Date
May 15, 2025, 10:38 a.m.
Environment | |
---|---|
e850-96 |
[ 56.031314] ================================================================== [ 56.038257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 56.045631] Read of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 56.052923] [ 56.054406] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 56.054457] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.054471] Hardware name: WinLink E850-96 board (DT) [ 56.054490] Call trace: [ 56.054503] show_stack+0x20/0x38 (C) [ 56.054536] dump_stack_lvl+0x8c/0xd0 [ 56.054567] print_report+0x118/0x608 [ 56.054599] kasan_report+0xdc/0x128 [ 56.054630] __asan_report_load8_noabort+0x20/0x30 [ 56.054666] kasan_atomics_helper+0x3f58/0x4858 [ 56.054699] kasan_atomics+0x198/0x2e0 [ 56.054729] kunit_try_run_case+0x170/0x3f0 [ 56.054762] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.054798] kthread+0x328/0x630 [ 56.054830] ret_from_fork+0x10/0x20 [ 56.054863] [ 56.122539] Allocated by task 310: [ 56.125928] kasan_save_stack+0x3c/0x68 [ 56.129744] kasan_save_track+0x20/0x40 [ 56.133564] kasan_save_alloc_info+0x40/0x58 [ 56.137817] __kasan_kmalloc+0xd4/0xd8 [ 56.141550] __kmalloc_cache_noprof+0x15c/0x3c0 [ 56.146063] kasan_atomics+0xb8/0x2e0 [ 56.149709] kunit_try_run_case+0x170/0x3f0 [ 56.153876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.159345] kthread+0x328/0x630 [ 56.162556] ret_from_fork+0x10/0x20 [ 56.166115] [ 56.167592] The buggy address belongs to the object at ffff00080243ed00 [ 56.167592] which belongs to the cache kmalloc-64 of size 64 [ 56.179919] The buggy address is located 0 bytes to the right of [ 56.179919] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 56.192764] [ 56.194240] The buggy address belongs to the physical page: [ 56.199798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 56.207783] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.214293] page_type: f5(slab) [ 56.217426] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.225149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.232868] page dumped because: kasan: bad access detected [ 56.238423] [ 56.239899] Memory state around the buggy address: [ 56.244678] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.251882] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.259088] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.266287] ^ [ 56.271065] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.278272] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.285471] ================================================================== [ 60.261671] ================================================================== [ 60.268746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 60.276123] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 60.283502] [ 60.284984] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 60.285033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.285048] Hardware name: WinLink E850-96 board (DT) [ 60.285067] Call trace: [ 60.285081] show_stack+0x20/0x38 (C) [ 60.285114] dump_stack_lvl+0x8c/0xd0 [ 60.285146] print_report+0x118/0x608 [ 60.285179] kasan_report+0xdc/0x128 [ 60.285210] kasan_check_range+0x100/0x1a8 [ 60.285241] __kasan_check_write+0x20/0x30 [ 60.285276] kasan_atomics_helper+0x1414/0x4858 [ 60.285308] kasan_atomics+0x198/0x2e0 [ 60.285339] kunit_try_run_case+0x170/0x3f0 [ 60.285370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.285405] kthread+0x328/0x630 [ 60.285437] ret_from_fork+0x10/0x20 [ 60.285469] [ 60.356503] Allocated by task 310: [ 60.359891] kasan_save_stack+0x3c/0x68 [ 60.363709] kasan_save_track+0x20/0x40 [ 60.367528] kasan_save_alloc_info+0x40/0x58 [ 60.371781] __kasan_kmalloc+0xd4/0xd8 [ 60.375514] __kmalloc_cache_noprof+0x15c/0x3c0 [ 60.380028] kasan_atomics+0xb8/0x2e0 [ 60.383673] kunit_try_run_case+0x170/0x3f0 [ 60.387840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.393309] kthread+0x328/0x630 [ 60.396520] ret_from_fork+0x10/0x20 [ 60.400080] [ 60.401556] The buggy address belongs to the object at ffff00080243ed00 [ 60.401556] which belongs to the cache kmalloc-64 of size 64 [ 60.413883] The buggy address is located 0 bytes to the right of [ 60.413883] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 60.426728] [ 60.428204] The buggy address belongs to the physical page: [ 60.433763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 60.441748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.448257] page_type: f5(slab) [ 60.451389] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.459113] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.466832] page dumped because: kasan: bad access detected [ 60.472387] [ 60.473863] Memory state around the buggy address: [ 60.478644] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.485846] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.493052] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.500251] ^ [ 60.505029] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.512236] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.519435] ================================================================== [ 56.557759] ================================================================== [ 56.564810] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 56.572186] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 56.579564] [ 56.581046] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 56.581095] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.581112] Hardware name: WinLink E850-96 board (DT) [ 56.581134] Call trace: [ 56.581149] show_stack+0x20/0x38 (C) [ 56.581183] dump_stack_lvl+0x8c/0xd0 [ 56.581216] print_report+0x118/0x608 [ 56.581246] kasan_report+0xdc/0x128 [ 56.581278] __asan_report_store8_noabort+0x20/0x30 [ 56.581315] kasan_atomics_helper+0x3e5c/0x4858 [ 56.581348] kasan_atomics+0x198/0x2e0 [ 56.581377] kunit_try_run_case+0x170/0x3f0 [ 56.581407] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.581443] kthread+0x328/0x630 [ 56.581473] ret_from_fork+0x10/0x20 [ 56.581508] [ 56.649268] Allocated by task 310: [ 56.652656] kasan_save_stack+0x3c/0x68 [ 56.656473] kasan_save_track+0x20/0x40 [ 56.660292] kasan_save_alloc_info+0x40/0x58 [ 56.664545] __kasan_kmalloc+0xd4/0xd8 [ 56.668278] __kmalloc_cache_noprof+0x15c/0x3c0 [ 56.672792] kasan_atomics+0xb8/0x2e0 [ 56.676437] kunit_try_run_case+0x170/0x3f0 [ 56.680604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.686073] kthread+0x328/0x630 [ 56.689285] ret_from_fork+0x10/0x20 [ 56.692843] [ 56.694321] The buggy address belongs to the object at ffff00080243ed00 [ 56.694321] which belongs to the cache kmalloc-64 of size 64 [ 56.706647] The buggy address is located 0 bytes to the right of [ 56.706647] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 56.719492] [ 56.720968] The buggy address belongs to the physical page: [ 56.726527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 56.734511] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.741021] page_type: f5(slab) [ 56.744153] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.751877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.759596] page dumped because: kasan: bad access detected [ 56.765151] [ 56.766627] Memory state around the buggy address: [ 56.771405] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.778610] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.785816] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.793015] ^ [ 56.797794] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.805000] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.812199] ================================================================== [ 49.692931] ================================================================== [ 49.699984] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 49.707272] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 49.714650] [ 49.716131] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 49.716180] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.716196] Hardware name: WinLink E850-96 board (DT) [ 49.716216] Call trace: [ 49.716231] show_stack+0x20/0x38 (C) [ 49.716263] dump_stack_lvl+0x8c/0xd0 [ 49.716295] print_report+0x118/0x608 [ 49.716326] kasan_report+0xdc/0x128 [ 49.716355] kasan_check_range+0x100/0x1a8 [ 49.716389] __kasan_check_write+0x20/0x30 [ 49.716425] kasan_atomics_helper+0x54c/0x4858 [ 49.716457] kasan_atomics+0x198/0x2e0 [ 49.716487] kunit_try_run_case+0x170/0x3f0 [ 49.716519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.716553] kthread+0x328/0x630 [ 49.716584] ret_from_fork+0x10/0x20 [ 49.716615] [ 49.787565] Allocated by task 310: [ 49.790953] kasan_save_stack+0x3c/0x68 [ 49.794770] kasan_save_track+0x20/0x40 [ 49.798589] kasan_save_alloc_info+0x40/0x58 [ 49.802843] __kasan_kmalloc+0xd4/0xd8 [ 49.806575] __kmalloc_cache_noprof+0x15c/0x3c0 [ 49.811089] kasan_atomics+0xb8/0x2e0 [ 49.814735] kunit_try_run_case+0x170/0x3f0 [ 49.818901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.824370] kthread+0x328/0x630 [ 49.827582] ret_from_fork+0x10/0x20 [ 49.831141] [ 49.832616] The buggy address belongs to the object at ffff00080243ed00 [ 49.832616] which belongs to the cache kmalloc-64 of size 64 [ 49.844945] The buggy address is located 0 bytes to the right of [ 49.844945] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 49.857790] [ 49.859266] The buggy address belongs to the physical page: [ 49.864825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 49.872809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.879317] page_type: f5(slab) [ 49.882450] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.890175] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.897893] page dumped because: kasan: bad access detected [ 49.903448] [ 49.904924] Memory state around the buggy address: [ 49.909703] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.916907] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.924112] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.931313] ^ [ 49.936091] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.943296] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.950496] ================================================================== [ 51.282498] ================================================================== [ 51.289542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 51.296831] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 51.304209] [ 51.305692] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 51.305740] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.305756] Hardware name: WinLink E850-96 board (DT) [ 51.305776] Call trace: [ 51.305789] show_stack+0x20/0x38 (C) [ 51.305822] dump_stack_lvl+0x8c/0xd0 [ 51.305851] print_report+0x118/0x608 [ 51.305881] kasan_report+0xdc/0x128 [ 51.305911] kasan_check_range+0x100/0x1a8 [ 51.305944] __kasan_check_write+0x20/0x30 [ 51.305976] kasan_atomics_helper+0x7cc/0x4858 [ 51.306008] kasan_atomics+0x198/0x2e0 [ 51.306036] kunit_try_run_case+0x170/0x3f0 [ 51.306069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.306105] kthread+0x328/0x630 [ 51.306135] ret_from_fork+0x10/0x20 [ 51.306166] [ 51.377124] Allocated by task 310: [ 51.380512] kasan_save_stack+0x3c/0x68 [ 51.384329] kasan_save_track+0x20/0x40 [ 51.388149] kasan_save_alloc_info+0x40/0x58 [ 51.392402] __kasan_kmalloc+0xd4/0xd8 [ 51.396135] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.400648] kasan_atomics+0xb8/0x2e0 [ 51.404294] kunit_try_run_case+0x170/0x3f0 [ 51.408461] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.413930] kthread+0x328/0x630 [ 51.417141] ret_from_fork+0x10/0x20 [ 51.420700] [ 51.422176] The buggy address belongs to the object at ffff00080243ed00 [ 51.422176] which belongs to the cache kmalloc-64 of size 64 [ 51.434502] The buggy address is located 0 bytes to the right of [ 51.434502] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 51.447349] [ 51.448825] The buggy address belongs to the physical page: [ 51.454384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 51.462368] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.468878] page_type: f5(slab) [ 51.472009] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.479734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.487453] page dumped because: kasan: bad access detected [ 51.493008] [ 51.494484] Memory state around the buggy address: [ 51.499263] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.506467] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.513671] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.520873] ^ [ 51.525651] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.532857] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.540056] ================================================================== [ 47.315147] ================================================================== [ 47.322240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 47.329530] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 47.336908] [ 47.338390] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 47.338443] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.338460] Hardware name: WinLink E850-96 board (DT) [ 47.338479] Call trace: [ 47.338495] show_stack+0x20/0x38 (C) [ 47.338530] dump_stack_lvl+0x8c/0xd0 [ 47.338561] print_report+0x118/0x608 [ 47.338594] kasan_report+0xdc/0x128 [ 47.338627] kasan_check_range+0x100/0x1a8 [ 47.338658] __kasan_check_write+0x20/0x30 [ 47.338693] kasan_atomics_helper+0x24c/0x4858 [ 47.338725] kasan_atomics+0x198/0x2e0 [ 47.338754] kunit_try_run_case+0x170/0x3f0 [ 47.338789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.338824] kthread+0x328/0x630 [ 47.338856] ret_from_fork+0x10/0x20 [ 47.338887] [ 47.409823] Allocated by task 310: [ 47.413210] kasan_save_stack+0x3c/0x68 [ 47.417028] kasan_save_track+0x20/0x40 [ 47.420847] kasan_save_alloc_info+0x40/0x58 [ 47.425101] __kasan_kmalloc+0xd4/0xd8 [ 47.428834] __kmalloc_cache_noprof+0x15c/0x3c0 [ 47.433347] kasan_atomics+0xb8/0x2e0 [ 47.436993] kunit_try_run_case+0x170/0x3f0 [ 47.441160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.446628] kthread+0x328/0x630 [ 47.449840] ret_from_fork+0x10/0x20 [ 47.453399] [ 47.454876] The buggy address belongs to the object at ffff00080243ed00 [ 47.454876] which belongs to the cache kmalloc-64 of size 64 [ 47.467203] The buggy address is located 0 bytes to the right of [ 47.467203] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 47.480048] [ 47.481524] The buggy address belongs to the physical page: [ 47.487083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 47.495067] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.501577] page_type: f5(slab) [ 47.504708] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.512432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.520151] page dumped because: kasan: bad access detected [ 47.525707] [ 47.527182] Memory state around the buggy address: [ 47.531962] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.539165] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.546370] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.553571] ^ [ 47.558349] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.565555] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.572755] ================================================================== [ 48.371488] ================================================================== [ 48.378475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 48.385850] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 48.393229] [ 48.394710] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 48.394763] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.394777] Hardware name: WinLink E850-96 board (DT) [ 48.394796] Call trace: [ 48.394811] show_stack+0x20/0x38 (C) [ 48.394842] dump_stack_lvl+0x8c/0xd0 [ 48.394875] print_report+0x118/0x608 [ 48.394905] kasan_report+0xdc/0x128 [ 48.394938] __asan_report_store4_noabort+0x20/0x30 [ 48.394978] kasan_atomics_helper+0x3f94/0x4858 [ 48.395009] kasan_atomics+0x198/0x2e0 [ 48.395037] kunit_try_run_case+0x170/0x3f0 [ 48.395067] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.395101] kthread+0x328/0x630 [ 48.395133] ret_from_fork+0x10/0x20 [ 48.395166] [ 48.462932] Allocated by task 310: [ 48.466320] kasan_save_stack+0x3c/0x68 [ 48.470137] kasan_save_track+0x20/0x40 [ 48.473957] kasan_save_alloc_info+0x40/0x58 [ 48.478210] __kasan_kmalloc+0xd4/0xd8 [ 48.481942] __kmalloc_cache_noprof+0x15c/0x3c0 [ 48.486456] kasan_atomics+0xb8/0x2e0 [ 48.490102] kunit_try_run_case+0x170/0x3f0 [ 48.494268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.499737] kthread+0x328/0x630 [ 48.502949] ret_from_fork+0x10/0x20 [ 48.506508] [ 48.507985] The buggy address belongs to the object at ffff00080243ed00 [ 48.507985] which belongs to the cache kmalloc-64 of size 64 [ 48.520310] The buggy address is located 0 bytes to the right of [ 48.520310] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 48.533157] [ 48.534633] The buggy address belongs to the physical page: [ 48.540191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 48.548176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.554686] page_type: f5(slab) [ 48.557817] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.565542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.573261] page dumped because: kasan: bad access detected [ 48.578816] [ 48.580291] Memory state around the buggy address: [ 48.585070] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.592274] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.599479] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.606680] ^ [ 48.611458] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.618664] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.625864] ================================================================== [ 51.017638] ================================================================== [ 51.024616] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 51.031905] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 51.039283] [ 51.040765] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 51.040817] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.040833] Hardware name: WinLink E850-96 board (DT) [ 51.040854] Call trace: [ 51.040867] show_stack+0x20/0x38 (C) [ 51.040902] dump_stack_lvl+0x8c/0xd0 [ 51.040933] print_report+0x118/0x608 [ 51.040966] kasan_report+0xdc/0x128 [ 51.040998] kasan_check_range+0x100/0x1a8 [ 51.041030] __kasan_check_write+0x20/0x30 [ 51.041066] kasan_atomics_helper+0x760/0x4858 [ 51.041096] kasan_atomics+0x198/0x2e0 [ 51.041126] kunit_try_run_case+0x170/0x3f0 [ 51.041157] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.041192] kthread+0x328/0x630 [ 51.041226] ret_from_fork+0x10/0x20 [ 51.041256] [ 51.112197] Allocated by task 310: [ 51.115585] kasan_save_stack+0x3c/0x68 [ 51.119403] kasan_save_track+0x20/0x40 [ 51.123222] kasan_save_alloc_info+0x40/0x58 [ 51.127476] __kasan_kmalloc+0xd4/0xd8 [ 51.131208] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.135722] kasan_atomics+0xb8/0x2e0 [ 51.139368] kunit_try_run_case+0x170/0x3f0 [ 51.143534] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.149003] kthread+0x328/0x630 [ 51.152215] ret_from_fork+0x10/0x20 [ 51.155773] [ 51.157251] The buggy address belongs to the object at ffff00080243ed00 [ 51.157251] which belongs to the cache kmalloc-64 of size 64 [ 51.169578] The buggy address is located 0 bytes to the right of [ 51.169578] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 51.182423] [ 51.183899] The buggy address belongs to the physical page: [ 51.189457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 51.197442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.203951] page_type: f5(slab) [ 51.207083] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.214807] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.222526] page dumped because: kasan: bad access detected [ 51.228082] [ 51.229557] Memory state around the buggy address: [ 51.234337] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.241540] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.248745] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.255946] ^ [ 51.260724] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.267930] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.275130] ================================================================== [ 50.222786] ================================================================== [ 50.229837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 50.237125] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 50.244503] [ 50.245984] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 