fork+0x10/0x20 [ 20.675465] [ 20.675495] Allocated by task 265: [ 20.675526] kasan_save_stack+0x3c/0x68 [ 20.675569] kasan_save_track+0x20/0x40 [ 20.675609] kasan_save_alloc_info+0x40/0x58 [ 20.675650] __kasan_kmalloc+0xd4/0xd8 [ 20.675687] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.675728] kasan_atomics+0xb8/0x2e0 [ 20.675764] kunit_try_run_case+0x170/0x3f0 [ 20.675812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.675858] kthread+0x328/0x630 [ 20.675894] ret_from_fork+0x10/0x20 [ 20.675933] [ 20.675962] The buggy address belongs to the object at fff00000c7832f80 [ 20.675962] which belongs to the cache kmalloc-64 of size 64 [ 20.676021] The buggy address is located 0 bytes to the right of [ 20.676021] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.676096] [ 20.676119] The buggy address belongs to the physical page: [ 20.676150] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.676212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.676260] page_type: f5(slab) [ 20.676297] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.676349] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.676404] page dumped because: kasan: bad access detected [ 20.676438] [ 20.676458] Memory state around the buggy address: [ 20.676490] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.676534] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.676579] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.676618] ^ [ 20.676656] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.676700] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.676742] ================================================================== [ 20.686646] ================================================================== [ 20.686696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 20.686912] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.686970] [ 20.687002] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.687088] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.687117] Hardware name: linux,dummy-virt (DT) [ 20.687148] Call trace: [ 20.687186] show_stack+0x20/0x38 (C) [ 20.687426] dump_stack_lvl+0x8c/0xd0 [ 20.687505] print_report+0x118/0x608 [ 20.687602] kasan_report+0xdc/0x128 [ 20.687684] kasan_check_range+0x100/0x1a8 [ 20.687751] __kasan_check_write+0x20/0x30 [ 20.687828] kasan_atomics_helper+0x175c/0x4858 [ 20.687879] kasan_atomics+0x198/0x2e0 [ 20.688051] kunit_try_run_case+0x170/0x3f0 [ 20.688101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.688199] kthread+0x328/0x630 [ 20.688276] ret_from_fork+0x10/0x20 [ 20.688342] [ 20.688372] Allocated by task 265: [ 20.688430] kasan_save_stack+0x3c/0x68 [ 20.688548] kasan_save_track+0x20/0x40 [ 20.688606] kasan_save_alloc_info+0x40/0x58 [ 20.688675] __kasan_kmalloc+0xd4/0xd8 [ 20.688714] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.688837] kasan_atomics+0xb8/0x2e0 [ 20.688964] kunit_try_run_case+0x170/0x3f0 [ 20.689005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.689209] kthread+0x328/0x630 [ 20.689252] ret_from_fork+0x10/0x20 [ 20.689290] [ 20.689312] The buggy address belongs to the object at fff00000c7832f80 [ 20.689312] which belongs to the cache kmalloc-64 of size 64 [ 20.689372] The buggy address is located 0 bytes to the right of [ 20.689372] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.689470] [ 20.689541] The buggy address belongs to the physical page: [ 20.689693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.689762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.689862] page_type: f5(slab) [ 20.689914] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.690176] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.690219] page dumped because: kasan: bad access detected [ 20.690254] [ 20.690274] Memory state around the buggy address: [ 20.690308] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.690378] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.690468] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.690540] ^ [ 20.690592] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.690671] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.690720] ================================================================== [ 20.457649] ================================================================== [ 20.458124] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 20.458327] Read of size 4 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.458401] [ 20.458445] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.458781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.458934] Hardware name: linux,dummy-virt (DT) [ 20.459117] Call trace: [ 20.464568] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.469507] __kasan_kmalloc+0xd4/0xd8 [ 20.469545] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.469586] kasan_atomics+0xb8/0x2e0 [ 20.469624] kunit_try_run_case+0x170/0x3f0 [ 20.469663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.469709] kthread+0x328/0x630 [ 20.469747] ret_from_fork+0x10/0x20 [ 20.469785] [ 20.469835] The buggy address belongs to the object at fff00000c7832f80 [ 20.469835] which belongs to the cache kmalloc-64 of size 64 [ 20.469899] The buggy address is located 0 bytes to the right of [ 20.469899] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.469964] [ 20.469986] The buggy address belongs to the physical page: [ 20.470019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.470072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.470216] page_type: f5(slab) [ 20.470282] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.470405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.470493] page dumped because: kasan: bad access detected [ 20.470959] [ 20.471009] Memory state around the buggy address: [ 20.471063] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.471142] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.471195] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.471263] ^ [ 20.471299] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.471344] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.471385] ================================================================== [ 20.647040] ================================================================== [ 20.647086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 20.647132] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.647199] [ 20.647229] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.647317] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.647344] Hardware name: linux,dummy-virt (DT) [ 20.647377] Call trace: [ 20.647401] show_stack+0x20/0x38 (C) [ 20.647451] dump_stack_lvl+0x8c/0xd0 [ 20.647497] print_report+0x118/0x608 [ 20.647545] kasan_report+0xdc/0x128 [ 20.647592] kasan_check_range+0x100/0x1a8 [ 20.647640] __kasan_check_write+0x20/0x30 [ 20.647690] kasan_atomics_helper+0x147c/0x4858 [ 20.647752] kasan_atomics+0x198/0x2e0 [ 20.647809] kunit_try_run_case+0x170/0x3f0 [ 20.647858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.647913] kthread+0x328/0x630 [ 20.647958] ret_from_fork+0x10/0x20 [ 20.648015] [ 20.648038] Allocated by task 265: [ 20.648076] kasan_save_stack+0x3c/0x68 [ 20.648117] kasan_save_track+0x20/0x40 [ 20.648166] kasan_save_alloc_info+0x40/0x58 [ 20.648209] __kasan_kmalloc+0xd4/0xd8 [ 20.648248] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.648290] kasan_atomics+0xb8/0x2e0 [ 20.648328] kunit_try_run_case+0x170/0x3f0 [ 20.648367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.648413] kthread+0x328/0x630 [ 20.648451] ret_from_fork+0x10/0x20 [ 20.648490] [ 20.648511] The buggy address belongs to the object at fff00000c7832f80 [ 20.648511] which belongs to the cache kmalloc-64 of size 64 [ 20.648569] The buggy address is located 0 bytes to the right of [ 20.648569] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.648634] [ 20.648655] The buggy address belongs to the physical page: [ 20.648698] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.648758] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.648806] page_type: f5(slab) [ 20.648844] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.648893] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.648936] page dumped because: kasan: bad access detected [ 20.648970] [ 20.648991] Memory state around the buggy address: [ 20.649023] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.649068] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.649120] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.649176] ^ [ 20.649209] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.649253] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.649292] ================================================================== [ 20.631711] ================================================================== [ 20.631759] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 20.631860] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.631959] [ 20.632024] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.632169] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.632235] Hardware name: linux,dummy-virt (DT) [ 20.632285] Call trace: [ 20.632311] show_stack+0x20/0x38 (C) [ 20.632545] dump_stack_lvl+0x8c/0xd0 [ 20.632623] print_report+0x118/0x608 [ 20.632689] kasan_report+0xdc/0x128 [ 20.632765] kasan_check_range+0x100/0x1a8 [ 20.632832] __kasan_check_write+0x20/0x30 [ 20.632882] kasan_atomics_helper+0x1384/0x4858 [ 20.632970] kasan_atomics+0x198/0x2e0 [ 20.633090] kunit_try_run_case+0x170/0x3f0 [ 20.633140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.633221] kthread+0x328/0x630 [ 20.633479] ret_from_fork+0x10/0x20 [ 20.633529] [ 20.633571] Allocated by task 265: [ 20.633629] kasan_save_stack+0x3c/0x68 [ 20.633688] kasan_save_track+0x20/0x40 [ 20.633768] kasan_save_alloc_info+0x40/0x58 [ 20.633846] __kasan_kmalloc+0xd4/0xd8 [ 20.633916] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.634085] kasan_atomics+0xb8/0x2e0 [ 20.634294] kunit_try_run_case+0x170/0x3f0 [ 20.634441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.634532] kthread+0x328/0x630 [ 20.634590] ret_from_fork+0x10/0x20 [ 20.634638] [ 20.634661] The buggy address belongs to the object at fff00000c7832f80 [ 20.634661] which belongs to the cache kmalloc-64 of size 64 [ 20.634719] The buggy address is located 0 bytes to the right of [ 20.634719] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.634790] [ 20.634812] The buggy address belongs to the physical page: [ 20.634846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.634897] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.635223] page_type: f5(slab) [ 20.635299] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.635437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.635552] page dumped because: kasan: bad access detected [ 20.635600] [ 20.635641] Memory state around the buggy address: [ 20.635737] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.635782] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.635825] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.635998] ^ [ 20.636038] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.636171] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.636273] ================================================================== [ 20.484676] ================================================================== [ 20.484842] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 20.484906] Write of size 4 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.485067] [ 20.485193] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.485722] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.485841] Hardware name: linux,dummy-virt (DT) [ 20.485875] Call trace: [ 20.485900] show_stack+0x20/0x38 (C) [ 20.485955] dump_stack_lvl+0x8c/0xd0 [ 20.486007] print_report+0x118/0x608 [ 20.486056] kasan_report+0xdc/0x128 [ 20.486103] kasan_check_range+0x100/0x1a8 [ 20.486151] __kasan_check_write+0x20/0x30 [ 20.486225] kasan_atomics_helper+0xa6c/0x4858 [ 20.486275] kasan_atomics+0x198/0x2e0 [ 20.486505] kunit_try_run_case+0x170/0x3f0 [ 20.486789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.487436] kthread+0x328/0x630 [ 20.487770] ret_from_fork+0x10/0x20 [ 20.487822] [ 20.487844] Allocated by task 265: [ 20.487878] kasan_save_stack+0x3c/0x68 [ 20.488338] kasan_save_track+0x20/0x40 [ 20.488418] kasan_save_alloc_info+0x40/0x58 [ 20.488524] __kasan_kmalloc+0xd4/0xd8 [ 20.488596] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.488666] kasan_atomics+0xb8/0x2e0 [ 20.488846] kunit_try_run_case+0x170/0x3f0 [ 20.488887] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.488932] kthread+0x328/0x630 [ 20.488969] ret_from_fork+0x10/0x20 [ 20.489008] [ 20.489031] The buggy address belongs to the object at fff00000c7832f80 [ 20.489031] which belongs to the cache kmalloc-64 of size 64 [ 20.489102] The buggy address is located 0 bytes to the right of [ 20.489102] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.489178] [ 20.489200] The buggy address belongs to the physical page: [ 20.489233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.489309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.489360] page_type: f5(slab) [ 20.489397] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.489450] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.490440] page dumped because: kasan: bad access detected [ 20.490541] [ 20.490581] Memory state around the buggy address: [ 20.490635] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.490825] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.490992] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.491044] ^ [ 20.491083] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.491253] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.491295] ================================================================== [ 20.636696] ================================================================== [ 20.636742] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 20.636790] Read of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.636884] [ 20.637013] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.637109] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.637310] Hardware name: linux,dummy-virt (DT) [ 20.637354] Call trace: [ 20.637394] show_stack+0x20/0x38 (C) [ 20.637467] dump_stack_lvl+0x8c/0xd0 [ 20.637560] print_report+0x118/0x608 [ 20.637627] kasan_report+0xdc/0x128 [ 20.637719] __asan_report_load8_noabort+0x20/0x30 [ 20.637780] kasan_atomics_helper+0x3f04/0x4858 [ 20.637831] kasan_atomics+0x198/0x2e0 [ 20.637878] kunit_try_run_case+0x170/0x3f0 [ 20.637928] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.638004] kthread+0x328/0x630 [ 20.638053] ret_from_fork+0x10/0x20 [ 20.638103] [ 20.638142] Allocated by task 265: [ 20.638304] kasan_save_stack+0x3c/0x68 [ 20.638410] kasan_save_track+0x20/0x40 [ 20.638744] kasan_save_alloc_info+0x40/0x58 [ 20.638817] __kasan_kmalloc+0xd4/0xd8 [ 20.638879] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.638920] kasan_atomics+0xb8/0x2e0 [ 20.638958] kunit_try_run_case+0x170/0x3f0 [ 20.638997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.639042] kthread+0x328/0x630 [ 20.639252] ret_from_fork+0x10/0x20 [ 20.639342] [ 20.639489] The buggy address belongs to the object at fff00000c7832f80 [ 20.639489] which belongs to the cache kmalloc-64 of size 64 [ 20.639619] The buggy address is located 0 bytes to the right of [ 20.639619] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.639965] [ 20.640076] The buggy address belongs to the physical page: [ 20.640167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.640222] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.640269] page_type: f5(slab) [ 20.640317] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.640369] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.640411] page dumped because: kasan: bad access detected [ 20.640444] [ 20.640472] Memory state around the buggy address: [ 20.640506] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.640558] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.640602] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.640651] ^ [ 20.640701] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.640756] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.640806] ================================================================== [ 20.534855] ================================================================== [ 20.534918] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 20.535058] Read of size 4 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.535168] [ 20.535201] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.535288] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.535318] Hardware name: linux,dummy-virt (DT) [ 20.535350] Call trace: [ 20.535375] show_stack+0x20/0x38 (C) [ 20.535427] dump_stack_lvl+0x8c/0xd0 [ 20.535480] print_report+0x118/0x608 [ 20.535609] kasan_report+0xdc/0x128 [ 20.535688] __asan_report_load4_noabort+0x20/0x30 [ 20.535948] kasan_atomics_helper+0x3dd8/0x4858 [ 20.536472] kasan_atomics+0x198/0x2e0 [ 20.536670] kunit_try_run_case+0x170/0x3f0 [ 20.536720] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.537353] kthread+0x328/0x630 [ 20.537572] ret_from_fork+0x10/0x20 [ 20.537637] [ 20.537781] Allocated by task 265: [ 20.537816] kasan_save_stack+0x3c/0x68 [ 20.537858] kasan_save_track+0x20/0x40 [ 20.537898] kasan_save_alloc_info+0x40/0x58 [ 20.537941] __kasan_kmalloc+0xd4/0xd8 [ 20.537980] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.538020] kasan_atomics+0xb8/0x2e0 [ 20.538258] kunit_try_run_case+0x170/0x3f0 [ 20.538300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.538343] kthread+0x328/0x630 [ 20.539312] ret_from_fork+0x10/0x20 [ 20.539372] [ 20.539395] The buggy address belongs to the object at fff00000c7832f80 [ 20.539395] which belongs to the cache kmalloc-64 of size 64 [ 20.539953] The buggy address is located 0 bytes to the right of [ 20.539953] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.540043] [ 20.540065] The buggy address belongs to the physical page: [ 20.540099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.540151] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.540414] page_type: f5(slab) [ 20.540456] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.540766] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.540820] page dumped because: kasan: bad access detected [ 20.540866] [ 20.540888] Memory state around the buggy address: [ 20.540920] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.541082] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.541181] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.541222] ^ [ 20.541336] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.541452] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.541493] ================================================================== [ 20.661322] ================================================================== [ 20.661369] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 20.661427] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.661478] [ 20.661508] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.661594] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.661621] Hardware name: linux,dummy-virt (DT) [ 20.661653] Call trace: [ 20.661677] show_stack+0x20/0x38 (C) [ 20.661727] dump_stack_lvl+0x8c/0xd0 [ 20.661812] print_report+0x118/0x608 [ 20.661861] kasan_report+0xdc/0x128 [ 20.661908] kasan_check_range+0x100/0x1a8 [ 20.661956] __kasan_check_write+0x20/0x30 [ 20.662007] kasan_atomics_helper+0x15b4/0x4858 [ 20.662057] kasan_atomics+0x198/0x2e0 [ 20.662103] kunit_try_run_case+0x170/0x3f0 [ 20.662200] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.662430] kthread+0x328/0x630 [ 20.662585] ret_from_fork+0x10/0x20 [ 20.662776] [ 20.662865] Allocated by task 265: [ 20.662897] kasan_save_stack+0x3c/0x68 [ 20.662938] kasan_save_track+0x20/0x40 [ 20.662978] kasan_save_alloc_info+0x40/0x58 [ 20.663020] __kasan_kmalloc+0xd4/0xd8 [ 20.663059] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.663116] kasan_atomics+0xb8/0x2e0 [ 20.663164] kunit_try_run_case+0x170/0x3f0 [ 20.663203] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.663373] kthread+0x328/0x630 [ 20.663532] ret_from_fork+0x10/0x20 [ 20.663689] [ 20.663809] The buggy address belongs to the object at fff00000c7832f80 [ 20.663809] which belongs to the cache kmalloc-64 of size 64 [ 20.663886] The buggy address is located 0 bytes to the right of [ 20.663886] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.664179] [ 20.664292] The buggy address belongs to the physical page: [ 20.664413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.664524] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.664571] page_type: f5(slab) [ 20.664611] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.664952] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.665082] page dumped because: kasan: bad access detected [ 20.665396] [ 20.665418] Memory state around the buggy address: [ 20.665452] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.665498] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.665542] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.665581] ^ [ 20.665614] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.665659] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.665699] ================================================================== [ 20.681340] ================================================================== [ 20.681406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 20.681494] Read of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.681546] [ 20.681599] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.681722] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.681751] Hardware name: linux,dummy-virt (DT) [ 20.681831] Call trace: [ 20.681966] show_stack+0x20/0x38 (C) [ 20.682085] dump_stack_lvl+0x8c/0xd0 [ 20.682259] print_report+0x118/0x608 [ 20.682326] kasan_report+0xdc/0x128 [ 20.682372] __asan_report_load8_noabort+0x20/0x30 [ 20.682587] kasan_atomics_helper+0x3e10/0x4858 [ 20.682638] kasan_atomics+0x198/0x2e0 [ 20.682684] kunit_try_run_case+0x170/0x3f0 [ 20.682739] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.682794] kthread+0x328/0x630 [ 20.682841] ret_from_fork+0x10/0x20 [ 20.682983] [ 20.683146] Allocated by task 265: [ 20.683237] kasan_save_stack+0x3c/0x68 [ 20.683301] kasan_save_track+0x20/0x40 [ 20.683372] kasan_save_alloc_info+0x40/0x58 [ 20.683763] __kasan_kmalloc+0xd4/0xd8 [ 20.683827] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.683969] kasan_atomics+0xb8/0x2e0 [ 20.684087] kunit_try_run_case+0x170/0x3f0 [ 20.684217] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.684271] kthread+0x328/0x630 [ 20.684310] ret_from_fork+0x10/0x20 [ 20.684391] [ 20.684556] The buggy address belongs to the object at fff00000c7832f80 [ 20.684556] which belongs to the cache kmalloc-64 of size 64 [ 20.684617] The buggy address is located 0 bytes to the right of [ 20.684617] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.684722] [ 20.684857] The buggy address belongs to the physical page: [ 20.684917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.685145] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.685208] page_type: f5(slab) [ 20.685246] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.685342] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.685466] page dumped because: kasan: bad access detected [ 20.685539] [ 20.685668] Memory state around the buggy address: [ 20.685751] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.685796] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.685840] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.685879] ^ [ 20.685914] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.685958] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.686149] ================================================================== [ 20.695344] ================================================================== [ 20.695450] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 20.695533] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.695585] [ 20.695645] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.695840] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.695870] Hardware name: linux,dummy-virt (DT) [ 20.695903] Call trace: [ 20.695926] show_stack+0x20/0x38 (C) [ 20.695977] dump_stack_lvl+0x8c/0xd0 [ 20.696032] print_report+0x118/0x608 [ 20.696110] kasan_report+0xdc/0x128 [ 20.696169] kasan_check_range+0x100/0x1a8 [ 20.696219] __kasan_check_write+0x20/0x30 [ 20.696287] kasan_atomics_helper+0x17ec/0x4858 [ 20.696355] kasan_atomics+0x198/0x2e0 [ 20.696447] kunit_try_run_case+0x170/0x3f0 [ 20.696544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.696653] kthread+0x328/0x630 [ 20.696739] ret_from_fork+0x10/0x20 [ 20.696799] [ 20.696841] Allocated by task 265: [ 20.696937] kasan_save_stack+0x3c/0x68 [ 20.697005] kasan_save_track+0x20/0x40 [ 20.697047] kasan_save_alloc_info+0x40/0x58 [ 20.697089] __kasan_kmalloc+0xd4/0xd8 [ 20.697128] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.697327] kasan_atomics+0xb8/0x2e0 [ 20.697368] kunit_try_run_case+0x170/0x3f0 [ 20.697505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.697582] kthread+0x328/0x630 [ 20.697649] ret_from_fork+0x10/0x20 [ 20.697704] [ 20.697727] The buggy address belongs to the object at fff00000c7832f80 [ 20.697727] which belongs to the cache kmalloc-64 of size 64 [ 20.697990] The buggy address is located 0 bytes to the right of [ 20.697990] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.698186] [ 20.698222] The buggy address belongs to the physical page: [ 20.698269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.698322] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.698370] page_type: f5(slab) [ 20.698635] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.698692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.698739] page dumped because: kasan: bad access detected [ 20.698772] [ 20.698792] Memory state around the buggy address: [ 20.698826] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.698914] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.699023] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.699177] ^ [ 20.699269] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.699354] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.699446] ================================================================== [ 20.552618] ================================================================== [ 20.552979] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 20.553259] Read of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.553342] [ 20.553374] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.553467] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.553613] Hardware name: linux,dummy-virt (DT) [ 20.553781] Call trace: [ 20.553807] show_stack+0x20/0x38 (C) [ 20.553860] dump_stack_lvl+0x8c/0xd0 [ 20.554086] print_report+0x118/0x608 [ 20.554144] kasan_report+0xdc/0x128 [ 20.554203] kasan_check_range+0x100/0x1a8 [ 20.554255] __kasan_check_read+0x20/0x30 [ 20.554308] kasan_atomics_helper+0xdd4/0x4858 [ 20.554521] kasan_atomics+0x198/0x2e0 [ 20.554735] kunit_try_run_case+0x170/0x3f0 [ 20.554850] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.554965] kthread+0x328/0x630 [ 20.555140] ret_from_fork+0x10/0x20 [ 20.555217] [ 20.555238] Allocated by task 265: [ 20.555269] kasan_save_stack+0x3c/0x68 [ 20.555364] kasan_save_track+0x20/0x40 [ 20.555553] kasan_save_alloc_info+0x40/0x58 [ 20.555734] __kasan_kmalloc+0xd4/0xd8 [ 20.555774] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.555815] kasan_atomics+0xb8/0x2e0 [ 20.555851] kunit_try_run_case+0x170/0x3f0 [ 20.555891] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.555937] kthread+0x328/0x630 [ 20.555973] ret_from_fork+0x10/0x20 [ 20.556010] [ 20.556031] The buggy address belongs to the object at fff00000c7832f80 [ 20.556031] which belongs to the cache kmalloc-64 of size 64 [ 20.556115] The buggy address is located 0 bytes to the right of [ 20.556115] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.556223] [ 20.556244] The buggy address belongs to the physical page: [ 20.556277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.556328] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.556375] page_type: f5(slab) [ 20.556414] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.556610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.556658] page dumped because: kasan: bad access detected [ 20.556692] [ 20.557144] Memory state around the buggy address: [ 20.557567] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.557779] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.557838] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.557880] ^ [ 20.557915] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.557959] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.557999] ================================================================== [ 20.472097] ================================================================== [ 20.472278] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 20.472331] Write of size 4 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.472441] [ 20.472556] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.472646] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.472675] Hardware name: linux,dummy-virt (DT) [ 20.472734] Call trace: [ 20.472789] show_stack+0x20/0x38 (C) [ 20.472857] dump_stack_lvl+0x8c/0xd0 [ 20.472916] print_report+0x118/0x608 [ 20.472974] kasan_report+0xdc/0x128 [ 20.473023] kasan_check_range+0x100/0x1a8 [ 20.473072] __kasan_check_write+0x20/0x30 [ 20.473122] kasan_atomics_helper+0x99c/0x4858 [ 20.473181] kasan_atomics+0x198/0x2e0 [ 20.473227] kunit_try_run_case+0x170/0x3f0 [ 20.473274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.473336] kthread+0x328/0x630 [ 20.473382] ret_from_fork+0x10/0x20 [ 20.473431] [ 20.473451] Allocated by task 265: [ 20.473481] kasan_save_stack+0x3c/0x68 [ 20.473521] kasan_save_track+0x20/0x40 [ 20.473561] kasan_save_alloc_info+0x40/0x58 [ 20.473601] __kasan_kmalloc+0xd4/0xd8 [ 20.473640] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.474005] kasan_atomics+0xb8/0x2e0 [ 20.474354] kunit_try_run_case+0x170/0x3f0 [ 20.474441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.474522] kthread+0x328/0x630 [ 20.474637] ret_from_fork+0x10/0x20 [ 20.474719] [ 20.474841] The buggy address belongs to the object at fff00000c7832f80 [ 20.474841] which belongs to the cache kmalloc-64 of size 64 [ 20.474945] The buggy address is located 0 bytes to the right of [ 20.474945] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.475018] [ 20.475251] The buggy address belongs to the physical page: [ 20.475343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.475532] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.475759] page_type: f5(slab) [ 20.475836] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.475917] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.476033] page dumped because: kasan: bad access detected [ 20.476129] [ 20.476178] Memory state around the buggy address: [ 20.476214] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.476427] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.476578] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.476721] ^ [ 20.476779] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.476847] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.477028] ================================================================== [ 20.589590] ================================================================== [ 20.589757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 20.589948] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.590026] [ 20.590169] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.590322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.590369] Hardware name: linux,dummy-virt (DT) [ 20.590401] Call trace: [ 20.590557] show_stack+0x20/0x38 (C) [ 20.590784] dump_stack_lvl+0x8c/0xd0 [ 20.590891] print_report+0x118/0x608 [ 20.591025] kasan_report+0xdc/0x128 [ 20.591102] kasan_check_range+0x100/0x1a8 [ 20.591206] __kasan_check_write+0x20/0x30 [ 20.591284] kasan_atomics_helper+0xf88/0x4858 [ 20.591335] kasan_atomics+0x198/0x2e0 [ 20.591420] kunit_try_run_case+0x170/0x3f0 [ 20.591470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.591715] kthread+0x328/0x630 [ 20.591826] ret_from_fork+0x10/0x20 [ 20.591963] [ 20.592087] Allocated by task 265: [ 20.592118] kasan_save_stack+0x3c/0x68 [ 20.592169] kasan_save_track+0x20/0x40 [ 20.592209] kasan_save_alloc_info+0x40/0x58 [ 20.592251] __kasan_kmalloc+0xd4/0xd8 [ 20.592290] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.592332] kasan_atomics+0xb8/0x2e0 [ 20.592370] kunit_try_run_case+0x170/0x3f0 [ 20.592410] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.592454] kthread+0x328/0x630 [ 20.592492] ret_from_fork+0x10/0x20 [ 20.592880] [ 20.592904] The buggy address belongs to the object at fff00000c7832f80 [ 20.592904] which belongs to the cache kmalloc-64 of size 64 [ 20.592965] The buggy address is located 0 bytes to the right of [ 20.592965] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.593497] [ 20.593523] The buggy address belongs to the physical page: [ 20.593555] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.593609] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.593658] page_type: f5(slab) [ 20.593697] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.594301] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.594517] page dumped because: kasan: bad access detected [ 20.594580] [ 20.594601] Memory state around the buggy address: [ 20.594681] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.594881] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.594996] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.595039] ^ [ 20.595072] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.595139] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.595189] ================================================================== [ 20.578236] ================================================================== [ 20.578287] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 20.578344] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.578587] [ 20.578710] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.578804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.578834] Hardware name: linux,dummy-virt (DT) [ 20.578901] Call trace: [ 20.579014] show_stack+0x20/0x38 (C) [ 20.579146] dump_stack_lvl+0x8c/0xd0 [ 20.579204] print_report+0x118/0x608 [ 20.579258] kasan_report+0xdc/0x128 [ 20.579408] kasan_check_range+0x100/0x1a8 [ 20.579509] __kasan_check_write+0x20/0x30 [ 20.579695] kasan_atomics_helper+0xeb8/0x4858 [ 20.579751] kasan_atomics+0x198/0x2e0 [ 20.579956] kunit_try_run_case+0x170/0x3f0 [ 20.580013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.580075] kthread+0x328/0x630 [ 20.580126] ret_from_fork+0x10/0x20 [ 20.580497] [ 20.580524] Allocated by task 265: [ 20.580645] kasan_save_stack+0x3c/0x68 [ 20.581199] kasan_save_track+0x20/0x40 [ 20.581256] kasan_save_alloc_info+0x40/0x58 [ 20.581301] __kasan_kmalloc+0xd4/0xd8 [ 20.581340] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.581381] kasan_atomics+0xb8/0x2e0 [ 20.581419] kunit_try_run_case+0x170/0x3f0 [ 20.581459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.581504] kthread+0x328/0x630 [ 20.581543] ret_from_fork+0x10/0x20 [ 20.581581] [ 20.581604] The buggy address belongs to the object at fff00000c7832f80 [ 20.581604] which belongs to the cache kmalloc-64 of size 64 [ 20.581663] The buggy address is located 0 bytes to the right of [ 20.581663] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.581727] [ 20.581757] The buggy address belongs to the physical page: [ 20.581789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.581840] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.581889] page_type: f5(slab) [ 20.581927] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.581979] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.582022] page dumped because: kasan: bad access detected [ 20.582057] [ 20.582077] Memory state around the buggy address: [ 20.582110] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.582164] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.582288] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.582400] ^ [ 20.582478] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.582530] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.582571] ================================================================== [ 20.656371] ================================================================== [ 20.656433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 20.656558] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.656635] [ 20.656700] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.656792] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.656838] Hardware name: linux,dummy-virt (DT) [ 20.656872] Call trace: [ 20.656895] show_stack+0x20/0x38 (C) [ 20.656945] dump_stack_lvl+0x8c/0xd0 [ 20.656991] print_report+0x118/0x608 [ 20.657172] kasan_report+0xdc/0x128 [ 20.657374] kasan_check_range+0x100/0x1a8 [ 20.657451] __kasan_check_write+0x20/0x30 [ 20.657508] kasan_atomics_helper+0x154c/0x4858 [ 20.657558] kasan_atomics+0x198/0x2e0 [ 20.657665] kunit_try_run_case+0x170/0x3f0 [ 20.657716] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.657776] kthread+0x328/0x630 [ 20.657822] ret_from_fork+0x10/0x20 [ 20.657871] [ 20.657893] Allocated by task 265: [ 20.657923] kasan_save_stack+0x3c/0x68 [ 20.657982] kasan_save_track+0x20/0x40 [ 20.658024] kasan_save_alloc_info+0x40/0x58 [ 20.658067] __kasan_kmalloc+0xd4/0xd8 [ 20.658106] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.658147] kasan_atomics+0xb8/0x2e0 [ 20.658197] kunit_try_run_case+0x170/0x3f0 [ 20.658236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.658281] kthread+0x328/0x630 [ 20.658320] ret_from_fork+0x10/0x20 [ 20.658358] [ 20.658408] The buggy address belongs to the object at fff00000c7832f80 [ 20.658408] which belongs to the cache kmalloc-64 of size 64 [ 20.658524] The buggy address is located 0 bytes to the right of [ 20.658524] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.658715] [ 20.658897] The buggy address belongs to the physical page: [ 20.659074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.659212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.659356] page_type: f5(slab) [ 20.659477] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.659527] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.659593] page dumped because: kasan: bad access detected [ 20.659627] [ 20.659648] Memory state around the buggy address: [ 20.659681] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.659993] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.660111] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.660275] ^ [ 20.660350] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.660544] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.660805] ================================================================== [ 20.564963] ================================================================== [ 20.565067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 20.565118] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.565235] [ 20.565273] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.565540] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.565688] Hardware name: