Date
May 29, 2025, 7:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 25.535534] ================================================================== [ 25.535671] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 25.535799] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.535917] [ 25.535996] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.536181] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.536251] Hardware name: linux,dummy-virt (DT) [ 25.536335] Call trace: [ 25.536394] show_stack+0x20/0x38 (C) [ 25.536533] dump_stack_lvl+0x8c/0xd0 [ 25.536656] print_report+0x118/0x608 [ 25.536768] kasan_report+0xdc/0x128 [ 25.536883] kasan_check_range+0x100/0x1a8 [ 25.537006] __kasan_check_write+0x20/0x30 [ 25.537119] kasan_atomics_helper+0xeb8/0x4858 [ 25.537239] kasan_atomics+0x198/0x2e0 [ 25.537359] kunit_try_run_case+0x170/0x3f0 [ 25.537736] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.537886] kthread+0x328/0x630 [ 25.538620] ret_from_fork+0x10/0x20 [ 25.538745] [ 25.538855] Allocated by task 265: [ 25.539115] kasan_save_stack+0x3c/0x68 [ 25.539246] kasan_save_track+0x20/0x40 [ 25.539358] kasan_save_alloc_info+0x40/0x58 [ 25.539473] __kasan_kmalloc+0xd4/0xd8 [ 25.539599] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.539704] kasan_atomics+0xb8/0x2e0 [ 25.539822] kunit_try_run_case+0x170/0x3f0 [ 25.539933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.540040] kthread+0x328/0x630 [ 25.540118] ret_from_fork+0x10/0x20 [ 25.540370] [ 25.540440] The buggy address belongs to the object at fff00000c7884f80 [ 25.540440] which belongs to the cache kmalloc-64 of size 64 [ 25.540609] The buggy address is located 0 bytes to the right of [ 25.540609] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.540778] [ 25.540840] The buggy address belongs to the physical page: [ 25.540926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.541051] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.541172] page_type: f5(slab) [ 25.541271] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.541414] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.541526] page dumped because: kasan: bad access detected [ 25.541612] [ 25.541662] Memory state around the buggy address: [ 25.541744] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.541856] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.541970] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.542072] ^ [ 25.542162] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.542275] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.542448] ================================================================== [ 25.691027] ================================================================== [ 25.691135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 25.691229] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.691290] [ 25.691558] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.691681] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.691913] Hardware name: linux,dummy-virt (DT) [ 25.691969] Call trace: [ 25.692001] show_stack+0x20/0x38 (C) [ 25.692226] dump_stack_lvl+0x8c/0xd0 [ 25.692438] print_report+0x118/0x608 [ 25.692513] kasan_report+0xdc/0x128 [ 25.692595] kasan_check_range+0x100/0x1a8 [ 25.692665] __kasan_check_write+0x20/0x30 [ 25.692724] kasan_atomics_helper+0x147c/0x4858 [ 25.692782] kasan_atomics+0x198/0x2e0 [ 25.692837] kunit_try_run_case+0x170/0x3f0 [ 25.692894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.692961] kthread+0x328/0x630 [ 25.693011] ret_from_fork+0x10/0x20 [ 25.693069] [ 25.693095] Allocated by task 265: [ 25.693133] kasan_save_stack+0x3c/0x68 [ 25.693188] kasan_save_track+0x20/0x40 [ 25.693236] kasan_save_alloc_info+0x40/0x58 [ 25.693283] __kasan_kmalloc+0xd4/0xd8 [ 25.693329] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.693378] kasan_atomics+0xb8/0x2e0 [ 25.693443] kunit_try_run_case+0x170/0x3f0 [ 25.693645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.693719] kthread+0x328/0x630 [ 25.694348] ret_from_fork+0x10/0x20 [ 25.694476] [ 25.694510] The buggy address belongs to the object at fff00000c7884f80 [ 25.694510] which belongs to the cache kmalloc-64 of size 64 [ 25.694586] The buggy address is located 0 bytes to the right of [ 25.694586] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.694663] [ 25.695732] The buggy address belongs to the physical page: [ 25.695838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.695914] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.696544] page_type: f5(slab) [ 25.696615] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.696775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.696921] page dumped because: kasan: bad access detected [ 25.697408] [ 25.697449] Memory state around the buggy address: [ 25.697746] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.697832] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.697938] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.697991] ^ [ 25.698233] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.698559] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.698721] ================================================================== [ 25.228443] ================================================================== [ 25.228562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 25.228674] Write of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.229824] kasan_check_range+0x100/0x1a8 [ 25.231143] kasan_save_track+0x20/0x40 [ 25.232114] kthread+0x328/0x630 [ 25.234088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.235123] page dumped because: kasan: bad access detected [ 25.237011] ================================================================== [ 25.347790] ================================================================== [ 25.347927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 25.348064] Write of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.348196] [ 25.348282] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.349190] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.349388] Hardware name: linux,dummy-virt (DT) [ 25.349596] Call trace: [ 25.349680] show_stack+0x20/0x38 (C) [ 25.350255] dump_stack_lvl+0x8c/0xd0 [ 25.350703] print_report+0x118/0x608 [ 25.350858] kasan_report+0xdc/0x128 [ 25.351224] kasan_check_range+0x100/0x1a8 [ 25.351614] __kasan_check_write+0x20/0x30 [ 25.352037] kasan_atomics_helper+0xad4/0x4858 [ 25.352570] kasan_atomics+0x198/0x2e0 [ 25.352714] kunit_try_run_case+0x170/0x3f0 [ 25.352948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.353239] kthread+0x328/0x630 [ 25.353362] ret_from_fork+0x10/0x20 [ 25.353502] [ 25.354045] Allocated by task 265: [ 25.354484] kasan_save_stack+0x3c/0x68 [ 25.354646] kasan_save_track+0x20/0x40 [ 25.354768] kasan_save_alloc_info+0x40/0x58 [ 25.355282] __kasan_kmalloc+0xd4/0xd8 [ 25.356242] The buggy address is located 0 bytes to the right of [ 25.356242] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.356807] [ 25.356968] The buggy address belongs to the physical page: [ 25.357055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.357171] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.357286] page_type: f5(slab) [ 25.357444] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.357744] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.357999] page dumped because: kasan: bad access detected [ 25.358449] [ 25.358522] Memory state around the buggy address: [ 25.358769] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.359038] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.359145] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.359238] ^ [ 25.359701] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.359954] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.360358] ================================================================== [ 25.444521] ================================================================== [ 25.444670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 25.444799] Write of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.444921] [ 25.445020] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.445244] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.445319] Hardware name: linux,dummy-virt (DT) [ 25.446933] Call trace: [ 25.447053] show_stack+0x20/0x38 (C) [ 25.447355] dump_stack_lvl+0x8c/0xd0 [ 25.447862] print_report+0x118/0x608 [ 25.448228] kasan_report+0xdc/0x128 [ 25.448358] kasan_check_range+0x100/0x1a8 [ 25.448877] __kasan_check_write+0x20/0x30 [ 25.449330] kasan_atomics_helper+0xd3c/0x4858 [ 25.449888] kasan_atomics+0x198/0x2e0 [ 25.450043] kunit_try_run_case+0x170/0x3f0 [ 25.450484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.450660] kthread+0x328/0x630 [ 25.451115] ret_from_fork+0x10/0x20 [ 25.451638] [ 25.451989] Allocated by task 265: [ 25.452244] kasan_save_stack+0x3c/0x68 [ 25.452908] kasan_save_track+0x20/0x40 [ 25.453407] kasan_save_alloc_info+0x40/0x58 [ 25.453549] __kasan_kmalloc+0xd4/0xd8 [ 25.453661] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.454178] kasan_atomics+0xb8/0x2e0 [ 25.454333] kunit_try_run_case+0x170/0x3f0 [ 25.454448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.454545] kthread+0x328/0x630 [ 25.454631] ret_from_fork+0x10/0x20 [ 25.454726] [ 25.455559] The buggy address belongs to the object at fff00000c7884f80 [ 25.455559] which belongs to the cache kmalloc-64 of size 64 [ 25.455748] The buggy address is located 0 bytes to the right of [ 25.455748] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.456660] [ 25.456741] The buggy address belongs to the physical page: [ 25.456988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.457193] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.457701] page_type: f5(slab) [ 25.457838] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.457978] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.458955] page dumped because: kasan: bad access detected [ 25.459090] [ 25.459155] Memory state around the buggy address: [ 25.459395] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.459568] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.459660] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.459751] ^ [ 25.459842] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.460673] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.460955] ================================================================== [ 25.498390] ================================================================== [ 25.498617] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 25.498811] Read of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.498943] [ 25.499034] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.499608] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.499955] Hardware name: linux,dummy-virt (DT) [ 25.500135] Call trace: [ 25.500223] show_stack+0x20/0x38 (C) [ 25.500467] dump_stack_lvl+0x8c/0xd0 [ 25.500683] print_report+0x118/0x608 [ 25.500878] kasan_report+0xdc/0x128 [ 25.501217] __asan_report_load8_noabort+0x20/0x30 [ 25.501688] kasan_atomics_helper+0x3f58/0x4858 [ 25.501864] kasan_atomics+0x198/0x2e0 [ 25.501988] kunit_try_run_case+0x170/0x3f0 [ 25.502106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.502251] kthread+0x328/0x630 [ 25.502798] ret_from_fork+0x10/0x20 [ 25.503302] [ 25.503355] Allocated by task 265: [ 25.503436] kasan_save_stack+0x3c/0x68 [ 25.503539] kasan_save_track+0x20/0x40 [ 25.503631] kasan_save_alloc_info+0x40/0x58 [ 25.503788] __kasan_kmalloc+0xd4/0xd8 [ 25.503933] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.504274] kasan_atomics+0xb8/0x2e0 [ 25.504762] kunit_try_run_case+0x170/0x3f0 [ 25.505206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.505824] kthread+0x328/0x630 [ 25.506444] ret_from_fork+0x10/0x20 [ 25.506860] [ 25.506943] The buggy address belongs to the object at fff00000c7884f80 [ 25.506943] which belongs to the cache kmalloc-64 of size 64 [ 25.507142] The buggy address is located 0 bytes to the right of [ 25.507142] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.507318] [ 25.507974] The buggy address belongs to the physical page: [ 25.508068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.508205] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.508343] page_type: f5(slab) [ 25.508458] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.509908] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.510102] page dumped because: kasan: bad access detected [ 25.510225] [ 25.510286] Memory state around the buggy address: [ 25.510456] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.510562] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.510927] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.511043] ^ [ 25.511133] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.511838] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.511958] ================================================================== [ 25.661217] ================================================================== [ 25.661334] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 25.661434] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.661496] [ 25.661797] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.661914] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.661951] Hardware name: linux,dummy-virt (DT) [ 25.661993] Call trace: [ 25.662024] show_stack+0x20/0x38 (C) [ 25.662279] dump_stack_lvl+0x8c/0xd0 [ 25.662428] print_report+0x118/0x608 [ 25.662558] kasan_report+0xdc/0x128 [ 25.662829] kasan_check_range+0x100/0x1a8 [ 25.663018] __kasan_check_write+0x20/0x30 [ 25.663183] kasan_atomics_helper+0x12d8/0x4858 [ 25.663307] kasan_atomics+0x198/0x2e0 [ 25.663367] kunit_try_run_case+0x170/0x3f0 [ 25.663440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.663507] kthread+0x328/0x630 [ 25.663959] ret_from_fork+0x10/0x20 [ 25.664169] [ 25.664247] Allocated by task 265: [ 25.664336] kasan_save_stack+0x3c/0x68 [ 25.664475] kasan_save_track+0x20/0x40 [ 25.664525] kasan_save_alloc_info+0x40/0x58 [ 25.664584] __kasan_kmalloc+0xd4/0xd8 [ 25.664636] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.664822] kasan_atomics+0xb8/0x2e0 [ 25.664874] kunit_try_run_case+0x170/0x3f0 [ 25.664934] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.664989] kthread+0x328/0x630 [ 25.665315] ret_from_fork+0x10/0x20 [ 25.665386] [ 25.665548] The buggy address belongs to the object at fff00000c7884f80 [ 25.665548] which belongs to the cache kmalloc-64 of size 64 [ 25.665931] The buggy address is located 0 bytes to the right of [ 25.665931] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.666027] [ 25.666070] The buggy address belongs