50.246035] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.246052] Hardware name: WinLink E850-96 board (DT) [ 50.246072] Call trace: [ 50.246086] show_stack+0x20/0x38 (C) [ 50.246116] dump_stack_lvl+0x8c/0xd0 [ 50.246147] print_report+0x118/0x608 [ 50.246177] kasan_report+0xdc/0x128 [ 50.246206] kasan_check_range+0x100/0x1a8 [ 50.246240] __kasan_check_write+0x20/0x30 [ 50.246274] kasan_atomics_helper+0x61c/0x4858 [ 50.246307] kasan_atomics+0x198/0x2e0 [ 50.246335] kunit_try_run_case+0x170/0x3f0 [ 50.246369] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.246404] kthread+0x328/0x630 [ 50.246435] ret_from_fork+0x10/0x20 [ 50.246465] [ 50.317418] Allocated by task 310: [ 50.320804] kasan_save_stack+0x3c/0x68 [ 50.324623] kasan_save_track+0x20/0x40 [ 50.328443] kasan_save_alloc_info+0x40/0x58 [ 50.332696] __kasan_kmalloc+0xd4/0xd8 [ 50.336429] __kmalloc_cache_noprof+0x15c/0x3c0 [ 50.340942] kasan_atomics+0xb8/0x2e0 [ 50.344588] kunit_try_run_case+0x170/0x3f0 [ 50.348755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.354223] kthread+0x328/0x630 [ 50.357435] ret_from_fork+0x10/0x20 [ 50.360994] [ 50.362471] The buggy address belongs to the object at ffff00080243ed00 [ 50.362471] which belongs to the cache kmalloc-64 of size 64 [ 50.374798] The buggy address is located 0 bytes to the right of [ 50.374798] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 50.387643] [ 50.389119] The buggy address belongs to the physical page: [ 50.394678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 50.402662] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.409172] page_type: f5(slab) [ 50.412303] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.420028] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.427746] page dumped because: kasan: bad access detected [ 50.433302] [ 50.434777] Memory state around the buggy address: [ 50.439555] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.446760] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.453965] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.461166] ^ [ 50.465944] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.473150] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.480350] ================================================================== [ 54.978375] ================================================================== [ 54.985322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 54.992695] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 54.999987] [ 55.001470] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 55.001521] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.001537] Hardware name: WinLink E850-96 board (DT) [ 55.001558] Call trace: [ 55.001573] show_stack+0x20/0x38 (C) [ 55.001607] dump_stack_lvl+0x8c/0xd0 [ 55.001639] print_report+0x118/0x608 [ 55.001672] kasan_report+0xdc/0x128 [ 55.001703] __asan_report_load4_noabort+0x20/0x30 [ 55.001740] kasan_atomics_helper+0x3dd8/0x4858 [ 55.001773] kasan_atomics+0x198/0x2e0 [ 55.001803] kunit_try_run_case+0x170/0x3f0 [ 55.001836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.001872] kthread+0x328/0x630 [ 55.001903] ret_from_fork+0x10/0x20 [ 55.001935] [ 55.069605] Allocated by task 310: [ 55.072991] kasan_save_stack+0x3c/0x68 [ 55.076808] kasan_save_track+0x20/0x40 [ 55.080628] kasan_save_alloc_info+0x40/0x58 [ 55.084882] __kasan_kmalloc+0xd4/0xd8 [ 55.088614] __kmalloc_cache_noprof+0x15c/0x3c0 [ 55.093128] kasan_atomics+0xb8/0x2e0 [ 55.096774] kunit_try_run_case+0x170/0x3f0 [ 55.100940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.106409] kthread+0x328/0x630 [ 55.109621] ret_from_fork+0x10/0x20 [ 55.113180] [ 55.114655] The buggy address belongs to the object at ffff00080243ed00 [ 55.114655] which belongs to the cache kmalloc-64 of size 64 [ 55.126983] The buggy address is located 0 bytes to the right of [ 55.126983] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 55.139828] [ 55.141305] The buggy address belongs to the physical page: [ 55.146864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 55.154847] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.161356] page_type: f5(slab) [ 55.164489] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.172213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.179932] page dumped because: kasan: bad access detected [ 55.185487] [ 55.186963] Memory state around the buggy address: [ 55.191745] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.198946] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.206151] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.213352] ^ [ 55.218130] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.225336] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.232536] ================================================================== [ 59.469895] ================================================================== [ 59.476922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 59.484295] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 59.491673] [ 59.493155] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 59.493204] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.493219] Hardware name: WinLink E850-96 board (DT) [ 59.493237] Call trace: [ 59.493252] show_stack+0x20/0x38 (C) [ 59.493285] dump_stack_lvl+0x8c/0xd0 [ 59.493318] print_report+0x118/0x608 [ 59.493348] kasan_report+0xdc/0x128 [ 59.493379] kasan_check_range+0x100/0x1a8 [ 59.493412] __kasan_check_write+0x20/0x30 [ 59.493449] kasan_atomics_helper+0x12d8/0x4858 [ 59.493480] kasan_atomics+0x198/0x2e0 [ 59.493509] kunit_try_run_case+0x170/0x3f0 [ 59.493540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.493575] kthread+0x328/0x630 [ 59.493605] ret_from_fork+0x10/0x20 [ 59.493638] [ 59.564675] Allocated by task 310: [ 59.568062] kasan_save_stack+0x3c/0x68 [ 59.571880] kasan_save_track+0x20/0x40 [ 59.575700] kasan_save_alloc_info+0x40/0x58 [ 59.579953] __kasan_kmalloc+0xd4/0xd8 [ 59.583686] __kmalloc_cache_noprof+0x15c/0x3c0 [ 59.588199] kasan_atomics+0xb8/0x2e0 [ 59.591845] kunit_try_run_case+0x170/0x3f0 [ 59.596012] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.601480] kthread+0x328/0x630 [ 59.604692] ret_from_fork+0x10/0x20 [ 59.608251] [ 59.609728] The buggy address belongs to the object at ffff00080243ed00 [ 59.609728] which belongs to the cache kmalloc-64 of size 64 [ 59.622056] The buggy address is located 0 bytes to the right of [ 59.622056] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 59.634900] [ 59.636376] The buggy address belongs to the physical page: [ 59.641935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 59.649920] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.656427] page_type: f5(slab) [ 59.659562] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.667284] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.675004] page dumped because: kasan: bad access detected [ 59.680559] [ 59.682034] Memory state around the buggy address: [ 59.686814] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.694017] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.701222] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.708423] ^ [ 59.713201] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.720408] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.727607] ================================================================== [ 57.084535] ================================================================== [ 57.091539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 57.098827] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 57.106205] [ 57.107688] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 57.107738] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.107755] Hardware name: WinLink E850-96 board (DT) [ 57.107774] Call trace: [ 57.107789] show_stack+0x20/0x38 (C) [ 57.107821] dump_stack_lvl+0x8c/0xd0 [ 57.107851] print_report+0x118/0x608 [ 57.107883] kasan_report+0xdc/0x128 [ 57.107915] kasan_check_range+0x100/0x1a8 [ 57.107949] __kasan_check_write+0x20/0x30 [ 57.107980] kasan_atomics_helper+0xf20/0x4858 [ 57.108012] kasan_atomics+0x198/0x2e0 [ 57.108040] kunit_try_run_case+0x170/0x3f0 [ 57.108074] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.108112] kthread+0x328/0x630 [ 57.108143] ret_from_fork+0x10/0x20 [ 57.108174] [ 57.179121] Allocated by task 310: [ 57.182508] kasan_save_stack+0x3c/0x68 [ 57.186326] kasan_save_track+0x20/0x40 [ 57.190145] kasan_save_alloc_info+0x40/0x58 [ 57.194399] __kasan_kmalloc+0xd4/0xd8 [ 57.198131] __kmalloc_cache_noprof+0x15c/0x3c0 [ 57.202645] kasan_atomics+0xb8/0x2e0 [ 57.206291] kunit_try_run_case+0x170/0x3f0 [ 57.210457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.215926] kthread+0x328/0x630 [ 57.219137] ret_from_fork+0x10/0x20 [ 57.222697] [ 57.224172] The buggy address belongs to the object at ffff00080243ed00 [ 57.224172] which belongs to the cache kmalloc-64 of size 64 [ 57.236500] The buggy address is located 0 bytes to the right of [ 57.236500] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 57.249346] [ 57.250823] The buggy address belongs to the physical page: [ 57.256379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 57.264365] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.270873] page_type: f5(slab) [ 57.274007] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.281730] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.289449] page dumped because: kasan: bad access detected [ 57.295004] [ 57.296480] Memory state around the buggy address: [ 57.301260] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.308463] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.315667] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.322869] ^ [ 57.327647] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.334853] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.342053] ================================================================== [ 53.660267] ================================================================== [ 53.667283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 53.674573] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 53.681951] [ 53.683432] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 53.683482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.683500] Hardware name: WinLink E850-96 board (DT) [ 53.683519] Call trace: [ 53.683535] show_stack+0x20/0x38 (C) [ 53.683568] dump_stack_lvl+0x8c/0xd0 [ 53.683599] print_report+0x118/0x608 [ 53.683632] kasan_report+0xdc/0x128 [ 53.683662] kasan_check_range+0x100/0x1a8 [ 53.683695] __kasan_check_write+0x20/0x30 [ 53.683730] kasan_atomics_helper+0xb70/0x4858 [ 53.683763] kasan_atomics+0x198/0x2e0 [ 53.683794] kunit_try_run_case+0x170/0x3f0 [ 53.683821] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.683858] kthread+0x328/0x630 [ 53.683890] ret_from_fork+0x10/0x20 [ 53.683919] [ 53.754866] Allocated by task 310: [ 53.758254] kasan_save_stack+0x3c/0x68 [ 53.762071] kasan_save_track+0x20/0x40 [ 53.765891] kasan_save_alloc_info+0x40/0x58 [ 53.770144] __kasan_kmalloc+0xd4/0xd8 [ 53.773877] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.778390] kasan_atomics+0xb8/0x2e0 [ 53.782037] kunit_try_run_case+0x170/0x3f0 [ 53.786203] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.791672] kthread+0x328/0x630 [ 53.794883] ret_from_fork+0x10/0x20 [ 53.798443] [ 53.799918] The buggy address belongs to the object at ffff00080243ed00 [ 53.799918] which belongs to the cache kmalloc-64 of size 64 [ 53.812246] The buggy address is located 0 bytes to the right of [ 53.812246] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 53.825091] [ 53.826567] The buggy address belongs to the physical page: [ 53.832125] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 53.840109] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.846619] page_type: f5(slab) [ 53.849752] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.857476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.865195] page dumped because: kasan: bad access detected [ 53.870750] [ 53.872226] Memory state around the buggy address: [ 53.877006] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.884209] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.891414] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.898615] ^ [ 53.903393] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.910598] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.917798] ================================================================== [ 58.674540] ================================================================== [ 58.681617] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 58.688994] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 58.696372] [ 58.697855] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 58.697906] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.697921] Hardware name: WinLink E850-96 board (DT) [ 58.697942] Call trace: [ 58.697954] show_stack+0x20/0x38 (C) [ 58.697984] dump_stack_lvl+0x8c/0xd0 [ 58.698016] print_report+0x118/0x608 [ 58.698048] kasan_report+0xdc/0x128 [ 58.698077] kasan_check_range+0x100/0x1a8 [ 58.698111] __kasan_check_write+0x20/0x30 [ 58.698147] kasan_atomics_helper+0x1190/0x4858 [ 58.698178] kasan_atomics+0x198/0x2e0 [ 58.698208] kunit_try_run_case+0x170/0x3f0 [ 58.698239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.698276] kthread+0x328/0x630 [ 58.698308] ret_from_fork+0x10/0x20 [ 58.698339] [ 58.769374] Allocated by task 310: [ 58.772762] kasan_save_stack+0x3c/0x68 [ 58.776580] kasan_save_track+0x20/0x40 [ 58.780399] kasan_save_alloc_info+0x40/0x58 [ 58.784652] __kasan_kmalloc+0xd4/0xd8 [ 58.788385] __kmalloc_cache_noprof+0x15c/0x3c0 [ 58.792899] kasan_atomics+0xb8/0x2e0 [ 58.796545] kunit_try_run_case+0x170/0x3f0 [ 58.800711] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.806179] kthread+0x328/0x630 [ 58.809391] ret_from_fork+0x10/0x20 [ 58.812951] [ 58.814426] The buggy address belongs to the object at ffff00080243ed00 [ 58.814426] which belongs to the cache kmalloc-64 of size 64 [ 58.826754] The buggy address is located 0 bytes to the right of [ 58.826754] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 58.839599] [ 58.841075] The buggy address belongs to the physical page: [ 58.846634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 58.854619] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.861127] page_type: f5(slab) [ 58.864260] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.871984] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.879703] page dumped because: kasan: bad access detected [ 58.885258] [ 58.886734] Memory state around the buggy address: [ 58.891512] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.898717] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.905921] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.913123] ^ [ 58.917901] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.925107] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.932307] ================================================================== [ 61.057073] ================================================================== [ 61.064048] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 61.071424] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 61.078802] [ 61.080284] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 61.080333] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.080350] Hardware name: WinLink E850-96 board (DT) [ 61.080370] Call trace: [ 61.080385] show_stack+0x20/0x38 (C) [ 61.080418] dump_stack_lvl+0x8c/0xd0 [ 61.080448] print_report+0x118/0x608 [ 61.080482] kasan_report+0xdc/0x128 [ 61.080514] kasan_check_range+0x100/0x1a8 [ 61.080546] __kasan_check_write+0x20/0x30 [ 61.080582] kasan_atomics_helper+0x154c/0x4858 [ 61.080614] kasan_atomics+0x198/0x2e0 [ 61.080643] kunit_try_run_case+0x170/0x3f0 [ 61.080674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.080710] kthread+0x328/0x630 [ 61.080743] ret_from_fork+0x10/0x20 [ 61.080775] [ 61.151804] Allocated by task 310: [ 61.155191] kasan_save_stack+0x3c/0x68 [ 61.159009] kasan_save_track+0x20/0x40 [ 61.162829] kasan_save_alloc_info+0x40/0x58 [ 61.167082] __kasan_kmalloc+0xd4/0xd8 [ 61.170814] __kmalloc_cache_noprof+0x15c/0x3c0 [ 61.175328] kasan_atomics+0xb8/0x2e0 [ 61.178974] kunit_try_run_case+0x170/0x3f0 [ 61.183141] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.188609] kthread+0x328/0x630 [ 61.191821] ret_from_fork+0x10/0x20 [ 61.195380] [ 61.196857] The buggy address belongs to the object at ffff00080243ed00 [ 61.196857] which belongs to the cache kmalloc-64 of size 64 [ 61.209182] The buggy address is located 0 bytes to the right of [ 61.209182] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 61.222029] [ 61.223505] The buggy address belongs to the physical page: [ 61.229063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 61.237048] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.243558] page_type: f5(slab) [ 61.246689] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 61.254413] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.262132] page dumped because: kasan: bad access detected [ 61.267688] [ 61.269163] Memory state around the buggy address: [ 61.273943] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.281147] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.288351] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.295552] ^ [ 61.300330] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.307536] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.314736] ================================================================== [ 57.879293] ================================================================== [ 57.886317] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 57.893694] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 57.901072] [ 57.902553] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 57.902601] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.902619] Hardware name: WinLink E850-96 board (DT) [ 57.902638] Call trace: [ 57.902653] show_stack+0x20/0x38 (C) [ 57.902687] dump_stack_lvl+0x8c/0xd0 [ 57.902719] print_report+0x118/0x608 [ 57.902750] kasan_report+0xdc/0x128 [ 57.902781] kasan_check_range+0x100/0x1a8 [ 57.902814] __kasan_check_write+0x20/0x30 [ 57.902848] kasan_atomics_helper+0x1058/0x4858 [ 57.902880] kasan_atomics+0x198/0x2e0 [ 57.902908] kunit_try_run_case+0x170/0x3f0 [ 57.902937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.902973] kthread+0x328/0x630 [ 57.903003] ret_from_fork+0x10/0x20 [ 57.903034] [ 57.974074] Allocated by task 310: [ 57.977461] kasan_save_stack+0x3c/0x68 [ 57.981279] kasan_save_track+0x20/0x40 [ 57.985098] kasan_save_alloc_info+0x40/0x58 [ 57.989352] __kasan_kmalloc+0xd4/0xd8 [ 57.993085] __kmalloc_cache_noprof+0x15c/0x3c0 [ 57.997598] kasan_atomics+0xb8/0x2e0 [ 58.001244] kunit_try_run_case+0x170/0x3f0 [ 58.005410] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.010879] kthread+0x328/0x630 [ 58.014091] ret_from_fork+0x10/0x20 [ 58.017650] [ 58.019125] The buggy address belongs to the object at ffff00080243ed00 [ 58.019125] which belongs to the cache kmalloc-64 of size 64 [ 58.031452] The buggy address is located 0 bytes to the right of [ 58.031452] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 58.044299] [ 58.045775] The buggy address belongs to the physical page: [ 58.051334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 58.059317] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.065827] page_type: f5(slab) [ 58.068959] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.076683] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.084402] page dumped because: kasan: bad access detected [ 58.089958] [ 58.091433] Memory state around the buggy address: [ 58.096212] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.103417] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.110621] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.117822] ^ [ 58.122600] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.129806] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.137006] ================================================================== [ 49.957962] ================================================================== [ 49.964914] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 49.972198] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 49.979576] [ 49.981059] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 49.981111] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.981129] Hardware name: WinLink E850-96 board (DT) [ 49.981150] Call trace: [ 49.981165] show_stack+0x20/0x38 (C) [ 49.981199] dump_stack_lvl+0x8c/0xd0 [ 49.981230] print_report+0x118/0x608 [ 49.981262] kasan_report+0xdc/0x128 [ 49.981295] kasan_check_range+0x100/0x1a8 [ 49.981328] __kasan_check_write+0x20/0x30 [ 49.981364] kasan_atomics_helper+0x5b4/0x4858 [ 49.981395] kasan_atomics+0x198/0x2e0 [ 49.981425] kunit_try_run_case+0x170/0x3f0 [ 49.981454] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.981489] kthread+0x328/0x630 [ 49.981521] ret_from_fork+0x10/0x20 [ 49.981554] [ 50.052492] Allocated by task 310: [ 50.055879] kasan_save_stack+0x3c/0x68 [ 50.059696] kasan_save_track+0x20/0x40 [ 50.063516] kasan_save_alloc_info+0x40/0x58 [ 50.067770] __kasan_kmalloc+0xd4/0xd8 [ 50.071502] __kmalloc_cache_noprof+0x15c/0x3c0 [ 50.076016] kasan_atomics+0xb8/0x2e0 [ 50.079662] kunit_try_run_case+0x170/0x3f0 [ 50.083828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.089296] kthread+0x328/0x630 [ 50.092509] ret_from_fork+0x10/0x20 [ 50.096068] [ 50.097544] The buggy address belongs to the object at ffff00080243ed00 [ 50.097544] which belongs to the cache kmalloc-64 of size 64 [ 50.109871] The buggy address is located 0 bytes to the right of [ 50.109871] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 50.122717] [ 50.124192] The buggy address belongs to the physical page: [ 50.129752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 50.137736] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.144245] page_type: f5(slab) [ 50.147377] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.155101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.162820] page dumped because: kasan: bad access detected [ 50.168375] [ 50.169851] Memory state around the buggy address: [ 50.174633] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.181834] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.189039] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.196240] ^ [ 50.201018] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.208224] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.215423] ================================================================== [ 54.713339] ================================================================== [ 54.720392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 54.727682] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 54.735061] [ 54.736543] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 54.736597] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.736612] Hardware name: WinLink E850-96 board (DT) [ 54.736634] Call trace: [ 54.736647] show_stack+0x20/0x38 (C) [ 54.736676] dump_stack_lvl+0x8c/0xd0 [ 54.736709] print_report+0x118/0x608 [ 54.736739] kasan_report+0xdc/0x128 [ 54.736770] kasan_check_range+0x100/0x1a8 [ 54.736803] __kasan_check_write+0x20/0x30 [ 54.736836] kasan_atomics_helper+0xca0/0x4858 [ 54.736869] kasan_atomics+0x198/0x2e0 [ 54.736898] kunit_try_run_case+0x170/0x3f0 [ 54.736928] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.736962] kthread+0x328/0x630 [ 54.736993] ret_from_fork+0x10/0x20 [ 54.737025] [ 54.807975] Allocated by task 310: [ 54.811363] kasan_save_stack+0x3c/0x68 [ 54.815181] kasan_save_track+0x20/0x40 [ 54.819000] kasan_save_alloc_info+0x40/0x58 [ 54.823253] __kasan_kmalloc+0xd4/0xd8 [ 54.826986] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.831500] kasan_atomics+0xb8/0x2e0 [ 54.835145] kunit_try_run_case+0x170/0x3f0 [ 54.839312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.844781] kthread+0x328/0x630 [ 54.847993] ret_from_fork+0x10/0x20 [ 54.851552] [ 54.853029] The buggy address belongs to the object at ffff00080243ed00 [ 54.853029] which belongs to the cache kmalloc-64 of size 64 [ 54.865355] The buggy address is located 0 bytes to the right of [ 54.865355] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 54.878201] [ 54.879676] The buggy address belongs to the physical page: [ 54.885235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 54.893218] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.899730] page_type: f5(slab) [ 54.902861] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.910585] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.918304] page dumped because: kasan: bad access detected [ 54.923860] [ 54.925335] Memory state around the buggy address: [ 54.930113] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.937318] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.944522] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.951724] ^ [ 54.956501] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.963708] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.970908] ================================================================== [ 48.898219] ================================================================== [ 48.905202] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 48.912492] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 48.919870] [ 48.921351] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 48.921398] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.921415] Hardware name: WinLink E850-96 board (DT) [ 48.921433] Call trace: [ 48.921447] show_stack+0x20/0x38 (C) [ 48.921482] dump_stack_lvl+0x8c/0xd0 [ 48.921513] print_report+0x118/0x608 [ 48.921545] kasan_report+0xdc/0x128 [ 48.921575] kasan_check_range+0x100/0x1a8 [ 48.921609] __kasan_check_write+0x20/0x30 [ 48.921643] kasan_atomics_helper+0x414/0x4858 [ 48.921673] kasan_atomics+0x198/0x2e0 [ 48.921702] kunit_try_run_case+0x170/0x3f0 [ 48.921732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.921765] kthread+0x328/0x630 [ 48.921798] ret_from_fork+0x10/0x20 [ 48.921829] [ 48.992785] Allocated by task 310: [ 48.996173] kasan_save_stack+0x3c/0x68 [ 48.999990] kasan_save_track+0x20/0x40 [ 49.003810] kasan_save_alloc_info+0x40/0x58 [ 49.008063] __kasan_kmalloc+0xd4/0xd8 [ 49.011796] __kmalloc_cache_noprof+0x15c/0x3c0 [ 49.016309] kasan_atomics+0xb8/0x2e0 [ 49.019955] kunit_try_run_case+0x170/0x3f0 [ 49.024122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.029590] kthread+0x328/0x630 [ 49.032802] ret_from_fork+0x10/0x20 [ 49.036361] [ 49.037838] The buggy address belongs to the object at ffff00080243ed00 [ 49.037838] which belongs to the cache kmalloc-64 of size 64 [ 49.050165] The buggy address is located 0 bytes to the right of [ 49.050165] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 49.063010] [ 49.064486] The buggy address belongs to the physical page: [ 49.070044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 49.078029] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.084537] page_type: f5(slab) [ 49.087670] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.095395] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.103114] page dumped because: kasan: bad access detected [ 49.108669] [ 49.110144] Memory state around the buggy address: [ 49.114923] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.122127] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.129332] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.136533] ^ [ 49.141311] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.148517] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.155717] ================================================================== [ 50.487739] ================================================================== [ 50.494761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 50.502051] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 50.509430] [ 50.510911] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 50.510959] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.510976] Hardware name: WinLink E850-96 board (DT) [ 50.510995] Call trace: [ 50.511006] show_stack+0x20/0x38 (C) [ 50.511038] dump_stack_lvl+0x8c/0xd0 [ 50.511069] print_report+0x118/0x608 [ 50.511101] kasan_report+0xdc/0x128 [ 50.511131] kasan_check_range+0x100/0x1a8 [ 50.511164] __kasan_check_write+0x20/0x30 [ 50.511198] kasan_atomics_helper+0x684/0x4858 [ 50.511228] kasan_atomics+0x198/0x2e0 [ 50.511256] kunit_try_run_case+0x170/0x3f0 [ 50.511286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.511321] kthread+0x328/0x630 [ 50.511353] ret_from_fork+0x10/0x20 [ 50.511382] [ 50.582345] Allocated by task 310: [ 50.585732] kasan_save_stack+0x3c/0x68 [ 50.589550] kasan_save_track+0x20/0x40 [ 50.593369] kasan_save_alloc_info+0x40/0x58 [ 50.597622] __kasan_kmalloc+0xd4/0xd8 [ 50.601355] __kmalloc_cache_noprof+0x15c/0x3c0 [ 50.605869] kasan_atomics+0xb8/0x2e0 [ 50.609515] kunit_try_run_case+0x170/0x3f0 [ 50.613681] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.619150] kthread+0x328/0x630 [ 50.622362] ret_from_fork+0x10/0x20 [ 50.625921] [ 50.627398] The buggy address belongs to the object at ffff00080243ed00 [ 50.627398] which belongs to the cache kmalloc-64 of size 64 [ 50.639723] The buggy address is located 0 bytes to the right of [ 50.639723] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 50.652569] [ 50.654045] The buggy address belongs to the physical page: [ 50.659604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 50.667588] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.674098] page_type: f5(slab) [ 50.677230] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.684954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.692673] page dumped because: kasan: bad access detected [ 50.698228] [ 50.699704] Memory state around the buggy address: [ 50.704482] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.711687] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.718892] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.726092] ^ [ 50.730871] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.738077] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.745276] ================================================================== [ 55.766428] ================================================================== [ 55.773501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 55.780792] Read of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 55.788083] [ 55.789566] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 55.789615] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.789631] Hardware name: WinLink E850-96 board (DT) [ 55.789650] Call trace: [ 55.789661] show_stack+0x20/0x38 (C) [ 55.789694] dump_stack_lvl+0x8c/0xd0 [ 55.789724] print_report+0x118/0x608 [ 55.789755] kasan_report+0xdc/0x128 [ 55.789787] kasan_check_range+0x100/0x1a8 [ 55.789820] __kasan_check_read+0x20/0x30 [ 55.789855] kasan_atomics_helper+0xdd4/0x4858 [ 55.789886] kasan_atomics+0x198/0x2e0 [ 55.789916] kunit_try_run_case+0x170/0x3f0 [ 55.789946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.789981] kthread+0x328/0x630 [ 55.790015] ret_from_fork+0x10/0x20 [ 55.790048] [ 55.860913] Allocated by task 310: [ 55.864299] kasan_save_stack+0x3c/0x68 [ 55.868116] kasan_save_track+0x20/0x40 [ 55.871936] kasan_save_alloc_info+0x40/0x58 [ 55.876189] __kasan_kmalloc+0xd4/0xd8 [ 55.879922] __kmalloc_cache_noprof+0x15c/0x3c0 [ 55.884435] kasan_atomics+0xb8/0x2e0 [ 55.888081] kunit_try_run_case+0x170/0x3f0 [ 55.892248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.897716] kthread+0x328/0x630 [ 55.900928] ret_from_fork+0x10/0x20 [ 55.904487] [ 55.905964] The buggy address belongs to the object at ffff00080243ed00 [ 55.905964] which belongs to the cache kmalloc-64 of size 64 [ 55.918293] The buggy address is located 0 bytes to the right of [ 55.918293] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 55.931136] [ 55.932612] The buggy address belongs to the physical page: [ 55.938171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 55.946155] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.952665] page_type: f5(slab) [ 55.955797] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.963521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.971240] page dumped because: kasan: bad access detected [ 55.976795] [ 55.978271] Memory state around the buggy address: [ 55.983050] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.990253] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.997458] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.004659] ^ [ 56.009437] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.016644] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.023843] ================================================================== [ 57.614338] ================================================================== [ 57.621391] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 57.628681] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 57.636059] [ 57.637540] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 57.637588] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.637606] Hardware name: WinLink E850-96 board (DT) [ 57.637625] Call trace: [ 57.637642] show_stack+0x20/0x38 (C) [ 57.637675] dump_stack_lvl+0x8c/0xd0 [ 57.637707] print_report+0x118/0x608 [ 57.637737] kasan_report+0xdc/0x128 [ 57.637769] kasan_check_range+0x100/0x1a8 [ 57.637803] __kasan_check_write+0x20/0x30 [ 57.637838] kasan_atomics_helper+0xff0/0x4858 [ 57.637870] kasan_atomics+0x198/0x2e0 [ 57.637898] kunit_try_run_case+0x170/0x3f0 [ 57.637930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.637967] kthread+0x328/0x630 [ 57.637998] ret_from_fork+0x10/0x20 [ 57.638030] [ 57.708974] Allocated by task 310: [ 57.712361] kasan_save_stack+0x3c/0x68 [ 57.716179] kasan_save_track+0x20/0x40 [ 57.719998] kasan_save_alloc_info+0x40/0x58 [ 57.724251] __kasan_kmalloc+0xd4/0xd8 [ 57.727984] __kmalloc_cache_noprof+0x15c/0x3c0 [ 57.732498] kasan_atomics+0xb8/0x2e0 [ 57.736144] kunit_try_run_case+0x170/0x3f0 [ 57.740310] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.745779] kthread+0x328/0x630 [ 57.748991] ret_from_fork+0x10/0x20 [ 57.752549] [ 57.754027] The buggy address belongs to the object at ffff00080243ed00 [ 57.754027] which belongs to the cache kmalloc-64 of size 64 [ 57.766352] The buggy address is located 0 bytes to the right of [ 57.766352] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 57.779199] [ 57.780674] The buggy address belongs to the physical page: [ 57.786232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 57.794216] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.800726] page_type: f5(slab) [ 57.803859] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.811584] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.819302] page dumped because: kasan: bad access detected [ 57.824858] [ 57.826333] Memory state around the buggy address: [ 57.831111] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.838316] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.845521] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.852722] ^ [ 57.857500] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.864706] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.871906] ================================================================== [ 47.050390] ================================================================== [ 47.057489] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 47.064776] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 47.072068] [ 47.073549] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 47.073606] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.073622] Hardware name: WinLink E850-96 board (DT) [ 47.073641] Call trace: [ 47.073654] show_stack+0x20/0x38 (C) [ 47.073689] dump_stack_lvl+0x8c/0xd0 [ 47.073724] print_report+0x118/0x608 [ 47.073755] kasan_report+0xdc/0x128 [ 47.073785] kasan_check_range+0x100/0x1a8 [ 47.073820] __kasan_check_read+0x20/0x30 [ 47.073854] kasan_atomics_helper+0x1ec/0x4858 [ 47.073886] kasan_atomics+0x198/0x2e0 [ 47.073917] kunit_try_run_case+0x170/0x3f0 [ 47.073950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.073985] kthread+0x328/0x630 [ 47.074018] ret_from_fork+0x10/0x20 [ 47.074051] [ 47.144896] Allocated by task 310: [ 47.148284] kasan_save_stack+0x3c/0x68 [ 47.152101] kasan_save_track+0x20/0x40 [ 47.155921] kasan_save_alloc_info+0x40/0x58 [ 47.160174] __kasan_kmalloc+0xd4/0xd8 [ 47.163907] __kmalloc_cache_noprof+0x15c/0x3c0 [ 47.168421] kasan_atomics+0xb8/0x2e0 [ 47.172066] kunit_try_run_case+0x170/0x3f0 [ 47.176233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.181703] kthread+0x328/0x630 [ 47.184913] ret_from_fork+0x10/0x20 [ 47.188472] [ 47.189951] The buggy address belongs to the object at ffff00080243ed00 [ 47.189951] which belongs to the cache kmalloc-64 of size 64 [ 47.202276] The buggy address is located 0 bytes to the right of [ 47.202276] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 47.215121] [ 47.216597] The buggy address belongs to the physical page: [ 47.222156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 47.230141] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.236650] page_type: f5(slab) [ 47.239781] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.247506] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.255225] page dumped because: kasan: bad access detected [ 47.260780] [ 47.262256] Memory state around the buggy address: [ 47.267034] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.274239] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.281444] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.288644] ^ [ 47.293423] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.300629] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.307828] ================================================================== [ 56.819584] ================================================================== [ 56.826612] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 56.833900] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 56.841278] [ 56.842761] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 56.842812] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.842828] Hardware name: WinLink E850-96 board (DT) [ 56.842848] Call trace: [ 56.842863] show_stack+0x20/0x38 (C) [ 56.842894] dump_stack_lvl+0x8c/0xd0 [ 56.842925] print_report+0x118/0x608 [ 56.842957] kasan_report+0xdc/0x128 [ 56.842987] kasan_check_range+0x100/0x1a8 [ 56.843021] __kasan_check_write+0x20/0x30 [ 56.843056] kasan_atomics_helper+0xeb8/0x4858 [ 56.843089] kasan_atomics+0x198/0x2e0 [ 56.843118] kunit_try_run_case+0x170/0x3f0 [ 56.843150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.843184] kthread+0x328/0x630 [ 56.843216] ret_from_fork+0x10/0x20 [ 56.843250] [ 56.914194] Allocated by task 310: [ 56.917582] kasan_save_stack+0x3c/0x68 [ 56.921400] kasan_save_track+0x20/0x40 [ 56.925218] kasan_save_alloc_info+0x40/0x58 [ 56.929472] __kasan_kmalloc+0xd4/0xd8 [ 56.933205] __kmalloc_cache_noprof+0x15c/0x3c0 [ 56.937718] kasan_atomics+0xb8/0x2e0 [ 56.941364] kunit_try_run_case+0x170/0x3f0 [ 56.945531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.950999] kthread+0x328/0x630 [ 56.954211] ret_from_fork+0x10/0x20 [ 56.957770] [ 56.959247] The buggy address belongs to the object at ffff00080243ed00 [ 56.959247] which belongs to the cache kmalloc-64 of size 64 [ 56.971575] The buggy address is located 0 bytes to the right of [ 56.971575] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 56.984419] [ 56.985895] The buggy address belongs to the physical page: [ 56.991454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 56.999437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.005946] page_type: f5(slab) [ 57.009081] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.016803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.024523] page dumped because: kasan: bad access detected [ 57.030078] [ 57.031553] Memory state around the buggy address: [ 57.036331] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.043536] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.050741] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.057942] ^ [ 57.062720] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.069926] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.077126] ================================================================== [ 48.106552] ================================================================== [ 48.113547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 48.120837] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 48.128215] [ 48.129697] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 48.129749] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.129765] Hardware name: WinLink E850-96 board (DT) [ 48.129786] Call trace: [ 48.129799] show_stack+0x20/0x38 (C) [ 48.129834] dump_stack_lvl+0x8c/0xd0 [ 48.129865] print_report+0x118/0x608 [ 48.129899] kasan_report+0xdc/0x128 [ 48.129929] kasan_check_range+0x100/0x1a8 [ 48.129960] __kasan_check_write+0x20/0x30 [ 48.129995] kasan_atomics_helper+0x32c/0x4858 [ 48.130026] kasan_atomics+0x198/0x2e0 [ 48.130056] kunit_try_run_case+0x170/0x3f0 [ 48.130086] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.130121] kthread+0x328/0x630 [ 48.130153] ret_from_fork+0x10/0x20 [ 48.130187] [ 48.201131] Allocated by task 310: [ 48.204520] kasan_save_stack+0x3c/0x68 [ 48.208336] kasan_save_track+0x20/0x40 [ 48.212155] kasan_save_alloc_info+0x40/0x58 [ 48.216408] __kasan_kmalloc+0xd4/0xd8 [ 48.220141] __kmalloc_cache_noprof+0x15c/0x3c0 [ 48.224655] kasan_atomics+0xb8/0x2e0 [ 48.228300] kunit_try_run_case+0x170/0x3f0 [ 48.232467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.237936] kthread+0x328/0x630 [ 48.241147] ret_from_fork+0x10/0x20 [ 48.244706] [ 48.246184] The buggy address belongs to the object at ffff00080243ed00 [ 48.246184] which belongs to the cache kmalloc-64 of size 64 [ 48.258509] The buggy address is located 0 bytes to the right of [ 48.258509] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 48.271355] [ 48.272831] The buggy address belongs to the physical page: [ 48.278389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 48.286373] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.292884] page_type: f5(slab) [ 48.296019] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.303740] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.311459] page dumped because: kasan: bad access detected [ 48.317014] [ 48.318490] Memory state around the buggy address: [ 48.323270] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.330473] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.337677] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.344878] ^ [ 48.349657] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.356863] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.364062] ================================================================== [ 51.812349] ================================================================== [ 51.819394] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 51.826771] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 51.834062] [ 51.835542] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 51.835591] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.835606] Hardware name: WinLink E850-96 board (DT) [ 51.835626] Call trace: [ 51.835641] show_stack+0x20/0x38 (C) [ 51.835674] dump_stack_lvl+0x8c/0xd0 [ 51.835707] print_report+0x118/0x608 [ 51.835738] kasan_report+0xdc/0x128 [ 51.835768] __asan_report_load4_noabort+0x20/0x30 [ 51.835806] kasan_atomics_helper+0x42d8/0x4858 [ 51.835838] kasan_atomics+0x198/0x2e0 [ 51.835869] kunit_try_run_case+0x170/0x3f0 [ 51.835900] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.835937] kthread+0x328/0x630 [ 51.835969] ret_from_fork+0x10/0x20 [ 51.836002] [ 51.903679] Allocated by task 310: [ 51.907067] kasan_save_stack+0x3c/0x68 [ 51.910884] kasan_save_track+0x20/0x40 [ 51.914704] kasan_save_alloc_info+0x40/0x58 [ 51.918957] __kasan_kmalloc+0xd4/0xd8 [ 51.922690] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.927203] kasan_atomics+0xb8/0x2e0 [ 51.930849] kunit_try_run_case+0x170/0x3f0 [ 51.935016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.940484] kthread+0x328/0x630 [ 51.943696] ret_from_fork+0x10/0x20 [ 51.947255] [ 51.948730] The buggy address belongs to the object at ffff00080243ed00 [ 51.948730] which belongs to the cache kmalloc-64 of size 64 [ 51.961057] The buggy address is located 0 bytes to the right of [ 51.961057] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 51.973904] [ 51.975380] The buggy address belongs to the physical page: [ 51.980939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 51.988923] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.995431] page_type: f5(slab) [ 51.998564] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.006289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.014007] page dumped because: kasan: bad access detected [ 52.019563] [ 52.021038] Memory state around the buggy address: [ 52.025816] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.033021] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.040226] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.047427] ^ [ 52.052205] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.059411] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.066611] ================================================================== [ 61.587194] ================================================================== [ 61.594248] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 61.601624] Read of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 61.608915] [ 61.610397] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 61.610446] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.610464] Hardware name: WinLink E850-96 board (DT) [ 61.610486] Call trace: [ 61.610499] show_stack+0x20/0x38 (C) [ 61.610533] dump_stack_lvl+0x8c/0xd0 [ 61.610565] print_report+0x118/0x608 [ 61.610598] kasan_report+0xdc/0x128 [ 61.610629] __asan_report_load8_noabort+0x20/0x30 [ 61.610666] kasan_atomics_helper+0x3db0/0x4858 [ 61.610698] kasan_atomics+0x198/0x2e0 [ 61.610727] kunit_try_run_case+0x170/0x3f0 [ 61.610756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.610792] kthread+0x328/0x630 [ 61.610823] ret_from_fork+0x10/0x20 [ 61.610857] [ 61.678532] Allocated by task 310: [ 61.681921] kasan_save_stack+0x3c/0x68 [ 61.685737] kasan_save_track+0x20/0x40 [ 61.689557] kasan_save_alloc_info+0x40/0x58 [ 61.693810] __kasan_kmalloc+0xd4/0xd8 [ 61.697543] __kmalloc_cache_noprof+0x15c/0x3c0 [ 61.702057] kasan_atomics+0xb8/0x2e0 [ 61.705702] kunit_try_run_case+0x170/0x3f0 [ 61.709869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.715337] kthread+0x328/0x630 [ 61.718549] ret_from_fork+0x10/0x20 [ 61.722108] [ 61.723583] The buggy address belongs to the object at ffff00080243ed00 [ 61.723583] which belongs to the cache kmalloc-64 of size 64 [ 61.735912] The buggy address is located 0 bytes to the right of [ 61.735912] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 61.748757] [ 61.750233] The buggy address belongs to the physical page: [ 61.755792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 61.763775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.770286] page_type: f5(slab) [ 61.773417] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 61.781142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.788861] page dumped because: kasan: bad access detected [ 61.794416] [ 61.795892] Memory state around the buggy address: [ 61.800671] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.807874] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.815079] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.822280] ^ [ 61.827058] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.834264] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.841464] ================================================================== [ 63.429010] ================================================================== [ 63.436063] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 63.443437] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 63.450815] [ 63.452296] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 63.452343] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.452361] Hardware name: WinLink E850-96 board (DT) [ 63.452382] Call trace: [ 63.452393] show_stack+0x20/0x38 (C) [ 63.452426] dump_stack_lvl+0x8c/0xd0 [ 63.452457] print_report+0x118/0x608 [ 63.452488] kasan_report+0xdc/0x128 [ 63.452519] kasan_check_range+0x100/0x1a8 [ 63.452554] __kasan_check_write+0x20/0x30 [ 63.452589] kasan_atomics_helper+0x17ec/0x4858 [ 63.452622] kasan_atomics+0x198/0x2e0 [ 63.452651] kunit_try_run_case+0x170/0x3f0 [ 63.452681] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.452718] kthread+0x328/0x630 [ 63.452750] ret_from_fork+0x10/0x20 [ 63.452782] [ 63.523817] Allocated by task 310: [ 63.527204] kasan_save_stack+0x3c/0x68 [ 63.531022] kasan_save_track+0x20/0x40 [ 63.534842] kasan_save_alloc_info+0x40/0x58 [ 63.539095] __kasan_kmalloc+0xd4/0xd8 [ 63.542827] __kmalloc_cache_noprof+0x15c/0x3c0 [ 63.547341] kasan_atomics+0xb8/0x2e0 [ 63.550987] kunit_try_run_case+0x170/0x3f0 [ 63.555154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.560622] kthread+0x328/0x630 [ 63.563834] ret_from_fork+0x10/0x20 [ 63.567393] [ 63.568870] The buggy address belongs to the object at ffff00080243ed00 [ 63.568870] which belongs to the cache kmalloc-64 of size 64 [ 63.581197] The buggy address is located 0 bytes to the right of [ 63.581197] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 63.594042] [ 63.595518] The buggy address belongs to the physical page: [ 63.601077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 63.609061] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.615571] page_type: f5(slab) [ 63.618702] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 63.626426] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.634145] page dumped because: kasan: bad access detected [ 63.639700] [ 63.641176] Memory state around the buggy address: [ 63.645956] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.653159] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.660364] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.667565] ^ [ 63.672343] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.679549] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.686749] ================================================================== [ 52.074086] ================================================================== [ 52.081024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 52.088313] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 52.095690] [ 52.097173] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 52.097224] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.097240] Hardware name: WinLink E850-96 board (DT) [ 52.097262] Call trace: [ 52.097274] show_stack+0x20/0x38 (C) [ 52.097308] dump_stack_lvl+0x8c/0xd0 [ 52.097340] print_report+0x118/0x608 [ 52.097371] kasan_report+0xdc/0x128 [ 52.097401] kasan_check_range+0x100/0x1a8 [ 52.097433] __kasan_check_write+0x20/0x30 [ 52.097468] kasan_atomics_helper+0x934/0x4858 [ 52.097500] kasan_atomics+0x198/0x2e0 [ 52.097529] kunit_try_run_case+0x170/0x3f0 [ 52.097560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.097594] kthread+0x328/0x630 [ 52.097628] ret_from_fork+0x10/0x20 [ 52.097659] [ 52.168605] Allocated by task 310: [ 52.171995] kasan_save_stack+0x3c/0x68 [ 52.175811] kasan_save_track+0x20/0x40 [ 52.179630] kasan_save_alloc_info+0x40/0x58 [ 52.183883] __kasan_kmalloc+0xd4/0xd8 [ 52.187616] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.192130] kasan_atomics+0xb8/0x2e0 [ 52.195776] kunit_try_run_case+0x170/0x3f0 [ 52.199942] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.205411] kthread+0x328/0x630 [ 52.208623] ret_from_fork+0x10/0x20 [ 52.212182] [ 52.213658] The buggy address belongs to the object at ffff00080243ed00 [ 52.213658] which belongs to the cache kmalloc-64 of size 64 [ 52.225984] The buggy address is located 0 bytes to the right of [ 52.225984] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 52.238830] [ 52.240308] The buggy address belongs to the physical page: [ 52.245865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 52.253850] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.260358] page_type: f5(slab) [ 52.263491] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.271215] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.278934] page dumped because: kasan: bad access detected [ 52.284489] [ 52.285965] Memory state around the buggy address: [ 52.290745] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.297948] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.305153] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.312354] ^ [ 52.317131] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.324338] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.331538] ================================================================== [ 46.788771] ================================================================== [ 46.795688] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 46.803061] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 46.810440] [ 46.811925] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 46.811980] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.811997] Hardware name: WinLink E850-96 board (DT) [ 46.812019] Call trace: [ 46.812034] show_stack+0x20/0x38 (C) [ 46.812072] dump_stack_lvl+0x8c/0xd0 [ 46.812104] print_report+0x118/0x608 [ 46.812137] kasan_report+0xdc/0x128 [ 46.812167] __asan_report_store4_noabort+0x20/0x30 [ 46.812204] kasan_atomics_helper+0x3f7c/0x4858 [ 46.812240] kasan_atomics+0x198/0x2e0 [ 46.812269] kunit_try_run_case+0x170/0x3f0 [ 46.812303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.812343] kthread+0x328/0x630 [ 46.812381] ret_from_fork+0x10/0x20 [ 46.812418] [ 46.880143] Allocated by task 310: [ 46.883532] kasan_save_stack+0x3c/0x68 [ 46.887348] kasan_save_track+0x20/0x40 [ 46.891168] kasan_save_alloc_info+0x40/0x58 [ 46.895421] __kasan_kmalloc+0xd4/0xd8 [ 46.899154] __kmalloc_cache_noprof+0x15c/0x3c0 [ 46.903667] kasan_atomics+0xb8/0x2e0 [ 46.907313] kunit_try_run_case+0x170/0x3f0 [ 46.911480] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.916948] kthread+0x328/0x630 [ 46.920160] ret_from_fork+0x10/0x20 [ 46.923719] [ 46.925198] The buggy address belongs to the object at ffff00080243ed00 [ 46.925198] which belongs to the cache kmalloc-64 of size 64 [ 46.937525] The buggy address is located 0 bytes to the right of [ 46.937525] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 46.950368] [ 46.951846] The buggy address belongs to the physical page: [ 46.957403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 46.965387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.971897] page_type: f5(slab) [ 46.975032] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 46.982753] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.990472] page dumped because: kasan: bad access detected [ 46.996027] [ 46.997503] Memory state around the buggy address: [ 47.002281] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.009486] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.016692] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.023891] ^ [ 47.028669] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.035875] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.043077] ================================================================== [ 52.603827] ================================================================== [ 52.610877] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 52.618166] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 52.625543] [ 52.627024] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 52.627071] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.627088] Hardware name: WinLink E850-96 board (DT) [ 52.627110] Call trace: [ 52.627123] show_stack+0x20/0x38 (C) [ 52.627155] dump_stack_lvl+0x8c/0xd0 [ 52.627185] print_report+0x118/0x608 [ 52.627216] kasan_report+0xdc/0x128 [ 52.627246] kasan_check_range+0x100/0x1a8 [ 52.627278] __kasan_check_write+0x20/0x30 [ 52.627313] kasan_atomics_helper+0xa04/0x4858 [ 52.627347] kasan_atomics+0x198/0x2e0 [ 52.627375] kunit_try_run_case+0x170/0x3f0 [ 52.627406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.627440] kthread+0x328/0x630 [ 52.627470] ret_from_fork+0x10/0x20 [ 52.627502] [ 52.698459] Allocated by task 310: [ 52.701846] kasan_save_stack+0x3c/0x68 [ 52.705664] kasan_save_track+0x20/0x40 [ 52.709483] kasan_save_alloc_info+0x40/0x58 [ 52.713737] __kasan_kmalloc+0xd4/0xd8 [ 52.717469] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.721983] kasan_atomics+0xb8/0x2e0 [ 52.725629] kunit_try_run_case+0x170/0x3f0 [ 52.729795] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.735264] kthread+0x328/0x630 [ 52.738476] ret_from_fork+0x10/0x20 [ 52.742035] [ 52.743512] The buggy address belongs to the object at ffff00080243ed00 [ 52.743512] which belongs to the cache kmalloc-64 of size 64 [ 52.755838] The buggy address is located 0 bytes to the right of [ 52.755838] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 52.768684] [ 52.770159] The buggy address belongs to the physical page: [ 52.775718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 52.783702] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.790211] page_type: f5(slab) [ 52.793344] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.801068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.808787] page dumped because: kasan: bad access detected [ 52.814342] [ 52.815818] Memory state around the buggy address: [ 52.820596] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.827801] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.835007] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.842207] ^ [ 52.846984] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.854191] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.861391] ================================================================== [ 53.398612] ================================================================== [ 53.405655] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 53.413032] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 53.420323] [ 53.421804] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 53.421854] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.421871] Hardware name: WinLink E850-96 board (DT) [ 53.421890] Call trace: [ 53.421905] show_stack+0x20/0x38 (C) [ 53.421939] dump_stack_lvl+0x8c/0xd0 [ 53.421971] print_report+0x118/0x608 [ 53.422004] kasan_report+0xdc/0x128 [ 53.422034] __asan_report_load4_noabort+0x20/0x30 [ 53.422071] kasan_atomics_helper+0x3dcc/0x4858 [ 53.422102] kasan_atomics+0x198/0x2e0 [ 53.422131] kunit_try_run_case+0x170/0x3f0 [ 53.422161] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.422199] kthread+0x328/0x630 [ 53.422231] ret_from_fork+0x10/0x20 [ 53.422261] [ 53.489940] Allocated by task 310: [ 53.493328] kasan_save_stack+0x3c/0x68 [ 53.497145] kasan_save_track+0x20/0x40 [ 53.500965] kasan_save_alloc_info+0x40/0x58 [ 53.505218] __kasan_kmalloc+0xd4/0xd8 [ 53.508950] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.513464] kasan_atomics+0xb8/0x2e0 [ 53.517110] kunit_try_run_case+0x170/0x3f0 [ 53.521277] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.526745] kthread+0x328/0x630 [ 53.529957] ret_from_fork+0x10/0x20 [ 53.533516] [ 53.534991] The buggy address belongs to the object at ffff00080243ed00 [ 53.534991] which belongs to the cache kmalloc-64 of size 64 [ 53.547320] The buggy address is located 0 bytes to the right of [ 53.547320] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 53.560165] [ 53.561641] The buggy address belongs to the physical page: [ 53.567199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 53.575182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.581692] page_type: f5(slab) [ 53.584825] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.592550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.600268] page dumped because: kasan: bad access detected [ 53.605824] [ 53.607299] Memory state around the buggy address: [ 53.612078] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.619282] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.626487] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.633688] ^ [ 53.638466] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.645672] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.652872] ================================================================== [ 47.844821] ================================================================== [ 47.851919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 47.859295] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 47.866587] [ 47.868067] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 47.868119] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.868135] Hardware name: WinLink E850-96 board (DT) [ 47.868155] Call trace: [ 47.868167] show_stack+0x20/0x38 (C) [ 47.868204] dump_stack_lvl+0x8c/0xd0 [ 47.868236] print_report+0x118/0x608 [ 47.868268] kasan_report+0xdc/0x128 [ 47.868299] __asan_report_load4_noabort+0x20/0x30 [ 47.868335] kasan_atomics_helper+0x40fc/0x4858 [ 47.868366] kasan_atomics+0x198/0x2e0 [ 47.868395] kunit_try_run_case+0x170/0x3f0 [ 47.868425] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.868461] kthread+0x328/0x630 [ 47.868492] ret_from_fork+0x10/0x20 [ 47.868525] [ 47.936205] Allocated by task 310: [ 47.939593] kasan_save_stack+0x3c/0x68 [ 47.943409] kasan_save_track+0x20/0x40 [ 47.947228] kasan_save_alloc_info+0x40/0x58 [ 47.951482] __kasan_kmalloc+0xd4/0xd8 [ 47.955214] __kmalloc_cache_noprof+0x15c/0x3c0 [ 47.959728] kasan_atomics+0xb8/0x2e0 [ 47.963374] kunit_try_run_case+0x170/0x3f0 [ 