linux,dummy-virt (DT) [ 20.565824] Call trace: [ 20.566087] show_stack+0x20/0x38 (C) [ 20.566368] dump_stack_lvl+0x8c/0xd0 [ 20.566524] print_report+0x118/0x608 [ 20.566829] kasan_report+0xdc/0x128 [ 20.566883] kasan_check_range+0x100/0x1a8 [ 20.566990] __kasan_check_write+0x20/0x30 [ 20.567113] kasan_atomics_helper+0xe44/0x4858 [ 20.567236] kasan_atomics+0x198/0x2e0 [ 20.567454] kunit_try_run_case+0x170/0x3f0 [ 20.567504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.567643] kthread+0x328/0x630 [ 20.567711] ret_from_fork+0x10/0x20 [ 20.567761] [ 20.567866] Allocated by task 265: [ 20.567900] kasan_save_stack+0x3c/0x68 [ 20.567980] kasan_save_track+0x20/0x40 [ 20.568114] kasan_save_alloc_info+0x40/0x58 [ 20.568171] __kasan_kmalloc+0xd4/0xd8 [ 20.568212] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.568253] kasan_atomics+0xb8/0x2e0 [ 20.568291] kunit_try_run_case+0x170/0x3f0 [ 20.568331] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.568375] kthread+0x328/0x630 [ 20.568414] ret_from_fork+0x10/0x20 [ 20.568452] [ 20.568850] The buggy address belongs to the object at fff00000c7832f80 [ 20.568850] which belongs to the cache kmalloc-64 of size 64 [ 20.569004] The buggy address is located 0 bytes to the right of [ 20.569004] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.569142] [ 20.569200] The buggy address belongs to the physical page: [ 20.569302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.569393] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.569580] page_type: f5(slab) [ 20.569621] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.569679] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.569807] page dumped because: kasan: bad access detected [ 20.569842] [ 20.569862] Memory state around the buggy address: [ 20.569897] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.569957] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.570000] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.570040] ^ [ 20.570074] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.570253] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.570305] ================================================================== [ 20.669245] ================================================================== [ 20.669288] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 20.669333] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.669383] [ 20.669413] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.669498] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.669527] Hardware name: linux,dummy-virt (DT) [ 20.669558] Call trace: [ 20.669582] show_stack+0x20/0x38 (C) [ 20.669630] dump_stack_lvl+0x8c/0xd0 [ 20.669695] print_report+0x118/0x608 [ 20.669744] kasan_report+0xdc/0x128 [ 20.669791] kasan_check_range+0x100/0x1a8 [ 20.669841] __kasan_check_write+0x20/0x30 [ 20.669898] kasan_atomics_helper+0x1644/0x4858 [ 20.669947] kasan_atomics+0x198/0x2e0 [ 20.669994] kunit_try_run_case+0x170/0x3f0 [ 20.670042] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.670143] kthread+0x328/0x630 [ 20.670220] ret_from_fork+0x10/0x20 [ 20.670270] [ 20.670292] Allocated by task 265: [ 20.670321] kasan_save_stack+0x3c/0x68 [ 20.670362] kasan_save_track+0x20/0x40 [ 20.670401] kasan_save_alloc_info+0x40/0x58 [ 20.670443] __kasan_kmalloc+0xd4/0xd8 [ 20.670481] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.670643] kasan_atomics+0xb8/0x2e0 [ 20.670682] kunit_try_run_case+0x170/0x3f0 [ 20.670721] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.670773] kthread+0x328/0x630 [ 20.670871] ret_from_fork+0x10/0x20 [ 20.671044] [ 20.671164] The buggy address belongs to the object at fff00000c7832f80 [ 20.671164] which belongs to the cache kmalloc-64 of size 64 [ 20.671437] The buggy address is located 0 bytes to the right of [ 20.671437] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.671648] [ 20.671785] The buggy address belongs to the physical page: [ 20.671882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.672016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.672064] page_type: f5(slab) [ 20.672102] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.672320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.672480] page dumped because: kasan: bad access detected [ 20.672660] [ 20.672794] Memory state around the buggy address: [ 20.672922] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.673161] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.673287] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.673407] ^ [ 20.673509] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.673561] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.673717] ================================================================== [ 20.628362] ================================================================== [ 20.628409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 20.628455] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.628505] [ 20.628535] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.628618] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.628647] Hardware name: linux,dummy-virt (DT) [ 20.628678] Call trace: [ 20.628702] show_stack+0x20/0x38 (C) [ 20.628748] dump_stack_lvl+0x8c/0xd0 [ 20.628796] print_report+0x118/0x608 [ 20.628842] kasan_report+0xdc/0x128 [ 20.628889] kasan_check_range+0x100/0x1a8 [ 20.628971] __kasan_check_write+0x20/0x30 [ 20.629035] kasan_atomics_helper+0x12d8/0x4858 [ 20.629092] kasan_atomics+0x198/0x2e0 [ 20.629192] kunit_try_run_case+0x170/0x3f0 [ 20.629289] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.629346] kthread+0x328/0x630 [ 20.629398] ret_from_fork+0x10/0x20 [ 20.629494] [ 20.629538] Allocated by task 265: [ 20.629586] kasan_save_stack+0x3c/0x68 [ 20.629643] kasan_save_track+0x20/0x40 [ 20.629682] kasan_save_alloc_info+0x40/0x58 [ 20.629723] __kasan_kmalloc+0xd4/0xd8 [ 20.629786] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.629837] kasan_atomics+0xb8/0x2e0 [ 20.629876] kunit_try_run_case+0x170/0x3f0 [ 20.629926] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.629971] kthread+0x328/0x630 [ 20.630010] ret_from_fork+0x10/0x20 [ 20.630072] [ 20.630184] The buggy address belongs to the object at fff00000c7832f80 [ 20.630184] which belongs to the cache kmalloc-64 of size 64 [ 20.630326] The buggy address is located 0 bytes to the right of [ 20.630326] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.630412] [ 20.630472] The buggy address belongs to the physical page: [ 20.630542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.630596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.630642] page_type: f5(slab) [ 20.630688] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.630743] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.630806] page dumped because: kasan: bad access detected [ 20.630917] [ 20.631006] Memory state around the buggy address: [ 20.631091] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.631207] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.631282] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.631322] ^ [ 20.631357] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.631402] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.631451] ================================================================== [ 20.570834] ================================================================== [ 20.571010] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 20.571064] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.571116] [ 20.571146] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.571407] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.571442] Hardware name: linux,dummy-virt (DT) [ 20.571476] Call trace: [ 20.571501] show_stack+0x20/0x38 (C) [ 20.571563] dump_stack_lvl+0x8c/0xd0 [ 20.571612] print_report+0x118/0x608 [ 20.571661] kasan_report+0xdc/0x128 [ 20.571955] __asan_report_store8_noabort+0x20/0x30 [ 20.572066] kasan_atomics_helper+0x3e5c/0x4858 [ 20.572270] kasan_atomics+0x198/0x2e0 [ 20.572332] kunit_try_run_case+0x170/0x3f0 [ 20.572382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.572436] kthread+0x328/0x630 [ 20.572484] ret_from_fork+0x10/0x20 [ 20.572830] [ 20.573057] Allocated by task 265: [ 20.573433] kasan_save_stack+0x3c/0x68 [ 20.573543] kasan_save_track+0x20/0x40 [ 20.573874] kasan_save_alloc_info+0x40/0x58 [ 20.574007] __kasan_kmalloc+0xd4/0xd8 [ 20.574048] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.574257] kasan_atomics+0xb8/0x2e0 [ 20.574305] kunit_try_run_case+0x170/0x3f0 [ 20.574345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.574446] kthread+0x328/0x630 [ 20.574714] ret_from_fork+0x10/0x20 [ 20.574836] [ 20.574861] The buggy address belongs to the object at fff00000c7832f80 [ 20.574861] which belongs to the cache kmalloc-64 of size 64 [ 20.575199] The buggy address is located 0 bytes to the right of [ 20.575199] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.575302] [ 20.575325] The buggy address belongs to the physical page: [ 20.575357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.575421] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.575470] page_type: f5(slab) [ 20.575509] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.576062] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.576417] page dumped because: kasan: bad access detected [ 20.576690] [ 20.576714] Memory state around the buggy address: [ 20.576749] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.576842] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.577268] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.577446] ^ [ 20.577598] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.577699] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.577767] ================================================================== [ 20.619435] ================================================================== [ 20.619519] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 20.619623] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.619730] [ 20.619762] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.619847] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.619876] Hardware name: linux,dummy-virt (DT) [ 20.620145] Call trace: [ 20.620182] show_stack+0x20/0x38 (C) [ 20.620261] dump_stack_lvl+0x8c/0xd0 [ 20.620327] print_report+0x118/0x608 [ 20.620390] kasan_report+0xdc/0x128 [ 20.620474] kasan_check_range+0x100/0x1a8 [ 20.620530] __kasan_check_write+0x20/0x30 [ 20.620616] kasan_atomics_helper+0x11f8/0x4858 [ 20.620668] kasan_atomics+0x198/0x2e0 [ 20.620831] kunit_try_run_case+0x170/0x3f0 [ 20.620978] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.621036] kthread+0x328/0x630 [ 20.621081] ret_from_fork+0x10/0x20 [ 20.621149] [ 20.621208] Allocated by task 265: [ 20.621282] kasan_save_stack+0x3c/0x68 [ 20.621325] kasan_save_track+0x20/0x40 [ 20.621402] kasan_save_alloc_info+0x40/0x58 [ 20.621446] __kasan_kmalloc+0xd4/0xd8 [ 20.621764] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.622033] kasan_atomics+0xb8/0x2e0 [ 20.622639] kunit_try_run_case+0x170/0x3f0 [ 20.622695] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.622773] kthread+0x328/0x630 [ 20.622812] ret_from_fork+0x10/0x20 [ 20.622851] [ 20.622874] The buggy address belongs to the object at fff00000c7832f80 [ 20.622874] which belongs to the cache kmalloc-64 of size 64 [ 20.622934] The buggy address is located 0 bytes to the right of [ 20.622934] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.622999] [ 20.623022] The buggy address belongs to the physical page: [ 20.623055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.623108] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.623164] page_type: f5(slab) [ 20.623289] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.623410] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.623522] page dumped because: kasan: bad access detected [ 20.623557] [ 20.623578] Memory state around the buggy address: [ 20.623611] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.623944] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.624076] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.624127] ^ [ 20.624185] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.624242] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.624291] ================================================================== [ 20.649393] ================================================================== [ 20.649433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 20.649476] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.649525] [ 20.649553] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.650075] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.650262] Hardware name: linux,dummy-virt (DT) [ 20.650316] Call trace: [ 20.650340] show_stack+0x20/0x38 (C) [ 20.650392] dump_stack_lvl+0x8c/0xd0 [ 20.650438] print_report+0x118/0x608 [ 20.650499] kasan_report+0xdc/0x128 [ 20.650554] kasan_check_range+0x100/0x1a8 [ 20.650603] __kasan_check_write+0x20/0x30 [ 20.650654] kasan_atomics_helper+0x14e4/0x4858 [ 20.650703] kasan_atomics+0x198/0x2e0 [ 20.650777] kunit_try_run_case+0x170/0x3f0 [ 20.650828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.650902] kthread+0x328/0x630 [ 20.651023] ret_from_fork+0x10/0x20 [ 20.651233] [ 20.651313] Allocated by task 265: [ 20.651636] kasan_save_stack+0x3c/0x68 [ 20.651710] kasan_save_track+0x20/0x40 [ 20.651854] kasan_save_alloc_info+0x40/0x58 [ 20.651916] __kasan_kmalloc+0xd4/0xd8 [ 20.651955] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.652253] kasan_atomics+0xb8/0x2e0 [ 20.652364] kunit_try_run_case+0x170/0x3f0 [ 20.652499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.652632] kthread+0x328/0x630 [ 20.652912] ret_from_fork+0x10/0x20 [ 20.652963] [ 20.653095] The buggy address belongs to the object at fff00000c7832f80 [ 20.653095] which belongs to the cache kmalloc-64 of size 64 [ 20.653296] The buggy address is located 0 bytes to the right of [ 20.653296] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.653465] [ 20.653572] The buggy address belongs to the physical page: [ 20.653625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.653677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.653961] page_type: f5(slab) [ 20.654298] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.654435] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.654627] page dumped because: kasan: bad access detected [ 20.654844] [ 20.654935] Memory state around the buggy address: [ 20.655056] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.655123] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.655177] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.655243] ^ [ 20.655334] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.655489] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.655677] ================================================================== [ 20.595877] ================================================================== [ 20.595955] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 20.596151] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.596215] [ 20.596247] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.596336] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.596367] Hardware name: linux,dummy-virt (DT) [ 20.596398] Call trace: [ 20.596422] show_stack+0x20/0x38 (C) [ 20.596526] dump_stack_lvl+0x8c/0xd0 [ 20.596827] print_report+0x118/0x608 [ 20.596893] kasan_report+0xdc/0x128 [ 20.596981] kasan_check_range+0x100/0x1a8 [ 20.597032] __kasan_check_write+0x20/0x30 [ 20.597299] kasan_atomics_helper+0xff0/0x4858 [ 20.597353] kasan_atomics+0x198/0x2e0 [ 20.597401] kunit_try_run_case+0x170/0x3f0 [ 20.597451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.597505] kthread+0x328/0x630 [ 20.597552] ret_from_fork+0x10/0x20 [ 20.597601] [ 20.597623] Allocated by task 265: [ 20.597658] kasan_save_stack+0x3c/0x68 [ 20.597816] kasan_save_track+0x20/0x40 [ 20.597858] kasan_save_alloc_info+0x40/0x58 [ 20.597900] __kasan_kmalloc+0xd4/0xd8 [ 20.597937] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.597979] kasan_atomics+0xb8/0x2e0 [ 20.598593] kunit_try_run_case+0x170/0x3f0 [ 20.598722] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.598776] kthread+0x328/0x630 [ 20.598816] ret_from_fork+0x10/0x20 [ 20.598866] [ 20.598888] The buggy address belongs to the object at fff00000c7832f80 [ 20.598888] which belongs to the cache kmalloc-64 of size 64 [ 20.598955] The buggy address is located 0 bytes to the right of [ 20.598955] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.599355] [ 20.599410] The buggy address belongs to the physical page: [ 20.599445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.599521] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.599729] page_type: f5(slab) [ 20.599767] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.599905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.600014] page dumped because: kasan: bad access detected [ 20.600099] [ 20.600153] Memory state around the buggy address: [ 20.600197] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.600332] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.600411] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.600518] ^ [ 20.600620] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.600718] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.600841] ================================================================== [ 20.676876] ================================================================== [ 20.676919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 20.676964] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.677014] [ 20.677042] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.677127] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.677166] Hardware name: linux,dummy-virt (DT) [ 20.677199] Call trace: [ 20.677221] show_stack+0x20/0x38 (C) [ 20.677271] dump_stack_lvl+0x8c/0xd0 [ 20.677317] print_report+0x118/0x608 [ 20.677364] kasan_report+0xdc/0x128 [ 20.677410] kasan_check_range+0x100/0x1a8 [ 20.677460] __kasan_check_write+0x20/0x30 [ 20.677509] kasan_atomics_helper+0x16d0/0x4858 [ 20.677567] kasan_atomics+0x198/0x2e0 [ 20.677615] kunit_try_run_case+0x170/0x3f0 [ 20.677662] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.677716] kthread+0x328/0x630 [ 20.677772] ret_from_fork+0x10/0x20 [ 20.677821] [ 20.677843] Allocated by task 265: [ 20.677872] kasan_save_stack+0x3c/0x68 [ 20.677914] kasan_save_track+0x20/0x40 [ 20.677954] kasan_save_alloc_info+0x40/0x58 [ 20.677996] __kasan_kmalloc+0xd4/0xd8 [ 20.678033] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.678075] kasan_atomics+0xb8/0x2e0 [ 20.678184] kunit_try_run_case+0x170/0x3f0 [ 20.678265] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.678466] kthread+0x328/0x630 [ 20.678633] ret_from_fork+0x10/0x20 [ 20.678702] [ 20.678727] The buggy address belongs to the object at fff00000c7832f80 [ 20.678727] which belongs to the cache kmalloc-64 of size 64 [ 20.678801] The buggy address is located 0 bytes to the right of [ 20.678801] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.678882] [ 20.678906] The buggy address belongs to the physical page: [ 20.678938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.678989] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.679323] page_type: f5(slab) [ 20.679428] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.679553] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.679724] page dumped because: kasan: bad access detected [ 20.679785] [ 20.680091] Memory state around the buggy address: [ 20.680168] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.680215] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.680260] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.680591] ^ [ 20.680673] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.680810] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.680929] ================================================================== [ 20.582817] ================================================================== [ 20.582870] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 20.582944] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.583003] [ 20.583131] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.583229] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.583259] Hardware name: linux,dummy-virt (DT) [ 20.583299] Call trace: [ 20.583423] show_stack+0x20/0x38 (C) [ 20.584018] dump_stack_lvl+0x8c/0xd0 [ 20.584067] print_report+0x118/0x608 [ 20.584115] kasan_report+0xdc/0x128 [ 20.584172] kasan_check_range+0x100/0x1a8 [ 20.584222] __kasan_check_write+0x20/0x30 [ 20.584273] kasan_atomics_helper+0xf20/0x4858 [ 20.584323] kasan_atomics+0x198/0x2e0 [ 20.584369] kunit_try_run_case+0x170/0x3f0 [ 20.584419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.584480] kthread+0x328/0x630 [ 20.584709] ret_from_fork+0x10/0x20 [ 20.584954] [ 20.585059] Allocated by task 265: [ 20.585134] kasan_save_stack+0x3c/0x68 [ 20.585184] kasan_save_track+0x20/0x40 [ 20.585222] kasan_save_alloc_info+0x40/0x58 [ 20.585265] __kasan_kmalloc+0xd4/0xd8 [ 20.585304] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.585346] kasan_atomics+0xb8/0x2e0 [ 20.585384] kunit_try_run_case+0x170/0x3f0 [ 20.585423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.585468] kthread+0x328/0x630 [ 20.585517] ret_from_fork+0x10/0x20 [ 20.586020] [ 20.586169] The buggy address belongs to the object at fff00000c7832f80 [ 20.586169] which belongs to the cache kmalloc-64 of size 64 [ 20.586348] The buggy address is located 0 bytes to the right of [ 20.586348] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.586418] [ 20.586893] The buggy address belongs to the physical page: [ 20.586930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.586984] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.587035] page_type: f5(slab) [ 20.587074] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.587125] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.587566] page dumped because: kasan: bad access detected [ 20.587981] [ 20.588005] Memory state around the buggy address: [ 20.588109] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.588527] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.588591] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.588723] ^ [ 20.588992] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.589184] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.589267] ================================================================== [ 20.542553] ================================================================== [ 20.542623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 20.542685] Write of size 4 at addr fff00000c7832fb0 by task kunit_try_catch/265 [ 20.542865] [ 20.542899] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 20.542990] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.543281] Hardware name: linux,dummy-virt (DT) [ 20.543357] Call trace: [ 20.543381] show_stack+0x20/0x38 (C) [ 20.543441] dump_stack_lvl+0x8c/0xd0 [ 20.543702] print_report+0x118/0x608 [ 20.543833] kasan_report+0xdc/0x128 [ 20.543880] kasan_check_range+0x100/0x1a8 [ 20.543930] __kasan_check_write+0x20/0x30 [ 20.543980] kasan_atomics_helper+0xd3c/0x4858 [ 20.544037] kasan_atomics+0x198/0x2e0 [ 20.544306] kunit_try_run_case+0x170/0x3f0 [ 20.544476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.544593] kthread+0x328/0x630 [ 20.544817] ret_from_fork+0x10/0x20 [ 20.545002] [ 20.545059] Allocated by task 265: [ 20.545090] kasan_save_stack+0x3c/0x68 [ 20.545141] kasan_save_track+0x20/0x40 [ 20.545200] kasan_save_alloc_info+0x40/0x58 [ 20.545243] __kasan_kmalloc+0xd4/0xd8 [ 20.545282] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.545323] kasan_atomics+0xb8/0x2e0 [ 20.545361] kunit_try_run_case+0x170/0x3f0 [ 20.545400] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.545443] kthread+0x328/0x630 [ 20.545480] ret_from_fork+0x10/0x20 [ 20.545518] [ 20.545539] The buggy address belongs to the object at fff00000c7832f80 [ 20.545539] which belongs to the cache kmalloc-64 of size 64 [ 20.545597] The buggy address is located 0 bytes to the right of [ 20.545597] allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0) [ 20.545661] [ 20.545682] The buggy address belongs to the physical page: [ 20.545714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832 [ 20.545790] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.545839] page_type: f5(slab) [ 20.545878] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.545931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.545973] page dumped because: kasan: bad access detected [ 20.546007] [ 20.546027] Memory state around the buggy address: [ 20.546060] fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.546104] fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.546148] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.546197] ^ [ 20.546231] fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.546274] fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.546313] ==================================================================
[ 17.087873] ================================================================== [ 17.088038] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 17.088183] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.088329] [ 17.088541] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.088598] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.088613] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.088636] Call Trace: [ 17.088654] <TASK> [ 17.088673] dump_stack_lvl+0x73/0xb0 [ 17.088704] print_report+0xd1/0x650 [ 17.088727] ? __virt_addr_valid+0x1db/0x2d0 [ 17.088753] ? kasan_atomics_helper+0xa2b/0x5450 [ 17.088775] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.088798] ? kasan_atomics_helper+0xa2b/0x5450 [ 17.088819] kasan_report+0x141/0x180 [ 17.088843] ? kasan_atomics_helper+0xa2b/0x5450 [ 17.088869] kasan_check_range+0x10c/0x1c0 [ 17.088894] __kasan_check_write+0x18/0x20 [ 17.088915] kasan_atomics_helper+0xa2b/0x5450 [ 17.088938] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.088961] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.088983] ? kasan_atomics+0x152/0x310 [ 17.089010] kasan_atomics+0x1dc/0x310 [ 17.089034] ? __pfx_kasan_atomics+0x10/0x10 [ 17.089058] ? __pfx_read_tsc+0x10/0x10 [ 17.089080] ? ktime_get_ts64+0x86/0x230 [ 17.089105] kunit_try_run_case+0x1a5/0x480 [ 17.089131] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.089153] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.089176] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.089198] ? __kthread_parkme+0x82/0x180 [ 17.089226] ? preempt_count_sub+0x50/0x80 [ 17.089257] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.089282] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.089306] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.089330] kthread+0x337/0x6f0 [ 17.089351] ? trace_preempt_on+0x20/0xc0 [ 17.089376] ? __pfx_kthread+0x10/0x10 [ 17.089398] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.089420] ? calculate_sigpending+0x7b/0xa0 [ 17.089446] ? __pfx_kthread+0x10/0x10 [ 17.089535] ret_from_fork+0x116/0x1d0 [ 17.089556] ? __pfx_kthread+0x10/0x10 [ 17.089579] ret_from_fork_asm+0x1a/0x30 [ 17.089613] </TASK> [ 17.089627] [ 17.096374] Allocated by task 283: [ 17.096534] kasan_save_stack+0x45/0x70 [ 17.096811] kasan_save_track+0x18/0x40 [ 17.097067] kasan_save_alloc_info+0x3b/0x50 [ 17.097317] __kasan_kmalloc+0xb7/0xc0 [ 17.097557] __kmalloc_cache_noprof+0x189/0x420 [ 17.097747] kasan_atomics+0x95/0x310 [ 17.097870] kunit_try_run_case+0x1a5/0x480 [ 17.098050] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.098265] kthread+0x337/0x6f0 [ 17.098403] ret_from_fork+0x116/0x1d0 [ 17.098792] ret_from_fork_asm+0x1a/0x30 [ 17.098968] [ 17.099097] The buggy address belongs to the object at ffff888102b6b880 [ 17.099097] which belongs to the cache kmalloc-64 of size 64 [ 17.099399] The buggy address is located 0 bytes to the right of [ 17.099399] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.099689] [ 17.099748] The buggy address belongs to the physical page: [ 17.099856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.100003] flags: 0x200000000000000(node=0|zone=2) [ 17.100107] page_type: f5(slab) [ 17.100293] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.100815] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.101243] page dumped because: kasan: bad access detected [ 17.101617] [ 17.101740] Memory state around the buggy address: [ 17.102021] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.102441] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.102780] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.102910] ^ [ 17.103011] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.103432] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.104019] ================================================================== [ 17.398548] ================================================================== [ 17.398902] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 17.399083] Read of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.399237] [ 17.399322] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.399379] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.399395] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.399422] Call Trace: [ 17.399448] <TASK> [ 17.399471] dump_stack_lvl+0x73/0xb0 [ 17.399503] print_report+0xd1/0x650 [ 17.399529] ? __virt_addr_valid+0x1db/0x2d0 [ 17.399555] ? kasan_atomics_helper+0x13b5/0x5450 [ 17.399581] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.399605] ? kasan_atomics_helper+0x13b5/0x5450 [ 17.399629] kasan_report+0x141/0x180 [ 17.399654] ? kasan_atomics_helper+0x13b5/0x5450 [ 17.399683] kasan_check_range+0x10c/0x1c0 [ 17.399709] __kasan_check_read+0x15/0x20 [ 17.399730] kasan_atomics_helper+0x13b5/0x5450 [ 17.399755] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.399779] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.399802] ? kasan_atomics+0x152/0x310 [ 17.399831] kasan_atomics+0x1dc/0x310 [ 17.399856] ? __pfx_kasan_atomics+0x10/0x10 [ 17.399882] ? __pfx_read_tsc+0x10/0x10 [ 17.399905] ? ktime_get_ts64+0x86/0x230 [ 17.399930] kunit_try_run_case+0x1a5/0x480 [ 17.399955] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.399978] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.400002] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.400026] ? __kthread_parkme+0x82/0x180 [ 17.400047] ? preempt_count_sub+0x50/0x80 [ 17.400071] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.400095] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.400118] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.400142] kthread+0x337/0x6f0 [ 17.400162] ? trace_preempt_on+0x20/0xc0 [ 17.400186] ? __pfx_kthread+0x10/0x10 [ 17.400209] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.400250] ? calculate_sigpending+0x7b/0xa0 [ 17.400991] ? __pfx_kthread+0x10/0x10 [ 17.401033] ret_from_fork+0x116/0x1d0 [ 17.401056] ? __pfx_kthread+0x10/0x10 [ 17.401079] ret_from_fork_asm+0x1a/0x30 [ 17.401113] </TASK> [ 17.401126] [ 17.408960] Allocated by task 283: [ 17.409161] kasan_save_stack+0x45/0x70 [ 17.409385] kasan_save_track+0x18/0x40 [ 17.409617] kasan_save_alloc_info+0x3b/0x50 [ 17.409854] __kasan_kmalloc+0xb7/0xc0 [ 17.409985] __kmalloc_cache_noprof+0x189/0x420 [ 17.410098] kasan_atomics+0x95/0x310 [ 17.410314] kunit_try_run_case+0x1a5/0x480 [ 17.410514] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.410746] kthread+0x337/0x6f0 [ 17.410975] ret_from_fork+0x116/0x1d0 [ 17.411165] ret_from_fork_asm+0x1a/0x30 [ 17.411315] [ 17.411422] The buggy address belongs to the object at ffff888102b6b880 [ 17.411422] which belongs to the cache kmalloc-64 of size 64 [ 17.411842] The buggy address is located 0 bytes to the right of [ 17.411842] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.412216] [ 17.412329] The buggy address belongs to the physical page: [ 17.412534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.412847] flags: 0x200000000000000(node=0|zone=2) [ 17.413096] page_type: f5(slab) [ 17.413212] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.413397] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.413837] page dumped because: kasan: bad access detected [ 17.414065] [ 17.414121] Memory state around the buggy address: [ 17.414229] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.414376] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.414698] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.414986] ^ [ 17.415216] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.415472] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.415651] ================================================================== [ 17.241979] ================================================================== [ 17.242455] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 17.243492] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.243939] [ 17.244048] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.244101] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.244113] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.244137] Call Trace: [ 17.244153] <TASK> [ 17.244172] dump_stack_lvl+0x73/0xb0 [ 17.244201] print_report+0xd1/0x650 [ 17.244234] ? __virt_addr_valid+0x1db/0x2d0 [ 17.244261] ? kasan_atomics_helper+0xfa9/0x5450 [ 17.244284] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.244307] ? kasan_atomics_helper+0xfa9/0x5450 [ 17.244330] kasan_report+0x141/0x180 [ 17.244353] ? kasan_atomics_helper+0xfa9/0x5450 [ 17.244380] kasan_check_range+0x10c/0x1c0 [ 17.244404] __kasan_check_write+0x18/0x20 [ 17.244425] kasan_atomics_helper+0xfa9/0x5450 [ 17.244447] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.244471] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.244493] ? kasan_atomics+0x152/0x310 [ 17.244521] kasan_atomics+0x1dc/0x310 [ 17.244544] ? __pfx_kasan_atomics+0x10/0x10 [ 17.244569] ? __pfx_read_tsc+0x10/0x10 [ 17.244591] ? ktime_get_ts64+0x86/0x230 [ 17.244615] kunit_try_run_case+0x1a5/0x480 [ 17.244640] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.244663] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.244687] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.244709] ? __kthread_parkme+0x82/0x180 [ 17.244730] ? preempt_count_sub+0x50/0x80 [ 17.244755] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.244779] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.244802] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.244825] kthread+0x337/0x6f0 [ 17.244845] ? trace_preempt_on+0x20/0xc0 [ 17.244868] ? __pfx_kthread+0x10/0x10 [ 17.244890] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.244911] ? calculate_sigpending+0x7b/0xa0 [ 17.244937] ? __pfx_kthread+0x10/0x10 [ 17.244959] ret_from_fork+0x116/0x1d0 [ 17.244978] ? __pfx_kthread+0x10/0x10 [ 17.244999] ret_from_fork_asm+0x1a/0x30 [ 17.245031] </TASK> [ 17.245044] [ 17.250610] Allocated by task 283: [ 17.250696] kasan_save_stack+0x45/0x70 [ 17.250791] kasan_save_track+0x18/0x40 [ 17.250881] kasan_save_alloc_info+0x3b/0x50 [ 17.250973] __kasan_kmalloc+0xb7/0xc0 [ 17.251057] __kmalloc_cache_noprof+0x189/0x420 [ 17.251148] kasan_atomics+0x95/0x310 [ 17.251245] kunit_try_run_case+0x1a5/0x480 [ 17.251391] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.251685] kthread+0x337/0x6f0 [ 17.251896] ret_from_fork+0x116/0x1d0 [ 17.252133] ret_from_fork_asm+0x1a/0x30 [ 17.252386] [ 17.252504] The buggy address belongs to the object at ffff888102b6b880 [ 17.252504] which belongs to the cache kmalloc-64 of size 64 [ 17.253022] The buggy address is located 0 bytes to the right of [ 17.253022] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.253612] [ 17.253669] The buggy address belongs to the physical page: [ 17.253774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.253915] flags: 0x200000000000000(node=0|zone=2) [ 17.254168] page_type: f5(slab) [ 17.254381] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.254784] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.255127] page dumped because: kasan: bad access detected [ 17.255337] [ 17.255408] Memory state around the buggy address: [ 17.255510] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.255635] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.255760] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.255876] ^ [ 17.255968] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.256090] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.256210] ================================================================== [ 16.946760] ================================================================== [ 16.947073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 16.947406] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 16.947623] [ 16.947767] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.947822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.947836] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.947859] Call Trace: [ 16.947878] <TASK> [ 16.947898] dump_stack_lvl+0x73/0xb0 [ 16.947928] print_report+0xd1/0x650 [ 16.947953] ? __virt_addr_valid+0x1db/0x2d0 [ 16.947978] ? kasan_atomics_helper+0x565/0x5450 [ 16.948000] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.948024] ? kasan_atomics_helper+0x565/0x5450 [ 16.948048] kasan_report+0x141/0x180 [ 16.948073] ? kasan_atomics_helper+0x565/0x5450 [ 16.948102] kasan_check_range+0x10c/0x1c0 [ 16.948128] __kasan_check_write+0x18/0x20 [ 16.948149] kasan_atomics_helper+0x565/0x5450 [ 16.948173] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.948203] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.948238] ? kasan_atomics+0x152/0x310 [ 16.948270] kasan_atomics+0x1dc/0x310 [ 16.948295] ? __pfx_kasan_atomics+0x10/0x10 [ 16.948321] ? __pfx_read_tsc+0x10/0x10 [ 16.948343] ? ktime_get_ts64+0x86/0x230 [ 16.948369] kunit_try_run_case+0x1a5/0x480 [ 16.948396] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.948418] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.948442] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.948527] ? __kthread_parkme+0x82/0x180 [ 16.948551] ? preempt_count_sub+0x50/0x80 [ 16.948578] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.948603] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.948640] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.948664] kthread+0x337/0x6f0 [ 16.948696] ? trace_preempt_on+0x20/0xc0 [ 16.948723] ? __pfx_kthread+0x10/0x10 [ 16.948746] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.948768] ? calculate_sigpending+0x7b/0xa0 [ 16.948793] ? __pfx_kthread+0x10/0x10 [ 16.948816] ret_from_fork+0x116/0x1d0 [ 16.948835] ? __pfx_kthread+0x10/0x10 [ 16.948858] ret_from_fork_asm+0x1a/0x30 [ 16.948889] </TASK> [ 16.948901] [ 16.955056] Allocated by task 283: [ 16.955285] kasan_save_stack+0x45/0x70 [ 16.955528] kasan_save_track+0x18/0x40 [ 16.955778] kasan_save_alloc_info+0x3b/0x50 [ 16.956017] __kasan_kmalloc+0xb7/0xc0 [ 16.956200] __kmalloc_cache_noprof+0x189/0x420 [ 16.956423] kasan_atomics+0x95/0x310 [ 16.956669] kunit_try_run_case+0x1a5/0x480 [ 16.956889] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.957120] kthread+0x337/0x6f0 [ 16.957302] ret_from_fork+0x116/0x1d0 [ 16.957526] ret_from_fork_asm+0x1a/0x30 [ 16.957733] [ 16.958126] The buggy address belongs to the object at ffff888102b6b880 [ 16.958126] which belongs to the cache kmalloc-64 of size 64 [ 16.958355] The buggy address is located 0 bytes to the right of [ 16.958355] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 16.958637] [ 16.958698] The buggy