to the physical page: [ 25.666115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.666376] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.666518] page_type: f5(slab) [ 25.666747] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.666813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.666972] page dumped because: kasan: bad access detected [ 25.667018] [ 25.667044] Memory state around the buggy address: [ 25.667097] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.667152] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.667447] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.667611] ^ [ 25.667664] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.667743] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.667801] ================================================================== [ 25.486081] ================================================================== [ 25.486426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 25.488274] Read of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.488432] [ 25.488536] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.488765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.488852] Hardware name: linux,dummy-virt (DT) [ 25.488935] Call trace: [ 25.489000] show_stack+0x20/0x38 (C) [ 25.489140] dump_stack_lvl+0x8c/0xd0 [ 25.489271] print_report+0x118/0x608 [ 25.489392] kasan_report+0xdc/0x128 [ 25.489528] kasan_check_range+0x100/0x1a8 [ 25.489659] __kasan_check_read+0x20/0x30 [ 25.491111] kasan_atomics_helper+0xdd4/0x4858 [ 25.491744] kasan_atomics+0x198/0x2e0 [ 25.491958] kunit_try_run_case+0x170/0x3f0 [ 25.492150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.492564] kthread+0x328/0x630 [ 25.492810] ret_from_fork+0x10/0x20 [ 25.493169] [ 25.493264] Allocated by task 265: [ 25.494423] kasan_save_stack+0x3c/0x68 [ 25.494907] kasan_save_track+0x20/0x40 [ 25.495154] kasan_save_alloc_info+0x40/0x58 [ 25.495285] __kasan_kmalloc+0xd4/0xd8 [ 25.495416] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.495497] kasan_atomics+0xb8/0x2e0 [ 25.495546] kunit_try_run_case+0x170/0x3f0 [ 25.495594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.495651] kthread+0x328/0x630 [ 25.495693] ret_from_fork+0x10/0x20 [ 25.495738] [ 25.495770] The buggy address belongs to the object at fff00000c7884f80 [ 25.495770] which belongs to the cache kmalloc-64 of size 64 [ 25.495845] The buggy address is located 0 bytes to the right of [ 25.495845] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.495916] [ 25.495945] The buggy address belongs to the physical page: [ 25.495983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.496048] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.496110] page_type: f5(slab) [ 25.496162] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.496222] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.496270] page dumped because: kasan: bad access detected [ 25.496310] [ 25.496333] Memory state around the buggy address: [ 25.496375] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.496469] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.496787] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.497176] ^ [ 25.497234] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.497302] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.497393] ================================================================== [ 25.751604] ================================================================== [ 25.751916] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 25.752271] Read of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.752383] [ 25.752447] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.752545] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.752580] Hardware name: linux,dummy-virt (DT) [ 25.752620] Call trace: [ 25.752650] show_stack+0x20/0x38 (C) [ 25.752713] dump_stack_lvl+0x8c/0xd0 [ 25.752774] print_report+0x118/0x608 [ 25.752829] kasan_report+0xdc/0x128 [ 25.752885] __asan_report_load8_noabort+0x20/0x30 [ 25.752942] kasan_atomics_helper+0x3df4/0x4858 [ 25.752998] kasan_atomics+0x198/0x2e0 [ 25.753053] kunit_try_run_case+0x170/0x3f0 [ 25.753109] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.753172] kthread+0x328/0x630 [ 25.753221] ret_from_fork+0x10/0x20 [ 25.753282] [ 25.753306] Allocated by task 265: [ 25.755956] kasan_save_stack+0x3c/0x68 [ 25.756542] kasan_save_track+0x20/0x40 [ 25.757077] kasan_save_alloc_info+0x40/0x58 [ 25.757343] __kasan_kmalloc+0xd4/0xd8 [ 25.757745] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.757953] kasan_atomics+0xb8/0x2e0 [ 25.758492] kunit_try_run_case+0x170/0x3f0 [ 25.758562] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.758619] kthread+0x328/0x630 [ 25.758920] ret_from_fork+0x10/0x20 [ 25.758972] [ 25.759469] The buggy address belongs to the object at fff00000c7884f80 [ 25.759469] which belongs to the cache kmalloc-64 of size 64 [ 25.759794] The buggy address is located 0 bytes to the right of [ 25.759794] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.760367] [ 25.760431] The buggy address belongs to the physical page: [ 25.760668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.760952] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.761022] page_type: f5(slab) [ 25.761075] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.761339] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.761682] page dumped because: kasan: bad access detected [ 25.761746] [ 25.761774] Memory state around the buggy address: [ 25.761817] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.761871] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.761922] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.763073] ^ [ 25.763313] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.763583] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.763737] ================================================================== [ 25.593737] ================================================================== [ 25.593875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 25.594006] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.594128] [ 25.594221] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.595076] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.595225] Hardware name: linux,dummy-virt (DT) [ 25.595323] Call trace: [ 25.595500] show_stack+0x20/0x38 (C) [ 25.595783] dump_stack_lvl+0x8c/0xd0 [ 25.596181] print_report+0x118/0x608 [ 25.596301] kasan_report+0xdc/0x128 [ 25.596483] kasan_check_range+0x100/0x1a8 [ 25.596681] __kasan_check_write+0x20/0x30 [ 25.596942] kasan_atomics_helper+0x10c0/0x4858 [ 25.597281] kasan_atomics+0x198/0x2e0 [ 25.597763] kunit_try_run_case+0x170/0x3f0 [ 25.598154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.598291] kthread+0x328/0x630 [ 25.598770] ret_from_fork+0x10/0x20 [ 25.599269] [ 25.599777] Allocated by task 265: [ 25.599951] kasan_save_stack+0x3c/0x68 [ 25.600067] kasan_save_track+0x20/0x40 [ 25.600621] kasan_save_alloc_info+0x40/0x58 [ 25.600885] __kasan_kmalloc+0xd4/0xd8 [ 25.601192] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.601542] kasan_atomics+0xb8/0x2e0 [ 25.601655] kunit_try_run_case+0x170/0x3f0 [ 25.601728] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.601784] kthread+0x328/0x630 [ 25.601846] ret_from_fork+0x10/0x20 [ 25.601939] [ 25.602001] The buggy address belongs to the object at fff00000c7884f80 [ 25.602001] which belongs to the cache kmalloc-64 of size 64 [ 25.602192] The buggy address is located 0 bytes to the right of [ 25.602192] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.602422] [ 25.602482] The buggy address belongs to the physical page: [ 25.602588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.602723] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.602850] page_type: f5(slab) [ 25.602958] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.603119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.603260] page dumped because: kasan: bad access detected [ 25.603375] [ 25.603459] Memory state around the buggy address: [ 25.603627] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.603736] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.603825] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.603905] ^ [ 25.603990] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.604096] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.604193] ================================================================== [ 25.316251] ================================================================== [ 25.316437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 25.316653] Write of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.316871] [ 25.316973] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.317511] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.317594] Hardware name: linux,dummy-virt (DT) [ 25.317679] Call trace: [ 25.317746] show_stack+0x20/0x38 (C) [ 25.318126] dump_stack_lvl+0x8c/0xd0 [ 25.318545] print_report+0x118/0x608 [ 25.318916] kasan_report+0xdc/0x128 [ 25.319231] kasan_check_range+0x100/0x1a8 [ 25.319505] __kasan_check_write+0x20/0x30 [ 25.319711] kasan_atomics_helper+0x99c/0x4858 [ 25.319850] kasan_atomics+0x198/0x2e0 [ 25.319978] kunit_try_run_case+0x170/0x3f0 [ 25.320105] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.320247] kthread+0x328/0x630 [ 25.320356] ret_from_fork+0x10/0x20 [ 25.320499] [ 25.320758] Allocated by task 265: [ 25.320984] kasan_save_stack+0x3c/0x68 [ 25.321286] kasan_save_track+0x20/0x40 [ 25.321637] kasan_save_alloc_info+0x40/0x58 [ 25.321888] __kasan_kmalloc+0xd4/0xd8 [ 25.322035] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.322483] kasan_atomics+0xb8/0x2e0 [ 25.322588] kunit_try_run_case+0x170/0x3f0 [ 25.322792] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.323112] kthread+0x328/0x630 [ 25.323466] ret_from_fork+0x10/0x20 [ 25.323632] [ 25.323796] The buggy address belongs to the object at fff00000c7884f80 [ 25.323796] which belongs to the cache kmalloc-64 of size 64 [ 25.324080] The buggy address is located 0 bytes to the right of [ 25.324080] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.324582] [ 25.324650] The buggy address belongs to the physical page: [ 25.324915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.325297] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.325468] page_type: f5(slab) [ 25.325722] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.326254] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.326466] page dumped because: kasan: bad access detected [ 25.326780] [ 25.326852] Memory state around the buggy address: [ 25.326963] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.327070] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.327157] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.327648] ^ [ 25.328041] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.328326] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.328554] ================================================================== [ 25.561665] ================================================================== [ 25.561817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 25.562073] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.562205] [ 25.562393] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.562796] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.563009] Hardware name: linux,dummy-virt (DT) [ 25.563171] Call trace: [ 25.563227] show_stack+0x20/0x38 (C) [ 25.563346] dump_stack_lvl+0x8c/0xd0 [ 25.563474] print_report+0x118/0x608 [ 25.564844] kasan_report+0xdc/0x128 [ 25.565471] kasan_check_range+0x100/0x1a8 [ 25.565625] __kasan_check_write+0x20/0x30 [ 25.566489] kasan_atomics_helper+0xff0/0x4858 [ 25.567186] kasan_atomics+0x198/0x2e0 [ 25.567384] kunit_try_run_case+0x170/0x3f0 [ 25.567525] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.567669] kthread+0x328/0x630 [ 25.567775] ret_from_fork+0x10/0x20 [ 25.567878] [ 25.567931] Allocated by task 265: [ 25.568007] kasan_save_stack+0x3c/0x68 [ 25.570277] kasan_save_track+0x20/0x40 [ 25.571080] kasan_save_alloc_info+0x40/0x58 [ 25.571180] __kasan_kmalloc+0xd4/0xd8 [ 25.571273] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.572446] kasan_atomics+0xb8/0x2e0 [ 25.572768] kunit_try_run_case+0x170/0x3f0 [ 25.573266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.573388] kthread+0x328/0x630 [ 25.573490] ret_from_fork+0x10/0x20 [ 25.573588] [ 25.573659] The buggy address belongs to the object at fff00000c7884f80 [ 25.573659] which belongs to the cache kmalloc-64 of size 64 [ 25.573821] The buggy address is located 0 bytes to the right of [ 25.573821] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.576276] [ 25.576367] The buggy address belongs to the physical page: [ 25.576466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.576644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.576844] page_type: f5(slab) [ 25.577007] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.577195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.577315] page dumped because: kasan: bad access detected [ 25.577417] [ 25.577487] Memory state around the buggy address: [ 25.577578] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.577726] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.577881] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.577990] ^ [ 25.578086] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.578246] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.578481] ================================================================== [ 25.361482] ================================================================== [ 25.361777] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 25.361925] Read of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.362060] [ 25.362147] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.362758] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.362983] Hardware name: linux,dummy-virt (DT) [ 25.363082] Call trace: [ 25.363149] show_stack+0x20/0x38 (C) [ 25.363280] dump_stack_lvl+0x8c/0xd0 [ 25.363420] print_report+0x118/0x608 [ 25.363544] kasan_report+0xdc/0x128 [ 25.363683] __asan_report_load4_noabort+0x20/0x30 [ 25.363808] kasan_atomics_helper+0x3dcc/0x4858 [ 25.367836] kasan_save_alloc_info+0x40/0x58 [ 25.369265] The buggy address is located 0 bytes to the right of [ 25.369265] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.369360] [ 25.369557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.369780] page dumped because: kasan: bad access detected [ 25.369883] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.370165] ================================================================== [ 