47.967541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.973011] kthread+0x328/0x630 [ 47.976221] ret_from_fork+0x10/0x20 [ 47.979780] [ 47.981257] The buggy address belongs to the object at ffff00080243ed00 [ 47.981257] which belongs to the cache kmalloc-64 of size 64 [ 47.993582] The buggy address is located 0 bytes to the right of [ 47.993582] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 48.006429] [ 48.007904] The buggy address belongs to the physical page: [ 48.013462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 48.021447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.027958] page_type: f5(slab) [ 48.031089] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.038813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.046532] page dumped because: kasan: bad access detected [ 48.052087] [ 48.053563] Memory state around the buggy address: [ 48.058343] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.065546] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.072751] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.079952] ^ [ 48.084730] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.091936] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.099136] ================================================================== [ 49.163060] ================================================================== [ 49.170131] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 49.177418] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 49.184796] [ 49.186280] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 49.186328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.186343] Hardware name: WinLink E850-96 board (DT) [ 49.186365] Call trace: [ 49.186378] show_stack+0x20/0x38 (C) [ 49.186411] dump_stack_lvl+0x8c/0xd0 [ 49.186441] print_report+0x118/0x608 [ 49.186470] kasan_report+0xdc/0x128 [ 49.186501] kasan_check_range+0x100/0x1a8 [ 49.186535] __kasan_check_write+0x20/0x30 [ 49.186568] kasan_atomics_helper+0x47c/0x4858 [ 49.186602] kasan_atomics+0x198/0x2e0 [ 49.186632] kunit_try_run_case+0x170/0x3f0 [ 49.186663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.186696] kthread+0x328/0x630 [ 49.186727] ret_from_fork+0x10/0x20 [ 49.186760] [ 49.257712] Allocated by task 310: [ 49.261100] kasan_save_stack+0x3c/0x68 [ 49.264917] kasan_save_track+0x20/0x40 [ 49.268736] kasan_save_alloc_info+0x40/0x58 [ 49.272990] __kasan_kmalloc+0xd4/0xd8 [ 49.276722] __kmalloc_cache_noprof+0x15c/0x3c0 [ 49.281236] kasan_atomics+0xb8/0x2e0 [ 49.284882] kunit_try_run_case+0x170/0x3f0 [ 49.289048] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.294517] kthread+0x328/0x630 [ 49.297729] ret_from_fork+0x10/0x20 [ 49.301288] [ 49.302763] The buggy address belongs to the object at ffff00080243ed00 [ 49.302763] which belongs to the cache kmalloc-64 of size 64 [ 49.315091] The buggy address is located 0 bytes to the right of [ 49.315091] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 49.327937] [ 49.329412] The buggy address belongs to the physical page: [ 49.334972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 49.342956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.349464] page_type: f5(slab) [ 49.352597] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.360321] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.368040] page dumped because: kasan: bad access detected [ 49.373596] [ 49.375071] Memory state around the buggy address: [ 49.379850] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.387054] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.394259] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.401460] ^ [ 49.406238] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.413444] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.420644] ================================================================== [ 54.451743] ================================================================== [ 54.458765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 54.466141] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 54.473432] [ 54.474915] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 54.474967] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.474982] Hardware name: WinLink E850-96 board (DT) [ 54.475004] Call trace: [ 54.475018] show_stack+0x20/0x38 (C) [ 54.475049] dump_stack_lvl+0x8c/0xd0 [ 54.475081] print_report+0x118/0x608 [ 54.475110] kasan_report+0xdc/0x128 [ 54.475139] __asan_report_load4_noabort+0x20/0x30 [ 54.475176] kasan_atomics_helper+0x3de4/0x4858 [ 54.475208] kasan_atomics+0x198/0x2e0 [ 54.475237] kunit_try_run_case+0x170/0x3f0 [ 54.475268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.475303] kthread+0x328/0x630 [ 54.475335] ret_from_fork+0x10/0x20 [ 54.475366] [ 54.543049] Allocated by task 310: [ 54.546437] kasan_save_stack+0x3c/0x68 [ 54.550254] kasan_save_track+0x20/0x40 [ 54.554074] kasan_save_alloc_info+0x40/0x58 [ 54.558327] __kasan_kmalloc+0xd4/0xd8 [ 54.562060] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.566573] kasan_atomics+0xb8/0x2e0 [ 54.570219] kunit_try_run_case+0x170/0x3f0 [ 54.574386] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.579854] kthread+0x328/0x630 [ 54.583066] ret_from_fork+0x10/0x20 [ 54.586625] [ 54.588101] The buggy address belongs to the object at ffff00080243ed00 [ 54.588101] which belongs to the cache kmalloc-64 of size 64 [ 54.600429] The buggy address is located 0 bytes to the right of [ 54.600429] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 54.613274] [ 54.614750] The buggy address belongs to the physical page: [ 54.620309] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 54.628293] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.634803] page_type: f5(slab) [ 54.637936] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.645659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.653377] page dumped because: kasan: bad access detected [ 54.658933] [ 54.660408] Memory state around the buggy address: [ 54.665187] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.672391] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.679596] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.686797] ^ [ 54.691575] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.698781] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.705981] ================================================================== [ 62.640657] ================================================================== [ 62.647706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 62.655081] Read of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 62.662372] [ 62.663853] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 62.663902] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.663918] Hardware name: WinLink E850-96 board (DT) [ 62.663939] Call trace: [ 62.663953] show_stack+0x20/0x38 (C) [ 62.663986] dump_stack_lvl+0x8c/0xd0 [ 62.664017] print_report+0x118/0x608 [ 62.664048] kasan_report+0xdc/0x128 [ 62.664080] __asan_report_load8_noabort+0x20/0x30 [ 62.664116] kasan_atomics_helper+0x3e10/0x4858 [ 62.664148] kasan_atomics+0x198/0x2e0 [ 62.664177] kunit_try_run_case+0x170/0x3f0 [ 62.664211] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.664245] kthread+0x328/0x630 [ 62.664276] ret_from_fork+0x10/0x20 [ 62.664307] [ 62.731988] Allocated by task 310: [ 62.735376] kasan_save_stack+0x3c/0x68 [ 62.739194] kasan_save_track+0x20/0x40 [ 62.743013] kasan_save_alloc_info+0x40/0x58 [ 62.747267] __kasan_kmalloc+0xd4/0xd8 [ 62.750999] __kmalloc_cache_noprof+0x15c/0x3c0 [ 62.755513] kasan_atomics+0xb8/0x2e0 [ 62.759159] kunit_try_run_case+0x170/0x3f0 [ 62.763325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.768794] kthread+0x328/0x630 [ 62.772006] ret_from_fork+0x10/0x20 [ 62.775565] [ 62.777042] The buggy address belongs to the object at ffff00080243ed00 [ 62.777042] which belongs to the cache kmalloc-64 of size 64 [ 62.789368] The buggy address is located 0 bytes to the right of [ 62.789368] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 62.802213] [ 62.803689] The buggy address belongs to the physical page: [ 62.809248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 62.817233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.823742] page_type: f5(slab) [ 62.826874] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 62.834598] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.842317] page dumped because: kasan: bad access detected [ 62.847872] [ 62.849348] Memory state around the buggy address: [ 62.854126] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.861331] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.868536] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.875737] ^ [ 62.880515] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.887721] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.894920] ================================================================== [ 63.167385] ================================================================== [ 63.174433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 63.181809] Read of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 63.189100] [ 63.190581] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 63.190630] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.190647] Hardware name: WinLink E850-96 board (DT) [ 63.190663] Call trace: [ 63.190676] show_stack+0x20/0x38 (C) [ 63.190710] dump_stack_lvl+0x8c/0xd0 [ 63.190742] print_report+0x118/0x608 [ 63.190774] kasan_report+0xdc/0x128 [ 63.190804] __asan_report_load8_noabort+0x20/0x30 [ 63.190839] kasan_atomics_helper+0x3e20/0x4858 [ 63.190871] kasan_atomics+0x198/0x2e0 [ 63.190902] kunit_try_run_case+0x170/0x3f0 [ 63.190933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.190968] kthread+0x328/0x630 [ 63.191003] ret_from_fork+0x10/0x20 [ 63.191034] [ 63.258717] Allocated by task 310: [ 63.262104] kasan_save_stack+0x3c/0x68 [ 63.265922] kasan_save_track+0x20/0x40 [ 63.269742] kasan_save_alloc_info+0x40/0x58 [ 63.273995] __kasan_kmalloc+0xd4/0xd8 [ 63.277727] __kmalloc_cache_noprof+0x15c/0x3c0 [ 63.282241] kasan_atomics+0xb8/0x2e0 [ 63.285887] kunit_try_run_case+0x170/0x3f0 [ 63.290054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.295522] kthread+0x328/0x630 [ 63.298734] ret_from_fork+0x10/0x20 [ 63.302293] [ 63.303770] The buggy address belongs to the object at ffff00080243ed00 [ 63.303770] which belongs to the cache kmalloc-64 of size 64 [ 63.316095] The buggy address is located 0 bytes to the right of [ 63.316095] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 63.328942] [ 63.330418] The buggy address belongs to the physical page: [ 63.335975] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 63.343961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.350471] page_type: f5(slab) [ 63.353602] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 63.361326] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.369045] page dumped because: kasan: bad access detected [ 63.374601] [ 63.376076] Memory state around the buggy address: [ 63.380856] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.388059] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.395264] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.402465] ^ [ 63.407243] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.414449] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.421649] ================================================================== [ 47.580079] ================================================================== [ 47.587165] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 47.594458] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 47.601748] [ 47.603229] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 47.603282] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.603298] Hardware name: WinLink E850-96 board (DT) [ 47.603317] Call trace: [ 47.603332] show_stack+0x20/0x38 (C) [ 47.603365] dump_stack_lvl+0x8c/0xd0 [ 47.603398] print_report+0x118/0x608 [ 47.603431] kasan_report+0xdc/0x128 [ 47.603461] kasan_check_range+0x100/0x1a8 [ 47.603495] __kasan_check_read+0x20/0x30 [ 47.603530] kasan_atomics_helper+0x2b0/0x4858 [ 47.603562] kasan_atomics+0x198/0x2e0 [ 47.603591] kunit_try_run_case+0x170/0x3f0 [ 47.603624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.603660] kthread+0x328/0x630 [ 47.603691] ret_from_fork+0x10/0x20 [ 47.603724] [ 47.674576] Allocated by task 310: [ 47.677963] kasan_save_stack+0x3c/0x68 [ 47.681781] kasan_save_track+0x20/0x40 [ 47.685600] kasan_save_alloc_info+0x40/0x58 [ 47.689854] __kasan_kmalloc+0xd4/0xd8 [ 47.693587] __kmalloc_cache_noprof+0x15c/0x3c0 [ 47.698100] kasan_atomics+0xb8/0x2e0 [ 47.701746] kunit_try_run_case+0x170/0x3f0 [ 47.705912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.711382] kthread+0x328/0x630 [ 47.714592] ret_from_fork+0x10/0x20 [ 47.718152] [ 47.719629] The buggy address belongs to the object at ffff00080243ed00 [ 47.719629] which belongs to the cache kmalloc-64 of size 64 [ 47.731954] The buggy address is located 0 bytes to the right of [ 47.731954] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 47.744801] [ 47.746276] The buggy address belongs to the physical page: [ 47.751834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 47.759820] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.766329] page_type: f5(slab) [ 47.769461] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.777185] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.784904] page dumped because: kasan: bad access detected [ 47.790459] [ 47.791935] Memory state around the buggy address: [ 47.796716] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.803918] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.811123] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.818324] ^ [ 47.823102] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.830308] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.837508] ================================================================== [ 59.204777] ================================================================== [ 59.211820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 59.219195] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 59.226573] [ 59.228054] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 59.228106] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.228121] Hardware name: WinLink E850-96 board (DT) [ 59.228139] Call trace: [ 59.228154] show_stack+0x20/0x38 (C) [ 59.228188] dump_stack_lvl+0x8c/0xd0 [ 59.228219] print_report+0x118/0x608 [ 59.228250] kasan_report+0xdc/0x128 [ 59.228281] kasan_check_range+0x100/0x1a8 [ 59.228312] __kasan_check_write+0x20/0x30 [ 59.228347] kasan_atomics_helper+0x126c/0x4858 [ 59.228377] kasan_atomics+0x198/0x2e0 [ 59.228407] kunit_try_run_case+0x170/0x3f0 [ 59.228439] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.228475] kthread+0x328/0x630 [ 59.228505] ret_from_fork+0x10/0x20 [ 59.228538] [ 59.299575] Allocated by task 310: [ 59.302962] kasan_save_stack+0x3c/0x68 [ 59.306780] kasan_save_track+0x20/0x40 [ 59.310599] kasan_save_alloc_info+0x40/0x58 [ 59.314853] __kasan_kmalloc+0xd4/0xd8 [ 59.318586] __kmalloc_cache_noprof+0x15c/0x3c0 [ 59.323099] kasan_atomics+0xb8/0x2e0 [ 59.326745] kunit_try_run_case+0x170/0x3f0 [ 59.330911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.336380] kthread+0x328/0x630 [ 59.339592] ret_from_fork+0x10/0x20 [ 59.343151] [ 59.344628] The buggy address belongs to the object at ffff00080243ed00 [ 59.344628] which belongs to the cache kmalloc-64 of size 64 [ 59.356954] The buggy address is located 0 bytes to the right of [ 59.356954] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 59.369800] [ 59.371276] The buggy address belongs to the physical page: [ 59.376835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 59.384818] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.391327] page_type: f5(slab) [ 59.394460] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.402184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.409903] page dumped because: kasan: bad access detected [ 59.415459] [ 59.416934] Memory state around the buggy address: [ 59.421714] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.428917] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.436122] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.443323] ^ [ 59.448101] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.455307] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.462507] ================================================================== [ 59.734972] ================================================================== [ 59.742018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 59.749395] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 59.756773] [ 59.758255] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 59.758308] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.758322] Hardware name: WinLink E850-96 board (DT) [ 59.758341] Call trace: [ 59.758355] show_stack+0x20/0x38 (C) [ 59.758390] dump_stack_lvl+0x8c/0xd0 [ 59.758423] print_report+0x118/0x608 [ 59.758455] kasan_report+0xdc/0x128 [ 59.758485] kasan_check_range+0x100/0x1a8 [ 59.758519] __kasan_check_write+0x20/0x30 [ 59.758554] kasan_atomics_helper+0x1384/0x4858 [ 59.758586] kasan_atomics+0x198/0x2e0 [ 59.758615] kunit_try_run_case+0x170/0x3f0 [ 59.758646] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.758682] kthread+0x328/0x630 [ 59.758715] ret_from_fork+0x10/0x20 [ 59.758748] [ 59.829775] Allocated by task 310: [ 59.833163] kasan_save_stack+0x3c/0x68 [ 59.836980] kasan_save_track+0x20/0x40 [ 59.840800] kasan_save_alloc_info+0x40/0x58 [ 59.845053] __kasan_kmalloc+0xd4/0xd8 [ 59.848786] __kmalloc_cache_noprof+0x15c/0x3c0 [ 59.853300] kasan_atomics+0xb8/0x2e0 [ 59.856945] kunit_try_run_case+0x170/0x3f0 [ 59.861112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.866580] kthread+0x328/0x630 [ 59.869792] ret_from_fork+0x10/0x20 [ 59.873352] [ 59.874827] The buggy address belongs to the object at ffff00080243ed00 [ 59.874827] which belongs to the cache kmalloc-64 of size 64 [ 59.887156] The buggy address is located 0 bytes to the right of [ 59.887156] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 59.900000] [ 59.901476] The buggy address belongs to the physical page: [ 59.907033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 59.915019] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.921529] page_type: f5(slab) [ 59.924660] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.932385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.940104] page dumped because: kasan: bad access detected [ 59.945659] [ 59.947135] Memory state around the buggy address: [ 59.951913] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.959118] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.966323] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.973523] ^ [ 59.978301] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.985507] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.992707] ================================================================== [ 55.504829] ================================================================== [ 55.511876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 55.519250] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 55.526542] [ 55.528024] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 55.528071] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.528087] Hardware name: WinLink E850-96 board (DT) [ 55.528109] Call trace: [ 55.528122] show_stack+0x20/0x38 (C) [ 55.528154] dump_stack_lvl+0x8c/0xd0 [ 55.528187] print_report+0x118/0x608 [ 55.528218] kasan_report+0xdc/0x128 [ 55.528250] __asan_report_load4_noabort+0x20/0x30 [ 55.528286] kasan_atomics_helper+0x3e04/0x4858 [ 55.528319] kasan_atomics+0x198/0x2e0 [ 55.528349] kunit_try_run_case+0x170/0x3f0 [ 55.528378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.528415] kthread+0x328/0x630 [ 55.528449] ret_from_fork+0x10/0x20 [ 55.528484] [ 55.596158] Allocated by task 310: [ 55.599547] kasan_save_stack+0x3c/0x68 [ 55.603364] kasan_save_track+0x20/0x40 [ 55.607183] kasan_save_alloc_info+0x40/0x58 [ 55.611436] __kasan_kmalloc+0xd4/0xd8 [ 55.615169] __kmalloc_cache_noprof+0x15c/0x3c0 [ 55.619683] kasan_atomics+0xb8/0x2e0 [ 55.623328] kunit_try_run_case+0x170/0x3f0 [ 55.627495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.632964] kthread+0x328/0x630 [ 55.636175] ret_from_fork+0x10/0x20 [ 55.639734] [ 55.641210] The buggy address belongs to the object at ffff00080243ed00 [ 55.641210] which belongs to the cache kmalloc-64 of size 64 [ 55.653537] The buggy address is located 0 bytes to the right of [ 55.653537] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 