address belongs to the physical page: [ 16.958861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 16.959336] flags: 0x200000000000000(node=0|zone=2) [ 16.959662] page_type: f5(slab) [ 16.959895] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.960333] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.960638] page dumped because: kasan: bad access detected [ 16.960907] [ 16.960965] Memory state around the buggy address: [ 16.961062] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.961189] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.961604] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.962008] ^ [ 16.962179] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.962697] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.962845] ================================================================== [ 17.014961] ================================================================== [ 17.015300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 17.015703] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.016007] [ 17.016118] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.016171] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.016185] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.016208] Call Trace: [ 17.016234] <TASK> [ 17.016258] dump_stack_lvl+0x73/0xb0 [ 17.016288] print_report+0xd1/0x650 [ 17.016312] ? __virt_addr_valid+0x1db/0x2d0 [ 17.016337] ? kasan_atomics_helper+0x7c7/0x5450 [ 17.016360] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.016384] ? kasan_atomics_helper+0x7c7/0x5450 [ 17.016407] kasan_report+0x141/0x180 [ 17.016431] ? kasan_atomics_helper+0x7c7/0x5450 [ 17.016475] kasan_check_range+0x10c/0x1c0 [ 17.016581] __kasan_check_write+0x18/0x20 [ 17.016605] kasan_atomics_helper+0x7c7/0x5450 [ 17.016631] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.016655] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.016678] ? kasan_atomics+0x152/0x310 [ 17.016706] kasan_atomics+0x1dc/0x310 [ 17.016731] ? __pfx_kasan_atomics+0x10/0x10 [ 17.016757] ? __pfx_read_tsc+0x10/0x10 [ 17.016779] ? ktime_get_ts64+0x86/0x230 [ 17.016806] kunit_try_run_case+0x1a5/0x480 [ 17.016831] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.016855] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.016879] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.016903] ? __kthread_parkme+0x82/0x180 [ 17.016925] ? preempt_count_sub+0x50/0x80 [ 17.016950] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.016976] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.017000] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.017024] kthread+0x337/0x6f0 [ 17.017045] ? trace_preempt_on+0x20/0xc0 [ 17.017070] ? __pfx_kthread+0x10/0x10 [ 17.017093] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.017115] ? calculate_sigpending+0x7b/0xa0 [ 17.017140] ? __pfx_kthread+0x10/0x10 [ 17.017163] ret_from_fork+0x116/0x1d0 [ 17.017182] ? __pfx_kthread+0x10/0x10 [ 17.017203] ret_from_fork_asm+0x1a/0x30 [ 17.017252] </TASK> [ 17.017268] [ 17.024825] Allocated by task 283: [ 17.025008] kasan_save_stack+0x45/0x70 [ 17.025138] kasan_save_track+0x18/0x40 [ 17.025401] kasan_save_alloc_info+0x3b/0x50 [ 17.025703] __kasan_kmalloc+0xb7/0xc0 [ 17.026031] __kmalloc_cache_noprof+0x189/0x420 [ 17.026326] kasan_atomics+0x95/0x310 [ 17.026527] kunit_try_run_case+0x1a5/0x480 [ 17.026663] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.026776] kthread+0x337/0x6f0 [ 17.026908] ret_from_fork+0x116/0x1d0 [ 17.027137] ret_from_fork_asm+0x1a/0x30 [ 17.027384] [ 17.027497] The buggy address belongs to the object at ffff888102b6b880 [ 17.027497] which belongs to the cache kmalloc-64 of size 64 [ 17.027709] The buggy address is located 0 bytes to the right of [ 17.027709] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.028166] [ 17.028319] The buggy address belongs to the physical page: [ 17.028826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.029202] flags: 0x200000000000000(node=0|zone=2) [ 17.029465] page_type: f5(slab) [ 17.029596] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.029842] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.030213] page dumped because: kasan: bad access detected [ 17.030331] [ 17.030399] Memory state around the buggy address: [ 17.030503] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.030631] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.030761] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.030963] ^ [ 17.031215] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.031763] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.031995] ================================================================== [ 17.336134] ================================================================== [ 17.336387] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 17.336801] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.336970] [ 17.337112] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.337163] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.337177] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.337200] Call Trace: [ 17.337216] <TASK> [ 17.337245] dump_stack_lvl+0x73/0xb0 [ 17.337274] print_report+0xd1/0x650 [ 17.337298] ? __virt_addr_valid+0x1db/0x2d0 [ 17.337322] ? kasan_atomics_helper+0x1217/0x5450 [ 17.337345] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.337369] ? kasan_atomics_helper+0x1217/0x5450 [ 17.337392] kasan_report+0x141/0x180 [ 17.337416] ? kasan_atomics_helper+0x1217/0x5450 [ 17.337444] kasan_check_range+0x10c/0x1c0 [ 17.337469] __kasan_check_write+0x18/0x20 [ 17.337490] kasan_atomics_helper+0x1217/0x5450 [ 17.337515] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.337539] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.337561] ? kasan_atomics+0x152/0x310 [ 17.337588] kasan_atomics+0x1dc/0x310 [ 17.337613] ? __pfx_kasan_atomics+0x10/0x10 [ 17.337638] ? __pfx_read_tsc+0x10/0x10 [ 17.337659] ? ktime_get_ts64+0x86/0x230 [ 17.337684] kunit_try_run_case+0x1a5/0x480 [ 17.337708] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.337731] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.337755] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.337778] ? __kthread_parkme+0x82/0x180 [ 17.337799] ? preempt_count_sub+0x50/0x80 [ 17.337824] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.337849] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.337872] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.337896] kthread+0x337/0x6f0 [ 17.337917] ? trace_preempt_on+0x20/0xc0 [ 17.337942] ? __pfx_kthread+0x10/0x10 [ 17.337963] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.337985] ? calculate_sigpending+0x7b/0xa0 [ 17.338010] ? __pfx_kthread+0x10/0x10 [ 17.338032] ret_from_fork+0x116/0x1d0 [ 17.338051] ? __pfx_kthread+0x10/0x10 [ 17.338073] ret_from_fork_asm+0x1a/0x30 [ 17.338135] </TASK> [ 17.338146] [ 17.344104] Allocated by task 283: [ 17.344191] kasan_save_stack+0x45/0x70 [ 17.344298] kasan_save_track+0x18/0x40 [ 17.344389] kasan_save_alloc_info+0x3b/0x50 [ 17.344483] __kasan_kmalloc+0xb7/0xc0 [ 17.344569] __kmalloc_cache_noprof+0x189/0x420 [ 17.344662] kasan_atomics+0x95/0x310 [ 17.344748] kunit_try_run_case+0x1a5/0x480 [ 17.344838] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.344942] kthread+0x337/0x6f0 [ 17.345019] ret_from_fork+0x116/0x1d0 [ 17.345102] ret_from_fork_asm+0x1a/0x30 [ 17.345187] [ 17.345255] The buggy address belongs to the object at ffff888102b6b880 [ 17.345255] which belongs to the cache kmalloc-64 of size 64 [ 17.345875] The buggy address is located 0 bytes to the right of [ 17.345875] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.346598] [ 17.346730] The buggy address belongs to the physical page: [ 17.347079] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.347563] flags: 0x200000000000000(node=0|zone=2) [ 17.347861] page_type: f5(slab) [ 17.348075] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.348262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.348441] page dumped because: kasan: bad access detected [ 17.348572] [ 17.348633] Memory state around the buggy address: [ 17.348758] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.348928] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.349273] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.349685] ^ [ 17.349990] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.350438] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.350826] ================================================================== [ 17.712197] ================================================================== [ 17.712605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 17.712989] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.713376] [ 17.713510] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.713562] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.713577] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.713601] Call Trace: [ 17.713619] <TASK> [ 17.713636] dump_stack_lvl+0x73/0xb0 [ 17.713664] print_report+0xd1/0x650 [ 17.713688] ? __virt_addr_valid+0x1db/0x2d0 [ 17.713712] ? kasan_atomics_helper+0x1eaa/0x5450 [ 17.713735] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.713759] ? kasan_atomics_helper+0x1eaa/0x5450 [ 17.713782] kasan_report+0x141/0x180 [ 17.713806] ? kasan_atomics_helper+0x1eaa/0x5450 [ 17.713834] kasan_check_range+0x10c/0x1c0 [ 17.713859] __kasan_check_write+0x18/0x20 [ 17.713880] kasan_atomics_helper+0x1eaa/0x5450 [ 17.713904] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.713928] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.713950] ? kasan_atomics+0x152/0x310 [ 17.713978] kasan_atomics+0x1dc/0x310 [ 17.714003] ? __pfx_kasan_atomics+0x10/0x10 [ 17.714029] ? __pfx_read_tsc+0x10/0x10 [ 17.714050] ? ktime_get_ts64+0x86/0x230 [ 17.714075] kunit_try_run_case+0x1a5/0x480 [ 17.714099] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.714121] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.714145] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.714168] ? __kthread_parkme+0x82/0x180 [ 17.714189] ? preempt_count_sub+0x50/0x80 [ 17.714213] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.714272] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.714307] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.714347] kthread+0x337/0x6f0 [ 17.714380] ? trace_preempt_on+0x20/0xc0 [ 17.714406] ? __pfx_kthread+0x10/0x10 [ 17.714440] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.714464] ? calculate_sigpending+0x7b/0xa0 [ 17.714489] ? __pfx_kthread+0x10/0x10 [ 17.714514] ret_from_fork+0x116/0x1d0 [ 17.714534] ? __pfx_kthread+0x10/0x10 [ 17.714559] ret_from_fork_asm+0x1a/0x30 [ 17.714591] </TASK> [ 17.714604] [ 17.720203] Allocated by task 283: [ 17.720368] kasan_save_stack+0x45/0x70 [ 17.720564] kasan_save_track+0x18/0x40 [ 17.720787] kasan_save_alloc_info+0x3b/0x50 [ 17.720924] __kasan_kmalloc+0xb7/0xc0 [ 17.721069] __kmalloc_cache_noprof+0x189/0x420 [ 17.721279] kasan_atomics+0x95/0x310 [ 17.721436] kunit_try_run_case+0x1a5/0x480 [ 17.721603] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.721754] kthread+0x337/0x6f0 [ 17.721924] ret_from_fork+0x116/0x1d0 [ 17.722056] ret_from_fork_asm+0x1a/0x30 [ 17.722213] [ 17.722316] The buggy address belongs to the object at ffff888102b6b880 [ 17.722316] which belongs to the cache kmalloc-64 of size 64 [ 17.722671] The buggy address is located 0 bytes to the right of [ 17.722671] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.723039] [ 17.723123] The buggy address belongs to the physical page: [ 17.723281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.723464] flags: 0x200000000000000(node=0|zone=2) [ 17.723607] page_type: f5(slab) [ 17.723711] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.723892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.724136] page dumped because: kasan: bad access detected [ 17.724362] [ 17.724449] Memory state around the buggy address: [ 17.724656] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.724931] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.725205] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.725487] ^ [ 17.725693] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.725984] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.726262] ================================================================== [ 17.530094] ================================================================== [ 17.530844] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 17.531288] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.531755] [ 17.531904] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.531955] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.531968] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.531991] Call Trace: [ 17.532008] <TASK> [ 17.532024] dump_stack_lvl+0x73/0xb0 [ 17.532051] print_report+0xd1/0x650 [ 17.532075] ? __virt_addr_valid+0x1db/0x2d0 [ 17.532100] ? kasan_atomics_helper+0x177f/0x5450 [ 17.532122] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.532147] ? kasan_atomics_helper+0x177f/0x5450 [ 17.532170] kasan_report+0x141/0x180 [ 17.532193] ? kasan_atomics_helper+0x177f/0x5450 [ 17.532232] kasan_check_range+0x10c/0x1c0 [ 17.532262] __kasan_check_write+0x18/0x20 [ 17.532282] kasan_atomics_helper+0x177f/0x5450 [ 17.532306] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.532330] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.532365] ? kasan_atomics+0x152/0x310 [ 17.532395] kasan_atomics+0x1dc/0x310 [ 17.532420] ? __pfx_kasan_atomics+0x10/0x10 [ 17.532460] ? __pfx_read_tsc+0x10/0x10 [ 17.532483] ? ktime_get_ts64+0x86/0x230 [ 17.532518] kunit_try_run_case+0x1a5/0x480 [ 17.532546] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.532569] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.532605] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.532630] ? __kthread_parkme+0x82/0x180 [ 17.532665] ? preempt_count_sub+0x50/0x80 [ 17.532689] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.532725] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.532752] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.532784] kthread+0x337/0x6f0 [ 17.532810] ? trace_preempt_on+0x20/0xc0 [ 17.532835] ? __pfx_kthread+0x10/0x10 [ 17.532869] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.532893] ? calculate_sigpending+0x7b/0xa0 [ 17.532929] ? __pfx_kthread+0x10/0x10 [ 17.532954] ret_from_fork+0x116/0x1d0 [ 17.532975] ? __pfx_kthread+0x10/0x10 [ 17.533009] ret_from_fork_asm+0x1a/0x30 [ 17.533043] </TASK> [ 17.533066] [ 17.539081] Allocated by task 283: [ 17.539196] kasan_save_stack+0x45/0x70 [ 17.539481] kasan_save_track+0x18/0x40 [ 17.539736] kasan_save_alloc_info+0x3b/0x50 [ 17.539950] __kasan_kmalloc+0xb7/0xc0 [ 17.540040] __kmalloc_cache_noprof+0x189/0x420 [ 17.540138] kasan_atomics+0x95/0x310 [ 17.540234] kunit_try_run_case+0x1a5/0x480 [ 17.540332] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.540439] kthread+0x337/0x6f0 [ 17.540519] ret_from_fork+0x116/0x1d0 [ 17.540602] ret_from_fork_asm+0x1a/0x30 [ 17.540691] [ 17.540745] The buggy address belongs to the object at ffff888102b6b880 [ 17.540745] which belongs to the cache kmalloc-64 of size 64 [ 17.540941] The buggy address is located 0 bytes to the right of [ 17.540941] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.541365] [ 17.541493] The buggy address belongs to the physical page: [ 17.541821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.542279] flags: 0x200000000000000(node=0|zone=2) [ 17.542575] page_type: f5(slab) [ 17.542801] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.543244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.543692] page dumped because: kasan: bad access detected [ 17.544001] [ 17.544113] Memory state around the buggy address: [ 17.544337] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.544646] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.544773] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.544894] ^ [ 17.544987] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.545108] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.545238] ================================================================== [ 17.741403] ================================================================== [ 17.741723] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 17.742016] Read of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.742347] [ 17.742483] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.742541] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.742555] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.742577] Call Trace: [ 17.742601] <TASK> [ 17.742618] dump_stack_lvl+0x73/0xb0 [ 17.742653] print_report+0xd1/0x650 [ 17.742678] ? __virt_addr_valid+0x1db/0x2d0 [ 17.742703] ? kasan_atomics_helper+0x4f71/0x5450 [ 17.742725] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.742748] ? kasan_atomics_helper+0x4f71/0x5450 [ 17.742771] kasan_report+0x141/0x180 [ 17.742794] ? kasan_atomics_helper+0x4f71/0x5450 [ 17.742822] __asan_report_load8_noabort+0x18/0x20 [ 17.742844] kasan_atomics_helper+0x4f71/0x5450 [ 17.742867] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.742890] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.742912] ? kasan_atomics+0x152/0x310 [ 17.742940] kasan_atomics+0x1dc/0x310 [ 17.742963] ? __pfx_kasan_atomics+0x10/0x10 [ 17.742988] ? __pfx_read_tsc+0x10/0x10 [ 17.743009] ? ktime_get_ts64+0x86/0x230 [ 17.743034] kunit_try_run_case+0x1a5/0x480 [ 17.743058] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.743080] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.743103] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.743126] ? __kthread_parkme+0x82/0x180 [ 17.743146] ? preempt_count_sub+0x50/0x80 [ 17.743169] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.743193] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.743215] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.743250] kthread+0x337/0x6f0 [ 17.743270] ? trace_preempt_on+0x20/0xc0 [ 17.743294] ? __pfx_kthread+0x10/0x10 [ 17.743315] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.743336] ? calculate_sigpending+0x7b/0xa0 [ 17.743360] ? __pfx_kthread+0x10/0x10 [ 17.743381] ret_from_fork+0x116/0x1d0 [ 17.743400] ? __pfx_kthread+0x10/0x10 [ 17.743421] ret_from_fork_asm+0x1a/0x30 [ 17.743469] </TASK> [ 17.743483] [ 17.748264] Allocated by task 283: [ 17.748418] kasan_save_stack+0x45/0x70 [ 17.748594] kasan_save_track+0x18/0x40 [ 17.748797] kasan_save_alloc_info+0x3b/0x50 [ 17.749003] __kasan_kmalloc+0xb7/0xc0 [ 17.749183] __kmalloc_cache_noprof+0x189/0x420 [ 17.749389] kasan_atomics+0x95/0x310 [ 17.749579] kunit_try_run_case+0x1a5/0x480 [ 17.749767] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.750003] kthread+0x337/0x6f0 [ 17.750160] ret_from_fork+0x116/0x1d0 [ 17.750351] ret_from_fork_asm+0x1a/0x30 [ 17.750536] [ 17.750651] The buggy address belongs to the object at ffff888102b6b880 [ 17.750651] which belongs to the cache kmalloc-64 of size 64 [ 17.751060] The buggy address is located 0 bytes to the right of [ 17.751060] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.751336] [ 17.751411] The buggy address belongs to the physical page: [ 17.751543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.751730] flags: 0x200000000000000(node=0|zone=2) [ 17.751857] page_type: f5(slab) [ 17.752021] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.752325] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.752636] page dumped because: kasan: bad access detected [ 17.752843] [ 17.752927] Memory state around the buggy address: [ 17.753131] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.753430] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.753719] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.753993] ^ [ 17.754249] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.754384] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.754514] ================================================================== [ 17.447343] ================================================================== [ 17.447951] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 17.448279] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.448579] [ 17.448694] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.448746] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.448759] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.448782] Call Trace: [ 17.448801] <TASK> [ 17.448817] dump_stack_lvl+0x73/0xb0 [ 17.448845] print_report+0xd1/0x650 [ 17.448868] ? __virt_addr_valid+0x1db/0x2d0 [ 17.448891] ? kasan_atomics_helper+0x50d4/0x5450 [ 17.448913] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.448937] ? kasan_atomics_helper+0x50d4/0x5450 [ 17.448960] kasan_report+0x141/0x180 [ 17.448983] ? kasan_atomics_helper+0x50d4/0x5450 [ 17.449011] __asan_report_store8_noabort+0x1b/0x30 [ 17.449033] kasan_atomics_helper+0x50d4/0x5450 [ 17.449057] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.449080] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.449102] ? kasan_atomics+0x152/0x310 [ 17.449129] kasan_atomics+0x1dc/0x310 [ 17.449152] ? __pfx_kasan_atomics+0x10/0x10 [ 17.449177] ? __pfx_read_tsc+0x10/0x10 [ 17.449199] ? ktime_get_ts64+0x86/0x230 [ 17.449234] kunit_try_run_case+0x1a5/0x480 [ 17.449262] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.449287] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.449310] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.449334] ? __kthread_parkme+0x82/0x180 [ 17.449356] ? preempt_count_sub+0x50/0x80 [ 17.449381] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.449405] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.449429] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.449454] kthread+0x337/0x6f0 [ 17.449474] ? trace_preempt_on+0x20/0xc0 [ 17.449499] ? __pfx_kthread+0x10/0x10 [ 17.449522] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.449545] ? calculate_sigpending+0x7b/0xa0 [ 17.449571] ? __pfx_kthread+0x10/0x10 [ 17.449593] ret_from_fork+0x116/0x1d0 [ 17.449613] ? __pfx_kthread+0x10/0x10 [ 17.449635] ret_from_fork_asm+0x1a/0x30 [ 17.449668] </TASK> [ 17.449681] [ 17.454488] Allocated by task 283: [ 17.454682] kasan_save_stack+0x45/0x70 [ 17.454863] kasan_save_track+0x18/0x40 [ 17.455075] kasan_save_alloc_info+0x3b/0x50 [ 17.455308] __kasan_kmalloc+0xb7/0xc0 [ 17.455534] __kmalloc_cache_noprof+0x189/0x420 [ 17.455735] kasan_atomics+0x95/0x310 [ 17.455916] kunit_try_run_case+0x1a5/0x480 [ 17.456134] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.456296] kthread+0x337/0x6f0 [ 17.456491] ret_from_fork+0x116/0x1d0 [ 17.456711] ret_from_fork_asm+0x1a/0x30 [ 17.456890] [ 17.456999] The buggy address belongs to the object at ffff888102b6b880 [ 17.456999] which belongs to the cache kmalloc-64 of size 64 [ 17.457378] The buggy address is located 0 bytes to the right of [ 17.457378] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.457759] [ 17.457875] The buggy address belongs to the physical page: [ 17.458042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.458361] flags: 0x200000000000000(node=0|zone=2) [ 17.458495] page_type: f5(slab) [ 17.458586] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.458929] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.459219] page dumped because: kasan: bad access detected [ 17.459334] [ 17.459388] Memory state around the buggy address: [ 17.459486] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.459614] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.459742] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.459864] ^ [ 17.459958] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.460081] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.460202] ================================================================== [ 17.366635] ================================================================== [ 17.366962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 17.367154] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.367335] [ 17.367438] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.367507] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.367522] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.367547] Call Trace: [ 17.367568] <TASK> [ 17.367586] dump_stack_lvl+0x73/0xb0 [ 17.367616] print_report+0xd1/0x650 [ 17.367640] ? __virt_addr_valid+0x1db/0x2d0 [ 17.367666] ? kasan_atomics_helper+0x12e6/0x5450 [ 17.367689] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.367713] ? kasan_atomics_helper+0x12e6/0x5450 [ 17.367737] kasan_report+0x141/0x180 [ 17.367761] ? kasan_atomics_helper+0x12e6/0x5450 [ 17.367789] kasan_check_range+0x10c/0x1c0 [ 17.367815] __kasan_check_write+0x18/0x20 [ 17.367836] kasan_atomics_helper+0x12e6/0x5450 [ 17.367861] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.367885] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.367907] ? kasan_atomics+0x152/0x310 [ 17.367934] kasan_atomics+0x1dc/0x310 [ 17.367958] ? __pfx_kasan_atomics+0x10/0x10 [ 17.367983] ? __pfx_read_tsc+0x10/0x10 [ 17.368005] ? ktime_get_ts64+0x86/0x230 [ 17.368030] kunit_try_run_case+0x1a5/0x480 [ 17.368079] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.368106] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.368146] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.368173] ? __kthread_parkme+0x82/0x180 [ 17.368193] ? preempt_count_sub+0x50/0x80 [ 17.368218] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.368255] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.368297] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.368323] kthread+0x337/0x6f0 [ 17.368345] ? trace_preempt_on+0x20/0xc0 [ 17.368369] ? __pfx_kthread+0x10/0x10 [ 17.368393] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.368414] ? calculate_sigpending+0x7b/0xa0 [ 17.368439] ? __pfx_kthread+0x10/0x10 [ 17.368462] ret_from_fork+0x116/0x1d0 [ 17.368482] ? __pfx_kthread+0x10/0x10 [ 17.368504] ret_from_fork_asm+0x1a/0x30 [ 17.368536] </TASK> [ 17.368548] [ 17.373741] Allocated by task 283: [ 17.373857] kasan_save_stack+0x45/0x70 [ 17.373976] kasan_save_track+0x18/0x40 [ 17.374089] kasan_save_alloc_info+0x3b/0x50 [ 17.374206] __kasan_kmalloc+0xb7/0xc0 [ 17.374439] __kmalloc_cache_noprof+0x189/0x420 [ 17.374736] kasan_atomics+0x95/0x310 [ 17.374972] kunit_try_run_case+0x1a5/0x480 [ 17.375198] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.375496] kthread+0x337/0x6f0 [ 17.375689] ret_from_fork+0x116/0x1d0 [ 17.375911] ret_from_fork_asm+0x1a/0x30 [ 17.376129] [ 17.376247] The buggy address belongs to the object at ffff888102b6b880 [ 17.376247] which belongs to the cache kmalloc-64 of size 64 [ 17.376822] The buggy address is located 0 bytes to the right of [ 17.376822] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.377427] [ 17.377543] The buggy address belongs to the physical page: [ 17.377738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.377881] flags: 0x200000000000000(node=0|zone=2) [ 17.377984] page_type: f5(slab) [ 17.378073] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.378206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.378355] page dumped because: kasan: bad access detected [ 17.378466] [ 17.378561] Memory state around the buggy address: [ 17.378790] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.379086] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.379410] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.379692] ^ [ 17.379898] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.380187] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.380475] ================================================================== [ 16.875740] ================================================================== [ 16.876087] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 16.876390] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 16.876773] [ 16.876895] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.876954] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.876969] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.876994] Call Trace: [ 16.877019] <TASK> [ 16.877042] dump_stack_lvl+0x73/0xb0 [ 16.877074] print_report+0xd1/0x650 [ 16.877101] ? __virt_addr_valid+0x1db/0x2d0 [ 16.877127] ? kasan_atomics_helper+0x3df/0x5450 [ 16.877158] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.877190] ? kasan_atomics_helper+0x3df/0x5450 [ 16.877214] kasan_report+0x141/0x180 [ 16.877258] ? kasan_atomics_helper+0x3df/0x5450 [ 16.877289] kasan_check_range+0x10c/0x1c0 [ 16.877315] __kasan_check_read+0x15/0x20 [ 16.877335] kasan_atomics_helper+0x3df/0x5450 [ 16.877360] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.877384] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.877406] ? kasan_atomics+0x152/0x310 [ 16.877435] kasan_atomics+0x1dc/0x310 [ 16.877459] ? __pfx_kasan_atomics+0x10/0x10 [ 16.877485] ? __pfx_read_tsc+0x10/0x10 [ 16.877508] ? ktime_get_ts64+0x86/0x230 [ 16.877536] kunit_try_run_case+0x1a5/0x480 [ 16.877563] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.877586] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.877611] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.877635] ? __kthread_parkme+0x82/0x180 [ 16.877658] ? preempt_count_sub+0x50/0x80 [ 16.877684] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.877709] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.877734] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.877760] kthread+0x337/0x6f0 [ 16.877783] ? trace_preempt_on+0x20/0xc0 [ 16.877809] ? __pfx_kthread+0x10/0x10 [ 16.877833] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.877890] ? calculate_sigpending+0x7b/0xa0 [ 16.877917] ? __pfx_kthread+0x10/0x10 [ 16.877942] ret_from_fork+0x116/0x1d0 [ 16.877963] ? __pfx_kthread+0x10/0x10 [ 16.877985] ret_from_fork_asm+0x1a/0x30 [ 16.878019] </TASK> [ 16.878032] [ 16.884871] Allocated by task 283: [ 16.884990] kasan_save_stack+0x45/0x70 [ 16.885247] kasan_save_track+0x18/0x40 [ 16.885481] kasan_save_alloc_info+0x3b/0x50 [ 16.885753] __kasan_kmalloc+0xb7/0xc0 [ 16.885995] __kmalloc_cache_noprof+0x189/0x420 [ 16.886189] kasan_atomics+0x95/0x310 [ 16.886292] kunit_try_run_case+0x1a5/0x480 [ 16.886402] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.886589] kthread+0x337/0x6f0 [ 16.886832] ret_from_fork+0x116/0x1d0 [ 16.887146] ret_from_fork_asm+0x1a/0x30 [ 16.887396] [ 16.887582] The buggy address belongs to the object at ffff888102b6b880 [ 16.887582] which belongs to the cache kmalloc-64 of size 64 [ 16.887827] The buggy address is located 0 bytes to the right of [ 16.887827] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 16.888404] [ 16.888578] The buggy address belongs to the physical page: [ 16.888835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 16.889140] flags: 0x200000000000000(node=0|zone=2) [ 16.889702] page_type: f5(slab) [ 16.889898] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.890141] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.890422] page dumped because: kasan: bad access detected [ 16.890870] [ 16.890928] Memory state around the buggy address: [ 16.891030] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.891159] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.891296] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.891421] ^ [ 16.891733] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.892164] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.893007] ================================================================== [ 17.669961] ================================================================== [ 17.670290] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 17.670448] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.670580] [ 17.670648] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.670697] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.670710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.670734] Call Trace: [ 17.670751] <TASK> [ 17.670767] dump_stack_lvl+0x73/0xb0 [ 17.670795] print_report+0xd1/0x650 [ 17.670818] ? __virt_addr_valid+0x1db/0x2d0 [ 17.670842] ? kasan_atomics_helper+0x1ce1/0x5450 [ 17.670864] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.670887] ? kasan_atomics_helper+0x1ce1/0x5450 [ 17.670910] kasan_report+0x141/0x180 [ 17.670933] ? kasan_atomics_helper+0x1ce1/0x5450 [ 17.670961] kasan_check_range+0x10c/0x1c0 [ 17.670985] __kasan_check_write+0x18/0x20 [ 17.671004] kasan_atomics_helper+0x1ce1/0x5450 [ 17.671028] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.671050] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.671071] ? kasan_atomics+0x152/0x310 [ 17.671098] kasan_atomics+0x1dc/0x310 [ 17.671122] ? __pfx_kasan_atomics+0x10/0x10 [ 17.671146] ? __pfx_read_tsc+0x10/0x10 [ 17.671167] ? ktime_get_ts64+0x86/0x230 [ 17.671190] kunit_try_run_case+0x1a5/0x480 [ 17.671214] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.671248] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.671272] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.671294] ? __kthread_parkme+0x82/0x180 [ 17.671314] ? preempt_count_sub+0x50/0x80 [ 17.671338] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.671361] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.671383] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.671406] kthread+0x337/0x6f0 [ 17.671426] ? trace_preempt_on+0x20/0xc0 [ 17.671448] ? __pfx_kthread+0x10/0x10 [ 17.671469] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.671491] ? calculate_sigpending+0x7b/0xa0 [ 17.671513] ? __pfx_kthread+0x10/0x10 [ 17.671535] ret_from_fork+0x116/0x1d0 [ 17.671553] ? __pfx_kthread+0x10/0x10 [ 17.671574] ret_from_fork_asm+0x1a/0x30 [ 17.671605] </TASK> [ 17.671616] [ 17.676849] Allocated by task 283: [ 17.677022] kasan_save_stack+0x45/0x70 [ 17.677227] kasan_save_track+0x18/0x40 [ 17.677407] kasan_save_alloc_info+0x3b/0x50 [ 17.677608] __kasan_kmalloc+0xb7/0xc0 [ 17.677835] __kmalloc_cache_noprof+0x189/0x420 [ 17.678072] kasan_atomics+0x95/0x310 [ 17.678256] kunit_try_run_case+0x1a5/0x480 [ 17.678467] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.678696] kthread+0x337/0x6f0 [ 17.678856] ret_from_fork+0x116/0x1d0 [ 17.679030] ret_from_fork_asm+0x1a/0x30 [ 17.679212] [ 17.679331] The buggy address belongs to the object at ffff888102b6b880 [ 17.679331] which belongs to the cache kmalloc-64 of size 64 [ 17.679807] The buggy address is located 0 bytes to the right of [ 17.679807] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.680010] [ 17.680065] The buggy address belongs to the physical page: [ 17.680171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.680468] flags: 0x200000000000000(node=0|zone=2) [ 17.680696] page_type: f5(slab) [ 17.680870] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.681156] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.681479] page dumped because: kasan: bad access detected [ 17.681700] [ 17.681783] Memory state around the buggy address: [ 17.681942] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.682145] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.682323] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.682459] ^ [ 17.682558] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.682684] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.683042] ================================================================== [ 17.070237] ================================================================== [ 17.070656] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 17.071200] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.072277] [ 17.072377] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.072449] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.072463] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.072488] Call Trace: [ 17.072505] <TASK> [ 17.072524] dump_stack_lvl+0x73/0xb0 [ 17.072559] print_report+0xd1/0x650 [ 17.072584] ? __virt_addr_valid+0x1db/0x2d0 [ 17.072691] ? kasan_atomics_helper+0x992/0x5450 [ 17.072715] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.072739] ? kasan_atomics_helper+0x992/0x5450 [ 17.072761] kasan_report+0x141/0x180 [ 17.072785] ? kasan_atomics_helper+0x992/0x5450 [ 17.072811] kasan_check_range+0x10c/0x1c0 [ 17.072836] __kasan_check_write+0x18/0x20 [ 17.072857] kasan_atomics_helper+0x992/0x5450 [ 17.072881] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.072904] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.072926] ? kasan_atomics+0x152/0x310 [ 17.072953] kasan_atomics+0x1dc/0x310 [ 17.072976] ? __pfx_kasan_atomics+0x10/0x10 [ 17.073001] ? __pfx_read_tsc+0x10/0x10 [ 17.073025] ? ktime_get_ts64+0x86/0x230 [ 17.073050] kunit_try_run_case+0x1a5/0x480 [ 17.073075] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.073097] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.073121] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.073144] ? __kthread_parkme+0x82/0x180 [ 17.073164] ? preempt_count_sub+0x50/0x80 [ 17.073188] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.073212] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.073256] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.073280] kthread+0x337/0x6f0 [ 17.073301] ? trace_preempt_on+0x20/0xc0 [ 17.073328] ? __pfx_kthread+0x10/0x10 [ 17.073350] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.073372] ? calculate_sigpending+0x7b/0xa0 [ 17.073400] ? __pfx_kthread+0x10/0x10 [ 17.073423] ret_from_fork+0x116/0x1d0 [ 17.073443] ? __pfx_kthread+0x10/0x10 [ 17.073465] ret_from_fork_asm+0x1a/0x30 [ 17.073601] </TASK> [ 17.073620] [ 17.079770] Allocated by task 283: [ 17.079989] kasan_save_stack+0x45/0x70 [ 17.080228] kasan_save_track+0x18/0x40 [ 17.080522] kasan_save_alloc_info+0x3b/0x50 [ 17.080736] __kasan_kmalloc+0xb7/0xc0 [ 17.080883] __kmalloc_cache_noprof+0x189/0x420 [ 17.081007] kasan_atomics+0x95/0x310 [ 17.081098] kunit_try_run_case+0x1a5/0x480 [ 17.081203] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.081778] kthread+0x337/0x6f0 [ 17.081976] ret_from_fork+0x116/0x1d0 [ 17.082184] ret_from_fork_asm+0x1a/0x30 [ 17.082290] [ 17.082423] The buggy address belongs to the object at ffff888102b6b880 [ 17.082423] which belongs to the cache kmalloc-64 of size 64 [ 17.082894] The buggy address is located 0 bytes to the right of [ 17.082894] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.083311] [ 17.083434] The buggy address belongs to the physical page: [ 17.083686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.083872] flags: 0x200000000000000(node=0|zone=2) [ 17.084095] page_type: f5(slab) [ 17.084284] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.084419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.084601] page dumped because: kasan: bad access detected [ 17.084706] [ 17.084757] Memory state around the buggy address: [ 17.084851] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.084975] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.085308] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.085804] ^ [ 17.086116] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.086744] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.087184] ================================================================== [ 17.190019] ================================================================== [ 17.190414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 17.191476] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.191791] [ 17.191868] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.191923] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.191937] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.191960] Call Trace: [ 17.191984] <TASK> [ 17.192004] dump_stack_lvl+0x73/0xb0 [ 17.192039] print_report+0xd1/0x650 [ 17.192064] ? __virt_addr_valid+0x1db/0x2d0 [ 17.192089] ? kasan_atomics_helper+0xde0/0x5450 [ 17.192112] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.192148] ? kasan_atomics_helper+0xde0/0x5450 [ 17.192172] kasan_report+0x141/0x180 [ 17.192206] ? kasan_atomics_helper+0xde0/0x5450 [ 17.192246] kasan_check_range+0x10c/0x1c0 [ 17.192273] __kasan_check_write+0x18/0x20 [ 17.192295] kasan_atomics_helper+0xde0/0x5450 [ 17.192318] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.192342] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.192364] ? kasan_atomics+0x152/0x310 [ 17.192392] kasan_atomics+0x1dc/0x310 [ 17.192415] ? __pfx_kasan_atomics+0x10/0x10 [ 17.192440] ? __pfx_read_tsc+0x10/0x10 [ 17.192480] ? ktime_get_ts64+0x86/0x230 [ 17.192508] kunit_try_run_case+0x1a5/0x480 [ 17.192534] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.192557] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.192583] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.192618] ? __kthread_parkme+0x82/0x180 [ 17.192640] ? preempt_count_sub+0x50/0x80 [ 17.192674] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.192711] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.192805] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.192831] kthread+0x337/0x6f0 [ 17.192853] ? trace_preempt_on+0x20/0xc0 [ 17.192879] ? __pfx_kthread+0x10/0x10 [ 17.192901] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.192923] ? calculate_sigpending+0x7b/0xa0 [ 17.192949] ? __pfx_kthread+0x10/0x10 [ 17.192971] ret_from_fork+0x116/0x1d0 [ 17.192991] ? __pfx_kthread+0x10/0x10 [ 17.193012] ret_from_fork_asm+0x1a/0x30 [ 17.193045] </TASK> [ 17.193058] [ 17.200153] Allocated by task 283: [ 17.200268] kasan_save_stack+0x45/0x70 [ 17.200372] kasan_save_track+0x18/0x40 [ 17.200880] kasan_save_alloc_info+0x3b/0x50 [ 17.201132] __kasan_kmalloc+0xb7/0xc0 [ 17.201370] __kmalloc_cache_noprof+0x189/0x420 [ 17.201711] kasan_atomics+0x95/0x310 [ 17.201937] kunit_try_run_case+0x1a5/0x480 [ 17.202141] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.202298] kthread+0x337/0x6f0 [ 17.202574] ret_from_fork+0x116/0x1d0 [ 17.202670] ret_from_fork_asm+0x1a/0x30 [ 17.202804] [ 17.202930] The buggy address belongs to the object at ffff888102b6b880 [ 17.202930] which belongs to the cache kmalloc-64 of size 64 [ 17.203420] The buggy address is located 0 bytes to the right of [ 17.203420] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.204007] [ 17.204067] The buggy address belongs to the physical page: [ 17.204344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.204694] flags: 0x200000000000000(node=0|zone=2) [ 17.204859] page_type: f5(slab) [ 17.205070] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.205326] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.205852] page dumped because: kasan: bad access detected [ 17.206125] [ 17.206193] Memory state around the buggy address: [ 17.206582] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.206763] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.206895] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.207021] ^ [ 17.207301] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.207797] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.208149] ================================================================== [ 17.461154] ================================================================== [ 17.462377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 17.463831] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.464164] [ 17.464288] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.464338] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.464353] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.464376] Call Trace: [ 17.464395] <TASK> [ 17.464413] dump_stack_lvl+0x73/0xb0 [ 17.464443] print_report+0xd1/0x650 [ 17.464467] ? __virt_addr_valid+0x1db/0x2d0 [ 17.464491] ? kasan_atomics_helper+0x151d/0x5450 [ 17.464514] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.464537] ? kasan_atomics_helper+0x151d/0x5450 [ 17.464560] kasan_report+0x141/0x180 [ 17.464583] ? kasan_atomics_helper+0x151d/0x5450 [ 17.464610] kasan_check_range+0x10c/0x1c0 [ 17.464634] __kasan_check_write+0x18/0x20 [ 17.464655] kasan_atomics_helper+0x151d/0x5450 [ 17.464678] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.464701] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.464723] ? kasan_atomics+0x152/0x310 [ 17.464750] kasan_atomics+0x1dc/0x310 [ 17.464773] ? __pfx_kasan_atomics+0x10/0x10 [ 17.464798] ? __pfx_read_tsc+0x10/0x10 [ 17.464819] ? ktime_get_ts64+0x86/0x230 [ 17.464844] kunit_try_run_case+0x1a5/0x480 [ 17.464868] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.465587] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.465693] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.465721] ? __kthread_parkme+0x82/0x180 [ 17.465746] ? preempt_count_sub+0x50/0x80 [ 17.465773] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.465801] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.465829] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.465854] kthread+0x337/0x6f0 [ 17.465876] ? trace_preempt_on+0x20/0xc0 [ 17.465903] ? __pfx_kthread+0x10/0x10 [ 17.465927] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.465951] ? calculate_sigpending+0x7b/0xa0 [ 17.465977] ? __pfx_kthread+0x10/0x10 [ 17.466002] ret_from_fork+0x116/0x1d0 [ 17.466023] ? __pfx_kthread+0x10/0x10 [ 17.466046] ret_from_fork_asm+0x1a/0x30 [ 17.466081] </TASK> [ 17.466096] [ 17.473137] Allocated by task 283: [ 17.473404] kasan_save_stack+0x45/0x70 [ 17.473617] kasan_save_track+0x18/0x40 [ 17.473860] kasan_save_alloc_info+0x3b/0x50 [ 17.474076] __kasan_kmalloc+0xb7/0xc0 [ 17.474285] __kmalloc_cache_noprof+0x189/0x420 [ 17.474519] kasan_atomics+0x95/0x310 [ 17.474692] kunit_try_run_case+0x1a5/0x480 [ 17.474843] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.475094] kthread+0x337/0x6f0 [ 17.475185] ret_from_fork+0x116/0x1d0 [ 17.475286] ret_from_fork_asm+0x1a/0x30 [ 17.475385] [ 17.475444] The buggy address belongs to the object at ffff888102b6b880 [ 17.475444] which belongs to the cache kmalloc-64 of size 64 [ 17.475655] The buggy address is located 0 bytes to the right of [ 17.475655] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.476053] [ 17.476184] The buggy address belongs to the physical page: [ 17.476524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.476971] flags: 0x200000000000000(node=0|zone=2) [ 17.477301] page_type: f5(slab) [ 17.477531] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.477738] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.477875] page dumped because: kasan: bad access detected [ 17.477980] [ 17.478033] Memory state around the buggy address: [ 17.478309] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.478508] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.478643] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.478768] ^ [ 17.478866] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.478991] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.479150] ================================================================== [ 17.138850] ================================================================== [ 17.139148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 17.139892] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.140290] [ 17.140410] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.140521] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.140538] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.140563] Call Trace: [ 17.140585] <TASK> [ 17.140605] dump_stack_lvl+0x73/0xb0 [ 17.140639] print_report+0xd1/0x650 [ 17.140664] ? __virt_addr_valid+0x1db/0x2d0 [ 17.140691] ? kasan_atomics_helper+0xc70/0x5450 [ 17.140714] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.140737] ? kasan_atomics_helper+0xc70/0x5450 [ 17.140760] kasan_report+0x141/0x180 [ 17.140784] ? kasan_atomics_helper+0xc70/0x5450 [ 17.140811] kasan_check_range+0x10c/0x1c0 [ 17.140836] __kasan_check_write+0x18/0x20 [ 17.140857] kasan_atomics_helper+0xc70/0x5450 [ 17.140880] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.140904] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.140926] ? kasan_atomics+0x152/0x310 [ 17.140954] kasan_atomics+0x1dc/0x310 [ 17.140978] ? __pfx_kasan_atomics+0x10/0x10 [ 17.141004] ? __pfx_read_tsc+0x10/0x10 [ 17.141025] ? ktime_get_ts64+0x86/0x230 [ 17.141050] kunit_try_run_case+0x1a5/0x480 [ 17.141075] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.141097] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.141121] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.141144] ? __kthread_parkme+0x82/0x180 [ 17.141165] ? preempt_count_sub+0x50/0x80 [ 17.141190] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.141214] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.141256] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.141280] kthread+0x337/0x6f0 [ 17.141300] ? trace_preempt_on+0x20/0xc0 [ 17.141326] ? __pfx_kthread+0x10/0x10 [ 17.141348] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.141371] ? calculate_sigpending+0x7b/0xa0 [ 17.141397] ? __pfx_kthread+0x10/0x10 [ 17.141420] ret_from_fork+0x116/0x1d0 [ 17.141439] ? __pfx_kthread+0x10/0x10 [ 17.141476] ret_from_fork_asm+0x1a/0x30 [ 17.141583] </TASK> [ 17.141615] [ 17.147696] Allocated by task 283: [ 17.147942] kasan_save_stack+0x45/0x70 [ 17.148185] kasan_save_track+0x18/0x40 [ 17.148435] kasan_save_alloc_info+0x3b/0x50 [ 17.148866] __kasan_kmalloc+0xb7/0xc0 [ 17.149034] __kmalloc_cache_noprof+0x189/0x420 [ 17.149227] kasan_atomics+0x95/0x310 [ 17.149422] kunit_try_run_case+0x1a5/0x480 [ 17.149672] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.149820] kthread+0x337/0x6f0 [ 17.149989] ret_from_fork+0x116/0x1d0 [ 17.150167] ret_from_fork_asm+0x1a/0x30 [ 17.150341] [ 17.150402] The buggy address belongs to the object at ffff888102b6b880 [ 17.150402] which belongs to the cache kmalloc-64 of size 64 [ 17.150916] The buggy address is located 0 bytes to the right of [ 17.150916] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.151275] [ 17.151334] The buggy address belongs to the physical page: [ 17.151497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.151889] flags: 0x200000000000000(node=0|zone=2) [ 17.152128] page_type: f5(slab) [ 17.152217] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.152367] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.152748] page dumped because: kasan: bad access detected [ 17.153008] [ 17.153110] Memory state around the buggy address: [ 17.153281] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.153810] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.154131] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.154330] ^ [ 17.154438] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.154641] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.154763] ================================================================== [ 17.497305] ================================================================== [ 17.498035] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 17.498499] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.498912] [ 17.499079] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.499137] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.499152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.499177] Call Trace: [ 17.499198] <TASK> [ 17.499218] dump_stack_lvl+0x73/0xb0 [ 17.499259] print_report+0xd1/0x650 [ 17.499284] ? __virt_addr_valid+0x1db/0x2d0 [ 17.499310] ? kasan_atomics_helper+0x164f/0x5450 [ 17.499348] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.499373] ? kasan_atomics_helper+0x164f/0x5450 [ 17.499410] kasan_report+0x141/0x180 [ 17.499437] ? kasan_atomics_helper+0x164f/0x5450 [ 17.499466] kasan_check_range+0x10c/0x1c0 [ 17.499492] __kasan_check_write+0x18/0x20 [ 17.499514] kasan_atomics_helper+0x164f/0x5450 [ 17.499539] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.499563] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.499587] ? kasan_atomics+0x152/0x310 [ 17.499616] kasan_atomics+0x1dc/0x310 [ 17.499641] ? __pfx_kasan_atomics+0x10/0x10 [ 17.499668] ? __pfx_read_tsc+0x10/0x10 [ 17.499690] ? ktime_get_ts64+0x86/0x230 [ 17.499717] kunit_try_run_case+0x1a5/0x480 [ 17.499744] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.499778] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.499807] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.499832] ? __kthread_parkme+0x82/0x180 [ 17.499869] ? preempt_count_sub+0x50/0x80 [ 17.499896] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.499933] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.499959] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.499995] kthread+0x337/0x6f0 [ 17.500020] ? trace_preempt_on+0x20/0xc0 [ 17.500056] ? __pfx_kthread+0x10/0x10 [ 17.500082] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.500106] ? calculate_sigpending+0x7b/0xa0 [ 17.500144] ? __pfx_kthread+0x10/0x10 [ 17.500169] ret_from_fork+0x116/0x1d0 [ 17.500195] ? __pfx_kthread+0x10/0x10 [ 17.500218] ret_from_fork_asm+0x1a/0x30 [ 17.500268] </TASK> [ 17.500281] [ 17.506769] Allocated by task 283: [ 17.506945] kasan_save_stack+0x45/0x70 [ 17.507071] kasan_save_track+0x18/0x40 [ 17.507277] kasan_save_alloc_info+0x3b/0x50 [ 17.507443] __kasan_kmalloc+0xb7/0xc0 [ 17.507539] __kmalloc_cache_noprof+0x189/0x420 [ 17.507889] kasan_atomics+0x95/0x310 [ 17.508051] kunit_try_run_case+0x1a5/0x480 [ 17.508334] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.508593] kthread+0x337/0x6f0 [ 17.508743] ret_from_fork+0x116/0x1d0 [ 17.508833] ret_from_fork_asm+0x1a/0x30 [ 17.508927] [ 17.508982] The buggy address belongs to the object at ffff888102b6b880 [ 17.508982] which belongs to the cache kmalloc-64 of size 64 [ 17.509183] The buggy address is located 0 bytes to the right of [ 17.509183] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.509400] [ 17.509458] The buggy address belongs to the physical page: [ 17.509567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.509820] flags: 0x200000000000000(node=0|zone=2) [ 17.510043] page_type: f5(slab) [ 17.510210] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.510553] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.510861] page dumped because: kasan: bad access detected [ 17.511090] [ 17.511181] Memory state around the buggy address: [ 17.511400] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.511721] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.512019] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.512368] ^ [ 17.512624] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.512977] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.513335] ================================================================== [ 17.121989] ================================================================== [ 17.122192] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 17.122357] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.122615] [ 17.122737] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.122792] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.122807] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.122831] Call Trace: [ 17.122853] <TASK> [ 17.122874] dump_stack_lvl+0x73/0xb0 [ 17.122905] print_report+0xd1/0x650 [ 17.122931] ? __virt_addr_valid+0x1db/0x2d0 [ 17.122955] ? kasan_atomics_helper+0xb6a/0x5450 [ 17.122977] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.123000] ? kasan_atomics_helper+0xb6a/0x5450 [ 17.123022] kasan_report+0x141/0x180 [ 17.123044] ? kasan_atomics_helper+0xb6a/0x5450 [ 17.123072] kasan_check_range+0x10c/0x1c0 [ 17.123097] __kasan_check_write+0x18/0x20 [ 17.123117] kasan_atomics_helper+0xb6a/0x5450 [ 17.123140] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.123164] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.123185] ? kasan_atomics+0x152/0x310 [ 17.123212] kasan_atomics+0x1dc/0x310 [ 17.123247] ? __pfx_kasan_atomics+0x10/0x10 [ 17.123273] ? __pfx_read_tsc+0x10/0x10 [ 17.123296] ? ktime_get_ts64+0x86/0x230 [ 17.123322] kunit_try_run_case+0x1a5/0x480 [ 17.123348] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.123370] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.123394] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.123417] ? __kthread_parkme+0x82/0x180 [ 17.123438] ? preempt_count_sub+0x50/0x80 [ 17.123525] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.123550] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.123574] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.123597] kthread+0x337/0x6f0 [ 17.123618] ? trace_preempt_on+0x20/0xc0 [ 17.123643] ? __pfx_kthread+0x10/0x10 [ 17.123664] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.123686] ? calculate_sigpending+0x7b/0xa0 [ 17.123712] ? __pfx_kthread+0x10/0x10 [ 17.123734] ret_from_fork+0x116/0x1d0 [ 17.123752] ? __pfx_kthread+0x10/0x10 [ 17.123774] ret_from_fork_asm+0x1a/0x30 [ 17.123805] </TASK> [ 17.123819] [ 17.130898] Allocated by task 283: [ 17.131047] kasan_save_stack+0x45/0x70 [ 17.131243] kasan_save_track+0x18/0x40 [ 17.131434] kasan_save_alloc_info+0x3b/0x50 [ 17.131640] __kasan_kmalloc+0xb7/0xc0 [ 17.131834] __kmalloc_cache_noprof+0x189/0x420 [ 17.131995] kasan_atomics+0x95/0x310 [ 17.132181] kunit_try_run_case+0x1a5/0x480 [ 17.132308] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.132781] kthread+0x337/0x6f0 [ 17.132975] ret_from_fork+0x116/0x1d0 [ 17.133075] ret_from_fork_asm+0x1a/0x30 [ 17.133167] [ 17.133273] The buggy address belongs to the object at ffff888102b6b880 [ 17.133273] which belongs to the cache kmalloc-64 of size 64 [ 17.133757] The buggy address is located 0 bytes to the right of [ 17.133757] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.134183] [ 17.134308] The buggy address belongs to the physical page: [ 17.134434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.134631] flags: 0x200000000000000(node=0|zone=2) [ 17.134736] page_type: f5(slab) [ 17.134822] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.134954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.135081] page dumped because: kasan: bad access detected [ 17.135181] [ 17.135846] Memory state around the buggy address: [ 17.136251] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.136718] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.137178] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.137535] ^ [ 17.137823] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.138048] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.138246] ================================================================== [ 17.032712] ================================================================== [ 17.032975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 17.033134] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.034021] [ 17.034247] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.034427] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.034449] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.034496] Call Trace: [ 17.034527] <TASK> [ 17.034548] dump_stack_lvl+0x73/0xb0 [ 17.034593] print_report+0xd1/0x650 [ 17.034618] ? __virt_addr_valid+0x1db/0x2d0 [ 17.034641] ? kasan_atomics_helper+0x860/0x5450 [ 17.034664] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.034687] ? kasan_atomics_helper+0x860/0x5450 [ 17.034710] kasan_report+0x141/0x180 [ 17.034733] ? kasan_atomics_helper+0x860/0x5450 [ 17.034760] kasan_check_range+0x10c/0x1c0 [ 17.034784] __kasan_check_write+0x18/0x20 [ 17.034805] kasan_atomics_helper+0x860/0x5450 [ 17.034829] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.034852] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.034875] ? kasan_atomics+0x152/0x310 [ 17.034903] kasan_atomics+0x1dc/0x310 [ 17.034926] ? __pfx_kasan_atomics+0x10/0x10 [ 17.034951] ? __pfx_read_tsc+0x10/0x10 [ 17.034973] ? ktime_get_ts64+0x86/0x230 [ 17.034998] kunit_try_run_case+0x1a5/0x480 [ 17.035022] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.035045] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.035068] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.035091] ? __kthread_parkme+0x82/0x180 [ 17.035112] ? preempt_count_sub+0x50/0x80 [ 17.035137] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.035161] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.035185] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.035208] kthread+0x337/0x6f0 [ 17.035247] ? trace_preempt_on+0x20/0xc0 [ 17.035274] ? __pfx_kthread+0x10/0x10 [ 17.035296] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.035318] ? calculate_sigpending+0x7b/0xa0 [ 17.035344] ? __pfx_kthread+0x10/0x10 [ 17.035366] ret_from_fork+0x116/0x1d0 [ 17.035385] ? __pfx_kthread+0x10/0x10 [ 17.035407] ret_from_fork_asm+0x1a/0x30 [ 17.035440] </TASK> [ 17.035465] [ 17.043023] Allocated by task 283: [ 17.043236] kasan_save_stack+0x45/0x70 [ 17.043439] kasan_save_track+0x18/0x40 [ 17.043602] kasan_save_alloc_info+0x3b/0x50 [ 17.044084] __kasan_kmalloc+0xb7/0xc0 [ 17.044256] __kmalloc_cache_noprof+0x189/0x420 [ 17.044413] kasan_atomics+0x95/0x310 [ 17.044730] kunit_try_run_case+0x1a5/0x480 [ 17.044971] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.045110] kthread+0x337/0x6f0 [ 17.045261] ret_from_fork+0x116/0x1d0 [ 17.045568] ret_from_fork_asm+0x1a/0x30 [ 17.045715] [ 17.045841] The buggy address belongs to the object at ffff888102b6b880 [ 17.045841] which belongs to the cache kmalloc-64 of size 64 [ 17.046116] The buggy address is located 0 bytes to the right of [ 17.046116] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.046477] [ 17.046864] The buggy address belongs to the physical page: [ 17.047149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.047324] flags: 0x200000000000000(node=0|zone=2) [ 17.047731] page_type: f5(slab) [ 17.047935] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.048571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.049098] page dumped because: kasan: bad access detected [ 17.049243] [ 17.049300] Memory state around the buggy address: [ 17.049583] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.049866] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.050193] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.050351] ^ [ 17.050610] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.050890] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.051142] ================================================================== [ 16.910987] ================================================================== [ 16.911743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 16.912006] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 16.912275] [ 16.912396] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.912503] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.912520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.912545] Call Trace: [ 16.912568] <TASK> [ 16.912590] dump_stack_lvl+0x73/0xb0 [ 16.912619] print_report+0xd1/0x650 [ 16.912643] ? __virt_addr_valid+0x1db/0x2d0 [ 16.912668] ? kasan_atomics_helper+0x4a0/0x5450 [ 16.912690] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.912713] ? kasan_atomics_helper+0x4a0/0x5450 [ 16.912735] kasan_report+0x141/0x180 [ 16.912758] ? kasan_atomics_helper+0x4a0/0x5450 [ 16.912785] kasan_check_range+0x10c/0x1c0 [ 16.912810] __kasan_check_write+0x18/0x20 [ 16.912831] kasan_atomics_helper+0x4a0/0x5450 [ 16.912854] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.912879] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.912902] ? kasan_atomics+0x152/0x310 [ 16.912928] kasan_atomics+0x1dc/0x310 [ 16.912952] ? __pfx_kasan_atomics+0x10/0x10 [ 16.912976] ? __pfx_read_tsc+0x10/0x10 [ 16.912998] ? ktime_get_ts64+0x86/0x230 [ 16.913023] kunit_try_run_case+0x1a5/0x480 [ 16.913048] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.913070] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.913094] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.913116] ? __kthread_parkme+0x82/0x180 [ 16.913137] ? preempt_count_sub+0x50/0x80 [ 16.913162] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.913186] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.913208] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.913240] kthread+0x337/0x6f0 [ 16.913263] ? trace_preempt_on+0x20/0xc0 [ 16.913287] ? __pfx_kthread+0x10/0x10 [ 16.913309] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.913330] ? calculate_sigpending+0x7b/0xa0 [ 16.913355] ? __pfx_kthread+0x10/0x10 [ 16.913377] ret_from_fork+0x116/0x1d0 [ 16.913396] ? __pfx_kthread+0x10/0x10 [ 16.913417] ret_from_fork_asm+0x1a/0x30 [ 16.913499] </TASK> [ 16.913516] [ 16.919733] Allocated by task 283: [ 16.919899] kasan_save_stack+0x45/0x70 [ 16.920090] kasan_save_track+0x18/0x40 [ 16.920234] kasan_save_alloc_info+0x3b/0x50 [ 16.920417] __kasan_kmalloc+0xb7/0xc0 [ 16.920742] __kmalloc_cache_noprof+0x189/0x420 [ 16.920853] kasan_atomics+0x95/0x310 [ 16.920939] kunit_try_run_case+0x1a5/0x480 [ 16.921032] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.921137] kthread+0x337/0x6f0 [ 16.921216] ret_from_fork+0x116/0x1d0 [ 16.921422] ret_from_fork_asm+0x1a/0x30 [ 16.921747] [ 16.921876] The buggy address belongs to the object at ffff888102b6b880 [ 16.921876] which belongs to the cache kmalloc-64 of size 64 [ 16.922624] The buggy address is located 0 bytes to the right of [ 16.922624] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 16.922940] [ 16.923061] The buggy address belongs to the physical page: [ 16.923682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 16.923924] flags: 0x200000000000000(node=0|zone=2) [ 16.924112] page_type: f5(slab) [ 16.924277] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.925855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.926134] page dumped because: kasan: bad access detected [ 16.926329] [ 16.926540] Memory state around the buggy address: [ 16.926704] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.926944] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.927127] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.927422] ^ [ 16.927581] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.927710] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.928003] ================================================================== [ 17.155075] ================================================================== [ 17.155561] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 17.156013] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.156527] [ 17.156673] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.156727] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.156741] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.156765] Call Trace: [ 17.156786] <TASK> [ 17.156807] dump_stack_lvl+0x73/0xb0 [ 17.156837] print_report+0xd1/0x650 [ 17.156862] ? __virt_addr_valid+0x1db/0x2d0 [ 17.156888] ? kasan_atomics_helper+0x4a84/0x5450 [ 17.156912] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.156937] ? kasan_atomics_helper+0x4a84/0x5450 [ 17.156960] kasan_report+0x141/0x180 [ 17.156985] ? kasan_atomics_helper+0x4a84/0x5450 [ 17.157013] __asan_report_load4_noabort+0x18/0x20 [ 17.157036] kasan_atomics_helper+0x4a84/0x5450 [ 17.157060] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.157084] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.157107] ? kasan_atomics+0x152/0x310 [ 17.157135] kasan_atomics+0x1dc/0x310 [ 17.157159] ? __pfx_kasan_atomics+0x10/0x10 [ 17.157186] ? __pfx_read_tsc+0x10/0x10 [ 17.157208] ? ktime_get_ts64+0x86/0x230 [ 17.157245] kunit_try_run_case+0x1a5/0x480 [ 17.157273] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.157295] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.157319] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.157342] ? __kthread_parkme+0x82/0x180 [ 17.157363] ? preempt_count_sub+0x50/0x80 [ 17.157388] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.157412] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.157435] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.157529] kthread+0x337/0x6f0 [ 17.157554] ? trace_preempt_on+0x20/0xc0 [ 17.157582] ? __pfx_kthread+0x10/0x10 [ 17.157603] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.157626] ? calculate_sigpending+0x7b/0xa0 [ 17.157653] ? __pfx_kthread+0x10/0x10 [ 17.157676] ret_from_fork+0x116/0x1d0 [ 17.157696] ? __pfx_kthread+0x10/0x10 [ 17.157718] ret_from_fork_asm+0x1a/0x30 [ 17.157752] </TASK> [ 17.157764] [ 17.163847] Allocated by task 283: [ 17.164068] kasan_save_stack+0x45/0x70 [ 17.164271] kasan_save_track+0x18/0x40 [ 17.164551] kasan_save_alloc_info+0x3b/0x50 [ 17.164827] __kasan_kmalloc+0xb7/0xc0 [ 17.165034] __kmalloc_cache_noprof+0x189/0x420 [ 17.165204] kasan_atomics+0x95/0x310 [ 17.165305] kunit_try_run_case+0x1a5/0x480 [ 17.165400] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.165884] kthread+0x337/0x6f0 [ 17.166090] ret_from_fork+0x116/0x1d0 [ 17.166355] ret_from_fork_asm+0x1a/0x30 [ 17.167375] [ 17.167521] The buggy address belongs to the object at ffff888102b6b880 [ 17.167521] which belongs to the cache kmalloc-64 of size 64 [ 17.167921] The buggy address is located 0 bytes to the right of [ 17.167921] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.168124] [ 17.168521] The buggy address belongs to the physical page: [ 17.168944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.169502] flags: 0x200000000000000(node=0|zone=2) [ 17.169890] page_type: f5(slab) [ 17.170012] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.170153] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.170344] page dumped because: kasan: bad access detected [ 17.170594] [ 17.170662] Memory state around the buggy address: [ 17.170816] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.171112] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.171385] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.171603] ^ [ 17.171701] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.172044] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.172780] ================================================================== [ 17.546019] ================================================================== [ 17.546463] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 17.546889] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.547200] [ 17.547339] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.547389] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.547404] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.547424] Call Trace: [ 17.547440] <TASK> [ 17.547454] dump_stack_lvl+0x73/0xb0 [ 17.547480] print_report+0xd1/0x650 [ 17.547501] ? __virt_addr_valid+0x1db/0x2d0 [ 17.547525] ? kasan_atomics_helper+0x1818/0x5450 [ 17.547547] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.547568] ? kasan_atomics_helper+0x1818/0x5450 [ 17.547590] kasan_report+0x141/0x180 [ 17.547614] ? kasan_atomics_helper+0x1818/0x5450 [ 17.547640] kasan_check_range+0x10c/0x1c0 [ 17.547664] __kasan_check_write+0x18/0x20 [ 17.547684] kasan_atomics_helper+0x1818/0x5450 [ 17.547707] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.547730] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.547751] ? kasan_atomics+0x152/0x310 [ 17.547777] kasan_atomics+0x1dc/0x310 [ 17.547801] ? __pfx_kasan_atomics+0x10/0x10 [ 17.547825] ? __pfx_read_tsc+0x10/0x10 [ 17.547846] ? ktime_get_ts64+0x86/0x230 [ 17.547869] kunit_try_run_case+0x1a5/0x480 [ 17.547893] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.547915] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.547938] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.547959] ? __kthread_parkme+0x82/0x180 [ 17.547980] ? preempt_count_sub+0x50/0x80 [ 17.548002] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.548026] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.548048] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.548071] kthread+0x337/0x6f0 [ 17.548091] ? trace_preempt_on+0x20/0xc0 [ 17.548113] ? __pfx_kthread+0x10/0x10 [ 17.548135] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.548156] ? calculate_sigpending+0x7b/0xa0 [ 17.548179] ? __pfx_kthread+0x10/0x10 [ 17.548200] ret_from_fork+0x116/0x1d0 [ 17.548219] ? __pfx_kthread+0x10/0x10 [ 17.548498] ret_from_fork_asm+0x1a/0x30 [ 17.548531] </TASK> [ 17.548543] [ 17.554827] Allocated by task 283: [ 17.554932] kasan_save_stack+0x45/0x70 [ 17.555120] kasan_save_track+0x18/0x40 [ 17.555285] kasan_save_alloc_info+0x3b/0x50 [ 17.555383] __kasan_kmalloc+0xb7/0xc0 [ 17.555471] __kmalloc_cache_noprof+0x189/0x420 [ 17.555566] kasan_atomics+0x95/0x310 [ 17.555650] kunit_try_run_case+0x1a5/0x480 [ 17.555740] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.555841] kthread+0x337/0x6f0 [ 17.555918] ret_from_fork+0x116/0x1d0 [ 17.556000] ret_from_fork_asm+0x1a/0x30 [ 17.556091] [ 17.556144] The buggy address belongs to the object at ffff888102b6b880 [ 17.556144] which belongs to the cache kmalloc-64 of size 64 [ 17.556678] The buggy address is located 0 bytes to the right of [ 17.556678] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.557415] [ 17.557544] The buggy address belongs to the physical page: [ 17.557887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.558358] flags: 0x200000000000000(node=0|zone=2) [ 17.558589] page_type: f5(slab) [ 17.558682] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.558824] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.558956] page dumped because: kasan: bad access detected [ 17.559060] [ 17.559112] Memory state around the buggy address: [ 17.559212] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.559544] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.559974] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.560378] ^ [ 17.560684] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.561106] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.561270] ================================================================== [ 16.981097] ================================================================== [ 16.981402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 16.981793] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 16.982140] [ 16.982273] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.982346] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.982363] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.982397] Call Trace: [ 16.982420] <TASK> [ 16.982440] dump_stack_lvl+0x73/0xb0 [ 16.982552] print_report+0xd1/0x650 [ 16.982577] ? __virt_addr_valid+0x1db/0x2d0 [ 16.982615] ? kasan_atomics_helper+0x697/0x5450 [ 16.982638] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.982672] ? kasan_atomics_helper+0x697/0x5450 [ 16.982698] kasan_report+0x141/0x180 [ 16.982722] ? kasan_atomics_helper+0x697/0x5450 [ 16.982761] kasan_check_range+0x10c/0x1c0 [ 16.982788] __kasan_check_write+0x18/0x20 [ 16.982818] kasan_atomics_helper+0x697/0x5450 [ 16.982846] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.982870] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.982903] ? kasan_atomics+0x152/0x310 [ 16.982933] kasan_atomics+0x1dc/0x310 [ 16.982958] ? __pfx_kasan_atomics+0x10/0x10 [ 16.982997] ? __pfx_read_tsc+0x10/0x10 [ 16.983019] ? ktime_get_ts64+0x86/0x230 [ 16.983055] kunit_try_run_case+0x1a5/0x480 [ 16.983082] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.983115] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.983142] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.983167] ? __kthread_parkme+0x82/0x180 [ 16.983194] ? preempt_count_sub+0x50/0x80 [ 16.983233] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.983261] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.983285] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.983319] kthread+0x337/0x6f0 [ 16.983341] ? trace_preempt_on+0x20/0xc0 [ 16.983367] ? __pfx_kthread+0x10/0x10 [ 16.983389] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.983411] ? calculate_sigpending+0x7b/0xa0 [ 16.983436] ? __pfx_kthread+0x10/0x10 [ 16.983516] ret_from_fork+0x116/0x1d0 [ 16.983540] ? __pfx_kthread+0x10/0x10 [ 16.983563] ret_from_fork_asm+0x1a/0x30 [ 16.983595] </TASK> [ 16.983609] [ 16.989042] Allocated by task 283: [ 16.989251] kasan_save_stack+0x45/0x70 [ 16.989556] kasan_save_track+0x18/0x40 [ 16.989814] kasan_save_alloc_info+0x3b/0x50 [ 16.990086] __kasan_kmalloc+0xb7/0xc0 [ 16.990318] __kmalloc_cache_noprof+0x189/0x420 [ 16.990672] kasan_atomics+0x95/0x310 [ 16.990920] kunit_try_run_case+0x1a5/0x480 [ 16.991076] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.991194] kthread+0x337/0x6f0 [ 16.991291] ret_from_fork+0x116/0x1d0 [ 16.991407] ret_from_fork_asm+0x1a/0x30 [ 16.991835] [ 16.991961] The buggy address belongs to the object at ffff888102b6b880 [ 16.991961] which belongs to the cache kmalloc-64 of size 64 [ 16.992442] The buggy address is located 0 bytes to the right of [ 16.992442] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 16.992952] [ 16.993024] The buggy address belongs to the physical page: [ 16.993199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 16.993638] flags: 0x200000000000000(node=0|zone=2) [ 16.994985] page_type: f5(slab) [ 16.995234] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.995398] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.995932] page dumped because: kasan: bad access detected [ 16.996350] [ 16.996449] Memory state around the buggy address: [ 16.996879] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.997201] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.997483] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.997719] ^ [ 16.997909] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.998139] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.998379] ================================================================== [ 16.963147] ================================================================== [ 16.963584] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 16.964103] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 16.964589] [ 16.964727] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.964783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.964807] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.964831] Call Trace: [ 16.964851] <TASK> [ 16.964870] dump_stack_lvl+0x73/0xb0 [ 16.964899] print_report+0xd1/0x650 [ 16.964923] ? __virt_addr_valid+0x1db/0x2d0 [ 16.964947] ? kasan_atomics_helper+0x5fe/0x5450 [ 16.964971] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.964995] ? kasan_atomics_helper+0x5fe/0x5450 [ 16.965018] kasan_report+0x141/0x180 [ 16.965041] ? kasan_atomics_helper+0x5fe/0x5450 [ 16.965069] kasan_check_range+0x10c/0x1c0 [ 16.965094] __kasan_check_write+0x18/0x20 [ 16.965114] kasan_atomics_helper+0x5fe/0x5450 [ 16.965138] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.965161] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.965184] ? kasan_atomics+0x152/0x310 [ 16.965211] kasan_atomics+0x1dc/0x310 [ 16.965246] ? __pfx_kasan_atomics+0x10/0x10 [ 16.965272] ? __pfx_read_tsc+0x10/0x10 [ 16.965294] ? ktime_get_ts64+0x86/0x230 [ 16.965319] kunit_try_run_case+0x1a5/0x480 [ 16.965344] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.965367] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.965391] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.965415] ? __kthread_parkme+0x82/0x180 [ 16.965437] ? preempt_count_sub+0x50/0x80 [ 16.965546] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.965573] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.965608] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.965635] kthread+0x337/0x6f0 [ 16.965656] ? trace_preempt_on+0x20/0xc0 [ 16.965682] ? __pfx_kthread+0x10/0x10 [ 