25.668762] ================================================================== [ 25.668846] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 25.668927] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.668987] [ 25.669032] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.669133] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.669167] Hardware name: linux,dummy-virt (DT) [ 25.669207] Call trace: [ 25.669237] show_stack+0x20/0x38 (C) [ 25.669298] dump_stack_lvl+0x8c/0xd0 [ 25.669356] print_report+0x118/0x608 [ 25.669428] kasan_report+0xdc/0x128 [ 25.669487] kasan_check_range+0x100/0x1a8 [ 25.669544] __kasan_check_write+0x20/0x30 [ 25.669599] kasan_atomics_helper+0x1384/0x4858 [ 25.669657] kasan_atomics+0x198/0x2e0 [ 25.669715] kunit_try_run_case+0x170/0x3f0 [ 25.669774] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.669836] kthread+0x328/0x630 [ 25.669905] ret_from_fork+0x10/0x20 [ 25.669964] [ 25.669990] Allocated by task 265: [ 25.670026] kasan_save_stack+0x3c/0x68 [ 25.670080] kasan_save_track+0x20/0x40 [ 25.670127] kasan_save_alloc_info+0x40/0x58 [ 25.670174] __kasan_kmalloc+0xd4/0xd8 [ 25.670219] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.670267] kasan_atomics+0xb8/0x2e0 [ 25.670312] kunit_try_run_case+0x170/0x3f0 [ 25.670680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.670751] kthread+0x328/0x630 [ 25.670805] ret_from_fork+0x10/0x20 [ 25.670885] [ 25.670917] The buggy address belongs to the object at fff00000c7884f80 [ 25.670917] which belongs to the cache kmalloc-64 of size 64 [ 25.670988] The buggy address is located 0 bytes to the right of [ 25.670988] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.671576] [ 25.671732] The buggy address belongs to the physical page: [ 25.671897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.672019] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.672094] page_type: f5(slab) [ 25.672297] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.672364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.672429] page dumped because: kasan: bad access detected [ 25.672728] [ 25.673013] Memory state around the buggy address: [ 25.673162] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.673220] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.673283] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.673352] ^ [ 25.673678] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.673859] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.673928] ================================================================== [ 25.522693] ================================================================== [ 25.522924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 25.523385] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.523623] [ 25.523721] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.524008] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.524255] Hardware name: linux,dummy-virt (DT) [ 25.524688] Call trace: [ 25.524749] show_stack+0x20/0x38 (C) [ 25.525187] dump_stack_lvl+0x8c/0xd0 [ 25.525602] print_report+0x118/0x608 [ 25.525742] kasan_report+0xdc/0x128 [ 25.525872] __asan_report_store8_noabort+0x20/0x30 [ 25.526120] kasan_atomics_helper+0x3e5c/0x4858 [ 25.526276] kasan_atomics+0x198/0x2e0 [ 25.526410] kunit_try_run_case+0x170/0x3f0 [ 25.526986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.527135] kthread+0x328/0x630 [ 25.527235] ret_from_fork+0x10/0x20 [ 25.527349] [ 25.527414] Allocated by task 265: [ 25.527781] kasan_save_stack+0x3c/0x68 [ 25.528071] kasan_save_track+0x20/0x40 [ 25.528184] kasan_save_alloc_info+0x40/0x58 [ 25.528287] __kasan_kmalloc+0xd4/0xd8 [ 25.528383] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.528497] kasan_atomics+0xb8/0x2e0 [ 25.528594] kunit_try_run_case+0x170/0x3f0 [ 25.528701] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.528821] kthread+0x328/0x630 [ 25.529648] ret_from_fork+0x10/0x20 [ 25.530339] [ 25.530583] The buggy address belongs to the object at fff00000c7884f80 [ 25.530583] which belongs to the cache kmalloc-64 of size 64 [ 25.530729] The buggy address is located 0 bytes to the right of [ 25.530729] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.530906] [ 25.531566] The buggy address belongs to the physical page: [ 25.531707] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.531846] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.531972] page_type: f5(slab) [ 25.532079] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.532213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.532378] page dumped because: kasan: bad access detected [ 25.532505] [ 25.532576] Memory state around the buggy address: [ 25.532695] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.532856] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.533016] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.533165] ^ [ 25.533255] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.533373] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.533898] ================================================================== [ 25.545125] ================================================================== [ 25.545278] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 25.545498] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.545858] [ 25.545961] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.546306] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.546680] Hardware name: linux,dummy-virt (DT) [ 25.546761] Call trace: [ 25.546845] show_stack+0x20/0x38 (C) [ 25.546993] dump_stack_lvl+0x8c/0xd0 [ 25.547774] print_report+0x118/0x608 [ 25.548345] kasan_report+0xdc/0x128 [ 25.548521] kasan_check_range+0x100/0x1a8 [ 25.548773] __kasan_check_write+0x20/0x30 [ 25.548863] kasan_atomics_helper+0xf20/0x4858 [ 25.549008] kasan_atomics+0x198/0x2e0 [ 25.549127] kunit_try_run_case+0x170/0x3f0 [ 25.549242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.549388] kthread+0x328/0x630 [ 25.549575] ret_from_fork+0x10/0x20 [ 25.549713] [ 25.549788] Allocated by task 265: [ 25.549897] kasan_save_stack+0x3c/0x68 [ 25.550048] kasan_save_track+0x20/0x40 [ 25.550158] kasan_save_alloc_info+0x40/0x58 [ 25.550256] __kasan_kmalloc+0xd4/0xd8 [ 25.550408] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.550510] kasan_atomics+0xb8/0x2e0 [ 25.550609] kunit_try_run_case+0x170/0x3f0 [ 25.550696] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.550799] kthread+0x328/0x630 [ 25.550882] ret_from_fork+0x10/0x20 [ 25.550985] [ 25.551051] The buggy address belongs to the object at fff00000c7884f80 [ 25.551051] which belongs to the cache kmalloc-64 of size 64 [ 25.551208] The buggy address is located 0 bytes to the right of [ 25.551208] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.551429] [ 25.551527] The buggy address belongs to the physical page: [ 25.551616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.551757] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.551895] page_type: f5(slab) [ 25.551990] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.552099] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.552216] page dumped because: kasan: bad access detected [ 25.552301] [ 25.552349] Memory state around the buggy address: [ 25.552459] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.552610] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.552717] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.552803] ^ [ 25.552889] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.552996] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.553081] ================================================================== [ 25.330332] ================================================================== [ 25.330505] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 25.330650] Write of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.330784] [ 25.330883] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.331085] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.331159] Hardware name: linux,dummy-virt (DT) [ 25.331251] Call trace: [ 25.331313] show_stack+0x20/0x38 (C) [ 25.331622] dump_stack_lvl+0x8c/0xd0 [ 25.331807] print_report+0x118/0x608 [ 25.331980] kasan_report+0xdc/0x128 [ 25.332157] kasan_check_range+0x100/0x1a8 [ 25.332600] kasan_atomics+0x198/0x2e0 [ 25.333416] [ 25.334628] kthread+0x328/0x630 [ 25.334755] ret_from_fork+0x10/0x20 [ 25.334877] [ 25.334972] The buggy address belongs to the object at fff00000c7884f80 [ 25.334972] which belongs to the cache kmalloc-64 of size 64 [ 25.335132] The buggy address is located 0 bytes to the right of [ 25.335132] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.335477] [ 25.335574] The buggy address belongs to the physical page: [ 25.335709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.335874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.336063] page_type: f5(slab) [ 25.336215] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.336391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.336525] page dumped because: kasan: bad access detected [ 25.336651] [ 25.336736] Memory state around the buggy address: [ 25.336870] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.336991] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.337108] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.337211] ^ [ 25.337306] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.337430] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.337531] ================================================================== [ 25.432703] ================================================================== [ 25.432828] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 25.432961] Read of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.433142] [ 25.433238] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.433468] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.433546] Hardware name: linux,dummy-virt (DT) [ 25.433627] Call trace: [ 25.433686] show_stack+0x20/0x38 (C) [ 25.433815] dump_stack_lvl+0x8c/0xd0 [ 25.433933] print_report+0x118/0x608 [ 25.434072] kasan_report+0xdc/0x128 [ 25.434181] __asan_report_load4_noabort+0x20/0x30 [ 25.434300] kasan_atomics_helper+0x3dd8/0x4858 [ 25.434444] kasan_atomics+0x198/0x2e0 [ 25.435016] kunit_try_run_case+0x170/0x3f0 [ 25.435192] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.435333] kthread+0x328/0x630 [ 25.435658] ret_from_fork+0x10/0x20 [ 25.436008] [ 25.436206] Allocated by task 265: [ 25.436289] kasan_save_stack+0x3c/0x68 [ 25.436385] kasan_save_track+0x20/0x40 [ 25.436474] kasan_save_alloc_info+0x40/0x58 [ 25.436585] __kasan_kmalloc+0xd4/0xd8 [ 25.436668] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.436763] kasan_atomics+0xb8/0x2e0 [ 25.436850] kunit_try_run_case+0x170/0x3f0 [ 25.436949] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.437350] kthread+0x328/0x630 [ 25.437556] ret_from_fork+0x10/0x20 [ 25.437677] [ 25.437769] The buggy address belongs to the object at fff00000c7884f80 [ 25.437769] which belongs to the cache kmalloc-64 of size 64 [ 25.438155] The buggy address is located 0 bytes to the right of [ 25.438155] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.438594] [ 25.438669] The buggy address belongs to the physical page: [ 25.438745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.438894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.439391] page_type: f5(slab) [ 25.439812] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.440029] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.440354] page dumped because: kasan: bad access detected [ 25.440473] [ 25.440527] Memory state around the buggy address: [ 25.440624] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.440741] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.441272] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.442043] ^ [ 25.442565] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.442831] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.443250] ================================================================== [ 25.463742] ================================================================== [ 25.463888] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 25.464036] Read of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.464160] [ 25.464254] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.464492] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.464567] Hardware name: linux,dummy-virt (DT) [ 25.464657] Call trace: [ 25.464724] show_stack+0x20/0x38 (C) [ 25.464858] dump_stack_lvl+0x8c/0xd0 [ 25.467691] print_report+0x118/0x608 [ 25.467925] kasan_report+0xdc/0x128 [ 25.468054] __asan_report_load4_noabort+0x20/0x30 [ 25.468617] kasan_atomics_helper+0x3e04/0x4858 [ 25.468764] kasan_atomics+0x198/0x2e0 [ 25.469246] kunit_try_run_case+0x170/0x3f0 [ 25.469600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.470107] kthread+0x328/0x630 [ 25.470478] ret_from_fork+0x10/0x20 [ 25.470863] [ 25.471239] Allocated by task 265: [ 25.471321] kasan_save_stack+0x3c/0x68 [ 25.471680] kasan_save_track+0x20/0x40 [ 25.471910] kasan_save_alloc_info+0x40/0x58 [ 25.472268] __kasan_kmalloc+0xd4/0xd8 [ 25.472390] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.473180] kasan_atomics+0xb8/0x2e0 [ 25.473309] kunit_try_run_case+0x170/0x3f0 [ 25.473420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.474286] kthread+0x328/0x630 [ 25.474606] ret_from_fork+0x10/0x20 [ 25.474746] [ 25.474811] The buggy address belongs to the object at fff00000c7884f80 [ 25.474811] which belongs to the cache kmalloc-64 of size 64 [ 25.475564] The buggy address is located 0 bytes to the right of [ 25.475564] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.475762] [ 25.476020] The buggy address belongs to the physical page: [ 25.476317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.476863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.477494] page_type: f5(slab) [ 25.477786] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.478023] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.478388] page dumped because: kasan: bad access detected [ 25.478873] [ 25.478958] Memory state around the buggy address: [ 25.479081] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.479228] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.479441] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.479591] ^ [ 25.479884] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.480313] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.480514] ================================================================== [ 25.773880] ================================================================== [ 