55.666383] [ 55.667859] The buggy address belongs to the physical page: [ 55.673416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 55.681402] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.687912] page_type: f5(slab) [ 55.691045] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.698768] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.706487] page dumped because: kasan: bad access detected [ 55.712042] [ 55.713518] Memory state around the buggy address: [ 55.718297] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.725501] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.732707] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.739906] ^ [ 55.744684] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.751889] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.759090] ================================================================== [ 49.428008] ================================================================== [ 49.435055] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 49.442345] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 49.449723] [ 49.451204] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 49.451256] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.451272] Hardware name: WinLink E850-96 board (DT) [ 49.451292] Call trace: [ 49.451306] show_stack+0x20/0x38 (C) [ 49.451337] dump_stack_lvl+0x8c/0xd0 [ 49.451368] print_report+0x118/0x608 [ 49.451398] kasan_report+0xdc/0x128 [ 49.451428] kasan_check_range+0x100/0x1a8 [ 49.451461] __kasan_check_write+0x20/0x30 [ 49.451496] kasan_atomics_helper+0x4e4/0x4858 [ 49.451526] kasan_atomics+0x198/0x2e0 [ 49.451556] kunit_try_run_case+0x170/0x3f0 [ 49.451586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.451620] kthread+0x328/0x630 [ 49.451655] ret_from_fork+0x10/0x20 [ 49.451686] [ 49.522639] Allocated by task 310: [ 49.526026] kasan_save_stack+0x3c/0x68 [ 49.529844] kasan_save_track+0x20/0x40 [ 49.533663] kasan_save_alloc_info+0x40/0x58 [ 49.537916] __kasan_kmalloc+0xd4/0xd8 [ 49.541649] __kmalloc_cache_noprof+0x15c/0x3c0 [ 49.546163] kasan_atomics+0xb8/0x2e0 [ 49.549808] kunit_try_run_case+0x170/0x3f0 [ 49.553975] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.559443] kthread+0x328/0x630 [ 49.562655] ret_from_fork+0x10/0x20 [ 49.566215] [ 49.567691] The buggy address belongs to the object at ffff00080243ed00 [ 49.567691] which belongs to the cache kmalloc-64 of size 64 [ 49.580016] The buggy address is located 0 bytes to the right of [ 49.580016] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 49.592863] [ 49.594339] The buggy address belongs to the physical page: [ 49.599898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 49.607884] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.614391] page_type: f5(slab) [ 49.617524] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.625248] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.632967] page dumped because: kasan: bad access detected [ 49.638522] [ 49.639998] Memory state around the buggy address: [ 49.644777] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.651981] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.659186] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.666387] ^ [ 49.671164] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.678369] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.685570] ================================================================== [ 56.292834] ================================================================== [ 56.299883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 56.307172] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 56.314550] [ 56.316033] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 56.316085] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.316099] Hardware name: WinLink E850-96 board (DT) [ 56.316118] Call trace: [ 56.316131] show_stack+0x20/0x38 (C) [ 56.316165] dump_stack_lvl+0x8c/0xd0 [ 56.316198] print_report+0x118/0x608 [ 56.316229] kasan_report+0xdc/0x128 [ 56.316261] kasan_check_range+0x100/0x1a8 [ 56.316293] __kasan_check_write+0x20/0x30 [ 56.316330] kasan_atomics_helper+0xe44/0x4858 [ 56.316363] kasan_atomics+0x198/0x2e0 [ 56.316392] kunit_try_run_case+0x170/0x3f0 [ 56.316422] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.316459] kthread+0x328/0x630 [ 56.316490] ret_from_fork+0x10/0x20 [ 56.316521] [ 56.387466] Allocated by task 310: [ 56.390854] kasan_save_stack+0x3c/0x68 [ 56.394671] kasan_save_track+0x20/0x40 [ 56.398490] kasan_save_alloc_info+0x40/0x58 [ 56.402744] __kasan_kmalloc+0xd4/0xd8 [ 56.406476] __kmalloc_cache_noprof+0x15c/0x3c0 [ 56.410990] kasan_atomics+0xb8/0x2e0 [ 56.414636] kunit_try_run_case+0x170/0x3f0 [ 56.418802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.424271] kthread+0x328/0x630 [ 56.427483] ret_from_fork+0x10/0x20 [ 56.431042] [ 56.432519] The buggy address belongs to the object at ffff00080243ed00 [ 56.432519] which belongs to the cache kmalloc-64 of size 64 [ 56.444847] The buggy address is located 0 bytes to the right of [ 56.444847] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 56.457691] [ 56.459166] The buggy address belongs to the physical page: [ 56.464725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 56.472709] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.479219] page_type: f5(slab) [ 56.482351] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.490075] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.497794] page dumped because: kasan: bad access detected [ 56.503350] [ 56.504825] Memory state around the buggy address: [ 56.509604] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.516808] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.524013] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.531214] ^ [ 56.535992] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.543198] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.550398] ================================================================== [ 54.186763] ================================================================== [ 54.193838] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 54.201127] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 54.208506] [ 54.209988] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 54.210035] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.210053] Hardware name: WinLink E850-96 board (DT) [ 54.210072] Call trace: [ 54.210086] show_stack+0x20/0x38 (C) [ 54.210120] dump_stack_lvl+0x8c/0xd0 [ 54.210152] print_report+0x118/0x608 [ 54.210185] kasan_report+0xdc/0x128 [ 54.210215] kasan_check_range+0x100/0x1a8 [ 54.210249] __kasan_check_write+0x20/0x30 [ 54.210284] kasan_atomics_helper+0xc08/0x4858 [ 54.210315] kasan_atomics+0x198/0x2e0 [ 54.210346] kunit_try_run_case+0x170/0x3f0 [ 54.210378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.210412] kthread+0x328/0x630 [ 54.210444] ret_from_fork+0x10/0x20 [ 54.210473] [ 54.281421] Allocated by task 310: [ 54.284810] kasan_save_stack+0x3c/0x68 [ 54.288626] kasan_save_track+0x20/0x40 [ 54.292446] kasan_save_alloc_info+0x40/0x58 [ 54.296699] __kasan_kmalloc+0xd4/0xd8 [ 54.300431] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.304945] kasan_atomics+0xb8/0x2e0 [ 54.308591] kunit_try_run_case+0x170/0x3f0 [ 54.312758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.318226] kthread+0x328/0x630 [ 54.321438] ret_from_fork+0x10/0x20 [ 54.324997] [ 54.326474] The buggy address belongs to the object at ffff00080243ed00 [ 54.326474] which belongs to the cache kmalloc-64 of size 64 [ 54.338801] The buggy address is located 0 bytes to the right of [ 54.338801] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 54.351646] [ 54.353122] The buggy address belongs to the physical page: [ 54.358681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 54.366665] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.373175] page_type: f5(slab) [ 54.376306] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.384031] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.391750] page dumped because: kasan: bad access detected [ 54.397305] [ 54.398780] Memory state around the buggy address: [ 54.403559] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.410763] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.417968] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.425169] ^ [ 54.429947] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.437153] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.444353] ================================================================== [ 60.000245] ================================================================== [ 60.007119] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 60.014495] Read of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 60.021786] [ 60.023270] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 60.023322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.023338] Hardware name: WinLink E850-96 board (DT) [ 60.023358] Call trace: [ 60.023373] show_stack+0x20/0x38 (C) [ 60.023406] dump_stack_lvl+0x8c/0xd0 [ 60.023439] print_report+0x118/0x608 [ 60.023472] kasan_report+0xdc/0x128 [ 60.023503] __asan_report_load8_noabort+0x20/0x30 [ 60.023542] kasan_atomics_helper+0x3f04/0x4858 [ 60.023573] kasan_atomics+0x198/0x2e0 [ 60.023603] kunit_try_run_case+0x170/0x3f0 [ 60.023637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.023675] kthread+0x328/0x630 [ 60.023706] ret_from_fork+0x10/0x20 [ 60.023741] [ 60.091403] Allocated by task 310: [ 60.094791] kasan_save_stack+0x3c/0x68 [ 60.098609] kasan_save_track+0x20/0x40 [ 60.102428] kasan_save_alloc_info+0x40/0x58 [ 60.106681] __kasan_kmalloc+0xd4/0xd8 [ 60.110414] __kmalloc_cache_noprof+0x15c/0x3c0 [ 60.114927] kasan_atomics+0xb8/0x2e0 [ 60.118573] kunit_try_run_case+0x170/0x3f0 [ 60.122740] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.128208] kthread+0x328/0x630 [ 60.131420] ret_from_fork+0x10/0x20 [ 60.134979] [ 60.136456] The buggy address belongs to the object at ffff00080243ed00 [ 60.136456] which belongs to the cache kmalloc-64 of size 64 [ 60.148784] The buggy address is located 0 bytes to the right of [ 60.148784] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 60.161628] [ 60.163106] The buggy address belongs to the physical page: [ 60.168662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 60.176647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.183157] page_type: f5(slab) [ 60.186291] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.194013] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.201732] page dumped because: kasan: bad access detected [ 60.207287] [ 60.208762] Memory state around the buggy address: [ 60.213543] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.220746] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.227950] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.235152] ^ [ 60.239929] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.247135] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.254335] ================================================================== [ 53.133710] ================================================================== [ 53.140730] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 53.148018] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 53.155397] [ 53.156878] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 53.156928] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.156948] Hardware name: WinLink E850-96 board (DT) [ 53.156969] Call trace: [ 53.156981] show_stack+0x20/0x38 (C) [ 53.157014] dump_stack_lvl+0x8c/0xd0 [ 53.157047] print_report+0x118/0x608 [ 53.157078] kasan_report+0xdc/0x128 [ 53.157109] kasan_check_range+0x100/0x1a8 [ 53.157141] __kasan_check_write+0x20/0x30 [ 53.157176] kasan_atomics_helper+0xad4/0x4858 [ 53.157207] kasan_atomics+0x198/0x2e0 [ 53.157238] kunit_try_run_case+0x170/0x3f0 [ 53.157266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.157301] kthread+0x328/0x630 [ 53.157333] ret_from_fork+0x10/0x20 [ 53.157365] [ 53.228312] Allocated by task 310: [ 53.231701] kasan_save_stack+0x3c/0x68 [ 53.235517] kasan_save_track+0x20/0x40 [ 53.239336] kasan_save_alloc_info+0x40/0x58 [ 53.243590] __kasan_kmalloc+0xd4/0xd8 [ 53.247322] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.251836] kasan_atomics+0xb8/0x2e0 [ 53.255482] kunit_try_run_case+0x170/0x3f0 [ 53.259649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.265117] kthread+0x328/0x630 [ 53.268329] ret_from_fork+0x10/0x20 [ 53.271888] [ 53.273365] The buggy address belongs to the object at ffff00080243ed00 [ 53.273365] which belongs to the cache kmalloc-64 of size 64 [ 53.285693] The buggy address is located 0 bytes to the right of [ 53.285693] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 53.298537] [ 53.300012] The buggy address belongs to the physical page: [ 53.305572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 53.313554] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.320064] page_type: f5(slab) [ 53.323199] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.330922] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.338640] page dumped because: kasan: bad access detected [ 53.344196] [ 53.345671] Memory state around the buggy address: [ 53.350450] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.357654] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.364859] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.372060] ^ [ 53.376838] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.384044] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.391244] ================================================================== [ 61.848891] ================================================================== [ 61.855878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 61.863252] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 61.870631] [ 61.872112] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 61.872162] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.872175] Hardware name: WinLink E850-96 board (DT) [ 61.872196] Call trace: [ 61.872213] show_stack+0x20/0x38 (C) [ 61.872246] dump_stack_lvl+0x8c/0xd0 [ 61.872275] print_report+0x118/0x608 [ 61.872307] kasan_report+0xdc/0x128 [ 61.872338] kasan_check_range+0x100/0x1a8 [ 61.872372] __kasan_check_write+0x20/0x30 [ 61.872407] kasan_atomics_helper+0x1644/0x4858 [ 61.872439] kasan_atomics+0x198/0x2e0 [ 61.872471] kunit_try_run_case+0x170/0x3f0 [ 61.872503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.872539] kthread+0x328/0x630 [ 61.872571] ret_from_fork+0x10/0x20 [ 61.872603] [ 61.943632] Allocated by task 310: [ 61.947019] kasan_save_stack+0x3c/0x68 [ 61.950838] kasan_save_track+0x20/0x40 [ 61.954657] kasan_save_alloc_info+0x40/0x58 [ 61.958910] __kasan_kmalloc+0xd4/0xd8 [ 61.962643] __kmalloc_cache_noprof+0x15c/0x3c0 [ 61.967157] kasan_atomics+0xb8/0x2e0 [ 61.970802] kunit_try_run_case+0x170/0x3f0 [ 61.974969] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.980438] kthread+0x328/0x630 [ 61.983649] ret_from_fork+0x10/0x20 [ 61.987208] [ 61.988685] The buggy address belongs to the object at ffff00080243ed00 [ 61.988685] which belongs to the cache kmalloc-64 of size 64 [ 62.001013] The buggy address is located 0 bytes to the right of [ 62.001013] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 62.013857] [ 62.015334] The buggy address belongs to the physical page: [ 62.020892] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 62.028875] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.035386] page_type: f5(slab) [ 62.038517] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 62.046242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.053961] page dumped because: kasan: bad access detected [ 62.059516] [ 62.060992] Memory state around the buggy address: [ 62.065772] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.072975] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.080180] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.087380] ^ [ 62.092158] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.099365] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.106564] ================================================================== [ 55.239904] ================================================================== [ 55.246948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 55.254236] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 55.261615] [ 55.263098] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 55.263147] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.263165] Hardware name: WinLink E850-96 board (DT) [ 55.263182] Call trace: [ 55.263197] show_stack+0x20/0x38 (C) [ 55.263230] dump_stack_lvl+0x8c/0xd0 [ 55.263263] print_report+0x118/0x608 [ 55.263297] kasan_report+0xdc/0x128 [ 55.263327] kasan_check_range+0x100/0x1a8 [ 55.263361] __kasan_check_write+0x20/0x30 [ 55.263395] kasan_atomics_helper+0xd3c/0x4858 [ 55.263428] kasan_atomics+0x198/0x2e0 [ 55.263457] kunit_try_run_case+0x170/0x3f0 [ 55.263487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.263521] kthread+0x328/0x630 [ 55.263553] ret_from_fork+0x10/0x20 [ 55.263584] [ 55.334531] Allocated by task 310: [ 55.337919] kasan_save_stack+0x3c/0x68 [ 55.341735] kasan_save_track+0x20/0x40 [ 55.345555] kasan_save_alloc_info+0x40/0x58 [ 55.349808] __kasan_kmalloc+0xd4/0xd8 [ 55.353540] __kmalloc_cache_noprof+0x15c/0x3c0 [ 55.358055] kasan_atomics+0xb8/0x2e0 [ 55.361700] kunit_try_run_case+0x170/0x3f0 [ 55.365867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.371335] kthread+0x328/0x630 [ 55.374547] ret_from_fork+0x10/0x20 [ 55.378106] [ 55.379583] The buggy address belongs to the object at ffff00080243ed00 [ 55.379583] which belongs to the cache kmalloc-64 of size 64 [ 55.391908] The buggy address is located 0 bytes to the right of [ 55.391908] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 55.404755] [ 55.406231] The buggy address belongs to the physical page: [ 55.411790] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 55.419774] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.426284] page_type: f5(slab) [ 55.429415] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.437140] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.444859] page dumped because: kasan: bad access detected [ 55.450414] [ 55.451890] Memory state around the buggy address: [ 55.456670] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.463873] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.471077] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.478278] ^ [ 55.483056] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.490262] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.497462] ================================================================== [ 46.519832] ================================================================== [ 46.534061] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 46.541435] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 46.548726] [ 46.550212] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 46.550273] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.550292] Hardware name: WinLink E850-96 board (DT) [ 46.550315] Call trace: [ 46.550330] show_stack+0x20/0x38 (C) [ 46.550367] dump_stack_lvl+0x8c/0xd0 [ 46.550401] print_report+0x118/0x608 [ 46.550439] kasan_report+0xdc/0x128 [ 46.550469] __asan_report_load4_noabort+0x20/0x30 [ 46.550508] kasan_atomics_helper+0x40a8/0x4858 [ 46.550544] kasan_atomics+0x198/0x2e0 [ 46.550572] kunit_try_run_case+0x170/0x3f0 [ 46.550606] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.550647] kthread+0x328/0x630 [ 46.550684] ret_from_fork+0x10/0x20 [ 46.550720] [ 46.618343] Allocated by task 310: [ 46.621731] kasan_save_stack+0x3c/0x68 [ 46.625546] kasan_save_track+0x20/0x40 [ 46.629366] kasan_save_alloc_info+0x40/0x58 [ 46.633620] __kasan_kmalloc+0xd4/0xd8 [ 46.637352] __kmalloc_cache_noprof+0x15c/0x3c0 [ 46.641866] kasan_atomics+0xb8/0x2e0 [ 46.645512] kunit_try_run_case+0x170/0x3f0 [ 46.649678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.655147] kthread+0x328/0x630 [ 46.658358] ret_from_fork+0x10/0x20 [ 46.661918] [ 46.663396] The buggy address belongs to the object at ffff00080243ed00 [ 46.663396] which belongs to the cache kmalloc-64 of size 64 [ 46.675724] The buggy address is located 0 bytes to the right of [ 46.675724] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 46.688567] [ 46.690046] The buggy address belongs to the physical page: [ 46.695601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 46.703586] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.710096] page_type: f5(slab) [ 46.713234] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 