16.965705] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.965727] ? calculate_sigpending+0x7b/0xa0 [ 16.965753] ? __pfx_kthread+0x10/0x10 [ 16.965777] ret_from_fork+0x116/0x1d0 [ 16.965795] ? __pfx_kthread+0x10/0x10 [ 16.965818] ret_from_fork_asm+0x1a/0x30 [ 16.965850] </TASK> [ 16.965862] [ 16.972509] Allocated by task 283: [ 16.972681] kasan_save_stack+0x45/0x70 [ 16.972820] kasan_save_track+0x18/0x40 [ 16.972990] kasan_save_alloc_info+0x3b/0x50 [ 16.973196] __kasan_kmalloc+0xb7/0xc0 [ 16.973310] __kmalloc_cache_noprof+0x189/0x420 [ 16.973425] kasan_atomics+0x95/0x310 [ 16.973826] kunit_try_run_case+0x1a5/0x480 [ 16.974116] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.974536] kthread+0x337/0x6f0 [ 16.974768] ret_from_fork+0x116/0x1d0 [ 16.975025] ret_from_fork_asm+0x1a/0x30 [ 16.975231] [ 16.975290] The buggy address belongs to the object at ffff888102b6b880 [ 16.975290] which belongs to the cache kmalloc-64 of size 64 [ 16.975768] The buggy address is located 0 bytes to the right of [ 16.975768] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 16.976271] [ 16.976361] The buggy address belongs to the physical page: [ 16.976603] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 16.976835] flags: 0x200000000000000(node=0|zone=2) [ 16.976940] page_type: f5(slab) [ 16.977030] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.977163] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.977300] page dumped because: kasan: bad access detected [ 16.977403] [ 16.977503] Memory state around the buggy address: [ 16.977714] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.978017] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.978356] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.978877] ^ [ 16.979098] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.979566] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.979915] ================================================================== [ 17.514110] ================================================================== [ 17.514297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 17.515135] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.515471] [ 17.515631] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.515685] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.515699] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.515733] Call Trace: [ 17.515753] <TASK> [ 17.515771] dump_stack_lvl+0x73/0xb0 [ 17.515816] print_report+0xd1/0x650 [ 17.515842] ? __virt_addr_valid+0x1db/0x2d0 [ 17.515877] ? kasan_atomics_helper+0x16e7/0x5450 [ 17.515905] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.515929] ? kasan_atomics_helper+0x16e7/0x5450 [ 17.515966] kasan_report+0x141/0x180 [ 17.515992] ? kasan_atomics_helper+0x16e7/0x5450 [ 17.516022] kasan_check_range+0x10c/0x1c0 [ 17.516048] __kasan_check_write+0x18/0x20 [ 17.516068] kasan_atomics_helper+0x16e7/0x5450 [ 17.516094] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.516118] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.516141] ? kasan_atomics+0x152/0x310 [ 17.516170] kasan_atomics+0x1dc/0x310 [ 17.516202] ? __pfx_kasan_atomics+0x10/0x10 [ 17.516241] ? __pfx_read_tsc+0x10/0x10 [ 17.516267] ? ktime_get_ts64+0x86/0x230 [ 17.516293] kunit_try_run_case+0x1a5/0x480 [ 17.516320] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.516342] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.516367] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.516391] ? __kthread_parkme+0x82/0x180 [ 17.516412] ? preempt_count_sub+0x50/0x80 [ 17.516437] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.516462] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.516486] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.516510] kthread+0x337/0x6f0 [ 17.516530] ? trace_preempt_on+0x20/0xc0 [ 17.516556] ? __pfx_kthread+0x10/0x10 [ 17.516577] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.516600] ? calculate_sigpending+0x7b/0xa0 [ 17.516625] ? __pfx_kthread+0x10/0x10 [ 17.516648] ret_from_fork+0x116/0x1d0 [ 17.516669] ? __pfx_kthread+0x10/0x10 [ 17.516691] ret_from_fork_asm+0x1a/0x30 [ 17.516725] </TASK> [ 17.516738] [ 17.522859] Allocated by task 283: [ 17.523058] kasan_save_stack+0x45/0x70 [ 17.523283] kasan_save_track+0x18/0x40 [ 17.523463] kasan_save_alloc_info+0x3b/0x50 [ 17.523658] __kasan_kmalloc+0xb7/0xc0 [ 17.523859] __kmalloc_cache_noprof+0x189/0x420 [ 17.524044] kasan_atomics+0x95/0x310 [ 17.524245] kunit_try_run_case+0x1a5/0x480 [ 17.524451] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.524634] kthread+0x337/0x6f0 [ 17.524819] ret_from_fork+0x116/0x1d0 [ 17.524909] ret_from_fork_asm+0x1a/0x30 [ 17.525115] [ 17.525256] The buggy address belongs to the object at ffff888102b6b880 [ 17.525256] which belongs to the cache kmalloc-64 of size 64 [ 17.525706] The buggy address is located 0 bytes to the right of [ 17.525706] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.526040] [ 17.526099] The buggy address belongs to the physical page: [ 17.526206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.526674] flags: 0x200000000000000(node=0|zone=2) [ 17.526990] page_type: f5(slab) [ 17.527089] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.527244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.527624] page dumped because: kasan: bad access detected [ 17.527911] [ 17.528033] Memory state around the buggy address: [ 17.528359] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.528599] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.528818] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.529067] ^ [ 17.529309] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.529486] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.529616] ================================================================== [ 16.856663] ================================================================== [ 16.857053] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 16.857284] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 16.857420] [ 16.857522] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.857854] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.857880] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.857905] Call Trace: [ 16.857929] <TASK> [ 16.857980] dump_stack_lvl+0x73/0xb0 [ 16.858017] print_report+0xd1/0x650 [ 16.858051] ? __virt_addr_valid+0x1db/0x2d0 [ 16.858108] ? kasan_atomics_helper+0x4b6e/0x5450 [ 16.858131] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.858165] ? kasan_atomics_helper+0x4b6e/0x5450 [ 16.858189] kasan_report+0x141/0x180 [ 16.858254] ? kasan_atomics_helper+0x4b6e/0x5450 [ 16.858286] __asan_report_store4_noabort+0x1b/0x30 [ 16.858317] kasan_atomics_helper+0x4b6e/0x5450 [ 16.858351] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.858375] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.858397] ? kasan_atomics+0x152/0x310 [ 16.858424] kasan_atomics+0x1dc/0x310 [ 16.858447] ? __pfx_kasan_atomics+0x10/0x10 [ 16.858471] ? __pfx_read_tsc+0x10/0x10 [ 16.858493] ? ktime_get_ts64+0x86/0x230 [ 16.858518] kunit_try_run_case+0x1a5/0x480 [ 16.858543] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.858707] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.858738] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.858798] ? __kthread_parkme+0x82/0x180 [ 16.858822] ? preempt_count_sub+0x50/0x80 [ 16.858848] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.858873] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.858899] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.858925] kthread+0x337/0x6f0 [ 16.858947] ? trace_preempt_on+0x20/0xc0 [ 16.858974] ? __pfx_kthread+0x10/0x10 [ 16.858997] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.859020] ? calculate_sigpending+0x7b/0xa0 [ 16.859047] ? __pfx_kthread+0x10/0x10 [ 16.859071] ret_from_fork+0x116/0x1d0 [ 16.859092] ? __pfx_kthread+0x10/0x10 [ 16.859116] ret_from_fork_asm+0x1a/0x30 [ 16.859152] </TASK> [ 16.859166] [ 16.866583] Allocated by task 283: [ 16.866980] kasan_save_stack+0x45/0x70 [ 16.867372] kasan_save_track+0x18/0x40 [ 16.867844] kasan_save_alloc_info+0x3b/0x50 [ 16.868060] __kasan_kmalloc+0xb7/0xc0 [ 16.868333] __kmalloc_cache_noprof+0x189/0x420 [ 16.868840] kasan_atomics+0x95/0x310 [ 16.869051] kunit_try_run_case+0x1a5/0x480 [ 16.869278] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.869477] kthread+0x337/0x6f0 [ 16.869657] ret_from_fork+0x116/0x1d0 [ 16.869839] ret_from_fork_asm+0x1a/0x30 [ 16.869965] [ 16.870090] The buggy address belongs to the object at ffff888102b6b880 [ 16.870090] which belongs to the cache kmalloc-64 of size 64 [ 16.870385] The buggy address is located 0 bytes to the right of [ 16.870385] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 16.870814] [ 16.870917] The buggy address belongs to the physical page: [ 16.871109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 16.871631] flags: 0x200000000000000(node=0|zone=2) [ 16.871807] page_type: f5(slab) [ 16.871976] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.872270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.872602] page dumped because: kasan: bad access detected [ 16.872773] [ 16.872915] Memory state around the buggy address: [ 16.873077] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.873327] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.873756] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.874177] ^ [ 16.874448] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.874750] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.875039] ================================================================== [ 17.052010] ================================================================== [ 17.052629] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 17.052825] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.053216] [ 17.053349] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.053414] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.053429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.053475] Call Trace: [ 17.053494] <TASK> [ 17.053514] dump_stack_lvl+0x73/0xb0 [ 17.053610] print_report+0xd1/0x650 [ 17.053662] ? __virt_addr_valid+0x1db/0x2d0 [ 17.053688] ? kasan_atomics_helper+0x8f9/0x5450 [ 17.053720] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.053746] ? kasan_atomics_helper+0x8f9/0x5450 [ 17.053769] kasan_report+0x141/0x180 [ 17.053793] ? kasan_atomics_helper+0x8f9/0x5450 [ 17.053820] kasan_check_range+0x10c/0x1c0 [ 17.053845] __kasan_check_write+0x18/0x20 [ 17.053865] kasan_atomics_helper+0x8f9/0x5450 [ 17.053890] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.053913] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.053934] ? kasan_atomics+0x152/0x310 [ 17.053962] kasan_atomics+0x1dc/0x310 [ 17.053986] ? __pfx_kasan_atomics+0x10/0x10 [ 17.054010] ? __pfx_read_tsc+0x10/0x10 [ 17.054032] ? ktime_get_ts64+0x86/0x230 [ 17.054057] kunit_try_run_case+0x1a5/0x480 [ 17.054082] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.054104] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.054128] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.054151] ? __kthread_parkme+0x82/0x180 [ 17.054172] ? preempt_count_sub+0x50/0x80 [ 17.054197] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.054236] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.054264] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.054288] kthread+0x337/0x6f0 [ 17.054309] ? trace_preempt_on+0x20/0xc0 [ 17.054342] ? __pfx_kthread+0x10/0x10 [ 17.054368] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.054391] ? calculate_sigpending+0x7b/0xa0 [ 17.054417] ? __pfx_kthread+0x10/0x10 [ 17.054440] ret_from_fork+0x116/0x1d0 [ 17.054461] ? __pfx_kthread+0x10/0x10 [ 17.054582] ret_from_fork_asm+0x1a/0x30 [ 17.054623] </TASK> [ 17.054639] [ 17.060459] Allocated by task 283: [ 17.061407] kasan_save_stack+0x45/0x70 [ 17.061749] kasan_save_track+0x18/0x40 [ 17.061905] kasan_save_alloc_info+0x3b/0x50 [ 17.062001] __kasan_kmalloc+0xb7/0xc0 [ 17.062123] __kmalloc_cache_noprof+0x189/0x420 [ 17.062352] kasan_atomics+0x95/0x310 [ 17.062919] kunit_try_run_case+0x1a5/0x480 [ 17.063207] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.063340] kthread+0x337/0x6f0 [ 17.063619] ret_from_fork+0x116/0x1d0 [ 17.064130] ret_from_fork_asm+0x1a/0x30 [ 17.064282] [ 17.064378] The buggy address belongs to the object at ffff888102b6b880 [ 17.064378] which belongs to the cache kmalloc-64 of size 64 [ 17.064907] The buggy address is located 0 bytes to the right of [ 17.064907] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.065292] [ 17.065413] The buggy address belongs to the physical page: [ 17.065847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.066016] flags: 0x200000000000000(node=0|zone=2) [ 17.066135] page_type: f5(slab) [ 17.066342] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.066836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.067050] page dumped because: kasan: bad access detected [ 17.067158] [ 17.067212] Memory state around the buggy address: [ 17.067485] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.067920] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.068085] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.068427] ^ [ 17.068960] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.069123] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.069329] ================================================================== [ 17.257066] ================================================================== [ 17.257424] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 17.257770] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.258170] [ 17.258296] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.258355] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.258370] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.258393] Call Trace: [ 17.258409] <TASK> [ 17.258426] dump_stack_lvl+0x73/0xb0 [ 17.258453] print_report+0xd1/0x650 [ 17.258478] ? __virt_addr_valid+0x1db/0x2d0 [ 17.258503] ? kasan_atomics_helper+0x4a36/0x5450 [ 17.258526] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.258549] ? kasan_atomics_helper+0x4a36/0x5450 [ 17.258572] kasan_report+0x141/0x180 [ 17.258596] ? kasan_atomics_helper+0x4a36/0x5450 [ 17.258624] __asan_report_load4_noabort+0x18/0x20 [ 17.258646] kasan_atomics_helper+0x4a36/0x5450 [ 17.258670] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.258694] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.258715] ? kasan_atomics+0x152/0x310 [ 17.258743] kasan_atomics+0x1dc/0x310 [ 17.258768] ? __pfx_kasan_atomics+0x10/0x10 [ 17.258793] ? __pfx_read_tsc+0x10/0x10 [ 17.258814] ? ktime_get_ts64+0x86/0x230 [ 17.258840] kunit_try_run_case+0x1a5/0x480 [ 17.258865] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.258888] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.258912] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.258936] ? __kthread_parkme+0x82/0x180 [ 17.258958] ? preempt_count_sub+0x50/0x80 [ 17.258982] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.259007] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.259030] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.259054] kthread+0x337/0x6f0 [ 17.259075] ? trace_preempt_on+0x20/0xc0 [ 17.259098] ? __pfx_kthread+0x10/0x10 [ 17.259121] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.259143] ? calculate_sigpending+0x7b/0xa0 [ 17.259169] ? __pfx_kthread+0x10/0x10 [ 17.259192] ret_from_fork+0x116/0x1d0 [ 17.259211] ? __pfx_kthread+0x10/0x10 [ 17.259245] ret_from_fork_asm+0x1a/0x30 [ 17.259278] </TASK> [ 17.259290] [ 17.267599] Allocated by task 283: [ 17.267745] kasan_save_stack+0x45/0x70 [ 17.267864] kasan_save_track+0x18/0x40 [ 17.267956] kasan_save_alloc_info+0x3b/0x50 [ 17.268176] __kasan_kmalloc+0xb7/0xc0 [ 17.268331] __kmalloc_cache_noprof+0x189/0x420 [ 17.268593] kasan_atomics+0x95/0x310 [ 17.268744] kunit_try_run_case+0x1a5/0x480 [ 17.268871] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.268988] kthread+0x337/0x6f0 [ 17.269094] ret_from_fork+0x116/0x1d0 [ 17.269291] ret_from_fork_asm+0x1a/0x30 [ 17.269544] [ 17.269677] The buggy address belongs to the object at ffff888102b6b880 [ 17.269677] which belongs to the cache kmalloc-64 of size 64 [ 17.270194] The buggy address is located 0 bytes to the right of [ 17.270194] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.270660] [ 17.270726] The buggy address belongs to the physical page: [ 17.271005] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.271320] flags: 0x200000000000000(node=0|zone=2) [ 17.271511] page_type: f5(slab) [ 17.271611] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.271939] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.272172] page dumped because: kasan: bad access detected [ 17.272394] [ 17.272512] Memory state around the buggy address: [ 17.272699] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.272927] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.273207] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.273547] ^ [ 17.273763] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.274057] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.274418] ================================================================== [ 17.808162] ================================================================== [ 17.808721] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 17.809161] Read of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.809619] [ 17.810165] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.810235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.810251] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.810275] Call Trace: [ 17.810302] <TASK> [ 17.810320] dump_stack_lvl+0x73/0xb0 [ 17.810364] print_report+0xd1/0x650 [ 17.810390] ? __virt_addr_valid+0x1db/0x2d0 [ 17.810417] ? kasan_atomics_helper+0x4fb2/0x5450 [ 17.810441] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.810467] ? kasan_atomics_helper+0x4fb2/0x5450 [ 17.810491] kasan_report+0x141/0x180 [ 17.810514] ? kasan_atomics_helper+0x4fb2/0x5450 [ 17.810542] __asan_report_load8_noabort+0x18/0x20 [ 17.810564] kasan_atomics_helper+0x4fb2/0x5450 [ 17.810588] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.810611] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.810634] ? kasan_atomics+0x152/0x310 [ 17.810662] kasan_atomics+0x1dc/0x310 [ 17.810686] ? __pfx_kasan_atomics+0x10/0x10 [ 17.810711] ? __pfx_read_tsc+0x10/0x10 [ 17.810732] ? ktime_get_ts64+0x86/0x230 [ 17.810757] kunit_try_run_case+0x1a5/0x480 [ 17.810782] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.810804] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.810828] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.810851] ? __kthread_parkme+0x82/0x180 [ 17.810872] ? preempt_count_sub+0x50/0x80 [ 17.810897] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.810921] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.810948] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.810972] kthread+0x337/0x6f0 [ 17.810992] ? trace_preempt_on+0x20/0xc0 [ 17.811017] ? __pfx_kthread+0x10/0x10 [ 17.811041] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.811062] ? calculate_sigpending+0x7b/0xa0 [ 17.811087] ? __pfx_kthread+0x10/0x10 [ 17.811109] ret_from_fork+0x116/0x1d0 [ 17.811128] ? __pfx_kthread+0x10/0x10 [ 17.811150] ret_from_fork_asm+0x1a/0x30 [ 17.811212] </TASK> [ 17.811233] [ 17.817141] Allocated by task 283: [ 17.817395] kasan_save_stack+0x45/0x70 [ 17.817648] kasan_save_track+0x18/0x40 [ 17.817891] kasan_save_alloc_info+0x3b/0x50 [ 17.818023] __kasan_kmalloc+0xb7/0xc0 [ 17.818114] __kmalloc_cache_noprof+0x189/0x420 [ 17.818211] kasan_atomics+0x95/0x310 [ 17.818460] kunit_try_run_case+0x1a5/0x480 [ 17.818749] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.818901] kthread+0x337/0x6f0 [ 17.818986] ret_from_fork+0x116/0x1d0 [ 17.819070] ret_from_fork_asm+0x1a/0x30 [ 17.819156] [ 17.819209] The buggy address belongs to the object at ffff888102b6b880 [ 17.819209] which belongs to the cache kmalloc-64 of size 64 [ 17.819929] The buggy address is located 0 bytes to the right of [ 17.819929] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.820429] [ 17.820486] The buggy address belongs to the physical page: [ 17.820590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.820731] flags: 0x200000000000000(node=0|zone=2) [ 17.820834] page_type: f5(slab) [ 17.820919] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.821266] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.821752] page dumped because: kasan: bad access detected [ 17.822137] [ 17.822312] Memory state around the buggy address: [ 17.822655] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.822917] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.823046] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.823171] ^ [ 17.823385] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.823819] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.824237] ================================================================== [ 17.656898] ================================================================== [ 17.657196] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 17.657487] Read of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.657670] [ 17.657802] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.657866] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.657880] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.657902] Call Trace: [ 17.657919] <TASK> [ 17.657935] dump_stack_lvl+0x73/0xb0 [ 17.657975] print_report+0xd1/0x650 [ 17.658008] ? __virt_addr_valid+0x1db/0x2d0 [ 17.658032] ? kasan_atomics_helper+0x4f30/0x5450 [ 17.658063] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.658094] ? kasan_atomics_helper+0x4f30/0x5450 [ 17.658118] kasan_report+0x141/0x180 [ 17.658150] ? kasan_atomics_helper+0x4f30/0x5450 [ 17.658186] __asan_report_load8_noabort+0x18/0x20 [ 17.658216] kasan_atomics_helper+0x4f30/0x5450 [ 17.658251] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.658276] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.658299] ? kasan_atomics+0x152/0x310 [ 17.658327] kasan_atomics+0x1dc/0x310 [ 17.658360] ? __pfx_kasan_atomics+0x10/0x10 [ 17.658387] ? __pfx_read_tsc+0x10/0x10 [ 17.658410] ? ktime_get_ts64+0x86/0x230 [ 17.658437] kunit_try_run_case+0x1a5/0x480 [ 17.658461] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.658483] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.658506] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.658529] ? __kthread_parkme+0x82/0x180 [ 17.658551] ? preempt_count_sub+0x50/0x80 [ 17.658575] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.658599] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.658622] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.658646] kthread+0x337/0x6f0 [ 17.658666] ? trace_preempt_on+0x20/0xc0 [ 17.658711] ? __pfx_kthread+0x10/0x10 [ 17.658733] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.658755] ? calculate_sigpending+0x7b/0xa0 [ 17.658780] ? __pfx_kthread+0x10/0x10 [ 17.658802] ret_from_fork+0x116/0x1d0 [ 17.658838] ? __pfx_kthread+0x10/0x10 [ 17.658862] ret_from_fork_asm+0x1a/0x30 [ 17.658895] </TASK> [ 17.658907] [ 17.663311] Allocated by task 283: [ 17.663450] kasan_save_stack+0x45/0x70 [ 17.663542] kasan_save_track+0x18/0x40 [ 17.663631] kasan_save_alloc_info+0x3b/0x50 [ 17.663792] __kasan_kmalloc+0xb7/0xc0 [ 17.663951] __kmalloc_cache_noprof+0x189/0x420 [ 17.664149] kasan_atomics+0x95/0x310 [ 17.664276] kunit_try_run_case+0x1a5/0x480 [ 17.664451] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.664558] kthread+0x337/0x6f0 [ 17.664638] ret_from_fork+0x116/0x1d0 [ 17.664720] ret_from_fork_asm+0x1a/0x30 [ 17.664808] [ 17.664859] The buggy address belongs to the object at ffff888102b6b880 [ 17.664859] which belongs to the cache kmalloc-64 of size 64 [ 17.665049] The buggy address is located 0 bytes to the right of [ 17.665049] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.665255] [ 17.665311] The buggy address belongs to the physical page: [ 17.665414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.665662] flags: 0x200000000000000(node=0|zone=2) [ 17.665874] page_type: f5(slab) [ 17.666030] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.666350] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.666682] page dumped because: kasan: bad access detected [ 17.666913] [ 17.667017] Memory state around the buggy address: [ 17.667217] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.667558] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.667837] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.668119] ^ [ 17.668357] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.668640] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.668851] ================================================================== [ 17.275491] ================================================================== [ 17.275862] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 17.276097] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.276357] [ 17.276478] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.276535] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.276549] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.276572] Call Trace: [ 17.276596] <TASK> [ 17.276637] dump_stack_lvl+0x73/0xb0 [ 17.276678] print_report+0xd1/0x650 [ 17.276704] ? __virt_addr_valid+0x1db/0x2d0 [ 17.276728] ? kasan_atomics_helper+0x1079/0x5450 [ 17.276759] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.276792] ? kasan_atomics_helper+0x1079/0x5450 [ 17.276816] kasan_report+0x141/0x180 [ 17.276839] ? kasan_atomics_helper+0x1079/0x5450 [ 17.276866] kasan_check_range+0x10c/0x1c0 [ 17.276891] __kasan_check_write+0x18/0x20 [ 17.276912] kasan_atomics_helper+0x1079/0x5450 [ 17.276936] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.276959] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.276982] ? kasan_atomics+0x152/0x310 [ 17.277009] kasan_atomics+0x1dc/0x310 [ 17.277033] ? __pfx_kasan_atomics+0x10/0x10 [ 17.277057] ? __pfx_read_tsc+0x10/0x10 [ 17.277080] ? ktime_get_ts64+0x86/0x230 [ 17.277105] kunit_try_run_case+0x1a5/0x480 [ 17.277130] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.277152] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.277175] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.277197] ? __kthread_parkme+0x82/0x180 [ 17.277218] ? preempt_count_sub+0x50/0x80 [ 17.277264] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.277290] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.277315] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.277340] kthread+0x337/0x6f0 [ 17.277360] ? trace_preempt_on+0x20/0xc0 [ 17.277387] ? __pfx_kthread+0x10/0x10 [ 17.277409] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.277432] ? calculate_sigpending+0x7b/0xa0 [ 17.277459] ? __pfx_kthread+0x10/0x10 [ 17.277482] ret_from_fork+0x116/0x1d0 [ 17.277502] ? __pfx_kthread+0x10/0x10 [ 17.277525] ret_from_fork_asm+0x1a/0x30 [ 17.277559] </TASK> [ 17.277573] [ 17.283076] Allocated by task 283: [ 17.283207] kasan_save_stack+0x45/0x70 [ 17.283360] kasan_save_track+0x18/0x40 [ 17.283483] kasan_save_alloc_info+0x3b/0x50 [ 17.283659] __kasan_kmalloc+0xb7/0xc0 [ 17.283837] __kmalloc_cache_noprof+0x189/0x420 [ 17.284054] kasan_atomics+0x95/0x310 [ 17.284251] kunit_try_run_case+0x1a5/0x480 [ 17.284464] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.284722] kthread+0x337/0x6f0 [ 17.284884] ret_from_fork+0x116/0x1d0 [ 17.285061] ret_from_fork_asm+0x1a/0x30 [ 17.285263] [ 17.285363] The buggy address belongs to the object at ffff888102b6b880 [ 17.285363] which belongs to the cache kmalloc-64 of size 64 [ 17.285834] The buggy address is located 0 bytes to the right of [ 17.285834] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.286345] [ 17.286459] The buggy address belongs to the physical page: [ 17.286630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.286777] flags: 0x200000000000000(node=0|zone=2) [ 17.286886] page_type: f5(slab) [ 17.286976] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.287240] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.287627] page dumped because: kasan: bad access detected [ 17.287922] [ 17.288027] Memory state around the buggy address: [ 17.288311] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.288597] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.288845] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.289043] ^ [ 17.289210] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.289490] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.289706] ================================================================== [ 17.208875] ================================================================== [ 17.209606] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 17.210167] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.210468] [ 17.210584] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.210651] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.210667] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.210693] Call Trace: [ 17.210709] <TASK> [ 17.210738] dump_stack_lvl+0x73/0xb0 [ 17.210774] print_report+0xd1/0x650 [ 17.210812] ? __virt_addr_valid+0x1db/0x2d0 [ 17.210841] ? kasan_atomics_helper+0xe78/0x5450 [ 17.210864] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.210889] ? kasan_atomics_helper+0xe78/0x5450 [ 17.210914] kasan_report+0x141/0x180 [ 17.210939] ? kasan_atomics_helper+0xe78/0x5450 [ 17.210968] kasan_check_range+0x10c/0x1c0 [ 17.210995] __kasan_check_write+0x18/0x20 [ 17.211017] kasan_atomics_helper+0xe78/0x5450 [ 17.211042] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.211066] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.211090] ? kasan_atomics+0x152/0x310 [ 17.211119] kasan_atomics+0x1dc/0x310 [ 17.211144] ? __pfx_kasan_atomics+0x10/0x10 [ 17.211170] ? __pfx_read_tsc+0x10/0x10 [ 17.211193] ? ktime_get_ts64+0x86/0x230 [ 17.211228] kunit_try_run_case+0x1a5/0x480 [ 17.211270] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.211297] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.211322] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.211360] ? __kthread_parkme+0x82/0x180 [ 17.211383] ? preempt_count_sub+0x50/0x80 [ 17.211409] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.211434] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.211459] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.211484] kthread+0x337/0x6f0 [ 17.211505] ? trace_preempt_on+0x20/0xc0 [ 17.211531] ? __pfx_kthread+0x10/0x10 [ 17.211553] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.211576] ? calculate_sigpending+0x7b/0xa0 [ 17.211603] ? __pfx_kthread+0x10/0x10 [ 17.211627] ret_from_fork+0x116/0x1d0 [ 17.211646] ? __pfx_kthread+0x10/0x10 [ 17.211669] ret_from_fork_asm+0x1a/0x30 [ 17.211703] </TASK> [ 17.211716] [ 17.217549] Allocated by task 283: [ 17.217688] kasan_save_stack+0x45/0x70 [ 17.217790] kasan_save_track+0x18/0x40 [ 17.217883] kasan_save_alloc_info+0x3b/0x50 [ 17.217977] __kasan_kmalloc+0xb7/0xc0 [ 17.218063] __kmalloc_cache_noprof+0x189/0x420 [ 17.218160] kasan_atomics+0x95/0x310 [ 17.218391] kunit_try_run_case+0x1a5/0x480 [ 17.218670] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.219020] kthread+0x337/0x6f0 [ 17.219264] ret_from_fork+0x116/0x1d0 [ 17.219533] ret_from_fork_asm+0x1a/0x30 [ 17.219711] [ 17.219768] The buggy address belongs to the object at ffff888102b6b880 [ 17.219768] which belongs to the cache kmalloc-64 of size 64 [ 17.220104] The buggy address is located 0 bytes to the right of [ 17.220104] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.220641] [ 17.220743] The buggy address belongs to the physical page: [ 17.220958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.221105] flags: 0x200000000000000(node=0|zone=2) [ 17.221213] page_type: f5(slab) [ 17.221312] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.221452] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.221588] page dumped because: kasan: bad access detected [ 17.221698] [ 17.221755] Memory state around the buggy address: [ 17.221993] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.222448] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.222890] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.223296] ^ [ 17.223587] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.224002] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.224260] ================================================================== [ 17.641244] ================================================================== [ 17.641893] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 17.642300] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.642725] [ 17.642877] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.642931] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.642945] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.642969] Call Trace: [ 17.642988] <TASK> [ 17.643005] dump_stack_lvl+0x73/0xb0 [ 17.643034] print_report+0xd1/0x650 [ 17.643059] ? __virt_addr_valid+0x1db/0x2d0 [ 17.643084] ? kasan_atomics_helper+0x1c18/0x5450 [ 17.643137] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.643167] ? kasan_atomics_helper+0x1c18/0x5450 [ 17.643191] kasan_report+0x141/0x180 [ 17.643215] ? kasan_atomics_helper+0x1c18/0x5450 [ 17.643258] kasan_check_range+0x10c/0x1c0 [ 17.643300] __kasan_check_write+0x18/0x20 [ 17.643327] kasan_atomics_helper+0x1c18/0x5450 [ 17.643353] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.643378] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.643401] ? kasan_atomics+0x152/0x310 [ 17.643428] kasan_atomics+0x1dc/0x310 [ 17.643470] ? __pfx_kasan_atomics+0x10/0x10 [ 17.643496] ? __pfx_read_tsc+0x10/0x10 [ 17.643518] ? ktime_get_ts64+0x86/0x230 [ 17.643542] kunit_try_run_case+0x1a5/0x480 [ 17.643566] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.643598] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.643622] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.643645] ? __kthread_parkme+0x82/0x180 [ 17.643666] ? preempt_count_sub+0x50/0x80 [ 17.643690] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.643728] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.643755] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.643779] kthread+0x337/0x6f0 [ 17.643799] ? trace_preempt_on+0x20/0xc0 [ 17.643824] ? __pfx_kthread+0x10/0x10 [ 17.643845] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.643884] ? calculate_sigpending+0x7b/0xa0 [ 17.643908] ? __pfx_kthread+0x10/0x10 [ 17.643931] ret_from_fork+0x116/0x1d0 [ 17.643950] ? __pfx_kthread+0x10/0x10 [ 17.643971] ret_from_fork_asm+0x1a/0x30 [ 17.644019] </TASK> [ 17.644032] [ 17.649928] Allocated by task 283: [ 17.650122] kasan_save_stack+0x45/0x70 [ 17.650356] kasan_save_track+0x18/0x40 [ 17.650575] kasan_save_alloc_info+0x3b/0x50 [ 17.650781] __kasan_kmalloc+0xb7/0xc0 [ 17.650932] __kmalloc_cache_noprof+0x189/0x420 [ 17.651032] kasan_atomics+0x95/0x310 [ 17.651122] kunit_try_run_case+0x1a5/0x480 [ 17.651214] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.651334] kthread+0x337/0x6f0 [ 17.651417] ret_from_fork+0x116/0x1d0 [ 17.651502] ret_from_fork_asm+0x1a/0x30 [ 17.651592] [ 17.651698] The buggy address belongs to the object at ffff888102b6b880 [ 17.651698] which belongs to the cache kmalloc-64 of size 64 [ 17.652152] The buggy address is located 0 bytes to the right of [ 17.652152] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.652646] [ 17.652760] The buggy address belongs to the physical page: [ 17.653011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.653344] flags: 0x200000000000000(node=0|zone=2) [ 17.653570] page_type: f5(slab) [ 17.653760] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.653980] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.654109] page dumped because: kasan: bad access detected [ 17.654363] [ 17.654476] Memory state around the buggy address: [ 17.654698] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.654930] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.655181] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.655424] ^ [ 17.655626] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.655858] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.656110] ================================================================== [ 17.225612] ================================================================== [ 17.226109] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 17.226887] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.227363] [ 17.227511] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.227580] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.227710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.227747] Call Trace: [ 17.227771] <TASK> [ 17.227794] dump_stack_lvl+0x73/0xb0 [ 17.227842] print_report+0xd1/0x650 [ 17.227869] ? __virt_addr_valid+0x1db/0x2d0 [ 17.227909] ? kasan_atomics_helper+0xf10/0x5450 [ 17.227934] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.227970] ? kasan_atomics_helper+0xf10/0x5450 [ 17.227995] kasan_report+0x141/0x180 [ 17.228031] ? kasan_atomics_helper+0xf10/0x5450 [ 17.228063] kasan_check_range+0x10c/0x1c0 [ 17.228089] __kasan_check_write+0x18/0x20 [ 17.228122] kasan_atomics_helper+0xf10/0x5450 [ 17.228147] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.228181] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.228206] ? kasan_atomics+0x152/0x310 [ 17.228252] kasan_atomics+0x1dc/0x310 [ 17.228280] ? __pfx_kasan_atomics+0x10/0x10 [ 17.228307] ? __pfx_read_tsc+0x10/0x10 [ 17.228342] ? ktime_get_ts64+0x86/0x230 [ 17.228369] kunit_try_run_case+0x1a5/0x480 [ 17.228405] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.228431] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.228457] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.228493] ? __kthread_parkme+0x82/0x180 [ 17.228516] ? preempt_count_sub+0x50/0x80 [ 17.228541] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.228566] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.228590] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.228613] kthread+0x337/0x6f0 [ 17.228634] ? trace_preempt_on+0x20/0xc0 [ 17.228659] ? __pfx_kthread+0x10/0x10 [ 17.228681] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.228703] ? calculate_sigpending+0x7b/0xa0 [ 17.228729] ? __pfx_kthread+0x10/0x10 [ 17.228752] ret_from_fork+0x116/0x1d0 [ 17.228772] ? __pfx_kthread+0x10/0x10 [ 17.228793] ret_from_fork_asm+0x1a/0x30 [ 17.228828] </TASK> [ 17.228841] [ 17.235110] Allocated by task 283: [ 17.235328] kasan_save_stack+0x45/0x70 [ 17.235458] kasan_save_track+0x18/0x40 [ 17.235652] kasan_save_alloc_info+0x3b/0x50 [ 17.235828] __kasan_kmalloc+0xb7/0xc0 [ 17.236061] __kmalloc_cache_noprof+0x189/0x420 [ 17.236191] kasan_atomics+0x95/0x310 [ 17.236363] kunit_try_run_case+0x1a5/0x480 [ 17.236459] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.236564] kthread+0x337/0x6f0 [ 17.236646] ret_from_fork+0x116/0x1d0 [ 17.236729] ret_from_fork_asm+0x1a/0x30 [ 17.236949] [ 17.237069] The buggy address belongs to the object at ffff888102b6b880 [ 17.237069] which belongs to the cache kmalloc-64 of size 64 [ 17.237676] The buggy address is located 0 bytes to the right of [ 17.237676] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.238094] [ 17.238152] The buggy address belongs to the physical page: [ 17.238361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.238798] flags: 0x200000000000000(node=0|zone=2) [ 17.238999] page_type: f5(slab) [ 17.239209] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.239481] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.239759] page dumped because: kasan: bad