25.773958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 25.774033] Read of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.774093] [ 25.774138] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.774238] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.774284] Hardware name: linux,dummy-virt (DT) [ 25.774331] Call trace: [ 25.774389] show_stack+0x20/0x38 (C) [ 25.774822] dump_stack_lvl+0x8c/0xd0 [ 25.774973] print_report+0x118/0x608 [ 25.775061] kasan_report+0xdc/0x128 [ 25.775513] __asan_report_load8_noabort+0x20/0x30 [ 25.775583] kasan_atomics_helper+0x3e10/0x4858 [ 25.775644] kasan_atomics+0x198/0x2e0 [ 25.775698] kunit_try_run_case+0x170/0x3f0 [ 25.775755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.775901] kthread+0x328/0x630 [ 25.776067] ret_from_fork+0x10/0x20 [ 25.776190] [ 25.776338] Allocated by task 265: [ 25.776420] kasan_save_stack+0x3c/0x68 [ 25.776690] kasan_save_track+0x20/0x40 [ 25.776747] kasan_save_alloc_info+0x40/0x58 [ 25.776796] __kasan_kmalloc+0xd4/0xd8 [ 25.777100] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.777166] kasan_atomics+0xb8/0x2e0 [ 25.777393] kunit_try_run_case+0x170/0x3f0 [ 25.778023] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.778375] kthread+0x328/0x630 [ 25.778527] ret_from_fork+0x10/0x20 [ 25.778898] [ 25.778943] The buggy address belongs to the object at fff00000c7884f80 [ 25.778943] which belongs to the cache kmalloc-64 of size 64 [ 25.779172] The buggy address is located 0 bytes to the right of [ 25.779172] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.779274] [ 25.779317] The buggy address belongs to the physical page: [ 25.779496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.779616] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.779840] page_type: f5(slab) [ 25.779994] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.780059] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.780111] page dumped because: kasan: bad access detected [ 25.780151] [ 25.780178] Memory state around the buggy address: [ 25.780220] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.780273] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.780321] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.780670] ^ [ 25.780729] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.780785] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.780936] ================================================================== [ 25.580392] ================================================================== [ 25.580584] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 25.580721] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.580922] [ 25.581023] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.581345] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.581414] Hardware name: linux,dummy-virt (DT) [ 25.581484] Call trace: [ 25.581529] show_stack+0x20/0x38 (C) [ 25.581641] dump_stack_lvl+0x8c/0xd0 [ 25.581754] print_report+0x118/0x608 [ 25.581873] kasan_report+0xdc/0x128 [ 25.581988] kasan_check_range+0x100/0x1a8 [ 25.582463] __kasan_check_write+0x20/0x30 [ 25.582626] kasan_atomics_helper+0x1058/0x4858 [ 25.582759] kasan_atomics+0x198/0x2e0 [ 25.582974] kunit_try_run_case+0x170/0x3f0 [ 25.583196] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.583446] kthread+0x328/0x630 [ 25.583631] ret_from_fork+0x10/0x20 [ 25.584001] [ 25.584333] Allocated by task 265: [ 25.584454] kasan_save_stack+0x3c/0x68 [ 25.585006] kasan_save_track+0x20/0x40 [ 25.585356] kasan_save_alloc_info+0x40/0x58 [ 25.585703] __kasan_kmalloc+0xd4/0xd8 [ 25.585834] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.585995] kasan_atomics+0xb8/0x2e0 [ 25.586264] kunit_try_run_case+0x170/0x3f0 [ 25.586577] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.586726] kthread+0x328/0x630 [ 25.586828] ret_from_fork+0x10/0x20 [ 25.587316] [ 25.587449] The buggy address belongs to the object at fff00000c7884f80 [ 25.587449] which belongs to the cache kmalloc-64 of size 64 [ 25.587650] The buggy address is located 0 bytes to the right of [ 25.587650] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.587795] [ 25.588029] The buggy address belongs to the physical page: [ 25.588164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.588301] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.588540] page_type: f5(slab) [ 25.588869] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.589077] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.589204] page dumped because: kasan: bad access detected [ 25.589333] [ 25.589381] Memory state around the buggy address: [ 25.589798] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.589929] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.590373] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.590491] ^ [ 25.590937] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.591080] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.591586] ================================================================== [ 25.291833] ================================================================== [ 25.292003] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 25.292136] Read of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.292276] [ 25.292359] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.292582] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.292659] Hardware name: linux,dummy-virt (DT) [ 25.292740] Call trace: [ 25.292797] show_stack+0x20/0x38 (C) [ 25.292928] dump_stack_lvl+0x8c/0xd0 [ 25.293702] print_report+0x118/0x608 [ 25.294830] kasan_report+0xdc/0x128 [ 25.295613] __asan_report_load4_noabort+0x20/0x30 [ 25.295786] kasan_atomics_helper+0x42d8/0x4858 [ 25.296663] kasan_atomics+0x198/0x2e0 [ 25.297801] kunit_try_run_case+0x170/0x3f0 [ 25.297969] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.298739] kthread+0x328/0x630 [ 25.298930] ret_from_fork+0x10/0x20 [ 25.299427] [ 25.299497] Allocated by task 265: [ 25.299581] kasan_save_stack+0x3c/0x68 [ 25.299793] kasan_save_track+0x20/0x40 [ 25.299972] kasan_save_alloc_info+0x40/0x58 [ 25.300123] __kasan_kmalloc+0xd4/0xd8 [ 25.300232] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.300681] kthread+0x328/0x630 [ 25.301091] The buggy address is located 0 bytes to the right of [ 25.301091] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.301266] [ 25.301326] The buggy address belongs to the physical page: [ 25.301424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.301574] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.301702] page_type: f5(slab) [ 25.301810] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.302151] [ 25.304938] Write of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.306875] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.307097] kthread+0x328/0x630 [ 25.307617] ret_from_fork+0x10/0x20 [ 25.307851] [ 25.307936] Allocated by task 265: [ 25.308133] kasan_save_stack+0x3c/0x68 [ 25.308352] kasan_save_track+0x20/0x40 [ 25.308480] kasan_save_alloc_info+0x40/0x58 [ 25.308581] __kasan_kmalloc+0xd4/0xd8 [ 25.308685] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.308788] kasan_atomics+0xb8/0x2e0 [ 25.309308] kunit_try_run_case+0x170/0x3f0 [ 25.309668] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.310230] kthread+0x328/0x630 [ 25.310387] ret_from_fork+0x10/0x20 [ 25.310496] [ 25.310563] The buggy address belongs to the object at fff00000c7884f80 [ 25.310563] which belongs to the cache kmalloc-64 of size 64 [ 25.310724] The buggy address is located 0 bytes to the right of [ 25.310724] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.311030] [ 25.311355] The buggy address belongs to the physical page: [ 25.311628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.312040] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.312350] page_type: f5(slab) [ 25.312561] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.312703] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.313445] page dumped because: kasan: bad access detected [ 25.313661] [ 25.313728] Memory state around the buggy address: [ 25.313818] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.313944] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.314538] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.314747] ^ [ 25.315001] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.315238] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.315350] ================================================================== [ 25.004991] ================================================================== [ 25.005197] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 25.006609] [ 25.007111] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.007361] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.007697] Hardware name: linux,dummy-virt (DT) [ 25.009432] __asan_report_load4_noabort+0x20/0x30 [ 25.009950] kasan_atomics+0x198/0x2e0 [ 25.010329] kunit_try_run_case+0x170/0x3f0 [ 25.011869] Allocated by task 265: [ 25.012186] kasan_save_stack+0x3c/0x68 [ 25.012703] __kasan_kmalloc+0xd4/0xd8 [ 25.013146] kasan_atomics+0xb8/0x2e0 [ 25.013933] kthread+0x328/0x630 [ 25.014870] The buggy address is located 0 bytes to the right of [ 25.014870] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.015437] page_type: f5(slab) [ 25.015682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.016923] page dumped because: kasan: bad access detected [ 25.017041] [ 25.017091] Memory state around the buggy address: [ 25.017275] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.017545] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.018331] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.018474] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.021204] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 25.021339] Write of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.022236] [ 25.022563] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.030383] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.034646] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.039546] Read of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.043809] kunit_try_run_case+0x170/0x3f0 [ 25.048193] The buggy address belongs to the object at fff00000c7884f80 [ 25.048193] which belongs to the cache kmalloc-64 of size 64 [ 25.050300] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.051583] page dumped because: kasan: bad access detected [ 25.051869] [ 25.052297] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.062717] [ 25.062991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.065917] kasan_check_range+0x100/0x1a8 [ 25.066464] kunit_try_run_case+0x170/0x3f0 [ 25.067444] kasan_save_alloc_info+0x40/0x58 [ 25.071629] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.072452] [ 25.073982] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.078133] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.080264] kasan_atomics_helper+0x2b0/0x4858 [ 25.081817] kasan_save_alloc_info+0x40/0x58 [ 25.084176] [ 25.087360] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.087557] page dumped because: kasan: bad access detected [ 25.088453] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.094733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 25.095884] dump_stack_lvl+0x8c/0xd0 [ 25.101314] kasan_save_track+0x20/0x40 [ 25.104127] The buggy address is located 0 bytes to the right of [ 25.104127] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.105456] [ 25.107498] ================================================================== [ 25.789209] ================================================================== [ 25.789300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 25.789394] Read of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.789645] [ 25.789850] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.790165] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.790205] Hardware name: linux,dummy-virt (DT) [ 25.790246] Call trace: [ 25.790277] show_stack+0x20/0x38 (C) [ 25.790626] dump_stack_lvl+0x8c/0xd0 [ 25.790738] print_report+0x118/0x608 [ 25.790926] kasan_report+0xdc/0x128 [ 25.790995] __asan_report_load8_noabort+0x20/0x30 [ 25.791055] kasan_atomics_helper+0x3e20/0x4858 [ 25.791113] kasan_atomics+0x198/0x2e0 [ 25.791171] kunit_try_run_case+0x170/0x3f0 [ 25.791261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.791358] kthread+0x328/0x630 [ 25.791418] ret_from_fork+0x10/0x20 [ 25.791495] [ 25.791528] Allocated by task 265: [ 25.791765] kasan_save_stack+0x3c/0x68 [ 25.791854] kasan_save_track+0x20/0x40 [ 25.791901] kasan_save_alloc_info+0x40/0x58 [ 25.791947] __kasan_kmalloc+0xd4/0xd8 [ 25.791992] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.792040] kasan_atomics+0xb8/0x2e0 [ 25.792084] kunit_try_run_case+0x170/0x3f0 [ 25.792144] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.792199] kthread+0x328/0x630 [ 25.792253] ret_from_fork+0x10/0x20 [ 25.792337] [ 25.792381] The buggy address belongs to the object at fff00000c7884f80 [ 25.792381] which belongs to the cache kmalloc-64 of size 64 [ 25.792648] The buggy address is located 0 bytes to the right of [ 25.792648] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.792997] [ 25.793029] The buggy address belongs to the physical page: [ 25.793070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.793135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.793197] page_type: f5(slab) [ 25.793248] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.793308] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.793358] page dumped because: kasan: bad access detected [ 25.793395] [ 25.793434] Memory state around the buggy address: [ 25.793475] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.793545] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.793608] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.793673] ^ [ 25.793716] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.793766] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.794085] ================================================================== [ 25.700604] ================================================================== [ 25.700695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 25.700785] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.700846] [ 25.700947] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.701058] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.701265] Hardware name: linux,dummy-virt (DT) [ 25.701621] Call trace: [ 25.701724] show_stack+0x20/0x38 (C) [ 25.701843] dump_stack_lvl+0x8c/0xd0 [ 25.701989] print_report+0x118/0x608 [ 25.702057] kasan_report+0xdc/0x128 [ 