46.720951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.728670] page dumped because: kasan: bad access detected [ 46.734225] [ 46.735701] Memory state around the buggy address: [ 46.740482] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.747684] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.754890] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 46.762090] ^ [ 46.766868] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.774074] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.781275] ================================================================== [ 53.925211] ================================================================== [ 53.932211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 53.939586] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 53.946878] [ 53.948360] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 53.948407] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.948423] Hardware name: WinLink E850-96 board (DT) [ 53.948445] Call trace: [ 53.948458] show_stack+0x20/0x38 (C) [ 53.948490] dump_stack_lvl+0x8c/0xd0 [ 53.948521] print_report+0x118/0x608 [ 53.948554] kasan_report+0xdc/0x128 [ 53.948588] __asan_report_load4_noabort+0x20/0x30 [ 53.948623] kasan_atomics_helper+0x3dbc/0x4858 [ 53.948654] kasan_atomics+0x198/0x2e0 [ 53.948683] kunit_try_run_case+0x170/0x3f0 [ 53.948714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.948749] kthread+0x328/0x630 [ 53.948785] ret_from_fork+0x10/0x20 [ 53.948815] [ 54.016495] Allocated by task 310: [ 54.019884] kasan_save_stack+0x3c/0x68 [ 54.023699] kasan_save_track+0x20/0x40 [ 54.027519] kasan_save_alloc_info+0x40/0x58 [ 54.031773] __kasan_kmalloc+0xd4/0xd8 [ 54.035505] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.040019] kasan_atomics+0xb8/0x2e0 [ 54.043665] kunit_try_run_case+0x170/0x3f0 [ 54.047831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.053300] kthread+0x328/0x630 [ 54.056512] ret_from_fork+0x10/0x20 [ 54.060071] [ 54.061546] The buggy address belongs to the object at ffff00080243ed00 [ 54.061546] which belongs to the cache kmalloc-64 of size 64 [ 54.073874] The buggy address is located 0 bytes to the right of [ 54.073874] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 54.086719] [ 54.088197] The buggy address belongs to the physical page: [ 54.093754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 54.101739] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.108248] page_type: f5(slab) [ 54.111380] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.119104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.126823] page dumped because: kasan: bad access detected [ 54.132378] [ 54.133854] Memory state around the buggy address: [ 54.138634] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.145837] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.153041] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.160243] ^ [ 54.165021] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.172227] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.179426] ================================================================== [ 50.752607] ================================================================== [ 50.759689] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 50.766978] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 50.774356] [ 50.775839] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 50.775892] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.775909] Hardware name: WinLink E850-96 board (DT) [ 50.775929] Call trace: [ 50.775941] show_stack+0x20/0x38 (C) [ 50.775974] dump_stack_lvl+0x8c/0xd0 [ 50.776004] print_report+0x118/0x608 [ 50.776033] kasan_report+0xdc/0x128 [ 50.776064] kasan_check_range+0x100/0x1a8 [ 50.776097] __kasan_check_write+0x20/0x30 [ 50.776132] kasan_atomics_helper+0x6ec/0x4858 [ 50.776164] kasan_atomics+0x198/0x2e0 [ 50.776193] kunit_try_run_case+0x170/0x3f0 [ 50.776223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.776257] kthread+0x328/0x630 [ 50.776288] ret_from_fork+0x10/0x20 [ 50.776318] [ 50.847271] Allocated by task 310: [ 50.850659] kasan_save_stack+0x3c/0x68 [ 50.854476] kasan_save_track+0x20/0x40 [ 50.858296] kasan_save_alloc_info+0x40/0x58 [ 50.862549] __kasan_kmalloc+0xd4/0xd8 [ 50.866282] __kmalloc_cache_noprof+0x15c/0x3c0 [ 50.870795] kasan_atomics+0xb8/0x2e0 [ 50.874441] kunit_try_run_case+0x170/0x3f0 [ 50.878608] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.884076] kthread+0x328/0x630 [ 50.887288] ret_from_fork+0x10/0x20 [ 50.890847] [ 50.892324] The buggy address belongs to the object at ffff00080243ed00 [ 50.892324] which belongs to the cache kmalloc-64 of size 64 [ 50.904650] The buggy address is located 0 bytes to the right of [ 50.904650] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 50.917496] [ 50.918972] The buggy address belongs to the physical page: [ 50.924531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 50.932515] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.939025] page_type: f5(slab) [ 50.942156] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.949881] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.957600] page dumped because: kasan: bad access detected [ 50.963155] [ 50.964631] Memory state around the buggy address: [ 50.969411] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.976614] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.983818] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.991019] ^ [ 50.995797] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.003003] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.010203] ================================================================== [ 52.338872] ================================================================== [ 52.345950] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 52.353239] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 52.360617] [ 52.362098] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 52.362149] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.362165] Hardware name: WinLink E850-96 board (DT) [ 52.362186] Call trace: [ 52.362200] show_stack+0x20/0x38 (C) [ 52.362235] dump_stack_lvl+0x8c/0xd0 [ 52.362267] print_report+0x118/0x608 [ 52.362299] kasan_report+0xdc/0x128 [ 52.362327] kasan_check_range+0x100/0x1a8 [ 52.362358] __kasan_check_write+0x20/0x30 [ 52.362393] kasan_atomics_helper+0x99c/0x4858 [ 52.362424] kasan_atomics+0x198/0x2e0 [ 52.362454] kunit_try_run_case+0x170/0x3f0 [ 52.362484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.362520] kthread+0x328/0x630 [ 52.362550] ret_from_fork+0x10/0x20 [ 52.362582] [ 52.433532] Allocated by task 310: [ 52.436919] kasan_save_stack+0x3c/0x68 [ 52.440737] kasan_save_track+0x20/0x40 [ 52.444557] kasan_save_alloc_info+0x40/0x58 [ 52.448810] __kasan_kmalloc+0xd4/0xd8 [ 52.452542] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.457056] kasan_atomics+0xb8/0x2e0 [ 52.460702] kunit_try_run_case+0x170/0x3f0 [ 52.464869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.470337] kthread+0x328/0x630 [ 52.473549] ret_from_fork+0x10/0x20 [ 52.477108] [ 52.478584] The buggy address belongs to the object at ffff00080243ed00 [ 52.478584] which belongs to the cache kmalloc-64 of size 64 [ 52.490911] The buggy address is located 0 bytes to the right of [ 52.490911] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 52.503757] [ 52.505233] The buggy address belongs to the physical page: [ 52.510792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 52.518775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.525284] page_type: f5(slab) [ 52.528417] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.536142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.543861] page dumped because: kasan: bad access detected [ 52.549416] [ 52.550891] Memory state around the buggy address: [ 52.555670] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.562874] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.570079] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.577280] ^ [ 52.582058] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.589264] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.596464] ================================================================== [ 52.868841] ================================================================== [ 52.875802] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 52.883092] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 52.890470] [ 52.891953] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 52.892003] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.892021] Hardware name: WinLink E850-96 board (DT) [ 52.892040] Call trace: [ 52.892055] show_stack+0x20/0x38 (C) [ 52.892088] dump_stack_lvl+0x8c/0xd0 [ 52.892120] print_report+0x118/0x608 [ 52.892151] kasan_report+0xdc/0x128 [ 52.892180] kasan_check_range+0x100/0x1a8 [ 52.892212] __kasan_check_write+0x20/0x30 [ 52.892247] kasan_atomics_helper+0xa6c/0x4858 [ 52.892278] kasan_atomics+0x198/0x2e0 [ 52.892308] kunit_try_run_case+0x170/0x3f0 [ 52.892337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.892374] kthread+0x328/0x630 [ 52.892407] ret_from_fork+0x10/0x20 [ 52.892439] [ 52.963385] Allocated by task 310: [ 52.966773] kasan_save_stack+0x3c/0x68 [ 52.970591] kasan_save_track+0x20/0x40 [ 52.974410] kasan_save_alloc_info+0x40/0x58 [ 52.978663] __kasan_kmalloc+0xd4/0xd8 [ 52.982395] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.986910] kasan_atomics+0xb8/0x2e0 [ 52.990555] kunit_try_run_case+0x170/0x3f0 [ 52.994722] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.000190] kthread+0x328/0x630 [ 53.003402] ret_from_fork+0x10/0x20 [ 53.006961] [ 53.008438] The buggy address belongs to the object at ffff00080243ed00 [ 53.008438] which belongs to the cache kmalloc-64 of size 64 [ 53.020765] The buggy address is located 0 bytes to the right of [ 53.020765] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 53.033610] [ 53.035087] The buggy address belongs to the physical page: [ 53.040645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 53.048628] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.055138] page_type: f5(slab) [ 53.058272] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.065995] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.073714] page dumped because: kasan: bad access detected [ 53.079269] [ 53.080745] Memory state around the buggy address: [ 53.085524] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.092728] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.099932] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.107133] ^ [ 53.111911] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.119117] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.126317] ================================================================== [ 57.349409] ================================================================== [ 57.356464] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 57.363754] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 57.371132] [ 57.372614] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 57.372664] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.372679] Hardware name: WinLink E850-96 board (DT) [ 57.372697] Call trace: [ 57.372712] show_stack+0x20/0x38 (C) [ 57.372747] dump_stack_lvl+0x8c/0xd0 [ 57.372778] print_report+0x118/0x608 [ 57.372810] kasan_report+0xdc/0x128 [ 57.372840] kasan_check_range+0x100/0x1a8 [ 57.372873] __kasan_check_write+0x20/0x30 [ 57.372907] kasan_atomics_helper+0xf88/0x4858 [ 57.372937] kasan_atomics+0x198/0x2e0 [ 57.372966] kunit_try_run_case+0x170/0x3f0 [ 57.372999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.373033] kthread+0x328/0x630 [ 57.373066] ret_from_fork+0x10/0x20 [ 57.373097] [ 57.444047] Allocated by task 310: [ 57.447435] kasan_save_stack+0x3c/0x68 [ 57.451252] kasan_save_track+0x20/0x40 [ 57.455072] kasan_save_alloc_info+0x40/0x58 [ 57.459325] __kasan_kmalloc+0xd4/0xd8 [ 57.463058] __kmalloc_cache_noprof+0x15c/0x3c0 [ 57.467571] kasan_atomics+0xb8/0x2e0 [ 57.471217] kunit_try_run_case+0x170/0x3f0 [ 57.475384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.480852] kthread+0x328/0x630 [ 57.484064] ret_from_fork+0x10/0x20 [ 57.487623] [ 57.489098] The buggy address belongs to the object at ffff00080243ed00 [ 57.489098] which belongs to the cache kmalloc-64 of size 64 [ 57.501428] The buggy address is located 0 bytes to the right of [ 57.501428] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 57.514272] [ 57.515748] The buggy address belongs to the physical page: [ 57.521305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 57.529290] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.535800] page_type: f5(slab) [ 57.538933] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.546657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.554376] page dumped because: kasan: bad access detected [ 57.559931] [ 57.561406] Memory state around the buggy address: [ 57.566186] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.573390] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.580594] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.587795] ^ [ 57.592573] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.599779] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.606979] ================================================================== [ 62.375582] ================================================================== [ 62.382604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 62.389981] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 62.397359] [ 62.398841] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 62.398892] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.398906] Hardware name: WinLink E850-96 board (DT) [ 62.398927] Call trace: [ 62.398942] show_stack+0x20/0x38 (C) [ 62.398974] dump_stack_lvl+0x8c/0xd0 [ 62.399006] print_report+0x118/0x608 [ 62.399035] kasan_report+0xdc/0x128 [ 62.399065] kasan_check_range+0x100/0x1a8 [ 62.399098] __kasan_check_write+0x20/0x30 [ 62.399131] kasan_atomics_helper+0x16d0/0x4858 [ 62.399162] kasan_atomics+0x198/0x2e0 [ 62.399191] kunit_try_run_case+0x170/0x3f0 [ 62.399222] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.399258] kthread+0x328/0x630 [ 62.399290] ret_from_fork+0x10/0x20 [ 62.399323] [ 62.470361] Allocated by task 310: [ 62.473748] kasan_save_stack+0x3c/0x68 [ 62.477566] kasan_save_track+0x20/0x40 [ 62.481385] kasan_save_alloc_info+0x40/0x58 [ 62.485638] __kasan_kmalloc+0xd4/0xd8 [ 62.489371] __kmalloc_cache_noprof+0x15c/0x3c0 [ 62.493885] kasan_atomics+0xb8/0x2e0 [ 62.497530] kunit_try_run_case+0x170/0x3f0 [ 62.501697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.507166] kthread+0x328/0x630 [ 62.510378] ret_from_fork+0x10/0x20 [ 62.513936] [ 62.515414] The buggy address belongs to the object at ffff00080243ed00 [ 62.515414] which belongs to the cache kmalloc-64 of size 64 [ 62.527740] The buggy address is located 0 bytes to the right of [ 62.527740] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 62.540586] [ 62.542061] The buggy address belongs to the physical page: [ 62.547619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 62.555604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.562114] page_type: f5(slab) [ 62.565246] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 62.572970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.580689] page dumped because: kasan: bad access detected [ 62.586244] [ 62.587720] Memory state around the buggy address: [ 62.592498] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.599703] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.606908] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.614109] ^ [ 62.618887] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.626093] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.633292] ================================================================== [ 60.791930] ================================================================== [ 60.798948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 60.806324] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 60.813702] [ 60.815184] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 60.815232] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.815248] Hardware name: WinLink E850-96 board (DT) [ 60.815267] Call trace: [ 60.815283] show_stack+0x20/0x38 (C) [ 60.815317] dump_stack_lvl+0x8c/0xd0 [ 60.815352] print_report+0x118/0x608 [ 60.815385] kasan_report+0xdc/0x128 [ 60.815414] kasan_check_range+0x100/0x1a8 [ 60.815447] __kasan_check_write+0x20/0x30 [ 60.815480] kasan_atomics_helper+0x14e4/0x4858 [ 60.815513] kasan_atomics+0x198/0x2e0 [ 60.815541] kunit_try_run_case+0x170/0x3f0 [ 60.815571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.815605] kthread+0x328/0x630 [ 60.815637] ret_from_fork+0x10/0x20 [ 60.815668] [ 60.886704] Allocated by task 310: [ 60.890091] kasan_save_stack+0x3c/0x68 [ 60.893909] kasan_save_track+0x20/0x40 [ 60.897729] kasan_save_alloc_info+0x40/0x58 [ 60.901982] __kasan_kmalloc+0xd4/0xd8 [ 60.905714] __kmalloc_cache_noprof+0x15c/0x3c0 [ 60.910228] kasan_atomics+0xb8/0x2e0 [ 60.913874] kunit_try_run_case+0x170/0x3f0 [ 60.918040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.923509] kthread+0x328/0x630 [ 60.926721] ret_from_fork+0x10/0x20 [ 60.930280] [ 60.931757] The buggy address belongs to the object at ffff00080243ed00 [ 60.931757] which belongs to the cache kmalloc-64 of size 64 [ 60.944082] The buggy address is located 0 bytes to the right of [ 60.944082] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 60.956929] [ 60.958406] The buggy address belongs to the physical page: [ 60.963963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 60.971948] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.978458] page_type: f5(slab) [ 60.981589] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.989314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.997032] page dumped because: kasan: bad access detected [ 61.002588] [ 61.004063] Memory state around the buggy address: [ 61.008841] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.016046] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.023251] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.030452] ^ [ 61.035230] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.042436] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.049636] ================================================================== [ 62.902388] ================================================================== [ 62.909335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 62.916709] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 62.924087] [ 62.925569] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 62.925618] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.925635] Hardware name: WinLink E850-96 board (DT) [ 62.925654] Call trace: [ 62.925665] show_stack+0x20/0x38 (C) [ 62.925699] dump_stack_lvl+0x8c/0xd0 [ 62.925732] print_report+0x118/0x608 [ 62.925764] kasan_report+0xdc/0x128 [ 62.925794] kasan_check_range+0x100/0x1a8 [ 62.925828] __kasan_check_write+0x20/0x30 [ 62.925864] kasan_atomics_helper+0x175c/0x4858 [ 62.925896] kasan_atomics+0x198/0x2e0 [ 62.925924] kunit_try_run_case+0x170/0x3f0 [ 62.925958] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.925993] kthread+0x328/0x630 [ 62.926025] ret_from_fork+0x10/0x20 [ 62.926056] [ 62.997089] Allocated by task 310: [ 63.000476] kasan_save_stack+0x3c/0x68 [ 63.004294] kasan_save_track+0x20/0x40 [ 63.008113] kasan_save_alloc_info+0x40/0x58 [ 63.012367] __kasan_kmalloc+0xd4/0xd8 [ 63.016099] __kmalloc_cache_noprof+0x15c/0x3c0 [ 63.020613] kasan_atomics+0xb8/0x2e0 [ 63.024259] kunit_try_run_case+0x170/0x3f0 [ 63.028425] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.033894] kthread+0x328/0x630 [ 63.037106] ret_from_fork+0x10/0x20 [ 63.040665] [ 63.042140] The buggy address belongs to the object at ffff00080243ed00 [ 63.042140] which belongs to the cache kmalloc-64 of size 64 [ 63.054469] The buggy address is located 0 bytes to the right of [ 63.054469] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 63.067314] [ 63.068790] The buggy address belongs to the physical page: [ 63.074349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 63.082334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.088843] page_type: f5(slab) [ 63.091976] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 63.099698] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.107417] page dumped because: kasan: bad access detected [ 63.112973] [ 63.114448] Memory state around the buggy address: [ 63.119229] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.126431] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.133636] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.140837] ^ [ 63.145615] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.152821] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.160021] ================================================================== [ 60.526766] ================================================================== [ 60.533848] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 60.541224] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 60.548602] [ 60.550083] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 60.550130] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.550150] Hardware name: WinLink E850-96 board (DT) [ 60.550170] Call trace: [ 60.550185] show_stack+0x20/0x38 (C) [ 60.550216] dump_stack_lvl+0x8c/0xd0 [ 60.550248] print_report+0x118/0x608 [ 60.550280] kasan_report+0xdc/0x128 [ 60.550311] kasan_check_range+0x100/0x1a8 [ 60.550343] __kasan_check_write+0x20/0x30 [ 60.550378] kasan_atomics_helper+0x147c/0x4858 [ 60.550411] kasan_atomics+0x198/0x2e0 [ 60.550440] kunit_try_run_case+0x170/0x3f0 [ 60.550473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.550509] kthread+0x328/0x630 [ 60.550541] ret_from_fork+0x10/0x20 [ 60.550572] [ 60.621603] Allocated by task 310: [ 60.624991] kasan_save_stack+0x3c/0x68 [ 60.628809] kasan_save_track+0x20/0x40 [ 60.632628] kasan_save_alloc_info+0x40/0x58 [ 60.636881] __kasan_kmalloc+0xd4/0xd8 [ 60.640614] __kmalloc_cache_noprof+0x15c/0x3c0 [ 60.645128] kasan_atomics+0xb8/0x2e0 [ 60.648773] kunit_try_run_case+0x170/0x3f0 [ 60.652940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.658409] kthread+0x328/0x630 [ 60.661621] ret_from_fork+0x10/0x20 [ 60.665180] [ 60.666657] The buggy address belongs to the object at ffff00080243ed00 [ 60.666657] which belongs to the cache kmalloc-64 of size 64 [ 60.678985] The buggy address is located 0 bytes to the right of [ 60.678985] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 60.691829] [ 60.693304] The buggy address belongs to the physical page: [ 60.698862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 60.706847] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.713357] page_type: f5(slab) [ 60.716489] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.724214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.731932] page dumped because: kasan: bad access detected [ 60.737487] [ 60.738963] Memory state around the buggy address: [ 60.743741] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.750946] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.758151] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.765352] ^ [ 60.770130] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.777336] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.784536] ================================================================== [ 51.547447] ================================================================== [ 51.554469] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 51.561758] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 51.569136] [ 51.570616] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 51.570665] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.570682] Hardware name: WinLink E850-96 board (DT) [ 51.570702] Call trace: [ 51.570716] show_stack+0x20/0x38 (C) [ 51.570751] dump_stack_lvl+0x8c/0xd0 [ 51.570782] print_report+0x118/0x608 [ 51.570814] kasan_report+0xdc/0x128 [ 51.570843] kasan_check_range+0x100/0x1a8 [ 51.570878] __kasan_check_write+0x20/0x30 [ 51.570911] kasan_atomics_helper+0x894/0x4858 [ 51.570942] kasan_atomics+0x198/0x2e0 [ 51.570970] kunit_try_run_case+0x170/0x3f0 [ 51.571001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.571036] kthread+0x328/0x630 [ 51.571070] ret_from_fork+0x10/0x20 [ 51.571103] [ 51.642051] Allocated by task 310: [ 51.645438] kasan_save_stack+0x3c/0x68 [ 51.649256] kasan_save_track+0x20/0x40 [ 51.653076] kasan_save_alloc_info+0x40/0x58 [ 51.657329] __kasan_kmalloc+0xd4/0xd8 [ 51.661061] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.665575] kasan_atomics+0xb8/0x2e0 [ 51.669221] kunit_try_run_case+0x170/0x3f0 [ 51.673387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.678856] kthread+0x328/0x630 [ 51.682068] ret_from_fork+0x10/0x20 [ 51.685627] [ 51.687104] The buggy address belongs to the object at ffff00080243ed00 [ 51.687104] which belongs to the cache kmalloc-64 of size 64 [ 51.699429] The buggy address is located 0 bytes to the right of [ 51.699429] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 51.712276] [ 51.713752] The buggy address belongs to the physical page: [ 51.719311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 51.727295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.733803] page_type: f5(slab) [ 51.736936] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.744661] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.752379] page dumped because: kasan: bad access detected [ 51.757935] [ 51.759410] Memory state around the buggy address: [ 51.764189] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.771393] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.778598] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.785799] ^ [ 51.790577] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.797783] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.804983] ================================================================== [ 58.939740] ================================================================== [ 58.946719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 58.954095] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 58.961473] [ 58.962954] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 58.963008] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.963023] Hardware name: WinLink E850-96 board (DT) [ 58.963042] Call trace: [ 58.963057] show_stack+0x20/0x38 (C) [ 58.963094] dump_stack_lvl+0x8c/0xd0 [ 58.963128] print_report+0x118/0x608 [ 58.963160] kasan_report+0xdc/0x128 [ 58.963190] kasan_check_range+0x100/0x1a8 [ 58.963224] __kasan_check_write+0x20/0x30 [ 58.963257] kasan_atomics_helper+0x11f8/0x4858 [ 58.963288] kasan_atomics+0x198/0x2e0 [ 58.963317] kunit_try_run_case+0x170/0x3f0 [ 58.963348] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.963386] kthread+0x328/0x630 [ 58.963417] ret_from_fork+0x10/0x20 [ 58.963449] [ 59.034475] Allocated by task 310: [ 59.037862] kasan_save_stack+0x3c/0x68 [ 59.041680] kasan_save_track+0x20/0x40 [ 59.045499] kasan_save_alloc_info+0x40/0x58 [ 59.049753] __kasan_kmalloc+0xd4/0xd8 [ 59.053485] __kmalloc_cache_noprof+0x15c/0x3c0 [ 59.057999] kasan_atomics+0xb8/0x2e0 [ 59.061645] kunit_try_run_case+0x170/0x3f0 [ 59.065811] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.071280] kthread+0x328/0x630 [ 59.074492] ret_from_fork+0x10/0x20 [ 59.078051] [ 59.079526] The buggy address belongs to the object at ffff00080243ed00 [ 59.079526] which belongs to the cache kmalloc-64 of size 64 [ 59.091854] The buggy address is located 0 bytes to the right of [ 59.091854] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 59.104699] [ 59.106175] The buggy address belongs to the physical page: [ 59.111735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 59.119718] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.126227] page_type: f5(slab) [ 59.129362] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.137084] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.144803] page dumped because: kasan: bad access detected [ 59.150358] [ 59.151834] Memory state around the buggy address: [ 59.156615] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.163817] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.171021] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.178223] ^ [ 59.183001] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.190207] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.197408] ================================================================== [ 48.633261] ================================================================== [ 48.640275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 48.647565] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 48.654943] [ 48.656423] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 48.656472] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.656490] Hardware name: WinLink E850-96 board (DT) [ 48.656511] Call trace: [ 48.656525] show_stack+0x20/0x38 (C) [ 48.656559] dump_stack_lvl+0x8c/0xd0 [ 48.656591] print_report+0x118/0x608 [ 48.656621] kasan_report+0xdc/0x128 [ 48.656653] kasan_check_range+0x100/0x1a8 [ 48.656685] __kasan_check_write+0x20/0x30 [ 48.656720] kasan_atomics_helper+0x3ac/0x4858 [ 48.656753] kasan_atomics+0x198/0x2e0 [ 48.656781] kunit_try_run_case+0x170/0x3f0 [ 48.656812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.656849] kthread+0x328/0x630 [ 48.656880] ret_from_fork+0x10/0x20 [ 48.656911] [ 48.727859] Allocated by task 310: [ 48.731248] kasan_save_stack+0x3c/0x68 [ 48.735064] kasan_save_track+0x20/0x40 [ 48.738883] kasan_save_alloc_info+0x40/0x58 [ 48.743136] __kasan_kmalloc+0xd4/0xd8 [ 48.746869] __kmalloc_cache_noprof+0x15c/0x3c0 [ 48.751383] kasan_atomics+0xb8/0x2e0 [ 48.755029] kunit_try_run_case+0x170/0x3f0 [ 48.759195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.764664] kthread+0x328/0x630 [ 48.767875] ret_from_fork+0x10/0x20 [ 48.771435] [ 48.772910] The buggy address belongs to the object at ffff00080243ed00 [ 48.772910] which belongs to the cache kmalloc-64 of size 64 [ 48.785237] The buggy address is located 0 bytes to the right of [ 48.785237] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 48.798083] [ 48.799559] The buggy address belongs to the physical page: [ 48.805117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 48.813101] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.819612] page_type: f5(slab) [ 48.822744] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.830468] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.838187] page dumped because: kasan: bad access detected [ 48.843742] [ 48.845218] Memory state around the buggy address: [ 48.849996] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.857201] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.864406] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.871607] ^ [ 48.876385] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.883591] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.890791] ================================================================== [ 61.322126] ================================================================== [ 61.329147] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 61.336524] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 61.343902] [ 61.345383] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 61.345433] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.345450] Hardware name: WinLink E850-96 board (DT) [ 61.345471] Call trace: [ 61.345485] show_stack+0x20/0x38 (C) [ 61.345518] dump_stack_lvl+0x8c/0xd0 [ 61.345550] print_report+0x118/0x608 [ 61.345580] kasan_report+0xdc/0x128 [ 61.345611] kasan_check_range+0x100/0x1a8 [ 61.345645] __kasan_check_write+0x20/0x30 [ 61.345679] kasan_atomics_helper+0x15b4/0x4858 [ 61.345712] kasan_atomics+0x198/0x2e0 [ 61.345742] kunit_try_run_case+0x170/0x3f0 [ 61.345773] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.345809] kthread+0x328/0x630 [ 61.345843] ret_from_fork+0x10/0x20 [ 61.345875] [ 61.416904] Allocated by task 310: [ 61.420292] kasan_save_stack+0x3c/0x68 [ 61.424109] kasan_save_track+0x20/0x40 [ 61.427929] kasan_save_alloc_info+0x40/0x58 [ 61.432182] __kasan_kmalloc+0xd4/0xd8 [ 61.435915] __kmalloc_cache_noprof+0x15c/0x3c0 [ 61.440428] kasan_atomics+0xb8/0x2e0 [ 61.444074] kunit_try_run_case+0x170/0x3f0 [ 61.448241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.453709] kthread+0x328/0x630 [ 61.456921] ret_from_fork+0x10/0x20 [ 61.460480] [ 61.461957] The buggy address belongs to the object at ffff00080243ed00 [ 61.461957] which belongs to the cache kmalloc-64 of size 64 [ 61.474285] The buggy address is located 0 bytes to the right of [ 61.474285] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 61.487129] [ 61.488605] The buggy address belongs to the physical page: [ 61.494164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 61.502148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.508658] page_type: f5(slab) [ 61.511789] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 61.519514] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.527233] page dumped because: kasan: bad access detected [ 61.532788] [ 61.534263] Memory state around the buggy address: [ 61.539043] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.546247] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.553451] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.560652] ^ [ 61.565430] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.572636] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.579836] ================================================================== [ 58.409492] ================================================================== [ 58.416517] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 58.423894] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 58.431272] [ 58.432755] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 58.432806] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.432823] Hardware name: WinLink E850-96 board (DT) [ 58.432841] Call trace: [ 58.432853] show_stack+0x20/0x38 (C) [ 58.432887] dump_stack_lvl+0x8c/0xd0 [ 58.432919] print_report+0x118/0x608 [ 58.432951] kasan_report+0xdc/0x128 [ 58.432981] kasan_check_range+0x100/0x1a8 [ 58.433018] __kasan_check_write+0x20/0x30 [ 58.433051] kasan_atomics_helper+0x1128/0x4858 [ 58.433084] kasan_atomics+0x198/0x2e0 [ 58.433112] kunit_try_run_case+0x170/0x3f0 [ 58.433143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.433178] kthread+0x328/0x630 [ 58.433210] ret_from_fork+0x10/0x20 [ 58.433241] [ 58.504274] Allocated by task 310: [ 58.507662] kasan_save_stack+0x3c/0x68 [ 58.511480] kasan_save_track+0x20/0x40 [ 58.515299] kasan_save_alloc_info+0x40/0x58 [ 58.519552] __kasan_kmalloc+0xd4/0xd8 [ 58.523285] __kmalloc_cache_noprof+0x15c/0x3c0 [ 58.527798] kasan_atomics+0xb8/0x2e0 [ 58.531444] kunit_try_run_case+0x170/0x3f0 [ 58.535611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.541080] kthread+0x328/0x630 [ 58.544291] ret_from_fork+0x10/0x20 [ 58.547850] [ 58.549326] The buggy address belongs to the object at ffff00080243ed00 [ 58.549326] which belongs to the cache kmalloc-64 of size 64 [ 58.561654] The buggy address is located 0 bytes to the right of [ 58.561654] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 58.574499] [ 58.575975] The buggy address belongs to the physical page: [ 58.581534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 58.589518] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.596027] page_type: f5(slab) [ 58.599159] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.606884] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.614603] page dumped because: kasan: bad access detected [ 58.620158] [ 58.621634] Memory state around the buggy address: [ 58.626413] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.633617] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.640823] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.648023] ^ [ 58.652800] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.660007] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.667206] ================================================================== [ 58.144366] ================================================================== [ 58.151417] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 58.158794] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 58.166172] [ 58.167653] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 58.167703] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.167718] Hardware name: WinLink E850-96 board (DT) [ 58.167739] Call trace: [ 58.167754] show_stack+0x20/0x38 (C) [ 58.167786] dump_stack_lvl+0x8c/0xd0 [ 58.167817] print_report+0x118/0x608 [ 58.167849] kasan_report+0xdc/0x128 [ 58.167879] kasan_check_range+0x100/0x1a8 [ 58.167911] __kasan_check_write+0x20/0x30 [ 58.167943] kasan_atomics_helper+0x10c0/0x4858 [ 58.167975] kasan_atomics+0x198/0x2e0 [ 58.168004] kunit_try_run_case+0x170/0x3f0 [ 58.168035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.168071] kthread+0x328/0x630 [ 58.168102] ret_from_fork+0x10/0x20 [ 58.168133] [ 58.239174] Allocated by task 310: [ 58.242562] kasan_save_stack+0x3c/0x68 [ 58.246379] kasan_save_track+0x20/0x40 [ 58.250199] kasan_save_alloc_info+0x40/0x58 [ 58.254452] __kasan_kmalloc+0xd4/0xd8 [ 58.258185] __kmalloc_cache_noprof+0x15c/0x3c0 [ 58.262698] kasan_atomics+0xb8/0x2e0 [ 58.266344] kunit_try_run_case+0x170/0x3f0 [ 58.270511] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.275979] kthread+0x328/0x630 [ 58.279191] ret_from_fork+0x10/0x20 [ 58.282750] [ 58.284225] The buggy address belongs to the object at ffff00080243ed00 [ 58.284225] which belongs to the cache kmalloc-64 of size 64 [ 58.296553] The buggy address is located 0 bytes to the right of [ 58.296553] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 58.309399] [ 58.310875] The buggy address belongs to the physical page: [ 58.316434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 58.324417] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.330927] page_type: f5(slab) [ 58.334060] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.341784] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.349503] page dumped because: kasan: bad access detected [ 58.355058] [ 58.356533] Memory state around the buggy address: [ 58.361312] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.368516] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.375721] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.382922] ^ [ 58.387700] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.394907] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.402106] ================================================================== [ 62.113899] ================================================================== [ 62.120977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 62.128352] Read of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310 [ 62.135644] [ 62.137126] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 62.137177] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.137191] Hardware name: WinLink E850-96 board (DT) [ 62.137209] Call trace: [ 62.137225] show_stack+0x20/0x38 (C) [ 62.137256] dump_stack_lvl+0x8c/0xd0 [ 62.137287] print_report+0x118/0x608 [ 62.137319] kasan_report+0xdc/0x128 [ 62.137348] __asan_report_load8_noabort+0x20/0x30 [ 62.137383] kasan_atomics_helper+0x3df4/0x4858 [ 62.137417] kasan_atomics+0x198/0x2e0 [ 62.137447] kunit_try_run_case+0x170/0x3f0 [ 62.137478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.137512] kthread+0x328/0x630 [ 62.137543] ret_from_fork+0x10/0x20 [ 62.137574] [ 62.205261] Allocated by task 310: [ 62.208647] kasan_save_stack+0x3c/0x68 [ 62.212466] kasan_save_track+0x20/0x40 [ 62.216285] kasan_save_alloc_info+0x40/0x58 [ 62.220538] __kasan_kmalloc+0xd4/0xd8 [ 62.224271] __kmalloc_cache_noprof+0x15c/0x3c0 [ 62.228785] kasan_atomics+0xb8/0x2e0 [ 62.232430] kunit_try_run_case+0x170/0x3f0 [ 62.236597] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.242066] kthread+0x328/0x630 [ 62.245277] ret_from_fork+0x10/0x20 [ 62.248837] [ 62.250313] The buggy address belongs to the object at ffff00080243ed00 [ 62.250313] which belongs to the cache kmalloc-64 of size 64 [ 62.262640] The buggy address is located 0 bytes to the right of [ 62.262640] allocated 48-byte region [ffff00080243ed00, ffff00080243ed30) [ 62.275485] [ 62.276961] The buggy address belongs to the physical page: [ 62.282520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e [ 62.290504] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.297014] page_type: f5(slab) [ 62.300146] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 62.307870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.315589] page dumped because: kasan: bad access detected [ 62.321144] [ 62.322620] Memory state around the buggy address: [ 62.327399] ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.334603] ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.341808] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.349009] ^ [ 62.353786] ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.360993] ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.368193] ==================================================================