access detected [ 17.239992] [ 17.240092] Memory state around the buggy address: [ 17.240326] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.240453] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.240578] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.240697] ^ [ 17.240789] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.240910] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.241029] ================================================================== [ 17.593455] ================================================================== [ 17.593925] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 17.594374] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.594842] [ 17.594989] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.595048] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.595063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.595086] Call Trace: [ 17.595102] <TASK> [ 17.595128] dump_stack_lvl+0x73/0xb0 [ 17.595156] print_report+0xd1/0x650 [ 17.595186] ? __virt_addr_valid+0x1db/0x2d0 [ 17.595210] ? kasan_atomics_helper+0x19e3/0x5450 [ 17.595247] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.595271] ? kasan_atomics_helper+0x19e3/0x5450 [ 17.595294] kasan_report+0x141/0x180 [ 17.595340] ? kasan_atomics_helper+0x19e3/0x5450 [ 17.595369] kasan_check_range+0x10c/0x1c0 [ 17.595405] __kasan_check_write+0x18/0x20 [ 17.595427] kasan_atomics_helper+0x19e3/0x5450 [ 17.595462] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.595486] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.595508] ? kasan_atomics+0x152/0x310 [ 17.595550] kasan_atomics+0x1dc/0x310 [ 17.595574] ? __pfx_kasan_atomics+0x10/0x10 [ 17.595613] ? __pfx_read_tsc+0x10/0x10 [ 17.595637] ? ktime_get_ts64+0x86/0x230 [ 17.595661] kunit_try_run_case+0x1a5/0x480 [ 17.595696] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.595719] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.595741] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.595765] ? __kthread_parkme+0x82/0x180 [ 17.595786] ? preempt_count_sub+0x50/0x80 [ 17.595810] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.595833] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.595856] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.595879] kthread+0x337/0x6f0 [ 17.595899] ? trace_preempt_on+0x20/0xc0 [ 17.595923] ? __pfx_kthread+0x10/0x10 [ 17.595944] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.595966] ? calculate_sigpending+0x7b/0xa0 [ 17.595989] ? __pfx_kthread+0x10/0x10 [ 17.596011] ret_from_fork+0x116/0x1d0 [ 17.596030] ? __pfx_kthread+0x10/0x10 [ 17.596052] ret_from_fork_asm+0x1a/0x30 [ 17.596082] </TASK> [ 17.596094] [ 17.601631] Allocated by task 283: [ 17.601830] kasan_save_stack+0x45/0x70 [ 17.602038] kasan_save_track+0x18/0x40 [ 17.602184] kasan_save_alloc_info+0x3b/0x50 [ 17.602438] __kasan_kmalloc+0xb7/0xc0 [ 17.602605] __kmalloc_cache_noprof+0x189/0x420 [ 17.602774] kasan_atomics+0x95/0x310 [ 17.602960] kunit_try_run_case+0x1a5/0x480 [ 17.603096] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.604501] kthread+0x337/0x6f0 [ 17.604866] ret_from_fork+0x116/0x1d0 [ 17.605253] ret_from_fork_asm+0x1a/0x30 [ 17.605363] [ 17.605422] The buggy address belongs to the object at ffff888102b6b880 [ 17.605422] which belongs to the cache kmalloc-64 of size 64 [ 17.605626] The buggy address is located 0 bytes to the right of [ 17.605626] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.605835] [ 17.605895] The buggy address belongs to the physical page: [ 17.606012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.606290] flags: 0x200000000000000(node=0|zone=2) [ 17.606627] page_type: f5(slab) [ 17.606893] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.607332] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.607696] page dumped because: kasan: bad access detected [ 17.608017] [ 17.608163] Memory state around the buggy address: [ 17.608499] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.608909] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.609216] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.609574] ^ [ 17.609862] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.610111] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.610365] ================================================================== [ 16.820070] ================================================================== [ 16.820407] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 16.820811] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 16.821065] [ 16.821203] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.821265] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.821297] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.821320] Call Trace: [ 16.821335] <TASK> [ 16.821355] dump_stack_lvl+0x73/0xb0 [ 16.821385] print_report+0xd1/0x650 [ 16.821425] ? __virt_addr_valid+0x1db/0x2d0 [ 16.821520] ? kasan_atomics_helper+0x4ba2/0x5450 [ 16.821545] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.821588] ? kasan_atomics_helper+0x4ba2/0x5450 [ 16.821612] kasan_report+0x141/0x180 [ 16.821635] ? kasan_atomics_helper+0x4ba2/0x5450 [ 16.821662] __asan_report_store4_noabort+0x1b/0x30 [ 16.821683] kasan_atomics_helper+0x4ba2/0x5450 [ 16.821720] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.821746] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.821769] ? kasan_atomics+0x152/0x310 [ 16.821796] kasan_atomics+0x1dc/0x310 [ 16.821819] ? __pfx_kasan_atomics+0x10/0x10 [ 16.821843] ? __pfx_read_tsc+0x10/0x10 [ 16.821865] ? ktime_get_ts64+0x86/0x230 [ 16.821890] kunit_try_run_case+0x1a5/0x480 [ 16.821913] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.821961] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.821987] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.822009] ? __kthread_parkme+0x82/0x180 [ 16.822030] ? preempt_count_sub+0x50/0x80 [ 16.822055] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.822080] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.822103] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.822125] kthread+0x337/0x6f0 [ 16.822144] ? trace_preempt_on+0x20/0xc0 [ 16.822169] ? __pfx_kthread+0x10/0x10 [ 16.822190] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.822212] ? calculate_sigpending+0x7b/0xa0 [ 16.822248] ? __pfx_kthread+0x10/0x10 [ 16.822271] ret_from_fork+0x116/0x1d0 [ 16.822290] ? __pfx_kthread+0x10/0x10 [ 16.822311] ret_from_fork_asm+0x1a/0x30 [ 16.822352] </TASK> [ 16.822367] [ 16.829780] Allocated by task 283: [ 16.829996] kasan_save_stack+0x45/0x70 [ 16.830215] kasan_save_track+0x18/0x40 [ 16.830401] kasan_save_alloc_info+0x3b/0x50 [ 16.830913] __kasan_kmalloc+0xb7/0xc0 [ 16.831161] __kmalloc_cache_noprof+0x189/0x420 [ 16.831388] kasan_atomics+0x95/0x310 [ 16.831654] kunit_try_run_case+0x1a5/0x480 [ 16.831822] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.831929] kthread+0x337/0x6f0 [ 16.832008] ret_from_fork+0x116/0x1d0 [ 16.832247] ret_from_fork_asm+0x1a/0x30 [ 16.832612] [ 16.832755] The buggy address belongs to the object at ffff888102b6b880 [ 16.832755] which belongs to the cache kmalloc-64 of size 64 [ 16.833205] The buggy address is located 0 bytes to the right of [ 16.833205] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 16.833682] [ 16.833740] The buggy address belongs to the physical page: [ 16.833849] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 16.834276] flags: 0x200000000000000(node=0|zone=2) [ 16.834654] page_type: f5(slab) [ 16.834823] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.834988] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.835442] page dumped because: kasan: bad access detected [ 16.835871] [ 16.835929] Memory state around the buggy address: [ 16.836031] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.836444] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.836914] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.837208] ^ [ 16.837553] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.837714] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.837839] ================================================================== [ 16.929741] ================================================================== [ 16.930488] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 16.930974] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 16.931249] [ 16.931395] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.931466] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.931482] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.931506] Call Trace: [ 16.931546] <TASK> [ 16.931569] dump_stack_lvl+0x73/0xb0 [ 16.931603] print_report+0xd1/0x650 [ 16.931626] ? __virt_addr_valid+0x1db/0x2d0 [ 16.931651] ? kasan_atomics_helper+0x4b3a/0x5450 [ 16.931673] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.931696] ? kasan_atomics_helper+0x4b3a/0x5450 [ 16.931796] kasan_report+0x141/0x180 [ 16.931822] ? kasan_atomics_helper+0x4b3a/0x5450 [ 16.931850] __asan_report_store4_noabort+0x1b/0x30 [ 16.931872] kasan_atomics_helper+0x4b3a/0x5450 [ 16.931896] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.931920] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.931943] ? kasan_atomics+0x152/0x310 [ 16.931971] kasan_atomics+0x1dc/0x310 [ 16.932004] ? __pfx_kasan_atomics+0x10/0x10 [ 16.932033] ? __pfx_read_tsc+0x10/0x10 [ 16.932056] ? ktime_get_ts64+0x86/0x230 [ 16.932093] kunit_try_run_case+0x1a5/0x480 [ 16.932119] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.932142] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.932166] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.932189] ? __kthread_parkme+0x82/0x180 [ 16.932210] ? preempt_count_sub+0x50/0x80 [ 16.932253] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.932279] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.932303] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.932326] kthread+0x337/0x6f0 [ 16.932348] ? trace_preempt_on+0x20/0xc0 [ 16.932374] ? __pfx_kthread+0x10/0x10 [ 16.932396] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.932419] ? calculate_sigpending+0x7b/0xa0 [ 16.932444] ? __pfx_kthread+0x10/0x10 [ 16.932480] ret_from_fork+0x116/0x1d0 [ 16.932500] ? __pfx_kthread+0x10/0x10 [ 16.932523] ret_from_fork_asm+0x1a/0x30 [ 16.932555] </TASK> [ 16.932569] [ 16.938945] Allocated by task 283: [ 16.939085] kasan_save_stack+0x45/0x70 [ 16.939190] kasan_save_track+0x18/0x40 [ 16.939505] kasan_save_alloc_info+0x3b/0x50 [ 16.939785] __kasan_kmalloc+0xb7/0xc0 [ 16.939891] __kmalloc_cache_noprof+0x189/0x420 [ 16.940090] kasan_atomics+0x95/0x310 [ 16.940233] kunit_try_run_case+0x1a5/0x480 [ 16.940419] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.940816] kthread+0x337/0x6f0 [ 16.941012] ret_from_fork+0x116/0x1d0 [ 16.941190] ret_from_fork_asm+0x1a/0x30 [ 16.941347] [ 16.941543] The buggy address belongs to the object at ffff888102b6b880 [ 16.941543] which belongs to the cache kmalloc-64 of size 64 [ 16.941774] The buggy address is located 0 bytes to the right of [ 16.941774] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 16.941974] [ 16.942030] The buggy address belongs to the physical page: [ 16.942134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 16.942419] flags: 0x200000000000000(node=0|zone=2) [ 16.942783] page_type: f5(slab) [ 16.943007] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.943510] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.943864] page dumped because: kasan: bad access detected [ 16.943968] [ 16.944018] Memory state around the buggy address: [ 16.944113] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.944410] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.944821] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.945115] ^ [ 16.945354] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.945863] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.946143] ================================================================== [ 17.480573] ================================================================== [ 17.480977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 17.481322] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.482003] [ 17.482244] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.482315] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.482337] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.482367] Call Trace: [ 17.482393] <TASK> [ 17.482417] dump_stack_lvl+0x73/0xb0 [ 17.482453] print_report+0xd1/0x650 [ 17.482480] ? __virt_addr_valid+0x1db/0x2d0 [ 17.482507] ? kasan_atomics_helper+0x15b6/0x5450 [ 17.482529] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.482552] ? kasan_atomics_helper+0x15b6/0x5450 [ 17.482576] kasan_report+0x141/0x180 [ 17.482614] ? kasan_atomics_helper+0x15b6/0x5450 [ 17.482644] kasan_check_range+0x10c/0x1c0 [ 17.482685] __kasan_check_write+0x18/0x20 [ 17.482707] kasan_atomics_helper+0x15b6/0x5450 [ 17.482733] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.482756] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.482779] ? kasan_atomics+0x152/0x310 [ 17.482807] kasan_atomics+0x1dc/0x310 [ 17.482832] ? __pfx_kasan_atomics+0x10/0x10 [ 17.482857] ? __pfx_read_tsc+0x10/0x10 [ 17.482881] ? ktime_get_ts64+0x86/0x230 [ 17.482907] kunit_try_run_case+0x1a5/0x480 [ 17.482933] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.482956] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.482981] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.483004] ? __kthread_parkme+0x82/0x180 [ 17.483026] ? preempt_count_sub+0x50/0x80 [ 17.483051] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.483076] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.483100] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.483123] kthread+0x337/0x6f0 [ 17.483143] ? trace_preempt_on+0x20/0xc0 [ 17.483169] ? __pfx_kthread+0x10/0x10 [ 17.483190] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.483213] ? calculate_sigpending+0x7b/0xa0 [ 17.483258] ? __pfx_kthread+0x10/0x10 [ 17.483281] ret_from_fork+0x116/0x1d0 [ 17.483301] ? __pfx_kthread+0x10/0x10 [ 17.483323] ret_from_fork_asm+0x1a/0x30 [ 17.483357] </TASK> [ 17.483371] [ 17.489534] Allocated by task 283: [ 17.489656] kasan_save_stack+0x45/0x70 [ 17.489771] kasan_save_track+0x18/0x40 [ 17.489871] kasan_save_alloc_info+0x3b/0x50 [ 17.489976] __kasan_kmalloc+0xb7/0xc0 [ 17.490203] __kmalloc_cache_noprof+0x189/0x420 [ 17.490554] kasan_atomics+0x95/0x310 [ 17.490835] kunit_try_run_case+0x1a5/0x480 [ 17.491149] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.491510] kthread+0x337/0x6f0 [ 17.491728] ret_from_fork+0x116/0x1d0 [ 17.491844] ret_from_fork_asm+0x1a/0x30 [ 17.491943] [ 17.492004] The buggy address belongs to the object at ffff888102b6b880 [ 17.492004] which belongs to the cache kmalloc-64 of size 64 [ 17.492584] The buggy address is located 0 bytes to the right of [ 17.492584] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.492803] [ 17.492932] The buggy address belongs to the physical page: [ 17.493299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.493708] flags: 0x200000000000000(node=0|zone=2) [ 17.493957] page_type: f5(slab) [ 17.494114] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.494404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.494704] page dumped because: kasan: bad access detected [ 17.494918] [ 17.495061] Memory state around the buggy address: [ 17.495237] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.495549] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.495827] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.496130] ^ [ 17.496351] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.496556] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.496684] ================================================================== [ 16.802025] ================================================================== [ 16.802458] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 16.802838] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 16.803104] [ 16.803212] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.803297] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.803310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.803335] Call Trace: [ 16.803349] <TASK> [ 16.803385] dump_stack_lvl+0x73/0xb0 [ 16.803416] print_report+0xd1/0x650 [ 16.803439] ? __virt_addr_valid+0x1db/0x2d0 [ 16.803482] ? kasan_atomics_helper+0x4bbc/0x5450 [ 16.803505] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.803527] ? kasan_atomics_helper+0x4bbc/0x5450 [ 16.803549] kasan_report+0x141/0x180 [ 16.803573] ? kasan_atomics_helper+0x4bbc/0x5450 [ 16.803599] __asan_report_load4_noabort+0x18/0x20 [ 16.803627] kasan_atomics_helper+0x4bbc/0x5450 [ 16.803651] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.803674] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.803696] ? kasan_atomics+0x152/0x310 [ 16.803722] kasan_atomics+0x1dc/0x310 [ 16.803746] ? __pfx_kasan_atomics+0x10/0x10 [ 16.803769] ? __pfx_read_tsc+0x10/0x10 [ 16.803789] ? ktime_get_ts64+0x86/0x230 [ 16.803814] kunit_try_run_case+0x1a5/0x480 [ 16.803836] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.803857] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.803881] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.803903] ? __kthread_parkme+0x82/0x180 [ 16.803922] ? preempt_count_sub+0x50/0x80 [ 16.803946] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.803969] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.803991] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.804014] kthread+0x337/0x6f0 [ 16.804032] ? trace_preempt_on+0x20/0xc0 [ 16.804056] ? __pfx_kthread+0x10/0x10 [ 16.804076] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.804097] ? calculate_sigpending+0x7b/0xa0 [ 16.804121] ? __pfx_kthread+0x10/0x10 [ 16.804142] ret_from_fork+0x116/0x1d0 [ 16.804159] ? __pfx_kthread+0x10/0x10 [ 16.804179] ret_from_fork_asm+0x1a/0x30 [ 16.804210] </TASK> [ 16.804230] [ 16.811059] Allocated by task 283: [ 16.811311] kasan_save_stack+0x45/0x70 [ 16.811663] kasan_save_track+0x18/0x40 [ 16.811882] kasan_save_alloc_info+0x3b/0x50 [ 16.812150] __kasan_kmalloc+0xb7/0xc0 [ 16.812247] __kmalloc_cache_noprof+0x189/0x420 [ 16.812346] kasan_atomics+0x95/0x310 [ 16.812434] kunit_try_run_case+0x1a5/0x480 [ 16.812590] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.812699] kthread+0x337/0x6f0 [ 16.812780] ret_from_fork+0x116/0x1d0 [ 16.812864] ret_from_fork_asm+0x1a/0x30 [ 16.813070] [ 16.813203] The buggy address belongs to the object at ffff888102b6b880 [ 16.813203] which belongs to the cache kmalloc-64 of size 64 [ 16.813963] The buggy address is located 0 bytes to the right of [ 16.813963] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 16.814947] [ 16.815073] The buggy address belongs to the physical page: [ 16.815580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 16.815854] flags: 0x200000000000000(node=0|zone=2) [ 16.816010] page_type: f5(slab) [ 16.816232] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.816392] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.816585] page dumped because: kasan: bad access detected [ 16.816689] [ 16.816740] Memory state around the buggy address: [ 16.816937] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.817240] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.817623] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.818041] ^ [ 16.818408] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.818623] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.818964] ================================================================== [ 17.104446] ================================================================== [ 17.104767] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 17.105077] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.105347] [ 17.105583] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.105708] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.105725] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.105749] Call Trace: [ 17.105770] <TASK> [ 17.105808] dump_stack_lvl+0x73/0xb0 [ 17.105848] print_report+0xd1/0x650 [ 17.105890] ? __virt_addr_valid+0x1db/0x2d0 [ 17.106172] ? kasan_atomics_helper+0xac7/0x5450 [ 17.106208] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.106246] ? kasan_atomics_helper+0xac7/0x5450 [ 17.106271] kasan_report+0x141/0x180 [ 17.106295] ? kasan_atomics_helper+0xac7/0x5450 [ 17.106324] kasan_check_range+0x10c/0x1c0 [ 17.106360] __kasan_check_write+0x18/0x20 [ 17.106381] kasan_atomics_helper+0xac7/0x5450 [ 17.106406] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.106430] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.106452] ? kasan_atomics+0x152/0x310 [ 17.106480] kasan_atomics+0x1dc/0x310 [ 17.106505] ? __pfx_kasan_atomics+0x10/0x10 [ 17.106530] ? __pfx_read_tsc+0x10/0x10 [ 17.106554] ? ktime_get_ts64+0x86/0x230 [ 17.106582] kunit_try_run_case+0x1a5/0x480 [ 17.106705] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.106737] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.106764] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.106788] ? __kthread_parkme+0x82/0x180 [ 17.106812] ? preempt_count_sub+0x50/0x80 [ 17.106839] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.106865] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.106890] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.106915] kthread+0x337/0x6f0 [ 17.106937] ? trace_preempt_on+0x20/0xc0 [ 17.106963] ? __pfx_kthread+0x10/0x10 [ 17.106987] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.107011] ? calculate_sigpending+0x7b/0xa0 [ 17.107039] ? __pfx_kthread+0x10/0x10 [ 17.107062] ret_from_fork+0x116/0x1d0 [ 17.107083] ? __pfx_kthread+0x10/0x10 [ 17.107105] ret_from_fork_asm+0x1a/0x30 [ 17.107139] </TASK> [ 17.107153] [ 17.113734] Allocated by task 283: [ 17.113846] kasan_save_stack+0x45/0x70 [ 17.113989] kasan_save_track+0x18/0x40 [ 17.114181] kasan_save_alloc_info+0x3b/0x50 [ 17.114447] __kasan_kmalloc+0xb7/0xc0 [ 17.114725] __kmalloc_cache_noprof+0x189/0x420 [ 17.115028] kasan_atomics+0x95/0x310 [ 17.115284] kunit_try_run_case+0x1a5/0x480 [ 17.115564] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.115902] kthread+0x337/0x6f0 [ 17.116044] ret_from_fork+0x116/0x1d0 [ 17.116134] ret_from_fork_asm+0x1a/0x30 [ 17.116304] [ 17.116365] The buggy address belongs to the object at ffff888102b6b880 [ 17.116365] which belongs to the cache kmalloc-64 of size 64 [ 17.116614] The buggy address is located 0 bytes to the right of [ 17.116614] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.117103] [ 17.117216] The buggy address belongs to the physical page: [ 17.117610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.118013] flags: 0x200000000000000(node=0|zone=2) [ 17.118284] page_type: f5(slab) [ 17.118574] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.118952] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.119085] page dumped because: kasan: bad access detected [ 17.119187] [ 17.119247] Memory state around the buggy address: [ 17.119346] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.120070] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.120539] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.120859] ^ [ 17.121070] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.121245] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.121591] ================================================================== [ 16.893735] ================================================================== [ 16.894428] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 16.895154] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 16.895551] [ 16.895740] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.895808] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.895822] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.895846] Call Trace: [ 16.895871] <TASK> [ 16.895893] dump_stack_lvl+0x73/0xb0 [ 16.895924] print_report+0xd1/0x650 [ 16.895973] ? __virt_addr_valid+0x1db/0x2d0 [ 16.896001] ? kasan_atomics_helper+0x4b54/0x5450 [ 16.896024] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.896060] ? kasan_atomics_helper+0x4b54/0x5450 [ 16.896085] kasan_report+0x141/0x180 [ 16.896109] ? kasan_atomics_helper+0x4b54/0x5450 [ 16.896138] __asan_report_load4_noabort+0x18/0x20 [ 16.896161] kasan_atomics_helper+0x4b54/0x5450 [ 16.896185] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.896209] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.896243] ? kasan_atomics+0x152/0x310 [ 16.896290] kasan_atomics+0x1dc/0x310 [ 16.896316] ? __pfx_kasan_atomics+0x10/0x10 [ 16.896342] ? __pfx_read_tsc+0x10/0x10 [ 16.896365] ? ktime_get_ts64+0x86/0x230 [ 16.896391] kunit_try_run_case+0x1a5/0x480 [ 16.896417] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.896440] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.896551] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.896577] ? __kthread_parkme+0x82/0x180 [ 16.896600] ? preempt_count_sub+0x50/0x80 [ 16.896625] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.896667] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.896693] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.896718] kthread+0x337/0x6f0 [ 16.896738] ? trace_preempt_on+0x20/0xc0 [ 16.896763] ? __pfx_kthread+0x10/0x10 [ 16.896784] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.896807] ? calculate_sigpending+0x7b/0xa0 [ 16.896851] ? __pfx_kthread+0x10/0x10 [ 16.896874] ret_from_fork+0x116/0x1d0 [ 16.896894] ? __pfx_kthread+0x10/0x10 [ 16.896917] ret_from_fork_asm+0x1a/0x30 [ 16.896950] </TASK> [ 16.896963] [ 16.903411] Allocated by task 283: [ 16.903807] kasan_save_stack+0x45/0x70 [ 16.904002] kasan_save_track+0x18/0x40 [ 16.904093] kasan_save_alloc_info+0x3b/0x50 [ 16.904186] __kasan_kmalloc+0xb7/0xc0 [ 16.904282] __kmalloc_cache_noprof+0x189/0x420 [ 16.904565] kasan_atomics+0x95/0x310 [ 16.904810] kunit_try_run_case+0x1a5/0x480 [ 16.905057] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.905294] kthread+0x337/0x6f0 [ 16.905520] ret_from_fork+0x116/0x1d0 [ 16.905634] ret_from_fork_asm+0x1a/0x30 [ 16.905728] [ 16.905831] The buggy address belongs to the object at ffff888102b6b880 [ 16.905831] which belongs to the cache kmalloc-64 of size 64 [ 16.906285] The buggy address is located 0 bytes to the right of [ 16.906285] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 16.906709] [ 16.906770] The buggy address belongs to the physical page: [ 16.906881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 16.907030] flags: 0x200000000000000(node=0|zone=2) [ 16.907135] page_type: f5(slab) [ 16.907230] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.907373] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.907876] page dumped because: kasan: bad access detected [ 16.908217] [ 16.908353] Memory state around the buggy address: [ 16.908877] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.909312] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.909546] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.909817] ^ [ 16.909992] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.910118] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.910251] ================================================================== [ 17.871240] ================================================================== [ 17.872168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 17.872516] Read of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.872922] [ 17.873069] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.873121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.873134] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.873157] Call Trace: [ 17.873174] <TASK> [ 17.873190] dump_stack_lvl+0x73/0xb0 [ 17.873217] print_report+0xd1/0x650 [ 17.873252] ? __virt_addr_valid+0x1db/0x2d0 [ 17.873277] ? kasan_atomics_helper+0x5115/0x5450 [ 17.873299] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.873325] ? kasan_atomics_helper+0x5115/0x5450 [ 17.873348] kasan_report+0x141/0x180 [ 17.873370] ? kasan_atomics_helper+0x5115/0x5450 [ 17.873422] __asan_report_load8_noabort+0x18/0x20 [ 17.873448] kasan_atomics_helper+0x5115/0x5450 [ 17.873472] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.873495] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.873517] ? kasan_atomics+0x152/0x310 [ 17.873545] kasan_atomics+0x1dc/0x310 [ 17.873589] ? __pfx_kasan_atomics+0x10/0x10 [ 17.873615] ? __pfx_read_tsc+0x10/0x10 [ 17.873636] ? ktime_get_ts64+0x86/0x230 [ 17.873661] kunit_try_run_case+0x1a5/0x480 [ 17.873686] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.873728] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.873753] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.873776] ? __kthread_parkme+0x82/0x180 [ 17.873797] ? preempt_count_sub+0x50/0x80 [ 17.873822] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.873846] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.873887] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.873913] kthread+0x337/0x6f0 [ 17.873934] ? trace_preempt_on+0x20/0xc0 [ 17.873958] ? __pfx_kthread+0x10/0x10 [ 17.873979] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.874000] ? calculate_sigpending+0x7b/0xa0 [ 17.874044] ? __pfx_kthread+0x10/0x10 [ 17.874067] ret_from_fork+0x116/0x1d0 [ 17.874086] ? __pfx_kthread+0x10/0x10 [ 17.874107] ret_from_fork_asm+0x1a/0x30 [ 17.874139] </TASK> [ 17.874170] [ 17.879950] Allocated by task 283: [ 17.880035] kasan_save_stack+0x45/0x70 [ 17.880127] kasan_save_track+0x18/0x40 [ 17.880216] kasan_save_alloc_info+0x3b/0x50 [ 17.880319] __kasan_kmalloc+0xb7/0xc0 [ 17.880405] __kmalloc_cache_noprof+0x189/0x420 [ 17.880499] kasan_atomics+0x95/0x310 [ 17.880586] kunit_try_run_case+0x1a5/0x480 [ 17.880678] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.880778] kthread+0x337/0x6f0 [ 17.880852] ret_from_fork+0x116/0x1d0 [ 17.880934] ret_from_fork_asm+0x1a/0x30 [ 17.881018] [ 17.881069] The buggy address belongs to the object at ffff888102b6b880 [ 17.881069] which belongs to the cache kmalloc-64 of size 64 [ 17.881343] The buggy address is located 0 bytes to the right of [ 17.881343] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.882019] [ 17.882139] The buggy address belongs to the physical page: [ 17.882482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.882929] flags: 0x200000000000000(node=0|zone=2) [ 17.883262] page_type: f5(slab) [ 17.883460] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.883857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.884273] page dumped because: kasan: bad access detected [ 17.884549] [ 17.884657] Memory state around the buggy address: [ 17.884810] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.885057] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.885267] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.885388] ^ [ 17.885483] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.885604] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.885724] ================================================================== [ 17.697957] ================================================================== [ 17.698213] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 17.698556] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.698783] [ 17.698905] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.698958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.698973] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.698997] Call Trace: [ 17.699014] <TASK> [ 17.699030] dump_stack_lvl+0x73/0xb0 [ 17.699060] print_report+0xd1/0x650 [ 17.699085] ? __virt_addr_valid+0x1db/0x2d0 [ 17.699111] ? kasan_atomics_helper+0x1e12/0x5450 [ 17.699135] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.699161] ? kasan_atomics_helper+0x1e12/0x5450 [ 17.699186] kasan_report+0x141/0x180 [ 17.699211] ? kasan_atomics_helper+0x1e12/0x5450 [ 17.699518] kasan_check_range+0x10c/0x1c0 [ 17.699550] __kasan_check_write+0x18/0x20 [ 17.699573] kasan_atomics_helper+0x1e12/0x5450 [ 17.699600] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.699626] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.699651] ? kasan_atomics+0x152/0x310 [ 17.699681] kasan_atomics+0x1dc/0x310 [ 17.699707] ? __pfx_kasan_atomics+0x10/0x10 [ 17.699733] ? __pfx_read_tsc+0x10/0x10 [ 17.699754] ? ktime_get_ts64+0x86/0x230 [ 17.699779] kunit_try_run_case+0x1a5/0x480 [ 17.699804] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.699827] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.699852] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.699876] ? __kthread_parkme+0x82/0x180 [ 17.699897] ? preempt_count_sub+0x50/0x80 [ 17.699922] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.699946] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.699969] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.699993] kthread+0x337/0x6f0 [ 17.700014] ? trace_preempt_on+0x20/0xc0 [ 17.700039] ? __pfx_kthread+0x10/0x10 [ 17.700061] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.700083] ? calculate_sigpending+0x7b/0xa0 [ 17.700107] ? __pfx_kthread+0x10/0x10 [ 17.700155] ret_from_fork+0x116/0x1d0 [ 17.700176] ? __pfx_kthread+0x10/0x10 [ 17.700197] ret_from_fork_asm+0x1a/0x30 [ 17.700238] </TASK> [ 17.700253] [ 17.705479] Allocated by task 283: [ 17.705643] kasan_save_stack+0x45/0x70 [ 17.705829] kasan_save_track+0x18/0x40 [ 17.706005] kasan_save_alloc_info+0x3b/0x50 [ 17.706196] __kasan_kmalloc+0xb7/0xc0 [ 17.706390] __kmalloc_cache_noprof+0x189/0x420 [ 17.706600] kasan_atomics+0x95/0x310 [ 17.706782] kunit_try_run_case+0x1a5/0x480 [ 17.706985] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.707232] kthread+0x337/0x6f0 [ 17.707396] ret_from_fork+0x116/0x1d0 [ 17.707574] ret_from_fork_asm+0x1a/0x30 [ 17.707673] [ 17.707729] The buggy address belongs to the object at ffff888102b6b880 [ 17.707729] which belongs to the cache kmalloc-64 of size 64 [ 17.707929] The buggy address is located 0 bytes to the right of [ 17.707929] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.708133] [ 17.708188] The buggy address belongs to the physical page: [ 17.708407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.708721] flags: 0x200000000000000(node=0|zone=2) [ 17.708929] page_type: f5(slab) [ 17.709087] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.709385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.709672] page dumped because: kasan: bad access detected [ 17.709928] [ 17.710022] Memory state around the buggy address: [ 17.710235] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.710533] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.710800] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.711060] ^ [ 17.711178] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.711318] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.711447] ================================================================== [ 17.290483] ================================================================== [ 17.290865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 17.291270] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.291568] [ 17.291678] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.291746] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.291761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.291785] Call Trace: [ 17.291817] <TASK> [ 17.291838] dump_stack_lvl+0x73/0xb0 [ 17.291867] print_report+0xd1/0x650 [ 17.291890] ? __virt_addr_valid+0x1db/0x2d0 [ 17.291914] ? kasan_atomics_helper+0x4a1c/0x5450 [ 17.291951] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.291978] ? kasan_atomics_helper+0x4a1c/0x5450 [ 17.292001] kasan_report+0x141/0x180 [ 17.292025] ? kasan_atomics_helper+0x4a1c/0x5450 [ 17.292053] __asan_report_load4_noabort+0x18/0x20 [ 17.292089] kasan_atomics_helper+0x4a1c/0x5450 [ 17.292116] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.292139] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.292161] ? kasan_atomics+0x152/0x310 [ 17.292188] kasan_atomics+0x1dc/0x310 [ 17.292232] ? __pfx_kasan_atomics+0x10/0x10 [ 17.292268] ? __pfx_read_tsc+0x10/0x10 [ 17.292290] ? ktime_get_ts64+0x86/0x230 [ 17.292324] kunit_try_run_case+0x1a5/0x480 [ 17.292356] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.292378] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.292409] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.292441] ? __kthread_parkme+0x82/0x180 [ 17.292470] ? preempt_count_sub+0x50/0x80 [ 17.292494] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.292526] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.292557] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.292589] kthread+0x337/0x6f0 [ 17.292609] ? trace_preempt_on+0x20/0xc0 [ 17.292633] ? __pfx_kthread+0x10/0x10 [ 17.292655] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.292676] ? calculate_sigpending+0x7b/0xa0 [ 17.292701] ? __pfx_kthread+0x10/0x10 [ 17.292723] ret_from_fork+0x116/0x1d0 [ 17.292742] ? __pfx_kthread+0x10/0x10 [ 17.292764] ret_from_fork_asm+0x1a/0x30 [ 17.292796] </TASK> [ 17.292808] [ 17.298768] Allocated by task 283: [ 17.298905] kasan_save_stack+0x45/0x70 [ 17.299103] kasan_save_track+0x18/0x40 [ 17.299240] kasan_save_alloc_info+0x3b/0x50 [ 17.299426] __kasan_kmalloc+0xb7/0xc0 [ 17.299539] __kmalloc_cache_noprof+0x189/0x420 [ 17.299781] kasan_atomics+0x95/0x310 [ 17.299901] kunit_try_run_case+0x1a5/0x480 [ 17.300086] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.300308] kthread+0x337/0x6f0 [ 17.300476] ret_from_fork+0x116/0x1d0 [ 17.300630] ret_from_fork_asm+0x1a/0x30 [ 17.300800] [ 17.300855] The buggy address belongs to the object at ffff888102b6b880 [ 17.300855] which belongs to the cache kmalloc-64 of size 64 [ 17.301327] The buggy address is located 0 bytes to the right of [ 17.301327] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.301665] [ 17.301768] The buggy address belongs to the physical page: [ 17.301960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.302216] flags: 0x200000000000000(node=0|zone=2) [ 17.302412] page_type: f5(slab) [ 17.302590] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.302761] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.303098] page dumped because: kasan: bad access detected [ 17.303254] [ 17.303356] Memory state around the buggy address: [ 17.303580] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.303831] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.304031] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.304308] ^ [ 17.304516] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.304718] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.304866] ================================================================== [ 17.416613] ================================================================== [ 17.416894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 17.417140] Read of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.417433] [ 17.417640] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.417694] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.417708] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.417732] Call Trace: [ 17.417755] <TASK> [ 17.417773] dump_stack_lvl+0x73/0xb0 [ 17.417803] print_report+0xd1/0x650 [ 17.417827] ? __virt_addr_valid+0x1db/0x2d0 [ 17.417852] ? kasan_atomics_helper+0x4eae/0x5450 [ 17.417875] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.417899] ? kasan_atomics_helper+0x4eae/0x5450 [ 17.417941] kasan_report+0x141/0x180 [ 17.417967] ? kasan_atomics_helper+0x4eae/0x5450 [ 17.417995] __asan_report_load8_noabort+0x18/0x20 [ 17.418017] kasan_atomics_helper+0x4eae/0x5450 [ 17.418042] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.418084] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.418108] ? kasan_atomics+0x152/0x310 [ 17.418136] kasan_atomics+0x1dc/0x310 [ 17.418160] ? __pfx_kasan_atomics+0x10/0x10 [ 17.418186] ? __pfx_read_tsc+0x10/0x10 [ 17.418209] ? ktime_get_ts64+0x86/0x230 [ 17.418262] kunit_try_run_case+0x1a5/0x480 [ 17.418288] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.418311] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.418342] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.418368] ? __kthread_parkme+0x82/0x180 [ 17.418410] ? preempt_count_sub+0x50/0x80 [ 17.418437] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.418461] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.418486] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.418510] kthread+0x337/0x6f0 [ 17.418531] ? trace_preempt_on+0x20/0xc0 [ 17.418556] ? __pfx_kthread+0x10/0x10 [ 17.418597] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.418620] ? calculate_sigpending+0x7b/0xa0 [ 17.418664] ? __pfx_kthread+0x10/0x10 [ 17.418688] ret_from_fork+0x116/0x1d0 [ 17.418708] ? __pfx_kthread+0x10/0x10 [ 17.418729] ret_from_fork_asm+0x1a/0x30 [ 17.418763] </TASK> [ 17.418777] [ 17.424710] Allocated by task 283: [ 17.424892] kasan_save_stack+0x45/0x70 [ 17.425027] kasan_save_track+0x18/0x40 [ 17.425206] kasan_save_alloc_info+0x3b/0x50 [ 17.425403] __kasan_kmalloc+0xb7/0xc0 [ 17.425609] __kmalloc_cache_noprof+0x189/0x420 [ 17.425812] kasan_atomics+0x95/0x310 [ 17.425973] kunit_try_run_case+0x1a5/0x480 [ 17.426204] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.426410] kthread+0x337/0x6f0 [ 17.426550] ret_from_fork+0x116/0x1d0 [ 17.426750] ret_from_fork_asm+0x1a/0x30 [ 17.426879] [ 17.426980] The buggy address belongs to the object at ffff888102b6b880 [ 17.426980] which belongs to the cache kmalloc-64 of size 64 [ 17.427345] The buggy address is located 0 bytes to the right of [ 17.427345] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.427757] [ 17.427871] The buggy address belongs to the physical page: [ 17.428090] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.428348] flags: 0x200000000000000(node=0|zone=2) [ 17.428515] page_type: f5(slab) [ 17.428645] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.428934] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.429069] page dumped because: kasan: bad access detected [ 17.429172] [ 17.429232] Memory state around the buggy address: [ 17.429442] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.429757] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.430045] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.430366] ^ [ 17.430474] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.430604] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.430732] ================================================================== [ 17.824779] ================================================================== [ 17.825373] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 17.826081] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.826228] [ 17.826382] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.826437] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.826451] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.826474] Call Trace: [ 17.826494] <TASK> [ 17.826511] dump_stack_lvl+0x73/0xb0 [ 17.826540] print_report+0xd1/0x650 [ 17.826566] ? __virt_addr_valid+0x1db/0x2d0 [ 17.826591] ? kasan_atomics_helper+0x218a/0x5450 [ 17.826615] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.826639] ? kasan_atomics_helper+0x218a/0x5450 [ 17.826662] kasan_report+0x141/0x180 [ 17.826685] ? kasan_atomics_helper+0x218a/0x5450 [ 17.826714] kasan_check_range+0x10c/0x1c0 [ 17.826739] __kasan_check_write+0x18/0x20 [ 17.826801] kasan_atomics_helper+0x218a/0x5450 [ 17.826830] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.826854] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.826876] ? kasan_atomics+0x152/0x310 [ 17.826906] kasan_atomics+0x1dc/0x310 [ 17.826958] ? __pfx_kasan_atomics+0x10/0x10 [ 17.826984] ? __pfx_read_tsc+0x10/0x10 [ 17.827007] ? ktime_get_ts64+0x86/0x230 [ 17.827032] kunit_try_run_case+0x1a5/0x480 [ 17.827085] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.827110] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.827135] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.827160] ? __kthread_parkme+0x82/0x180 [ 17.827206] ? preempt_count_sub+0x50/0x80 [ 17.827244] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.827270] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.827294] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.827319] kthread+0x337/0x6f0 [ 17.827368] ? trace_preempt_on+0x20/0xc0 [ 17.827395] ? __pfx_kthread+0x10/0x10 [ 17.827417] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.827439] ? calculate_sigpending+0x7b/0xa0 [ 17.827492] ? __pfx_kthread+0x10/0x10 [ 17.827518] ret_from_fork+0x116/0x1d0 [ 17.827539] ? __pfx_kthread+0x10/0x10 [ 17.827563] ret_from_fork_asm+0x1a/0x30 [ 17.827617] </TASK> [ 17.827633] [ 17.833366] Allocated by task 283: [ 17.833582] kasan_save_stack+0x45/0x70 [ 17.833822] kasan_save_track+0x18/0x40 [ 17.834073] kasan_save_alloc_info+0x3b/0x50 [ 17.834337] __kasan_kmalloc+0xb7/0xc0 [ 17.834433] __kmalloc_cache_noprof+0x189/0x420 [ 17.834533] kasan_atomics+0x95/0x310 [ 17.834621] kunit_try_run_case+0x1a5/0x480 [ 17.834713] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.834819] kthread+0x337/0x6f0 [ 17.834897] ret_from_fork+0x116/0x1d0 [ 17.834982] ret_from_fork_asm+0x1a/0x30 [ 17.835069] [ 17.835121] The buggy address belongs to the object at ffff888102b6b880 [ 17.835121] which belongs to the cache kmalloc-64 of size 64 [ 17.835821] The buggy address is located 0 bytes to the right of [ 17.835821] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.836568] [ 17.836692] The buggy address belongs to the physical page: [ 17.837032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.837423] flags: 0x200000000000000(node=0|zone=2) [ 17.837531] page_type: f5(slab) [ 17.837618] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.837754] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.837884] page dumped because: kasan: bad access detected [ 17.837985] [ 17.838035] Memory state around the buggy address: [ 17.838132] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.838268] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.838404] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.838531] ^ [ 17.838629] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.838913] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.839289] ================================================================== [ 17.840294] ================================================================== [ 17.840721] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 17.841166] Read of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.841600] [ 17.841737] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.841788] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.841802] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.841825] Call Trace: [ 17.841843] <TASK> [ 17.841858] dump_stack_lvl+0x73/0xb0 [ 17.841887] print_report+0xd1/0x650 [ 17.841911] ? __virt_addr_valid+0x1db/0x2d0 [ 17.841936] ? kasan_atomics_helper+0x4fa5/0x5450 [ 17.841960] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.841984] ? kasan_atomics_helper+0x4fa5/0x5450 [ 17.842007] kasan_report+0x141/0x180 [ 17.842031] ? kasan_atomics_helper+0x4fa5/0x5450 [ 17.842059] __asan_report_load8_noabort+0x18/0x20 [ 17.842082] kasan_atomics_helper+0x4fa5/0x5450 [ 17.842106] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.842130] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.842153] ? kasan_atomics+0x152/0x310 [ 17.842180] kasan_atomics+0x1dc/0x310 [ 17.842204] ? __pfx_kasan_atomics+0x10/0x10 [ 17.842243] ? __pfx_read_tsc+0x10/0x10 [ 17.842266] ? ktime_get_ts64+0x86/0x230 [ 17.842292] kunit_try_run_case+0x1a5/0x480 [ 17.842317] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.842347] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.842374] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.842397] ? __kthread_parkme+0x82/0x180 [ 17.842420] ? preempt_count_sub+0x50/0x80 [ 17.842446] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.842473] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.842497] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.842521] kthread+0x337/0x6f0 [ 17.842542] ? trace_preempt_on+0x20/0xc0 [ 17.842566] ? __pfx_kthread+0x10/0x10 [ 17.842590] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.842611] ? calculate_sigpending+0x7b/0xa0 [ 17.842636] ? __pfx_kthread+0x10/0x10 [ 17.842659] ret_from_fork+0x116/0x1d0 [ 17.842678] ? __pfx_kthread+0x10/0x10 [ 17.842699] ret_from_fork_asm+0x1a/0x30 [ 17.842758] </TASK> [ 17.842772] [ 17.848445] Allocated by task 283: [ 17.848677] kasan_save_stack+0x45/0x70 [ 17.848938] kasan_save_track+0x18/0x40 [ 17.849198] kasan_save_alloc_info+0x3b/0x50 [ 17.849354] __kasan_kmalloc+0xb7/0xc0 [ 17.849446] __kmalloc_cache_noprof+0x189/0x420 [ 17.849543] kasan_atomics+0x95/0x310 [ 17.849630] kunit_try_run_case+0x1a5/0x480 [ 17.849722] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.849824] kthread+0x337/0x6f0 [ 17.849901] ret_from_fork+0x116/0x1d0 [ 17.850021] ret_from_fork_asm+0x1a/0x30 [ 17.850203] [ 17.850337] The buggy address belongs to the object at ffff888102b6b880 [ 17.850337] which belongs to the cache kmalloc-64 of size 64 [ 17.851057] The buggy address is located 0 bytes to the right of [ 17.851057] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.851571] [ 17.851698] The buggy address belongs to the physical page: [ 17.851876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.852099] flags: 0x200000000000000(node=0|zone=2) [ 17.852381] page_type: f5(slab) [ 17.852469] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.852749] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.852878] page dumped because: kasan: bad access detected [ 17.852977] [ 17.853028] Memory state around the buggy address: [ 17.853122] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.853255] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.853379] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.853497] ^ [ 17.853589] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.853709] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.853827] ================================================================== [ 17.626681] ================================================================== [ 17.627025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 17.627425] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.627743] [ 17.627872] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.627926] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.627941] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.627964] Call Trace: [ 17.627999] <TASK> [ 17.628021] dump_stack_lvl+0x73/0xb0 [ 17.628049] print_report+0xd1/0x650 [ 17.628074] ? __virt_addr_valid+0x1db/0x2d0 [ 17.628099] ? kasan_atomics_helper+0x1b22/0x5450 [ 17.628140] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.628165] ? kasan_atomics_helper+0x1b22/0x5450 [ 17.628189] kasan_report+0x141/0x180 [ 17.628213] ? kasan_atomics_helper+0x1b22/0x5450 [ 17.628253] kasan_check_range+0x10c/0x1c0 [ 17.628298] __kasan_check_write+0x18/0x20 [ 17.628320] kasan_atomics_helper+0x1b22/0x5450 [ 17.628345] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.628369] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.628391] ? kasan_atomics+0x152/0x310 [ 17.628436] kasan_atomics+0x1dc/0x310 [ 17.628462] ? __pfx_kasan_atomics+0x10/0x10 [ 17.628489] ? __pfx_read_tsc+0x10/0x10 [ 17.628511] ? ktime_get_ts64+0x86/0x230 [ 17.628536] kunit_try_run_case+0x1a5/0x480 [ 17.628561] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.628585] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.628610] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.628633] ? __kthread_parkme+0x82/0x180 [ 17.628654] ? preempt_count_sub+0x50/0x80 [ 17.628679] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.628703] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.628726] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.628766] kthread+0x337/0x6f0 [ 17.628792] ? trace_preempt_on+0x20/0xc0 [ 17.628817] ? __pfx_kthread+0x10/0x10 [ 17.628840] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.628862] ? calculate_sigpending+0x7b/0xa0 [ 17.628887] ? __pfx_kthread+0x10/0x10 [ 17.628928] ret_from_fork+0x116/0x1d0 [ 17.628949] ? __pfx_kthread+0x10/0x10 [ 17.628971] ret_from_fork_asm+0x1a/0x30 [ 17.629005] </TASK> [ 17.629018] [ 17.634992] Allocated by task 283: [ 17.635141] kasan_save_stack+0x45/0x70 [ 17.635309] kasan_save_track+0x18/0x40 [ 17.635414] kasan_save_alloc_info+0x3b/0x50 [ 17.635616] __kasan_kmalloc+0xb7/0xc0 [ 17.635790] __kmalloc_cache_noprof+0x189/0x420 [ 17.635915] kasan_atomics+0x95/0x310 [ 17.636101] kunit_try_run_case+0x1a5/0x480 [ 17.636248] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.636461] kthread+0x337/0x6f0 [ 17.636640] ret_from_fork+0x116/0x1d0 [ 17.636791] ret_from_fork_asm+0x1a/0x30 [ 17.637010] [ 17.637080] The buggy address belongs to the object at ffff888102b6b880 [ 17.637080] which belongs to the cache kmalloc-64 of size 64 [ 17.637450] The buggy address is located 0 bytes to the right of [ 17.637450] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.637842] [ 17.637938] The buggy address belongs to the physical page: [ 17.638171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.638438] flags: 0x200000000000000(node=0|zone=2) [ 17.638605] page_type: f5(slab) [ 17.638764] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.638932] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.639094] page dumped because: kasan: bad access detected [ 17.639230] [ 17.639305] Memory state around the buggy address: [ 17.639429] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.639591] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.639750] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.639898] ^ [ 17.640019] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.640178] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.640549] ================================================================== [ 17.562190] ================================================================== [ 17.562402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 17.563551] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.563785] [ 17.563930] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.563994] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.564009] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.564034] Call Trace: [ 17.564055] <TASK> [ 17.564073] dump_stack_lvl+0x73/0xb0 [ 17.564104] print_report+0xd1/0x650 [ 17.564128] ? __virt_addr_valid+0x1db/0x2d0 [ 17.564153] ? kasan_atomics_helper+0x18b1/0x5450 [ 17.564176] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.564200] ? kasan_atomics_helper+0x18b1/0x5450 [ 17.564272] kasan_report+0x141/0x180 [ 17.564299] ? kasan_atomics_helper+0x18b1/0x5450 [ 17.564327] kasan_check_range+0x10c/0x1c0 [ 17.564354] __kasan_check_write+0x18/0x20 [ 17.564374] kasan_atomics_helper+0x18b1/0x5450 [ 17.564399] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.564422] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.564443] ? kasan_atomics+0x152/0x310 [ 17.564471] kasan_atomics+0x1dc/0x310 [ 17.564496] ? __pfx_kasan_atomics+0x10/0x10 [ 17.564521] ? __pfx_read_tsc+0x10/0x10 [ 17.564544] ? ktime_get_ts64+0x86/0x230 [ 17.564570] kunit_try_run_case+0x1a5/0x480 [ 17.564596] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.564618] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.564642] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.564666] ? __kthread_parkme+0x82/0x180 [ 17.564687] ? preempt_count_sub+0x50/0x80 [ 17.564710] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.564734] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.564757] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.564794] kthread+0x337/0x6f0 [ 17.564816] ? trace_preempt_on+0x20/0xc0 [ 17.564840] ? __pfx_kthread+0x10/0x10 [ 17.564878] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.564900] ? calculate_sigpending+0x7b/0xa0 [ 17.564926] ? __pfx_kthread+0x10/0x10 [ 17.564949] ret_from_fork+0x116/0x1d0 [ 17.564969] ? __pfx_kthread+0x10/0x10 [ 17.564991] ret_from_fork_asm+0x1a/0x30 [ 17.565024] </TASK> [ 17.565036] [ 17.571131] Allocated by task 283: [ 17.571217] kasan_save_stack+0x45/0x70 [ 17.571440] kasan_save_track+0x18/0x40 [ 17.571693] kasan_save_alloc_info+0x3b/0x50 [ 17.571964] __kasan_kmalloc+0xb7/0xc0 [ 17.572056] __kmalloc_cache_noprof+0x189/0x420 [ 17.572153] kasan_atomics+0x95/0x310 [ 17.572406] kunit_try_run_case+0x1a5/0x480 [ 17.572644] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.572853] kthread+0x337/0x6f0 [ 17.573063] ret_from_fork+0x116/0x1d0 [ 17.573197] ret_from_fork_asm+0x1a/0x30 [ 17.573416] [ 17.573499] The buggy address belongs to the object at ffff888102b6b880 [ 17.573499] which belongs to the cache kmalloc-64 of size 64 [ 17.573912] The buggy address is located 0 bytes to the right of [ 17.573912] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.574296] [ 17.574438] The buggy address belongs to the physical page: [ 17.574549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.574894] flags: 0x200000000000000(node=0|zone=2) [ 17.575065] page_type: f5(slab) [ 17.575274] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.575525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.575683] page dumped because: kasan: bad access detected [ 17.575785] [ 17.575836] Memory state around the buggy address: [ 17.575932] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.576053] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.576176] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.576305] ^ [ 17.576401] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.576523] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.576643] ================================================================== [ 17.305773] ================================================================== [ 17.306111] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 17.306462] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.306766] [ 17.306888] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.306941] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.306955] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.306978] Call Trace: [ 17.306996] <TASK> [ 17.307014] dump_stack_lvl+0x73/0xb0 [ 17.307041] print_report+0xd1/0x650 [ 17.307064] ? __virt_addr_valid+0x1db/0x2d0 [ 17.307089] ? kasan_atomics_helper+0x1148/0x5450 [ 17.307111] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.307135] ? kasan_atomics_helper+0x1148/0x5450 [ 17.307157] kasan_report+0x141/0x180 [ 17.307180] ? kasan_atomics_helper+0x1148/0x5450 [ 17.307207] kasan_check_range+0x10c/0x1c0 [ 17.307243] __kasan_check_write+0x18/0x20 [ 17.307266] kasan_atomics_helper+0x1148/0x5450 [ 17.307289] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.307313] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.307335] ? kasan_atomics+0x152/0x310 [ 17.307363] kasan_atomics+0x1dc/0x310 [ 17.307387] ? __pfx_kasan_atomics+0x10/0x10 [ 17.307411] ? __pfx_read_tsc+0x10/0x10 [ 17.307433] ? ktime_get_ts64+0x86/0x230 [ 17.307476] kunit_try_run_case+0x1a5/0x480 [ 17.307529] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.307577] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.307604] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.307642] ? __kthread_parkme+0x82/0x180 [ 17.307668] ? preempt_count_sub+0x50/0x80 [ 17.307704] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.307729] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.307753] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.307788] kthread+0x337/0x6f0 [ 17.307817] ? trace_preempt_on+0x20/0xc0 [ 17.307843] ? __pfx_kthread+0x10/0x10 [ 17.307864] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.307888] ? calculate_sigpending+0x7b/0xa0 [ 17.307914] ? __pfx_kthread+0x10/0x10 [ 17.307938] ret_from_fork+0x116/0x1d0 [ 17.307973] ? __pfx_kthread+0x10/0x10 [ 17.307997] ret_from_fork_asm+0x1a/0x30 [ 17.308029] </TASK> [ 17.308041] [ 17.314063] Allocated by task 283: [ 17.314212] kasan_save_stack+0x45/0x70 [ 17.314400] kasan_save_track+0x18/0x40 [ 17.314597] kasan_save_alloc_info+0x3b/0x50 [ 17.314831] __kasan_kmalloc+0xb7/0xc0 [ 17.314976] __kmalloc_cache_noprof+0x189/0x420 [ 17.315141] kasan_atomics+0x95/0x310 [ 17.315315] kunit_try_run_case+0x1a5/0x480 [ 17.315466] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.315653] kthread+0x337/0x6f0 [ 17.315786] ret_from_fork+0x116/0x1d0 [ 17.315933] ret_from_fork_asm+0x1a/0x30 [ 17.316120] [ 17.316197] The buggy address belongs to the object at ffff888102b6b880 [ 17.316197] which belongs to the cache kmalloc-64 of size 64 [ 17.316461] The buggy address is located 0 bytes to the right of [ 17.316461] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.316733] [ 17.316812] The buggy address belongs to the physical page: [ 17.316946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.317312] flags: 0x200000000000000(node=0|zone=2) [ 17.317546] page_type: f5(slab) [ 17.317717] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.318038] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.318366] page dumped because: kasan: bad access detected [ 17.318612] [ 17.318737] Memory state around the buggy address: [ 17.318962] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.319255] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.319499] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.319626] ^ [ 17.319723] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.319863] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.320243] ================================================================== [ 17.793887] ================================================================== [ 17.794603] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 17.794866] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.795067] [ 17.795164] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.795237] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.795254] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.795280] Call Trace: [ 17.795305] <TASK> [ 17.795329] dump_stack_lvl+0x73/0xb0 [ 17.795360] print_report+0xd1/0x650 [ 17.795387] ? __virt_addr_valid+0x1db/0x2d0 [ 17.795413] ? kasan_atomics_helper+0x20c8/0x5450 [ 17.795437] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.795461] ? kasan_atomics_helper+0x20c8/0x5450 [ 17.795485] kasan_report+0x141/0x180 [ 17.795508] ? kasan_atomics_helper+0x20c8/0x5450 [ 17.795535] kasan_check_range+0x10c/0x1c0 [ 17.795561] __kasan_check_write+0x18/0x20 [ 17.795581] kasan_atomics_helper+0x20c8/0x5450 [ 17.795605] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.795628] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.795650] ? kasan_atomics+0x152/0x310 [ 17.795678] kasan_atomics+0x1dc/0x310 [ 17.795702] ? __pfx_kasan_atomics+0x10/0x10 [ 17.795728] ? __pfx_read_tsc+0x10/0x10 [ 17.795749] ? ktime_get_ts64+0x86/0x230 [ 17.795774] kunit_try_run_case+0x1a5/0x480 [ 17.795800] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.795823] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.795848] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.795872] ? __kthread_parkme+0x82/0x180 [ 17.795894] ? preempt_count_sub+0x50/0x80 [ 17.795919] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.795943] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.795965] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.795989] kthread+0x337/0x6f0 [ 17.796010] ? trace_preempt_on+0x20/0xc0 [ 17.796033] ? __pfx_kthread+0x10/0x10 [ 17.796055] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.796077] ? calculate_sigpending+0x7b/0xa0 [ 17.796102] ? __pfx_kthread+0x10/0x10 [ 17.796125] ret_from_fork+0x116/0x1d0 [ 17.796143] ? __pfx_kthread+0x10/0x10 [ 17.796165] ret_from_fork_asm+0x1a/0x30 [ 17.796198] </TASK> [ 17.796209] [ 17.801747] Allocated by task 283: [ 17.801847] kasan_save_stack+0x45/0x70 [ 17.801942] kasan_save_track+0x18/0x40 [ 17.802030] kasan_save_alloc_info+0x3b/0x50 [ 17.802121] __kasan_kmalloc+0xb7/0xc0 [ 17.802206] __kmalloc_cache_noprof+0x189/0x420 [ 17.802434] kasan_atomics+0x95/0x310 [ 17.802678] kunit_try_run_case+0x1a5/0x480 [ 17.802947] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.803277] kthread+0x337/0x6f0 [ 17.803491] ret_from_fork+0x116/0x1d0 [ 17.803738] ret_from_fork_asm+0x1a/0x30 [ 17.804009] [ 17.804140] The buggy address belongs to the object at ffff888102b6b880 [ 17.804140] which belongs to the cache kmalloc-64 of size 64 [ 17.804439] The buggy address is located 0 bytes to the right of [ 17.804439] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.804856] [ 17.804969] The buggy address belongs to the physical page: [ 17.805161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.805400] flags: 0x200000000000000(node=0|zone=2) [ 17.805603] page_type: f5(slab) [ 17.805779] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.805976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.806255] page dumped because: kasan: bad access detected [ 17.806399] [ 17.806502] Memory state around the buggy address: [ 17.806684] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.806937] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.807198] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.807340] ^ [ 17.807445] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.807576] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.807703] ================================================================== [ 17.854553] ================================================================== [ 17.855534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 17.856022] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.856473] [ 17.856617] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.856668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.856682] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.856704] Call Trace: [ 17.856722] <TASK> [ 17.856738] dump_stack_lvl+0x73/0xb0 [ 17.856766] print_report+0xd1/0x650 [ 17.856790] ? __virt_addr_valid+0x1db/0x2d0 [ 17.856815] ? kasan_atomics_helper+0x224c/0x5450 [ 17.856838] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.856862] ? kasan_atomics_helper+0x224c/0x5450 [ 17.856885] kasan_report+0x141/0x180 [ 17.856909] ? kasan_atomics_helper+0x224c/0x5450 [ 17.856937] kasan_check_range+0x10c/0x1c0 [ 17.856963] __kasan_check_write+0x18/0x20 [ 17.856984] kasan_atomics_helper+0x224c/0x5450 [ 17.857008] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.857031] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.857057] ? kasan_atomics+0x152/0x310 [ 17.857084] kasan_atomics+0x1dc/0x310 [ 17.857109] ? __pfx_kasan_atomics+0x10/0x10 [ 17.857134] ? __pfx_read_tsc+0x10/0x10 [ 17.857156] ? ktime_get_ts64+0x86/0x230 [ 17.857210] kunit_try_run_case+0x1a5/0x480 [ 17.857247] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.857270] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.857295] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.857319] ? __kthread_parkme+0x82/0x180 [ 17.857361] ? preempt_count_sub+0x50/0x80 [ 17.857387] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.857412] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.857437] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.857462] kthread+0x337/0x6f0 [ 17.857502] ? trace_preempt_on+0x20/0xc0 [ 17.857528] ? __pfx_kthread+0x10/0x10 [ 17.857549] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.857572] ? calculate_sigpending+0x7b/0xa0 [ 17.857597] ? __pfx_kthread+0x10/0x10 [ 17.857619] ret_from_fork+0x116/0x1d0 [ 17.857639] ? __pfx_kthread+0x10/0x10 [ 17.857660] ret_from_fork_asm+0x1a/0x30 [ 17.857692] </TASK> [ 17.857704] [ 17.863744] Allocated by task 283: [ 17.863975] kasan_save_stack+0x45/0x70 [ 17.864248] kasan_save_track+0x18/0x40 [ 17.864503] kasan_save_alloc_info+0x3b/0x50 [ 17.864597] __kasan_kmalloc+0xb7/0xc0 [ 17.864684] __kmalloc_cache_noprof+0x189/0x420 [ 17.864778] kasan_atomics+0x95/0x310 [ 17.864881] kunit_try_run_case+0x1a5/0x480 [ 17.865152] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.865501] kthread+0x337/0x6f0 [ 17.865731] ret_from_fork+0x116/0x1d0 [ 17.865856] ret_from_fork_asm+0x1a/0x30 [ 17.865947] [ 17.865999] The buggy address belongs to the object at ffff888102b6b880 [ 17.865999] which belongs to the cache kmalloc-64 of size 64 [ 17.866189] The buggy address is located 0 bytes to the right of [ 17.866189] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.866931] [ 17.867049] The buggy address belongs to the physical page: [ 17.867325] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.867477] flags: 0x200000000000000(node=0|zone=2) [ 17.867588] page_type: f5(slab) [ 17.867681] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.867819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.867953] page dumped because: kasan: bad access detected [ 17.868053] [ 17.868174] Memory state around the buggy address: [ 17.868466] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.868896] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.869292] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.869698] ^ [ 17.869968] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.870347] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.870519] ================================================================== [ 17.321128] ================================================================== [ 17.321573] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 17.321714] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.321843] [ 17.321966] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.322036] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.322050] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.322089] Call Trace: [ 17.322107] <TASK> [ 17.322139] dump_stack_lvl+0x73/0xb0 [ 17.322168] print_report+0xd1/0x650 [ 17.322191] ? __virt_addr_valid+0x1db/0x2d0 [ 17.322216] ? kasan_atomics_helper+0x4a02/0x5450 [ 17.322252] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.322293] ? kasan_atomics_helper+0x4a02/0x5450 [ 17.322319] kasan_report+0x141/0x180 [ 17.322349] ? kasan_atomics_helper+0x4a02/0x5450 [ 17.322379] __asan_report_load4_noabort+0x18/0x20 [ 17.322401] kasan_atomics_helper+0x4a02/0x5450 [ 17.322446] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.322471] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.322493] ? kasan_atomics+0x152/0x310 [ 17.322522] kasan_atomics+0x1dc/0x310 [ 17.322546] ? __pfx_kasan_atomics+0x10/0x10 [ 17.322572] ? __pfx_read_tsc+0x10/0x10 [ 17.322593] ? ktime_get_ts64+0x86/0x230 [ 17.322618] kunit_try_run_case+0x1a5/0x480 [ 17.322643] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.322665] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.322688] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.322712] ? __kthread_parkme+0x82/0x180 [ 17.322733] ? preempt_count_sub+0x50/0x80 [ 17.322758] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.322781] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.322805] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.322828] kthread+0x337/0x6f0 [ 17.322850] ? trace_preempt_on+0x20/0xc0 [ 17.322874] ? __pfx_kthread+0x10/0x10 [ 17.322897] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.322918] ? calculate_sigpending+0x7b/0xa0 [ 17.322943] ? __pfx_kthread+0x10/0x10 [ 17.322966] ret_from_fork+0x116/0x1d0 [ 17.322985] ? __pfx_kthread+0x10/0x10 [ 17.323007] ret_from_fork_asm+0x1a/0x30 [ 17.323039] </TASK> [ 17.323052] [ 17.329011] Allocated by task 283: [ 17.329126] kasan_save_stack+0x45/0x70 [ 17.329264] kasan_save_track+0x18/0x40 [ 17.329386] kasan_save_alloc_info+0x3b/0x50 [ 17.329507] __kasan_kmalloc+0xb7/0xc0 [ 17.329614] __kmalloc_cache_noprof+0x189/0x420 [ 17.329747] kasan_atomics+0x95/0x310 [ 17.329854] kunit_try_run_case+0x1a5/0x480 [ 17.329976] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.330119] kthread+0x337/0x6f0 [ 17.330310] ret_from_fork+0x116/0x1d0 [ 17.330527] ret_from_fork_asm+0x1a/0x30 [ 17.330809] [ 17.330944] The buggy address belongs to the object at ffff888102b6b880 [ 17.330944] which belongs to the cache kmalloc-64 of size 64 [ 17.331629] The buggy address is located 0 bytes to the right of [ 17.331629] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.332348] [ 17.332474] The buggy address belongs to the physical page: [ 17.332800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.332953] flags: 0x200000000000000(node=0|zone=2) [ 17.333058] page_type: f5(slab) [ 17.333145] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.333288] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.333421] page dumped because: kasan: bad access detected [ 17.333524] [ 17.333574] Memory state around the buggy address: [ 17.333720] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.334033] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.334352] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.334648] ^ [ 17.334870] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.335164] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.335464] ================================================================== [ 16.998896] ================================================================== [ 16.999141] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 16.999591] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.000027] [ 17.000169] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.000235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.000250] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.000276] Call Trace: [ 17.000296] <TASK> [ 17.000316] dump_stack_lvl+0x73/0xb0 [ 17.000349] print_report+0xd1/0x650 [ 17.000373] ? __virt_addr_valid+0x1db/0x2d0 [ 17.000397] ? kasan_atomics_helper+0x72f/0x5450 [ 17.000420] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.000444] ? kasan_atomics_helper+0x72f/0x5450 [ 17.000467] kasan_report+0x141/0x180 [ 17.000491] ? kasan_atomics_helper+0x72f/0x5450 [ 17.000519] kasan_check_range+0x10c/0x1c0 [ 17.000544] __kasan_check_write+0x18/0x20 [ 17.000565] kasan_atomics_helper+0x72f/0x5450 [ 17.000590] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.000615] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.000638] ? kasan_atomics+0x152/0x310 [ 17.000666] kasan_atomics+0x1dc/0x310 [ 17.000690] ? __pfx_kasan_atomics+0x10/0x10 [ 17.000716] ? __pfx_read_tsc+0x10/0x10 [ 17.000738] ? ktime_get_ts64+0x86/0x230 [ 17.000764] kunit_try_run_case+0x1a5/0x480 [ 17.000789] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.000895] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.000920] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.000945] ? __kthread_parkme+0x82/0x180 [ 17.000967] ? preempt_count_sub+0x50/0x80 [ 17.000991] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.001015] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.001037] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.001060] kthread+0x337/0x6f0 [ 17.001081] ? trace_preempt_on+0x20/0xc0 [ 17.001106] ? __pfx_kthread+0x10/0x10 [ 17.001127] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.001277] ? calculate_sigpending+0x7b/0xa0 [ 17.001316] ? __pfx_kthread+0x10/0x10 [ 17.001343] ret_from_fork+0x116/0x1d0 [ 17.001369] ? __pfx_kthread+0x10/0x10 [ 17.001391] ret_from_fork_asm+0x1a/0x30 [ 17.001423] </TASK> [ 17.001436] [ 17.007672] Allocated by task 283: [ 17.007803] kasan_save_stack+0x45/0x70 [ 17.008011] kasan_save_track+0x18/0x40 [ 17.008187] kasan_save_alloc_info+0x3b/0x50 [ 17.008334] __kasan_kmalloc+0xb7/0xc0 [ 17.008596] __kmalloc_cache_noprof+0x189/0x420 [ 17.008779] kasan_atomics+0x95/0x310 [ 17.008980] kunit_try_run_case+0x1a5/0x480 [ 17.009130] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.009359] kthread+0x337/0x6f0 [ 17.009827] ret_from_fork+0x116/0x1d0 [ 17.009953] ret_from_fork_asm+0x1a/0x30 [ 17.010109] [ 17.010213] The buggy address belongs to the object at ffff888102b6b880 [ 17.010213] which belongs to the cache kmalloc-64 of size 64 [ 17.010606] The buggy address is located 0 bytes to the right of [ 17.010606] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.010959] [ 17.011084] The buggy address belongs to the physical page: [ 17.011302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.011617] flags: 0x200000000000000(node=0|zone=2) [ 17.011721] page_type: f5(slab) [ 17.011807] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.011938] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.012065] page dumped because: kasan: bad access detected [ 17.012162] [ 17.012210] Memory state around the buggy address: [ 17.012423] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.012766] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.013050] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.013345] ^ [ 17.013611] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.013897] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.014174] ================================================================== [ 17.683829] ================================================================== [ 17.684145] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 17.684485] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.684677] [ 17.684751] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.684802] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.684816] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.684840] Call Trace: [ 17.684861] <TASK> [ 17.684881] dump_stack_lvl+0x73/0xb0 [ 17.684910] print_report+0xd1/0x650 [ 17.684933] ? __virt_addr_valid+0x1db/0x2d0 [ 17.684957] ? kasan_atomics_helper+0x1d7a/0x5450 [ 17.684979] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.685002] ? kasan_atomics_helper+0x1d7a/0x5450 [ 17.685025] kasan_report+0x141/0x180 [ 17.685049] ? kasan_atomics_helper+0x1d7a/0x5450 [ 17.685076] kasan_check_range+0x10c/0x1c0 [ 17.685100] __kasan_check_write+0x18/0x20 [ 17.685121] kasan_atomics_helper+0x1d7a/0x5450 [ 17.685145] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.685168] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.685189] ? kasan_atomics+0x152/0x310 [ 17.685216] kasan_atomics+0x1dc/0x310 [ 17.685251] ? __pfx_kasan_atomics+0x10/0x10 [ 17.685277] ? __pfx_read_tsc+0x10/0x10 [ 17.685299] ? ktime_get_ts64+0x86/0x230 [ 17.685324] kunit_try_run_case+0x1a5/0x480 [ 17.685348] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.685370] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.685394] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.685417] ? __kthread_parkme+0x82/0x180 [ 17.685438] ? preempt_count_sub+0x50/0x80 [ 17.685462] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.685486] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.685510] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.685533] kthread+0x337/0x6f0 [ 17.685553] ? trace_preempt_on+0x20/0xc0 [ 17.685577] ? __pfx_kthread+0x10/0x10 [ 17.685598] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.685619] ? calculate_sigpending+0x7b/0xa0 [ 17.685643] ? __pfx_kthread+0x10/0x10 [ 17.685665] ret_from_fork+0x116/0x1d0 [ 17.685684] ? __pfx_kthread+0x10/0x10 [ 17.685705] ret_from_fork_asm+0x1a/0x30 [ 17.685737] </TASK> [ 17.685749] [ 17.691037] Allocated by task 283: [ 17.691126] kasan_save_stack+0x45/0x70 [ 17.691219] kasan_save_track+0x18/0x40 [ 17.691427] kasan_save_alloc_info+0x3b/0x50 [ 17.691626] __kasan_kmalloc+0xb7/0xc0 [ 17.691797] __kmalloc_cache_noprof+0x189/0x420 [ 17.691997] kasan_atomics+0x95/0x310 [ 17.692169] kunit_try_run_case+0x1a5/0x480 [ 17.692363] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.692589] kthread+0x337/0x6f0 [ 17.692744] ret_from_fork+0x116/0x1d0 [ 17.692918] ret_from_fork_asm+0x1a/0x30 [ 17.693104] [ 17.693213] The buggy address belongs to the object at ffff888102b6b880 [ 17.693213] which belongs to the cache kmalloc-64 of size 64 [ 17.693677] The buggy address is located 0 bytes to the right of [ 17.693677] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.694124] [ 17.694184] The buggy address belongs to the physical page: [ 17.694304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.694463] flags: 0x200000000000000(node=0|zone=2) [ 17.694575] page_type: f5(slab) [ 17.694738] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.695047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.695335] page dumped because: kasan: bad access detected [ 17.695560] [ 17.695655] Memory state around the buggy address: [ 17.695861] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.696111] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.696361] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.696580] ^ [ 17.696745] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.696976] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.697212] ================================================================== [ 17.381097] ================================================================== [ 17.381266] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 17.382112] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.382530] [ 17.382657] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.382715] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.382730] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.382755] Call Trace: [ 17.382775] <TASK> [ 17.382793] dump_stack_lvl+0x73/0xb0 [ 17.382833] print_report+0xd1/0x650 [ 17.382859] ? __virt_addr_valid+0x1db/0x2d0 [ 17.382886] ? kasan_atomics_helper+0x49ce/0x5450 [ 17.382910] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.382935] ? kasan_atomics_helper+0x49ce/0x5450 [ 17.382961] kasan_report+0x141/0x180 [ 17.382985] ? kasan_atomics_helper+0x49ce/0x5450 [ 17.383013] __asan_report_load4_noabort+0x18/0x20 [ 17.383036] kasan_atomics_helper+0x49ce/0x5450 [ 17.383061] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.383087] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.383110] ? kasan_atomics+0x152/0x310 [ 17.383139] kasan_atomics+0x1dc/0x310 [ 17.383165] ? __pfx_kasan_atomics+0x10/0x10 [ 17.383192] ? __pfx_read_tsc+0x10/0x10 [ 17.383215] ? ktime_get_ts64+0x86/0x230 [ 17.383255] kunit_try_run_case+0x1a5/0x480 [ 17.383281] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.383305] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.383330] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.383353] ? __kthread_parkme+0x82/0x180 [ 17.383376] ? preempt_count_sub+0x50/0x80 [ 17.383403] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.383427] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.383452] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.383476] kthread+0x337/0x6f0 [ 17.383496] ? trace_preempt_on+0x20/0xc0 [ 17.383520] ? __pfx_kthread+0x10/0x10 [ 17.383542] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.383563] ? calculate_sigpending+0x7b/0xa0 [ 17.383588] ? __pfx_kthread+0x10/0x10 [ 17.383611] ret_from_fork+0x116/0x1d0 [ 17.383629] ? __pfx_kthread+0x10/0x10 [ 17.383651] ret_from_fork_asm+0x1a/0x30 [ 17.383683] </TASK> [ 17.383695] [ 17.389501] Allocated by task 283: [ 17.389716] kasan_save_stack+0x45/0x70 [ 17.389925] kasan_save_track+0x18/0x40 [ 17.390118] kasan_save_alloc_info+0x3b/0x50 [ 17.390380] __kasan_kmalloc+0xb7/0xc0 [ 17.390582] __kmalloc_cache_noprof+0x189/0x420 [ 17.390802] kasan_atomics+0x95/0x310 [ 17.390985] kunit_try_run_case+0x1a5/0x480 [ 17.391186] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.391440] kthread+0x337/0x6f0 [ 17.391611] ret_from_fork+0x116/0x1d0 [ 17.391789] ret_from_fork_asm+0x1a/0x30 [ 17.391977] [ 17.392071] The buggy address belongs to the object at ffff888102b6b880 [ 17.392071] which belongs to the cache kmalloc-64 of size 64 [ 17.392734] The buggy address is located 0 bytes to the right of [ 17.392734] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.393330] [ 17.393501] The buggy address belongs to the physical page: [ 17.393820] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.394158] flags: 0x200000000000000(node=0|zone=2) [ 17.394482] page_type: f5(slab) [ 17.394679] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.395045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.395251] page dumped because: kasan: bad access detected [ 17.395361] [ 17.395418] Memory state around the buggy address: [ 17.395667] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.396091] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.396318] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.396678] ^ [ 17.396925] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.397236] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.397630] ================================================================== [ 17.577126] ================================================================== [ 17.577988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 17.578470] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.578947] [ 17.579100] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.579154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.579167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.579192] Call Trace: [ 17.579211] <TASK> [ 17.579237] dump_stack_lvl+0x73/0xb0 [ 17.579267] print_report+0xd1/0x650 [ 17.579292] ? __virt_addr_valid+0x1db/0x2d0 [ 17.579319] ? kasan_atomics_helper+0x194a/0x5450 [ 17.579342] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.579367] ? kasan_atomics_helper+0x194a/0x5450 [ 17.579391] kasan_report+0x141/0x180 [ 17.579416] ? kasan_atomics_helper+0x194a/0x5450 [ 17.579446] kasan_check_range+0x10c/0x1c0 [ 17.579472] __kasan_check_write+0x18/0x20 [ 17.579494] kasan_atomics_helper+0x194a/0x5450 [ 17.579520] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.579545] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.579567] ? kasan_atomics+0x152/0x310 [ 17.579595] kasan_atomics+0x1dc/0x310 [ 17.579619] ? __pfx_kasan_atomics+0x10/0x10 [ 17.579645] ? __pfx_read_tsc+0x10/0x10 [ 17.579668] ? ktime_get_ts64+0x86/0x230 [ 17.579692] kunit_try_run_case+0x1a5/0x480 [ 17.579717] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.579740] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.579763] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.579786] ? __kthread_parkme+0x82/0x180 [ 17.579807] ? preempt_count_sub+0x50/0x80 [ 17.579832] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.579856] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.579879] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.579902] kthread+0x337/0x6f0 [ 17.579922] ? trace_preempt_on+0x20/0xc0 [ 17.579947] ? __pfx_kthread+0x10/0x10 [ 17.579968] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.579990] ? calculate_sigpending+0x7b/0xa0 [ 17.580014] ? __pfx_kthread+0x10/0x10 [ 17.580037] ret_from_fork+0x116/0x1d0 [ 17.580075] ? __pfx_kthread+0x10/0x10 [ 17.580098] ret_from_fork_asm+0x1a/0x30 [ 17.580142] </TASK> [ 17.580156] [ 17.586833] Allocated by task 283: [ 17.587093] kasan_save_stack+0x45/0x70 [ 17.587261] kasan_save_track+0x18/0x40 [ 17.587358] kasan_save_alloc_info+0x3b/0x50 [ 17.587458] __kasan_kmalloc+0xb7/0xc0 [ 17.587550] __kmalloc_cache_noprof+0x189/0x420 [ 17.587649] kasan_atomics+0x95/0x310 [ 17.587736] kunit_try_run_case+0x1a5/0x480 [ 17.587828] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.587935] kthread+0x337/0x6f0 [ 17.588015] ret_from_fork+0x116/0x1d0 [ 17.588097] ret_from_fork_asm+0x1a/0x30 [ 17.588185] [ 17.588249] The buggy address belongs to the object at ffff888102b6b880 [ 17.588249] which belongs to the cache kmalloc-64 of size 64 [ 17.588447] The buggy address is located 0 bytes to the right of [ 17.588447] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.588853] [ 17.588979] The buggy address belongs to the physical page: [ 17.589319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.589808] flags: 0x200000000000000(node=0|zone=2) [ 17.590118] page_type: f5(slab) [ 17.590351] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.590813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.591271] page dumped because: kasan: bad access detected [ 17.591615] [ 17.591724] Memory state around the buggy address: [ 17.591823] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.591948] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.592071] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.592189] ^ [ 17.592292] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.592416] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.592535] ================================================================== [ 17.755156] ================================================================== [ 17.755438] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 17.755777] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.756065] [ 17.756178] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.756242] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.756256] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.756277] Call Trace: [ 17.756301] <TASK> [ 17.756316] dump_stack_lvl+0x73/0xb0 [ 17.756351] print_report+0xd1/0x650 [ 17.756375] ? __virt_addr_valid+0x1db/0x2d0 [ 17.756406] ? kasan_atomics_helper+0x2006/0x5450 [ 17.756437] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.756468] ? kasan_atomics_helper+0x2006/0x5450 [ 17.756491] kasan_report+0x141/0x180 [ 17.756522] ? kasan_atomics_helper+0x2006/0x5450 [ 17.756558] kasan_check_range+0x10c/0x1c0 [ 17.756591] __kasan_check_write+0x18/0x20 [ 17.756612] kasan_atomics_helper+0x2006/0x5450 [ 17.756643] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.756675] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.756697] ? kasan_atomics+0x152/0x310 [ 17.756733] kasan_atomics+0x1dc/0x310 [ 17.756765] ? __pfx_kasan_atomics+0x10/0x10 [ 17.756798] ? __pfx_read_tsc+0x10/0x10 [ 17.756827] ? ktime_get_ts64+0x86/0x230 [ 17.756851] kunit_try_run_case+0x1a5/0x480 [ 17.756884] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.756916] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.756946] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.756969] ? __kthread_parkme+0x82/0x180 [ 17.756998] ? preempt_count_sub+0x50/0x80 [ 17.757030] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.757053] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.757084] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.757116] kthread+0x337/0x6f0 [ 17.757136] ? trace_preempt_on+0x20/0xc0 [ 17.757169] ? __pfx_kthread+0x10/0x10 [ 17.757199] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.757237] ? calculate_sigpending+0x7b/0xa0 [ 17.757266] ? __pfx_kthread+0x10/0x10 [ 17.757298] ret_from_fork+0x116/0x1d0 [ 17.757328] ? __pfx_kthread+0x10/0x10 [ 17.757351] ret_from_fork_asm+0x1a/0x30 [ 17.757394] </TASK> [ 17.757415] [ 17.762427] Allocated by task 283: [ 17.762653] kasan_save_stack+0x45/0x70 [ 17.762857] kasan_save_track+0x18/0x40 [ 17.763033] kasan_save_alloc_info+0x3b/0x50 [ 17.763300] __kasan_kmalloc+0xb7/0xc0 [ 17.763499] __kmalloc_cache_noprof+0x189/0x420 [ 17.763688] kasan_atomics+0x95/0x310 [ 17.763875] kunit_try_run_case+0x1a5/0x480 [ 17.764054] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.764392] kthread+0x337/0x6f0 [ 17.764505] ret_from_fork+0x116/0x1d0 [ 17.764595] ret_from_fork_asm+0x1a/0x30 [ 17.764799] [ 17.764907] The buggy address belongs to the object at ffff888102b6b880 [ 17.764907] which belongs to the cache kmalloc-64 of size 64 [ 17.766378] The buggy address is located 0 bytes to the right of [ 17.766378] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.767150] [ 17.767324] The buggy address belongs to the physical page: [ 17.767584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.767905] flags: 0x200000000000000(node=0|zone=2) [ 17.768137] page_type: f5(slab) [ 17.769472] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.769641] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.769779] page dumped because: kasan: bad access detected [ 17.769884] [ 17.769935] Memory state around the buggy address: [ 17.770037] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.770449] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.770779] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.771117] ^ [ 17.771385] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.771715] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.771845] ================================================================== [ 17.431577] ================================================================== [ 17.431942] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 17.432330] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.433013] [ 17.433141] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.433193] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.433206] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.433238] Call Trace: [ 17.433258] <TASK> [ 17.433290] dump_stack_lvl+0x73/0xb0 [ 17.433319] print_report+0xd1/0x650 [ 17.433343] ? __virt_addr_valid+0x1db/0x2d0 [ 17.433368] ? kasan_atomics_helper+0x1467/0x5450 [ 17.433389] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.433430] ? kasan_atomics_helper+0x1467/0x5450 [ 17.433454] kasan_report+0x141/0x180 [ 17.433477] ? kasan_atomics_helper+0x1467/0x5450 [ 17.433505] kasan_check_range+0x10c/0x1c0 [ 17.433529] __kasan_check_write+0x18/0x20 [ 17.433567] kasan_atomics_helper+0x1467/0x5450 [ 17.433592] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.433634] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.433657] ? kasan_atomics+0x152/0x310 [ 17.433683] kasan_atomics+0x1dc/0x310 [ 17.433707] ? __pfx_kasan_atomics+0x10/0x10 [ 17.433733] ? __pfx_read_tsc+0x10/0x10 [ 17.433754] ? ktime_get_ts64+0x86/0x230 [ 17.433779] kunit_try_run_case+0x1a5/0x480 [ 17.433804] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.433826] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.433850] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.433873] ? __kthread_parkme+0x82/0x180 [ 17.433894] ? preempt_count_sub+0x50/0x80 [ 17.433918] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.433942] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.433965] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.433988] kthread+0x337/0x6f0 [ 17.434008] ? trace_preempt_on+0x20/0xc0 [ 17.434032] ? __pfx_kthread+0x10/0x10 [ 17.434053] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.434075] ? calculate_sigpending+0x7b/0xa0 [ 17.434099] ? __pfx_kthread+0x10/0x10 [ 17.434121] ret_from_fork+0x116/0x1d0 [ 17.434139] ? __pfx_kthread+0x10/0x10 [ 17.434161] ret_from_fork_asm+0x1a/0x30 [ 17.434207] </TASK> [ 17.434229] [ 17.439506] Allocated by task 283: [ 17.439617] kasan_save_stack+0x45/0x70 [ 17.439850] kasan_save_track+0x18/0x40 [ 17.440066] kasan_save_alloc_info+0x3b/0x50 [ 17.440286] __kasan_kmalloc+0xb7/0xc0 [ 17.440545] __kmalloc_cache_noprof+0x189/0x420 [ 17.440818] kasan_atomics+0x95/0x310 [ 17.441019] kunit_try_run_case+0x1a5/0x480 [ 17.441271] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.441475] kthread+0x337/0x6f0 [ 17.441560] ret_from_fork+0x116/0x1d0 [ 17.441645] ret_from_fork_asm+0x1a/0x30 [ 17.441888] [ 17.442012] The buggy address belongs to the object at ffff888102b6b880 [ 17.442012] which belongs to the cache kmalloc-64 of size 64 [ 17.442395] The buggy address is located 0 bytes to the right of [ 17.442395] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.442784] [ 17.442865] The buggy address belongs to the physical page: [ 17.443044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.443342] flags: 0x200000000000000(node=0|zone=2) [ 17.443590] page_type: f5(slab) [ 17.443753] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.443997] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.444215] page dumped because: kasan: bad access detected [ 17.444454] [ 17.444542] Memory state around the buggy address: [ 17.444675] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.444922] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.445151] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.445415] ^ [ 17.445560] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.445790] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.445948] ================================================================== [ 17.173251] ================================================================== [ 17.173579] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 17.173731] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.174043] [ 17.174125] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.174179] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.174193] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.174216] Call Trace: [ 17.174249] <TASK> [ 17.174270] dump_stack_lvl+0x73/0xb0 [ 17.174300] print_report+0xd1/0x650 [ 17.174324] ? __virt_addr_valid+0x1db/0x2d0 [ 17.174360] ? kasan_atomics_helper+0xd47/0x5450 [ 17.174384] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.174409] ? kasan_atomics_helper+0xd47/0x5450 [ 17.174432] kasan_report+0x141/0x180 [ 17.174457] ? kasan_atomics_helper+0xd47/0x5450 [ 17.174485] kasan_check_range+0x10c/0x1c0 [ 17.174510] __kasan_check_write+0x18/0x20 [ 17.174531] kasan_atomics_helper+0xd47/0x5450 [ 17.174555] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.174579] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.174602] ? kasan_atomics+0x152/0x310 [ 17.174631] kasan_atomics+0x1dc/0x310 [ 17.174655] ? __pfx_kasan_atomics+0x10/0x10 [ 17.174681] ? __pfx_read_tsc+0x10/0x10 [ 17.174706] ? ktime_get_ts64+0x86/0x230 [ 17.174732] kunit_try_run_case+0x1a5/0x480 [ 17.174758] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.174781] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.174805] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.174829] ? __kthread_parkme+0x82/0x180 [ 17.174850] ? preempt_count_sub+0x50/0x80 [ 17.174875] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.174900] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.174924] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.175129] kthread+0x337/0x6f0 [ 17.175238] ? trace_preempt_on+0x20/0xc0 [ 17.175273] ? __pfx_kthread+0x10/0x10 [ 17.175297] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.175322] ? calculate_sigpending+0x7b/0xa0 [ 17.175348] ? __pfx_kthread+0x10/0x10 [ 17.175372] ret_from_fork+0x116/0x1d0 [ 17.175392] ? __pfx_kthread+0x10/0x10 [ 17.175415] ret_from_fork_asm+0x1a/0x30 [ 17.175448] </TASK> [ 17.175550] [ 17.181998] Allocated by task 283: [ 17.182101] kasan_save_stack+0x45/0x70 [ 17.182205] kasan_save_track+0x18/0x40 [ 17.182427] kasan_save_alloc_info+0x3b/0x50 [ 17.182747] __kasan_kmalloc+0xb7/0xc0 [ 17.182971] __kmalloc_cache_noprof+0x189/0x420 [ 17.183253] kasan_atomics+0x95/0x310 [ 17.183556] kunit_try_run_case+0x1a5/0x480 [ 17.183709] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.183835] kthread+0x337/0x6f0 [ 17.183918] ret_from_fork+0x116/0x1d0 [ 17.184004] ret_from_fork_asm+0x1a/0x30 [ 17.184092] [ 17.184202] The buggy address belongs to the object at ffff888102b6b880 [ 17.184202] which belongs to the cache kmalloc-64 of size 64 [ 17.184967] The buggy address is located 0 bytes to the right of [ 17.184967] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.185607] [ 17.185669] The buggy address belongs to the physical page: [ 17.185799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.186213] flags: 0x200000000000000(node=0|zone=2) [ 17.186528] page_type: f5(slab) [ 17.186666] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.186901] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.187089] page dumped because: kasan: bad access detected [ 17.187193] [ 17.187256] Memory state around the buggy address: [ 17.187356] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.187543] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.187861] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.188286] ^ [ 17.188622] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.189035] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.189251] ================================================================== [ 17.727295] ================================================================== [ 17.727656] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 17.727969] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.728286] [ 17.728397] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.728464] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.728478] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.728501] Call Trace: [ 17.728518] <TASK> [ 17.728534] dump_stack_lvl+0x73/0xb0 [ 17.728562] print_report+0xd1/0x650 [ 17.728586] ? __virt_addr_valid+0x1db/0x2d0 [ 17.728629] ? kasan_atomics_helper+0x1f43/0x5450 [ 17.728654] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.728678] ? kasan_atomics_helper+0x1f43/0x5450 [ 17.728701] kasan_report+0x141/0x180 [ 17.728726] ? kasan_atomics_helper+0x1f43/0x5450 [ 17.728754] kasan_check_range+0x10c/0x1c0 [ 17.728799] __kasan_check_write+0x18/0x20 [ 17.728821] kasan_atomics_helper+0x1f43/0x5450 [ 17.728846] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.728870] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.728893] ? kasan_atomics+0x152/0x310 [ 17.728921] kasan_atomics+0x1dc/0x310 [ 17.728945] ? __pfx_kasan_atomics+0x10/0x10 [ 17.728988] ? __pfx_read_tsc+0x10/0x10 [ 17.729012] ? ktime_get_ts64+0x86/0x230 [ 17.729038] kunit_try_run_case+0x1a5/0x480 [ 17.729064] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.729087] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.729111] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.729153] ? __kthread_parkme+0x82/0x180 [ 17.729174] ? preempt_count_sub+0x50/0x80 [ 17.729198] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.729231] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.729256] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.729297] kthread+0x337/0x6f0 [ 17.729320] ? trace_preempt_on+0x20/0xc0 [ 17.729354] ? __pfx_kthread+0x10/0x10 [ 17.729384] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.729414] ? calculate_sigpending+0x7b/0xa0 [ 17.729439] ? __pfx_kthread+0x10/0x10 [ 17.729470] ret_from_fork+0x116/0x1d0 [ 17.729498] ? __pfx_kthread+0x10/0x10 [ 17.729520] ret_from_fork_asm+0x1a/0x30 [ 17.729560] </TASK> [ 17.729579] [ 17.735029] Allocated by task 283: [ 17.735226] kasan_save_stack+0x45/0x70 [ 17.735382] kasan_save_track+0x18/0x40 [ 17.735569] kasan_save_alloc_info+0x3b/0x50 [ 17.735692] __kasan_kmalloc+0xb7/0xc0 [ 17.735779] __kmalloc_cache_noprof+0x189/0x420 [ 17.735873] kasan_atomics+0x95/0x310 [ 17.735957] kunit_try_run_case+0x1a5/0x480 [ 17.736046] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.736149] kthread+0x337/0x6f0 [ 17.736246] ret_from_fork+0x116/0x1d0 [ 17.736439] ret_from_fork_asm+0x1a/0x30 [ 17.736640] [ 17.736755] The buggy address belongs to the object at ffff888102b6b880 [ 17.736755] which belongs to the cache kmalloc-64 of size 64 [ 17.737308] The buggy address is located 0 bytes to the right of [ 17.737308] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.737775] [ 17.737888] The buggy address belongs to the physical page: [ 17.738049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.738316] flags: 0x200000000000000(node=0|zone=2) [ 17.738455] page_type: f5(slab) [ 17.738656] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.738892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.739130] page dumped because: kasan: bad access detected [ 17.739288] [ 17.739363] Memory state around the buggy address: [ 17.739488] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.739648] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.739805] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.739965] ^ [ 17.740083] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.740367] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.740642] ================================================================== [ 17.351389] ================================================================== [ 17.351721] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 17.352029] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.352343] [ 17.352427] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.352497] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.352511] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.352535] Call Trace: [ 17.352552] <TASK> [ 17.352569] dump_stack_lvl+0x73/0xb0 [ 17.352597] print_report+0xd1/0x650 [ 17.352621] ? __virt_addr_valid+0x1db/0x2d0 [ 17.353594] ? kasan_atomics_helper+0x49e8/0x5450 [ 17.353621] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.353646] ? kasan_atomics_helper+0x49e8/0x5450 [ 17.353671] kasan_report+0x141/0x180 [ 17.353696] ? kasan_atomics_helper+0x49e8/0x5450 [ 17.353725] __asan_report_load4_noabort+0x18/0x20 [ 17.353749] kasan_atomics_helper+0x49e8/0x5450 [ 17.353774] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.353797] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.353820] ? kasan_atomics+0x152/0x310 [ 17.353848] kasan_atomics+0x1dc/0x310 [ 17.353873] ? __pfx_kasan_atomics+0x10/0x10 [ 17.353898] ? __pfx_read_tsc+0x10/0x10 [ 17.354308] ? ktime_get_ts64+0x86/0x230 [ 17.354352] kunit_try_run_case+0x1a5/0x480 [ 17.354385] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.354410] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.354436] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.354460] ? __kthread_parkme+0x82/0x180 [ 17.354483] ? preempt_count_sub+0x50/0x80 [ 17.354509] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.354534] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.354557] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.354581] kthread+0x337/0x6f0 [ 17.354602] ? trace_preempt_on+0x20/0xc0 [ 17.354627] ? __pfx_kthread+0x10/0x10 [ 17.354648] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.354671] ? calculate_sigpending+0x7b/0xa0 [ 17.354696] ? __pfx_kthread+0x10/0x10 [ 17.354719] ret_from_fork+0x116/0x1d0 [ 17.354739] ? __pfx_kthread+0x10/0x10 [ 17.354761] ret_from_fork_asm+0x1a/0x30 [ 17.354793] </TASK> [ 17.354807] [ 17.359719] Allocated by task 283: [ 17.359841] kasan_save_stack+0x45/0x70 [ 17.360068] kasan_save_track+0x18/0x40 [ 17.360260] kasan_save_alloc_info+0x3b/0x50 [ 17.360429] __kasan_kmalloc+0xb7/0xc0 [ 17.360575] __kmalloc_cache_noprof+0x189/0x420 [ 17.360783] kasan_atomics+0x95/0x310 [ 17.360907] kunit_try_run_case+0x1a5/0x480 [ 17.361101] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.361303] kthread+0x337/0x6f0 [ 17.361444] ret_from_fork+0x116/0x1d0 [ 17.361591] ret_from_fork_asm+0x1a/0x30 [ 17.361761] [ 17.361873] The buggy address belongs to the object at ffff888102b6b880 [ 17.361873] which belongs to the cache kmalloc-64 of size 64 [ 17.362204] The buggy address is located 0 bytes to the right of [ 17.362204] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.362618] [ 17.362735] The buggy address belongs to the physical page: [ 17.362910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.363165] flags: 0x200000000000000(node=0|zone=2) [ 17.363423] page_type: f5(slab) [ 17.363592] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.363851] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.364040] page dumped because: kasan: bad access detected [ 17.364241] [ 17.364340] Memory state around the buggy address: [ 17.364506] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.364746] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.364980] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.365173] ^ [ 17.365324] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.365485] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.365762] ================================================================== [ 17.775292] ================================================================== [ 17.777804] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 17.778277] Read of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.778672] [ 17.778820] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.778878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.778892] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.778917] Call Trace: [ 17.778944] <TASK> [ 17.778967] dump_stack_lvl+0x73/0xb0 [ 17.778997] print_report+0xd1/0x650 [ 17.779022] ? __virt_addr_valid+0x1db/0x2d0 [ 17.779047] ? kasan_atomics_helper+0x4f98/0x5450 [ 17.779069] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.779092] ? kasan_atomics_helper+0x4f98/0x5450 [ 17.779114] kasan_report+0x141/0x180 [ 17.779137] ? kasan_atomics_helper+0x4f98/0x5450 [ 17.779165] __asan_report_load8_noabort+0x18/0x20 [ 17.779187] kasan_atomics_helper+0x4f98/0x5450 [ 17.779211] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.779589] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.779624] ? kasan_atomics+0x152/0x310 [ 17.779652] kasan_atomics+0x1dc/0x310 [ 17.779680] ? __pfx_kasan_atomics+0x10/0x10 [ 17.779706] ? __pfx_read_tsc+0x10/0x10 [ 17.779728] ? ktime_get_ts64+0x86/0x230 [ 17.779754] kunit_try_run_case+0x1a5/0x480 [ 17.779781] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.779804] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.779828] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.779852] ? __kthread_parkme+0x82/0x180 [ 17.779874] ? preempt_count_sub+0x50/0x80 [ 17.779900] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.779924] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.779947] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.779971] kthread+0x337/0x6f0 [ 17.779990] ? trace_preempt_on+0x20/0xc0 [ 17.780015] ? __pfx_kthread+0x10/0x10 [ 17.780036] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.780057] ? calculate_sigpending+0x7b/0xa0 [ 17.780082] ? __pfx_kthread+0x10/0x10 [ 17.780105] ret_from_fork+0x116/0x1d0 [ 17.780124] ? __pfx_kthread+0x10/0x10 [ 17.780144] ret_from_fork_asm+0x1a/0x30 [ 17.780176] </TASK> [ 17.780190] [ 17.786628] Allocated by task 283: [ 17.786820] kasan_save_stack+0x45/0x70 [ 17.787029] kasan_save_track+0x18/0x40 [ 17.787214] kasan_save_alloc_info+0x3b/0x50 [ 17.787428] __kasan_kmalloc+0xb7/0xc0 [ 17.787610] __kmalloc_cache_noprof+0x189/0x420 [ 17.787823] kasan_atomics+0x95/0x310 [ 17.788005] kunit_try_run_case+0x1a5/0x480 [ 17.788203] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.788478] kthread+0x337/0x6f0 [ 17.788607] ret_from_fork+0x116/0x1d0 [ 17.788725] ret_from_fork_asm+0x1a/0x30 [ 17.788923] [ 17.789035] The buggy address belongs to the object at ffff888102b6b880 [ 17.789035] which belongs to the cache kmalloc-64 of size 64 [ 17.789394] The buggy address is located 0 bytes to the right of [ 17.789394] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.789643] [ 17.789762] The buggy address belongs to the physical page: [ 17.790082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.790341] flags: 0x200000000000000(node=0|zone=2) [ 17.790611] page_type: f5(slab) [ 17.790772] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.790996] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.791256] page dumped because: kasan: bad access detected [ 17.791361] [ 17.791413] Memory state around the buggy address: [ 17.791675] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.791973] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.792250] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.792517] ^ [ 17.792760] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.792910] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.793042] ================================================================== [ 17.611404] ================================================================== [ 17.611754] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 17.612011] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 17.612260] [ 17.612410] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 17.612488] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.612513] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.612538] Call Trace: [ 17.612572] <TASK> [ 17.612597] dump_stack_lvl+0x73/0xb0 [ 17.612627] print_report+0xd1/0x650 [ 17.612662] ? __virt_addr_valid+0x1db/0x2d0 [ 17.612689] ? kasan_atomics_helper+0x1a7f/0x5450 [ 17.612710] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.612752] ? kasan_atomics_helper+0x1a7f/0x5450 [ 17.612777] kasan_report+0x141/0x180 [ 17.612801] ? kasan_atomics_helper+0x1a7f/0x5450 [ 17.612830] kasan_check_range+0x10c/0x1c0 [ 17.612855] __kasan_check_write+0x18/0x20 [ 17.612875] kasan_atomics_helper+0x1a7f/0x5450 [ 17.612917] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.612943] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.612965] ? kasan_atomics+0x152/0x310 [ 17.612992] kasan_atomics+0x1dc/0x310 [ 17.613016] ? __pfx_kasan_atomics+0x10/0x10 [ 17.613041] ? __pfx_read_tsc+0x10/0x10 [ 17.613063] ? ktime_get_ts64+0x86/0x230 [ 17.613088] kunit_try_run_case+0x1a5/0x480 [ 17.613114] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.613137] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.613161] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.613184] ? __kthread_parkme+0x82/0x180 [ 17.613206] ? preempt_count_sub+0x50/0x80 [ 17.613249] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.613274] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.613299] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.613322] kthread+0x337/0x6f0 [ 17.613343] ? trace_preempt_on+0x20/0xc0 [ 17.613369] ? __pfx_kthread+0x10/0x10 [ 17.613391] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.613413] ? calculate_sigpending+0x7b/0xa0 [ 17.613438] ? __pfx_kthread+0x10/0x10 [ 17.613460] ret_from_fork+0x116/0x1d0 [ 17.613480] ? __pfx_kthread+0x10/0x10 [ 17.613501] ret_from_fork_asm+0x1a/0x30 [ 17.613535] </TASK> [ 17.613549] [ 17.619077] Allocated by task 283: [ 17.619196] kasan_save_stack+0x45/0x70 [ 17.619331] kasan_save_track+0x18/0x40 [ 17.619465] kasan_save_alloc_info+0x3b/0x50 [ 17.619700] __kasan_kmalloc+0xb7/0xc0 [ 17.619945] __kmalloc_cache_noprof+0x189/0x420 [ 17.620200] kasan_atomics+0x95/0x310 [ 17.620441] kunit_try_run_case+0x1a5/0x480 [ 17.620697] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.621009] kthread+0x337/0x6f0 [ 17.621229] ret_from_fork+0x116/0x1d0 [ 17.621447] ret_from_fork_asm+0x1a/0x30 [ 17.621680] [ 17.621801] The buggy address belongs to the object at ffff888102b6b880 [ 17.621801] which belongs to the cache kmalloc-64 of size 64 [ 17.621997] The buggy address is located 0 bytes to the right of [ 17.621997] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 17.622288] [ 17.622400] The buggy address belongs to the physical page: [ 17.622704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 17.623091] flags: 0x200000000000000(node=0|zone=2) [ 17.623260] page_type: f5(slab) [ 17.623350] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.623483] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.623614] page dumped because: kasan: bad access detected [ 17.623713] [ 17.623763] Memory state around the buggy address: [ 17.623859] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.624208] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.624622] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.624953] ^ [ 17.625190] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.625545] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.625725] ================================================================== [ 16.838281] ================================================================== [ 16.838766] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 16.839205] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283 [ 16.839659] [ 16.839805] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.839860] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.839874] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.839897] Call Trace: [ 16.839917] <TASK> [ 16.839937] dump_stack_lvl+0x73/0xb0 [ 16.839965] print_report+0xd1/0x650 [ 16.839989] ? __virt_addr_valid+0x1db/0x2d0 [ 16.840013] ? kasan_atomics_helper+0x4b88/0x5450 [ 16.840034] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.840056] ? kasan_atomics_helper+0x4b88/0x5450 [ 16.840078] kasan_report+0x141/0x180 [ 16.840100] ? kasan_atomics_helper+0x4b88/0x5450 [ 16.840127] __asan_report_load4_noabort+0x18/0x20 [ 16.840147] kasan_atomics_helper+0x4b88/0x5450 [ 16.840170] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.840192] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.840237] ? kasan_atomics+0x152/0x310 [ 16.840268] kasan_atomics+0x1dc/0x310 [ 16.840300] ? __pfx_kasan_atomics+0x10/0x10 [ 16.840325] ? __pfx_read_tsc+0x10/0x10 [ 16.840347] ? ktime_get_ts64+0x86/0x230 [ 16.840372] kunit_try_run_case+0x1a5/0x480 [ 16.840396] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.840418] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.840441] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.840531] ? __kthread_parkme+0x82/0x180 [ 16.840556] ? preempt_count_sub+0x50/0x80 [ 16.840597] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.840625] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.840648] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.840671] kthread+0x337/0x6f0 [ 16.840690] ? trace_preempt_on+0x20/0xc0 [ 16.840715] ? __pfx_kthread+0x10/0x10 [ 16.840752] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.840776] ? calculate_sigpending+0x7b/0xa0 [ 16.840801] ? __pfx_kthread+0x10/0x10 [ 16.840823] ret_from_fork+0x116/0x1d0 [ 16.840842] ? __pfx_kthread+0x10/0x10 [ 16.840862] ret_from_fork_asm+0x1a/0x30 [ 16.840910] </TASK> [ 16.840923] [ 16.846944] Allocated by task 283: [ 16.847046] kasan_save_stack+0x45/0x70 [ 16.847296] kasan_save_track+0x18/0x40 [ 16.847606] kasan_save_alloc_info+0x3b/0x50 [ 16.847882] __kasan_kmalloc+0xb7/0xc0 [ 16.848102] __kmalloc_cache_noprof+0x189/0x420 [ 16.848393] kasan_atomics+0x95/0x310 [ 16.848693] kunit_try_run_case+0x1a5/0x480 [ 16.848958] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.849096] kthread+0x337/0x6f0 [ 16.849307] ret_from_fork+0x116/0x1d0 [ 16.849414] ret_from_fork_asm+0x1a/0x30 [ 16.849818] [ 16.849884] The buggy address belongs to the object at ffff888102b6b880 [ 16.849884] which belongs to the cache kmalloc-64 of size 64 [ 16.850715] The buggy address is located 0 bytes to the right of [ 16.850715] allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0) [ 16.851370] [ 16.851427] The buggy address belongs to the physical page: [ 16.851588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b [ 16.851735] flags: 0x200000000000000(node=0|zone=2) [ 16.852055] page_type: f5(slab) [ 16.852240] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.852740] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.853101] page dumped because: kasan: bad access detected [ 16.853325] [ 16.853440] Memory state around the buggy address: [ 16.853631] ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.853964] ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.854091] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.854211] ^ [ 16.854316] ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.855013] ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.855585] ==================================================================