25.702175] kasan_check_range+0x100/0x1a8 [ 25.702236] __kasan_check_write+0x20/0x30 [ 25.702598] kasan_atomics_helper+0x14e4/0x4858 [ 25.702814] kasan_atomics+0x198/0x2e0 [ 25.703024] kunit_try_run_case+0x170/0x3f0 [ 25.703196] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.703451] kthread+0x328/0x630 [ 25.703520] ret_from_fork+0x10/0x20 [ 25.703584] [ 25.703764] Allocated by task 265: [ 25.703824] kasan_save_stack+0x3c/0x68 [ 25.703886] kasan_save_track+0x20/0x40 [ 25.704008] kasan_save_alloc_info+0x40/0x58 [ 25.704144] __kasan_kmalloc+0xd4/0xd8 [ 25.704470] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.704664] kasan_atomics+0xb8/0x2e0 [ 25.704874] kunit_try_run_case+0x170/0x3f0 [ 25.705007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.705367] kthread+0x328/0x630 [ 25.705436] ret_from_fork+0x10/0x20 [ 25.705655] [ 25.705715] The buggy address belongs to the object at fff00000c7884f80 [ 25.705715] which belongs to the cache kmalloc-64 of size 64 [ 25.705878] The buggy address is located 0 bytes to the right of [ 25.705878] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.705961] [ 25.706009] The buggy address belongs to the physical page: [ 25.706396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.706476] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.706662] page_type: f5(slab) [ 25.706736] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.706927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.707223] page dumped because: kasan: bad access detected [ 25.707446] [ 25.707528] Memory state around the buggy address: [ 25.707581] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.707757] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.707817] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.707866] ^ [ 25.707966] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.708248] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.708303] ================================================================== [ 25.781760] ================================================================== [ 25.781836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 25.781910] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.781971] [ 25.782019] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.782120] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.782154] Hardware name: linux,dummy-virt (DT) [ 25.782193] Call trace: [ 25.782234] show_stack+0x20/0x38 (C) [ 25.782296] dump_stack_lvl+0x8c/0xd0 [ 25.782534] print_report+0x118/0x608 [ 25.782957] kasan_report+0xdc/0x128 [ 25.783050] kasan_check_range+0x100/0x1a8 [ 25.783117] __kasan_check_write+0x20/0x30 [ 25.783174] kasan_atomics_helper+0x175c/0x4858 [ 25.783689] kasan_atomics+0x198/0x2e0 [ 25.783764] kunit_try_run_case+0x170/0x3f0 [ 25.783836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.784091] kthread+0x328/0x630 [ 25.784245] ret_from_fork+0x10/0x20 [ 25.784508] [ 25.784678] Allocated by task 265: [ 25.784725] kasan_save_stack+0x3c/0x68 [ 25.784901] kasan_save_track+0x20/0x40 [ 25.784953] kasan_save_alloc_info+0x40/0x58 [ 25.785327] __kasan_kmalloc+0xd4/0xd8 [ 25.785596] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.785655] kasan_atomics+0xb8/0x2e0 [ 25.785889] kunit_try_run_case+0x170/0x3f0 [ 25.785975] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.786186] kthread+0x328/0x630 [ 25.786359] ret_from_fork+0x10/0x20 [ 25.786603] [ 25.786642] The buggy address belongs to the object at fff00000c7884f80 [ 25.786642] which belongs to the cache kmalloc-64 of size 64 [ 25.786750] The buggy address is located 0 bytes to the right of [ 25.786750] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.786854] [ 25.786887] The buggy address belongs to the physical page: [ 25.786929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.786996] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.787056] page_type: f5(slab) [ 25.787109] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.787172] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.787222] page dumped because: kasan: bad access detected [ 25.787816] [ 25.787852] Memory state around the buggy address: [ 25.788151] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.788355] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.788450] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.788504] ^ [ 25.788551] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.788632] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.788728] ================================================================== [ 25.338211] ================================================================== [ 25.338424] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 25.338652] Write of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.338786] [ 25.338883] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.339090] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.339181] Hardware name: linux,dummy-virt (DT) [ 25.339263] Call trace: [ 25.339325] show_stack+0x20/0x38 (C) [ 25.339605] dump_stack_lvl+0x8c/0xd0 [ 25.339753] print_report+0x118/0x608 [ 25.339930] kasan_report+0xdc/0x128 [ 25.340061] kasan_check_range+0x100/0x1a8 [ 25.340186] __kasan_check_write+0x20/0x30 [ 25.340310] kasan_atomics_helper+0xa6c/0x4858 [ 25.340451] kasan_atomics+0x198/0x2e0 [ 25.340680] kunit_try_run_case+0x170/0x3f0 [ 25.340799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.340970] kthread+0x328/0x630 [ 25.341087] ret_from_fork+0x10/0x20 [ 25.341208] [ 25.341263] Allocated by task 265: [ 25.341517] kasan_save_stack+0x3c/0x68 [ 25.341688] kasan_save_track+0x20/0x40 [ 25.341814] kasan_save_alloc_info+0x40/0x58 [ 25.341926] __kasan_kmalloc+0xd4/0xd8 [ 25.342082] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.342190] kasan_atomics+0xb8/0x2e0 [ 25.342281] kunit_try_run_case+0x170/0x3f0 [ 25.342390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.342511] kthread+0x328/0x630 [ 25.342717] ret_from_fork+0x10/0x20 [ 25.342807] [ 25.342884] The buggy address belongs to the object at fff00000c7884f80 [ 25.342884] which belongs to the cache kmalloc-64 of size 64 [ 25.343168] The buggy address is located 0 bytes to the right of [ 25.343168] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.343409] [ 25.343468] The buggy address belongs to the physical page: [ 25.343552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.343757] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.343867] page_type: f5(slab) [ 25.344026] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.344184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.344384] page dumped because: kasan: bad access detected [ 25.344592] [ 25.344646] Memory state around the buggy address: [ 25.344750] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.344869] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.345566] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.345821] ^ [ 25.345921] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.346280] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.346604] ================================================================== [ 25.716948] ================================================================== [ 25.717016] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 25.717284] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.717408] [ 25.717464] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.717567] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.717600] Hardware name: linux,dummy-virt (DT) [ 25.717639] Call trace: [ 25.717669] show_stack+0x20/0x38 (C) [ 25.717738] dump_stack_lvl+0x8c/0xd0 [ 25.717796] print_report+0x118/0x608 [ 25.717854] kasan_report+0xdc/0x128 [ 25.717905] kasan_check_range+0x100/0x1a8 [ 25.717961] __kasan_check_write+0x20/0x30 [ 25.718013] kasan_atomics_helper+0x15b4/0x4858 [ 25.718068] kasan_atomics+0x198/0x2e0 [ 25.718120] kunit_try_run_case+0x170/0x3f0 [ 25.718174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.718235] kthread+0x328/0x630 [ 25.718283] ret_from_fork+0x10/0x20 [ 25.718339] [ 25.718363] Allocated by task 265: [ 25.718408] kasan_save_stack+0x3c/0x68 [ 25.718473] kasan_save_track+0x20/0x40 [ 25.718566] kasan_save_alloc_info+0x40/0x58 [ 25.718657] __kasan_kmalloc+0xd4/0xd8 [ 25.718739] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.718862] kasan_atomics+0xb8/0x2e0 [ 25.719074] kunit_try_run_case+0x170/0x3f0 [ 25.719164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.719217] kthread+0x328/0x630 [ 25.720141] ret_from_fork+0x10/0x20 [ 25.720201] [ 25.720243] The buggy address belongs to the object at fff00000c7884f80 [ 25.720243] which belongs to the cache kmalloc-64 of size 64 [ 25.720418] The buggy address is located 0 bytes to the right of [ 25.720418] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.720571] [ 25.720651] The buggy address belongs to the physical page: [ 25.720728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.721000] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.721262] page_type: f5(slab) [ 25.721433] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.721788] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.722373] page dumped because: kasan: bad access detected [ 25.722587] [ 25.722627] Memory state around the buggy address: [ 25.722680] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.722733] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.722787] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.722846] ^ [ 25.724231] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.724308] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.724356] ================================================================== [ 25.643048] ================================================================== [ 25.643171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 25.643254] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.643316] [ 25.643368] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.643541] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.643595] Hardware name: linux,dummy-virt (DT) [ 25.643660] Call trace: [ 25.643720] show_stack+0x20/0x38 (C) [ 25.643837] dump_stack_lvl+0x8c/0xd0 [ 25.644363] print_report+0x118/0x608 [ 25.644552] kasan_report+0xdc/0x128 [ 25.644723] kasan_check_range+0x100/0x1a8 [ 25.644870] __kasan_check_write+0x20/0x30 [ 25.644991] kasan_atomics_helper+0x11f8/0x4858 [ 25.645116] kasan_atomics+0x198/0x2e0 [ 25.645228] kunit_try_run_case+0x170/0x3f0 [ 25.645356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.645493] kthread+0x328/0x630 [ 25.645600] ret_from_fork+0x10/0x20 [ 25.646210] [ 25.646480] Allocated by task 265: [ 25.646610] kasan_save_stack+0x3c/0x68 [ 25.646743] kasan_save_track+0x20/0x40 [ 25.646880] kasan_save_alloc_info+0x40/0x58 [ 25.647030] __kasan_kmalloc+0xd4/0xd8 [ 25.647137] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.647246] kasan_atomics+0xb8/0x2e0 [ 25.647344] kunit_try_run_case+0x170/0x3f0 [ 25.647462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.647570] kthread+0x328/0x630 [ 25.647642] ret_from_fork+0x10/0x20 [ 25.649568] [ 25.649617] The buggy address belongs to the object at fff00000c7884f80 [ 25.649617] which belongs to the cache kmalloc-64 of size 64 [ 25.649727] The buggy address is located 0 bytes to the right of [ 25.649727] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.649804] [ 25.649842] The buggy address belongs to the physical page: [ 25.649924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.650051] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.650167] page_type: f5(slab) [ 25.650220] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.650277] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.650326] page dumped because: kasan: bad access detected [ 25.650378] [ 25.650416] Memory state around the buggy address: [ 25.650459] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.650509] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.650710] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.651016] ^ [ 25.651708] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.652094] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.652806] ================================================================== [ 25.709260] ================================================================== [ 25.709415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 25.709500] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.709562] [ 25.709608] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.709946] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.710246] Hardware name: linux,dummy-virt (DT) [ 25.710366] Call trace: [ 25.710433] show_stack+0x20/0x38 (C) [ 25.710542] dump_stack_lvl+0x8c/0xd0 [ 25.710609] print_report+0x118/0x608 [ 25.710667] kasan_report+0xdc/0x128 [ 25.710885] kasan_check_range+0x100/0x1a8 [ 25.711071] __kasan_check_write+0x20/0x30 [ 25.711136] kasan_atomics_helper+0x154c/0x4858 [ 25.711198] kasan_atomics+0x198/0x2e0 [ 25.711255] kunit_try_run_case+0x170/0x3f0 [ 25.711312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.711377] kthread+0x328/0x630 [ 25.711630] ret_from_fork+0x10/0x20 [ 25.711700] [ 25.711740] Allocated by task 265: [ 25.711794] kasan_save_stack+0x3c/0x68 [ 25.711869] kasan_save_track+0x20/0x40 [ 25.711922] kasan_save_alloc_info+0x40/0x58 [ 25.711969] __kasan_kmalloc+0xd4/0xd8 [ 25.712015] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.712078] kasan_atomics+0xb8/0x2e0 [ 25.712141] kunit_try_run_case+0x170/0x3f0 [ 25.712210] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.712281] kthread+0x328/0x630 [ 25.712326] ret_from_fork+0x10/0x20 [ 25.712372] [ 25.712412] The buggy address belongs to the object at fff00000c7884f80 [ 25.712412] which belongs to the cache kmalloc-64 of size 64 [ 25.712487] The buggy address is located 0 bytes to the right of [ 25.712487] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.712581] [ 25.712617] The buggy address belongs to the physical page: [ 25.712658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.712724] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.712786] page_type: f5(slab) [ 25.712841] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.712902] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.712951] page dumped because: kasan: bad access detected [ 25.713015] [ 25.713043] Memory state around the buggy address: [ 25.713086] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.713154] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.713209] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.713272] ^ [ 25.713331] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.716451] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.716577] ================================================================== [ 25.674299] ================================================================== [ 25.674377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 25.674696] Read of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.674763] [ 25.674807] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.674952] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.674991] Hardware name: linux,dummy-virt (DT) [ 25.675329] Call trace: [ 25.675379] show_stack+0x20/0x38 (C) [ 25.675725] dump_stack_lvl+0x8c/0xd0 [ 25.675797] print_report+0x118/0x608 [ 25.675925] kasan_report+0xdc/0x128 [ 25.676048] __asan_report_load8_noabort+0x20/0x30 [ 25.676110] kasan_atomics_helper+0x3f04/0x4858 [ 25.676412] kasan_atomics+0x198/0x2e0 [ 25.676571] kunit_try_run_case+0x170/0x3f0 [ 25.676728] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.676970] kthread+0x328/0x630 [ 25.677122] ret_from_fork+0x10/0x20 [ 25.677216] [ 25.677248] Allocated by task 265: [ 25.677610] kasan_save_stack+0x3c/0x68 [ 25.678156] kasan_save_track+0x20/0x40 [ 25.678231] kasan_save_alloc_info+0x40/0x58 [ 25.678308] __kasan_kmalloc+0xd4/0xd8 [ 25.678454] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.678557] kasan_atomics+0xb8/0x2e0 [ 25.678656] kunit_try_run_case+0x170/0x3f0 [ 25.678711] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.678788] kthread+0x328/0x630 [ 25.678857] ret_from_fork+0x10/0x20 [ 25.679258] [ 25.679440] The buggy address belongs to the object at fff00000c7884f80 [ 25.679440] which belongs to the cache kmalloc-64 of size 64 [ 25.679790] The buggy address is located 0 bytes to the right of [ 25.679790] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.680079] [ 25.680431] The buggy address belongs to the physical page: [ 25.680699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.680816] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.680935] page_type: f5(slab) [ 25.681224] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.681442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.681703] page dumped because: kasan: bad access detected [ 25.681764] [ 25.682029] Memory state around the buggy address: [ 25.682093] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.682150] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.682429] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.682505] ^ [ 25.682556] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.682994] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.683088] ================================================================== [ 25.605035] ================================================================== [ 25.605168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 25.605325] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.605469] [ 25.605603] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.605876] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.605979] Hardware name: linux,dummy-virt (DT) [ 25.606076] Call trace: [ 25.606163] show_stack+0x20/0x38 (C) [ 25.606324] dump_stack_lvl+0x8c/0xd0 [ 25.606580] print_report+0x118/0x608 [ 25.607108] kasan_report+0xdc/0x128 [ 25.607834] kasan_check_range+0x100/0x1a8 [ 25.608035] __kasan_check_write+0x20/0x30 [ 25.608917] kasan_atomics_helper+0x1128/0x4858 [ 25.609473] kasan_atomics+0x198/0x2e0 [ 25.610032] kunit_try_run_case+0x170/0x3f0 [ 25.610521] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.610655] kthread+0x328/0x630 [ 25.610755] ret_from_fork+0x10/0x20 [ 25.611839] [ 25.611962] Allocated by task 265: [ 25.612085] kasan_save_stack+0x3c/0x68 [ 25.612512] kasan_save_track+0x20/0x40 [ 25.613309] kasan_save_alloc_info+0x40/0x58 [ 25.613684] __kasan_kmalloc+0xd4/0xd8 [ 25.614297] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.614551] kasan_atomics+0xb8/0x2e0 [ 25.614635] kunit_try_run_case+0x170/0x3f0 [ 25.614724] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.614846] kthread+0x328/0x630 [ 25.614943] ret_from_fork+0x10/0x20 [ 25.616215] [ 25.616706] The buggy address belongs to the object at fff00000c7884f80 [ 25.616706] which belongs to the cache kmalloc-64 of size 64 [ 25.617571] The buggy address is located 0 bytes to the right of [ 25.617571] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.618612] [ 25.619315] The buggy address belongs to the physical page: [ 25.619458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.620487] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.620650] page_type: f5(slab) [ 25.621095] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.621712] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.621945] page dumped because: kasan: bad access detected [ 25.622150] [ 25.622433] Memory state around the buggy address: [ 25.623127] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.623674] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.624117] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.624861] ^ [ 25.625164] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.625697] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.626493] ================================================================== [ 25.628755] ================================================================== [ 25.629605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 25.630575] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.631094] [ 25.631376] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.631620] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.631691] Hardware name: linux,dummy-virt (DT) [ 25.631775] Call trace: [ 25.633183] show_stack+0x20/0x38 (C) [ 25.633918] dump_stack_lvl+0x8c/0xd0 [ 25.634296] print_report+0x118/0x608 [ 25.634436] kasan_report+0xdc/0x128 [ 25.634557] kasan_check_range+0x100/0x1a8 [ 25.634666] __kasan_check_write+0x20/0x30 [ 25.634771] kasan_atomics_helper+0x1190/0x4858 [ 25.634905] kasan_atomics+0x198/0x2e0 [ 25.635031] kunit_try_run_case+0x170/0x3f0 [ 25.636964] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.637421] kthread+0x328/0x630 [ 25.638066] ret_from_fork+0x10/0x20 [ 25.638220] [ 25.638298] Allocated by task 265: [ 25.638450] kasan_save_stack+0x3c/0x68 [ 25.638568] kasan_save_track+0x20/0x40 [ 25.638792] kasan_save_alloc_info+0x40/0x58 [ 25.638912] __kasan_kmalloc+0xd4/0xd8 [ 25.639031] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.639142] kasan_atomics+0xb8/0x2e0 [ 25.639243] kunit_try_run_case+0x170/0x3f0 [ 25.639345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.639493] kthread+0x328/0x630 [ 25.639581] ret_from_fork+0x10/0x20 [ 25.639663] [ 25.639712] The buggy address belongs to the object at fff00000c7884f80 [ 25.639712] which belongs to the cache kmalloc-64 of size 64 [ 25.639863] The buggy address is located 0 bytes to the right of [ 25.639863] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.640039] [ 25.640094] The buggy address belongs to the physical page: [ 25.640169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.640298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.640433] page_type: f5(slab) [ 25.640538] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.640721] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.640905] page dumped because: kasan: bad access detected [ 25.641003] [ 25.641050] Memory state around the buggy address: [ 25.641138] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.641239] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.641341] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.641465] ^ [ 25.641550] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.641655] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.641787] ================================================================== [ 25.765611] ================================================================== [ 25.765695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 25.765772] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.765833] [ 25.765880] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.765982] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.766014] Hardware name: linux,dummy-virt (DT) [ 25.766054] Call trace: [ 25.766084] show_stack+0x20/0x38 (C) [ 25.766147] dump_stack_lvl+0x8c/0xd0 [ 25.766205] print_report+0x118/0x608 [ 25.766262] kasan_report+0xdc/0x128 [ 25.766315] kasan_check_range+0x100/0x1a8 [ 25.768313] __kasan_check_write+0x20/0x30 [ 25.768811] kasan_atomics_helper+0x16d0/0x4858 [ 25.769114] kasan_atomics+0x198/0x2e0 [ 25.769578] kunit_try_run_case+0x170/0x3f0 [ 25.769788] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.770020] kthread+0x328/0x630 [ 25.770094] ret_from_fork+0x10/0x20 [ 25.770266] [ 25.770296] Allocated by task 265: [ 25.770576] kasan_save_stack+0x3c/0x68 [ 25.770640] kasan_save_track+0x20/0x40 [ 25.770691] kasan_save_alloc_info+0x40/0x58 [ 25.770738] __kasan_kmalloc+0xd4/0xd8 [ 25.770785] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.770845] kasan_atomics+0xb8/0x2e0 [ 25.770897] kunit_try_run_case+0x170/0x3f0 [ 25.770947] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.771211] kthread+0x328/0x630 [ 25.771461] ret_from_fork+0x10/0x20 [ 25.771520] [ 25.771556] The buggy address belongs to the object at fff00000c7884f80 [ 25.771556] which belongs to the cache kmalloc-64 of size 64 [ 25.771628] The buggy address is located 0 bytes to the right of [ 25.771628] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.771701] [ 25.771731] The buggy address belongs to the physical page: [ 25.771770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.772045] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.772117] page_type: f5(slab) [ 25.772172] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.772234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.772284] page dumped because: kasan: bad access detected [ 25.772327] [ 25.772350] Memory state around the buggy address: [ 25.772421] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.772489] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.772545] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.772592] ^ [ 25.772636] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.772686] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.772733] ================================================================== [ 25.513483] ================================================================== [ 25.513690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 25.513820] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.513989] [ 25.514129] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.514347] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.514775] Hardware name: linux,dummy-virt (DT) [ 25.514865] Call trace: [ 25.514929] show_stack+0x20/0x38 (C) [ 25.515154] dump_stack_lvl+0x8c/0xd0 [ 25.515586] print_report+0x118/0x608 [ 25.515804] kasan_report+0xdc/0x128 [ 25.515954] kasan_check_range+0x100/0x1a8 [ 25.516045] __kasan_check_write+0x20/0x30 [ 25.516147] kasan_atomics_helper+0xe44/0x4858 [ 25.516312] kasan_atomics+0x198/0x2e0 [ 25.516620] kunit_try_run_case+0x170/0x3f0 [ 25.517045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.517210] kthread+0x328/0x630 [ 25.517324] ret_from_fork+0x10/0x20 [ 25.517530] [ 25.517954] Allocated by task 265: [ 25.518127] kasan_save_stack+0x3c/0x68 [ 25.518246] kasan_save_track+0x20/0x40 [ 25.518350] kasan_save_alloc_info+0x40/0x58 [ 25.518686] __kasan_kmalloc+0xd4/0xd8 [ 25.519055] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.519173] kasan_atomics+0xb8/0x2e0 [ 25.519380] kunit_try_run_case+0x170/0x3f0 [ 25.519537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.519751] kthread+0x328/0x630 [ 25.520045] ret_from_fork+0x10/0x20 [ 25.520373] [ 25.520445] The buggy address belongs to the object at fff00000c7884f80 [ 25.520445] which belongs to the cache kmalloc-64 of size 64 [ 25.520792] The buggy address is located 0 bytes to the right of [ 25.520792] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.520972] [ 25.521009] The buggy address belongs to the physical page: [ 25.521050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.521114] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.521175] page_type: f5(slab) [ 25.521229] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.521289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.521337] page dumped because: kasan: bad access detected [ 25.521376] [ 25.521424] Memory state around the buggy address: [ 25.521469] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.521521] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.521572] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.521618] ^ [ 25.521659] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.521707] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.521751] ================================================================== [ 25.553708] ================================================================== [ 25.553886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 25.554045] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.554162] [ 25.554241] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.554498] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.554646] Hardware name: linux,dummy-virt (DT) [ 25.554761] Call trace: [ 25.554858] show_stack+0x20/0x38 (C) [ 25.555040] dump_stack_lvl+0x8c/0xd0 [ 25.555200] print_report+0x118/0x608 [ 25.555371] kasan_report+0xdc/0x128 [ 25.555547] kasan_check_range+0x100/0x1a8 [ 25.555668] __kasan_check_write+0x20/0x30 [ 25.555763] kasan_atomics_helper+0xf88/0x4858 [ 25.555897] kasan_atomics+0x198/0x2e0 [ 25.555998] kunit_try_run_case+0x170/0x3f0 [ 25.556102] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.556232] kthread+0x328/0x630 [ 25.556329] ret_from_fork+0x10/0x20 [ 25.556465] [ 25.556524] Allocated by task 265: [ 25.556615] kasan_save_stack+0x3c/0x68 [ 25.556722] kasan_save_track+0x20/0x40 [ 25.556825] kasan_save_alloc_info+0x40/0x58 [ 25.556924] __kasan_kmalloc+0xd4/0xd8 [ 25.557020] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.557124] kasan_atomics+0xb8/0x2e0 [ 25.557223] kunit_try_run_case+0x170/0x3f0 [ 25.557321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.557434] kthread+0x328/0x630 [ 25.557526] ret_from_fork+0x10/0x20 [ 25.557622] [ 25.557679] The buggy address belongs to the object at fff00000c7884f80 [ 25.557679] which belongs to the cache kmalloc-64 of size 64 [ 25.557814] The buggy address is located 0 bytes to the right of [ 25.557814] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.557976] [ 25.558043] The buggy address belongs to the physical page: [ 25.558122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.558253] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.558439] page_type: f5(slab) [ 25.558532] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.558594] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.558644] page dumped because: kasan: bad access detected [ 25.558708] [ 25.558792] Memory state around the buggy address: [ 25.559018] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.559243] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.559642] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.559961] ^ [ 25.560055] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.560169] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.560659] ================================================================== [ 25.653766] ================================================================== [ 25.653846] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 25.653926] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.654443] [ 25.654532] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.654645] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.654681] Hardware name: linux,dummy-virt (DT) [ 25.654722] Call trace: [ 25.654754] show_stack+0x20/0x38 (C) [ 25.654836] dump_stack_lvl+0x8c/0xd0 [ 25.654902] print_report+0x118/0x608 [ 25.654958] kasan_report+0xdc/0x128 [ 25.655044] kasan_check_range+0x100/0x1a8 [ 25.655266] __kasan_check_write+0x20/0x30 [ 25.655650] kasan_atomics_helper+0x126c/0x4858 [ 25.655729] kasan_atomics+0x198/0x2e0 [ 25.655786] kunit_try_run_case+0x170/0x3f0 [ 25.655845] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.656026] kthread+0x328/0x630 [ 25.656119] ret_from_fork+0x10/0x20 [ 25.656412] [ 25.656444] Allocated by task 265: [ 25.656483] kasan_save_stack+0x3c/0x68 [ 25.656726] kasan_save_track+0x20/0x40 [ 25.656801] kasan_save_alloc_info+0x40/0x58 [ 25.657004] __kasan_kmalloc+0xd4/0xd8 [ 25.657216] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.657305] kasan_atomics+0xb8/0x2e0 [ 25.657366] kunit_try_run_case+0x170/0x3f0 [ 25.657429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.657486] kthread+0x328/0x630 [ 25.657527] ret_from_fork+0x10/0x20 [ 25.658018] [ 25.658057] The buggy address belongs to the object at fff00000c7884f80 [ 25.658057] which belongs to the cache kmalloc-64 of size 64 [ 25.658445] The buggy address is located 0 bytes to the right of [ 25.658445] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.658746] [ 25.658781] The buggy address belongs to the physical page: [ 25.658832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.658903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.658965] page_type: f5(slab) [ 25.659019] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.659484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.659549] page dumped because: kasan: bad access detected [ 25.659592] [ 25.659699] Memory state around the buggy address: [ 25.659748] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.659802] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.659857] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.659907] ^ [ 25.659998] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.660241] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.660514] ================================================================== [ 25.794948] ================================================================== [ 25.795022] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 25.795096] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.795160] [ 25.795202] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.795304] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.795339] Hardware name: linux,dummy-virt (DT) [ 25.795379] Call trace: [ 25.795422] show_stack+0x20/0x38 (C) [ 25.795489] dump_stack_lvl+0x8c/0xd0 [ 25.795547] print_report+0x118/0x608 [ 25.795604] kasan_report+0xdc/0x128 [ 25.795658] kasan_check_range+0x100/0x1a8 [ 25.795716] __kasan_check_write+0x20/0x30 [ 25.795770] kasan_atomics_helper+0x17ec/0x4858 [ 25.795827] kasan_atomics+0x198/0x2e0 [ 25.795882] kunit_try_run_case+0x170/0x3f0 [ 25.795937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.795998] kthread+0x328/0x630 [ 25.796046] ret_from_fork+0x10/0x20 [ 25.796103] [ 25.796128] Allocated by task 265: [ 25.796164] kasan_save_stack+0x3c/0x68 [ 25.796217] kasan_save_track+0x20/0x40 [ 25.796266] kasan_save_alloc_info+0x40/0x58 [ 25.796312] __kasan_kmalloc+0xd4/0xd8 [ 25.796356] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.796430] kasan_atomics+0xb8/0x2e0 [ 25.796483] kunit_try_run_case+0x170/0x3f0 [ 25.796530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.796583] kthread+0x328/0x630 [ 25.796623] ret_from_fork+0x10/0x20 [ 25.796667] [ 25.796694] The buggy address belongs to the object at fff00000c7884f80 [ 25.796694] which belongs to the cache kmalloc-64 of size 64 [ 25.796971] The buggy address is located 0 bytes to the right of [ 25.796971] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.797269] [ 25.797301] The buggy address belongs to the physical page: [ 25.797343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.797828] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.797900] page_type: f5(slab) [ 25.798028] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.798175] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.798244] page dumped because: kasan: bad access detected [ 25.798328] [ 25.798379] Memory state around the buggy address: [ 25.798437] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.798542] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.798677] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.798787] ^ [ 25.798848] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.798903] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.798949] ================================================================== [ 25.684354] ================================================================== [ 25.684501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 25.684582] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.684641] [ 25.684684] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.684781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.684814] Hardware name: linux,dummy-virt (DT) [ 25.684853] Call trace: [ 25.684903] show_stack+0x20/0x38 (C) [ 25.684965] dump_stack_lvl+0x8c/0xd0 [ 25.685023] print_report+0x118/0x608 [ 25.685078] kasan_report+0xdc/0x128 [ 25.685131] kasan_check_range+0x100/0x1a8 [ 25.685184] __kasan_check_write+0x20/0x30 [ 25.685236] kasan_atomics_helper+0x1414/0x4858 [ 25.685292] kasan_atomics+0x198/0x2e0 [ 25.685344] kunit_try_run_case+0x170/0x3f0 [ 25.685782] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.686153] kthread+0x328/0x630 [ 25.686230] ret_from_fork+0x10/0x20 [ 25.686293] [ 25.686319] Allocated by task 265: [ 25.686788] kasan_save_stack+0x3c/0x68 [ 25.686871] kasan_save_track+0x20/0x40 [ 25.686938] kasan_save_alloc_info+0x40/0x58 [ 25.686990] __kasan_kmalloc+0xd4/0xd8 [ 25.687036] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.687085] kasan_atomics+0xb8/0x2e0 [ 25.687168] kunit_try_run_case+0x170/0x3f0 [ 25.687232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.687300] kthread+0x328/0x630 [ 25.687342] ret_from_fork+0x10/0x20 [ 25.687434] [ 25.687627] The buggy address belongs to the object at fff00000c7884f80 [ 25.687627] which belongs to the cache kmalloc-64 of size 64 [ 25.687795] The buggy address is located 0 bytes to the right of [ 25.687795] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.688061] [ 25.688240] The buggy address belongs to the physical page: [ 25.688468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.688556] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.688619] page_type: f5(slab) [ 25.689000] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.689069] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.689121] page dumped because: kasan: bad access detected [ 25.689161] [ 25.689186] Memory state around the buggy address: [ 25.689228] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.689492] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.689556] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.689709] ^ [ 25.689761] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.689861] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.689912] ================================================================== [ 25.738942] ================================================================== [ 25.739025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 25.739102] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.739162] [ 25.739209] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.739310] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.739344] Hardware name: linux,dummy-virt (DT) [ 25.739385] Call trace: [ 25.739430] show_stack+0x20/0x38 (C) [ 25.739492] dump_stack_lvl+0x8c/0xd0 [ 25.739552] print_report+0x118/0x608 [ 25.739605] kasan_report+0xdc/0x128 [ 25.739660] kasan_check_range+0x100/0x1a8 [ 25.739717] __kasan_check_write+0x20/0x30 [ 25.739771] kasan_atomics_helper+0x1644/0x4858 [ 25.739827] kasan_atomics+0x198/0x2e0 [ 25.739879] kunit_try_run_case+0x170/0x3f0 [ 25.739935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.739995] kthread+0x328/0x630 [ 25.740045] ret_from_fork+0x10/0x20 [ 25.740102] [ 25.740127] Allocated by task 265: [ 25.740161] kasan_save_stack+0x3c/0x68 [ 25.740215] kasan_save_track+0x20/0x40 [ 25.740262] kasan_save_alloc_info+0x40/0x58 [ 25.740306] __kasan_kmalloc+0xd4/0xd8 [ 25.740350] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.740395] kasan_atomics+0xb8/0x2e0 [ 25.743057] kunit_try_run_case+0x170/0x3f0 [ 25.743731] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.743853] kthread+0x328/0x630 [ 25.744019] ret_from_fork+0x10/0x20 [ 25.744297] [ 25.744443] The buggy address belongs to the object at fff00000c7884f80 [ 25.744443] which belongs to the cache kmalloc-64 of size 64 [ 25.745075] The buggy address is located 0 bytes to the right of [ 25.745075] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.745207] [ 25.745240] The buggy address belongs to the physical page: [ 25.745280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.746424] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.746829] page_type: f5(slab) [ 25.746898] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.747319] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.747726] page dumped because: kasan: bad access detected [ 25.747774] [ 25.747801] Memory state around the buggy address: [ 25.747849] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.747903] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.747958] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.748006] ^ [ 25.748048] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.748100] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.748147] ================================================================== [ 25.727827] ================================================================== [ 25.728268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 25.728432] Read of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265 [ 25.728497] [ 25.728542] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 25.728643] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.728676] Hardware name: linux,dummy-virt (DT) [ 25.728717] Call trace: [ 25.728745] show_stack+0x20/0x38 (C) [ 25.728809] dump_stack_lvl+0x8c/0xd0 [ 25.728866] print_report+0x118/0x608 [ 25.728923] kasan_report+0xdc/0x128 [ 25.728977] __asan_report_load8_noabort+0x20/0x30 [ 25.729034] kasan_atomics_helper+0x3db0/0x4858 [ 25.729092] kasan_atomics+0x198/0x2e0 [ 25.729145] kunit_try_run_case+0x170/0x3f0 [ 25.729202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.729264] kthread+0x328/0x630 [ 25.731179] ret_from_fork+0x10/0x20 [ 25.732236] [ 25.732271] Allocated by task 265: [ 25.732313] kasan_save_stack+0x3c/0x68 [ 25.732385] kasan_save_track+0x20/0x40 [ 25.732449] kasan_save_alloc_info+0x40/0x58 [ 25.733042] __kasan_kmalloc+0xd4/0xd8 [ 25.733345] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.733614] kasan_atomics+0xb8/0x2e0 [ 25.734188] kunit_try_run_case+0x170/0x3f0 [ 25.734496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.734574] kthread+0x328/0x630 [ 25.734621] ret_from_fork+0x10/0x20 [ 25.734926] [ 25.735149] The buggy address belongs to the object at fff00000c7884f80 [ 25.735149] which belongs to the cache kmalloc-64 of size 64 [ 25.735581] The buggy address is located 0 bytes to the right of [ 25.735581] allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0) [ 25.736193] [ 25.736529] The buggy address belongs to the physical page: [ 25.736745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884 [ 25.736855] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.736925] page_type: f5(slab) [ 25.736979] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.737040] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.737091] page dumped because: kasan: bad access detected [ 25.737131] [ 25.737155] Memory state around the buggy address: [ 25.737199] fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.737342] fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.737407] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.737479] ^ [ 25.737548] fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.737629] fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.737683] ==================================================================
[ 13.411426] ================================================================== [ 13.411701] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 13.412316] Read of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 13.412894] [ 13.413066] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.413114] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.413127] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.413150] Call Trace: [ 13.413166] <TASK> [ 13.413183] dump_stack_lvl+0x73/0xb0 [ 13.413211] print_report+0xd1/0x650 [ 13.413350] ? __virt_addr_valid+0x1db/0x2d0 [ 13.413373] ? kasan_atomics_helper+0x4b54/0x5450 [ 13.413397] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.413420] ? kasan_atomics_helper+0x4b54/0x5450 [ 13.413444] kasan_report+0x141/0x180 [ 13.413525] ? kasan_atomics_helper+0x4b54/0x5450 [ 13.413559] __asan_report_load4_noabort+0x18/0x20 [ 13.413581] kasan_atomics_helper+0x4b54/0x5450 [ 13.413606] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.413643] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.413667] ? kasan_atomics+0x152/0x310 [ 13.413691] kasan_atomics+0x1dc/0x310 [ 13.413712] ? __pfx_kasan_atomics+0x10/0x10 [ 13.413734] ? __pfx_read_tsc+0x10/0x10 [ 13.413764] ? ktime_get_ts64+0x86/0x230 [ 13.413792] kunit_try_run_case+0x1a5/0x480 [ 13.413828] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.413849] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.413875] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.413901] ? __kthread_parkme+0x82/0x180 [ 13.413923] ? preempt_count_sub+0x50/0x80 [ 13.413948] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.413971] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.413996] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.414023] kthread+0x337/0x6f0 [ 13.414043] ? trace_preempt_on+0x20/0xc0 [ 13.414067] ? __pfx_kthread+0x10/0x10 [ 13.414089] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.414113] ? calculate_sigpending+0x7b/0xa0 [ 13.414139] ? __pfx_kthread+0x10/0x10 [ 13.414162] ret_from_fork+0x116/0x1d0 [ 13.414182] ? __pfx_kthread+0x10/0x10 [ 13.414206] ret_from_fork_asm+0x1a/0x30 [ 13.414237] </TASK> [ 13.414248] [ 13.424975] Allocated by task 282: [ 13.425796] kasan_save_stack+0x45/0x70 [ 13.426022] kasan_save_track+0x18/0x40 [ 13.426645] kasan_save_alloc_info+0x3b/0x50 [ 13.426946] __kasan_kmalloc+0xb7/0xc0 [ 13.427157] __kmalloc_cache_noprof+0x189/0x420 [ 13.427331] kasan_atomics+0x95/0x310 [ 13.427526] kunit_try_run_case+0x1a5/0x480 [ 13.427745] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.428064] kthread+0x337/0x6f0 [ 13.428227] ret_from_fork+0x116/0x1d0 [ 13.428423] ret_from_fork_asm+0x1a/0x30 [ 13.428634] [ 13.428711] The buggy address belongs to the object at ffff888102fa7d80 [ 13.428711] which belongs to the cache kmalloc-64 of size 64 [ 13.429476] The buggy address is located 0 bytes to the right of [ 13.429476] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 13.430053] [ 13.430203] The buggy address belongs to the physical page: [ 13.430438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 13.430951] flags: 0x200000000000000(node=0|zone=2) [ 13.431138] page_type: f5(slab) [ 13.431349] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.431909] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.432446] page dumped because: kasan: bad access detected [ 13.433295] [ 13.433382] Memory state around the buggy address: [ 13.433861] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.434298] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.434702] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.435202] ^ [ 13.435439] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.435763] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.436071] ================================================================== [ 13.482921] ================================================================== [ 13.483376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 13.483743] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 13.484301] [ 13.484423] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.484470] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.484484] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.484507] Call Trace: [ 13.484522] <TASK> [ 13.484538] dump_stack_lvl+0x73/0xb0 [ 13.484565] print_report+0xd1/0x650 [ 13.484589] ? __virt_addr_valid+0x1db/0x2d0 [ 13.484626] ? kasan_atomics_helper+0x565/0x5450 [ 13.484650] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.484675] ? kasan_atomics_helper+0x565/0x5450 [ 13.484699] kasan_report+0x141/0x180 [ 13.484722] ? kasan_atomics_helper+0x565/0x5450 [ 13.484750] kasan_check_range+0x10c/0x1c0 [ 13.484837] __kasan_check_write+0x18/0x20 [ 13.484860] kasan_atomics_helper+0x565/0x5450 [ 13.484885] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.484909] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.484932] ? kasan_atomics+0x152/0x310 [ 13.484957] kasan_atomics+0x1dc/0x310 [ 13.484979] ? __pfx_kasan_atomics+0x10/0x10 [ 13.485003] ? __pfx_read_tsc+0x10/0x10 [ 13.485026] ? ktime_get_ts64+0x86/0x230 [ 13.485052] kunit_try_run_case+0x1a5/0x480 [ 13.485074] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.485095] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.485121] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.485148] ? __kthread_parkme+0x82/0x180 [ 13.485170] ? preempt_count_sub+0x50/0x80 [ 13.485196] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.485219] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.485244] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.485270] kthread+0x337/0x6f0 [ 13.485291] ? trace_preempt_on+0x20/0xc0 [ 13.485315] ? __pfx_kthread+0x10/0x10 [ 13.485337] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.485361] ? calculate_sigpending+0x7b/0xa0 [ 13.485386] ? __pfx_kthread+0x10/0x10 [ 13.485410] ret_from_fork+0x116/0x1d0 [ 13.485429] ? __pfx_kthread+0x10/0x10 [ 13.485450] ret_from_fork_asm+0x1a/0x30 [ 13.485482] </TASK> [ 13.485494] [ 13.496443] Allocated by task 282: [ 13.496633] kasan_save_stack+0x45/0x70 [ 13.497405] kasan_save_track+0x18/0x40 [ 13.497696] kasan_save_alloc_info+0x3b/0x50 [ 13.498144] __kasan_kmalloc+0xb7/0xc0 [ 13.498349] __kmalloc_cache_noprof+0x189/0x420 [ 13.498868] kasan_atomics+0x95/0x310 [ 13.499137] kunit_try_run_case+0x1a5/0x480 [ 13.499477] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.499957] kthread+0x337/0x6f0 [ 13.500135] ret_from_fork+0x116/0x1d0 [ 13.500305] ret_from_fork_asm+0x1a/0x30 [ 13.500488] [ 13.500585] The buggy address belongs to the object at ffff888102fa7d80 [ 13.500585] which belongs to the cache kmalloc-64 of size 64 [ 13.501192] The buggy address is located 0 bytes to the right of [ 13.501192] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 13.501863] [ 13.501953] The buggy address belongs to the physical page: [ 13.502136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 13.502503] flags: 0x200000000000000(node=0|zone=2) [ 13.502787] page_type: f5(slab) [ 13.502949] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.503282] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.503537] page dumped because: kasan: bad access detected [ 13.503790] [ 13.504007] Memory state around the buggy address: [ 13.504175] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.504495] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.504833] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.505322] ^ [ 13.505553] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.505895] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.506261] ================================================================== [ 14.695092] ================================================================== [ 14.695491] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 14.695917] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 14.696164] [ 14.696275] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 14.696320] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.696334] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.696356] Call Trace: [ 14.696371] <TASK> [ 14.696388] dump_stack_lvl+0x73/0xb0 [ 14.696417] print_report+0xd1/0x650 [ 14.696441] ? __virt_addr_valid+0x1db/0x2d0 [ 14.696464] ? kasan_atomics_helper+0x224c/0x5450 [ 14.696487] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.696512] ? kasan_atomics_helper+0x224c/0x5450 [ 14.696540] kasan_report+0x141/0x180 [ 14.696566] ? kasan_atomics_helper+0x224c/0x5450 [ 14.696595] kasan_check_range+0x10c/0x1c0 [ 14.696632] __kasan_check_write+0x18/0x20 [ 14.696654] kasan_atomics_helper+0x224c/0x5450 [ 14.696679] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.696702] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.696726] ? kasan_atomics+0x152/0x310 [ 14.696750] kasan_atomics+0x1dc/0x310 [ 14.696792] ? __pfx_kasan_atomics+0x10/0x10 [ 14.696815] ? __pfx_read_tsc+0x10/0x10 [ 14.696838] ? ktime_get_ts64+0x86/0x230 [ 14.696865] kunit_try_run_case+0x1a5/0x480 [ 14.696888] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.696909] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.696936] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.696963] ? __kthread_parkme+0x82/0x180 [ 14.696985] ? preempt_count_sub+0x50/0x80 [ 14.697009] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.697032] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.697058] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.697084] kthread+0x337/0x6f0 [ 14.697105] ? trace_preempt_on+0x20/0xc0 [ 14.697129] ? __pfx_kthread+0x10/0x10 [ 14.697151] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.697175] ? calculate_sigpending+0x7b/0xa0 [ 14.697200] ? __pfx_kthread+0x10/0x10 [ 14.697222] ret_from_fork+0x116/0x1d0 [ 14.697241] ? __pfx_kthread+0x10/0x10 [ 14.697263] ret_from_fork_asm+0x1a/0x30 [ 14.697295] </TASK> [ 14.697307] [ 14.704927] Allocated by task 282: [ 14.705107] kasan_save_stack+0x45/0x70 [ 14.705272] kasan_save_track+0x18/0x40 [ 14.705415] kasan_save_alloc_info+0x3b/0x50 [ 14.705584] __kasan_kmalloc+0xb7/0xc0 [ 14.705810] __kmalloc_cache_noprof+0x189/0x420 [ 14.706036] kasan_atomics+0x95/0x310 [ 14.706223] kunit_try_run_case+0x1a5/0x480 [ 14.706387] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.706652] kthread+0x337/0x6f0 [ 14.706844] ret_from_fork+0x116/0x1d0 [ 14.707018] ret_from_fork_asm+0x1a/0x30 [ 14.707184] [ 14.707261] The buggy address belongs to the object at ffff888102fa7d80 [ 14.707261] which belongs to the cache kmalloc-64 of size 64 [ 14.707648] The buggy address is located 0 bytes to the right of [ 14.707648] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 14.708235] [ 14.708336] The buggy address belongs to the physical page: [ 14.708593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 14.708925] flags: 0x200000000000000(node=0|zone=2) [ 14.709098] page_type: f5(slab) [ 14.709223] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.709568] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.709951] page dumped because: kasan: bad access detected [ 14.710222] [ 14.710326] Memory state around the buggy address: [ 14.710561] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.710898] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.711195] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.711483] ^ [ 14.711692] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.712030] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.712309] ================================================================== [ 14.031272] ================================================================== [ 14.031575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 14.032083] Read of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 14.032396] [ 14.032508] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 14.032554] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.032567] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.032588] Call Trace: [ 14.032604] <TASK> [ 14.032631] dump_stack_lvl+0x73/0xb0 [ 14.032658] print_report+0xd1/0x650 [ 14.032681] ? __virt_addr_valid+0x1db/0x2d0 [ 14.032705] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.032728] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.032869] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.032894] kasan_report+0x141/0x180 [ 14.032918] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.032946] __asan_report_load4_noabort+0x18/0x20 [ 14.032970] kasan_atomics_helper+0x49e8/0x5450 [ 14.032994] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.033018] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.033041] ? kasan_atomics+0x152/0x310 [ 14.033065] kasan_atomics+0x1dc/0x310 [ 14.033086] ? __pfx_kasan_atomics+0x10/0x10 [ 14.033108] ? __pfx_read_tsc+0x10/0x10 [ 14.033130] ? ktime_get_ts64+0x86/0x230 [ 14.033156] kunit_try_run_case+0x1a5/0x480 [ 14.033178] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.033199] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.033225] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.033252] ? __kthread_parkme+0x82/0x180 [ 14.033273] ? preempt_count_sub+0x50/0x80 [ 14.033298] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.033320] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.033345] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.033371] kthread+0x337/0x6f0 [ 14.033392] ? trace_preempt_on+0x20/0xc0 [ 14.033416] ? __pfx_kthread+0x10/0x10 [ 14.033438] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.033462] ? calculate_sigpending+0x7b/0xa0 [ 14.033487] ? __pfx_kthread+0x10/0x10 [ 14.033511] ret_from_fork+0x116/0x1d0 [ 14.033530] ? __pfx_kthread+0x10/0x10 [ 14.033552] ret_from_fork_asm+0x1a/0x30 [ 14.033583] </TASK> [ 14.033595] [ 14.042133] Allocated by task 282: [ 14.042282] kasan_save_stack+0x45/0x70 [ 14.042494] kasan_save_track+0x18/0x40 [ 14.042837] kasan_save_alloc_info+0x3b/0x50 [ 14.043034] __kasan_kmalloc+0xb7/0xc0 [ 14.043174] __kmalloc_cache_noprof+0x189/0x420 [ 14.043348] kasan_atomics+0x95/0x310 [ 14.043537] kunit_try_run_case+0x1a5/0x480 [ 14.043768] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.044019] kthread+0x337/0x6f0 [ 14.044147] ret_from_fork+0x116/0x1d0 [ 14.044286] ret_from_fork_asm+0x1a/0x30 [ 14.044433] [ 14.044510] The buggy address belongs to the object at ffff888102fa7d80 [ 14.044510] which belongs to the cache kmalloc-64 of size 64 [ 14.044933] The buggy address is located 0 bytes to the right of [ 14.044933] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 14.045576] [ 14.045685] The buggy address belongs to the physical page: [ 14.045976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 14.046381] flags: 0x200000000000000(node=0|zone=2) [ 14.046660] page_type: f5(slab) [ 14.046862] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.047234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.047537] page dumped because: kasan: bad access detected [ 14.047752] [ 14.047842] Memory state around the buggy address: [ 14.048023] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.048616] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.048919] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.049140] ^ [ 14.049325] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.049551] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.049889] ================================================================== [ 13.506718] ================================================================== [ 13.507249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 13.507533] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 13.508019] [ 13.508119] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.508167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.508180] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.508203] Call Trace: [ 13.508218] <TASK> [ 13.508234] dump_stack_lvl+0x73/0xb0 [ 13.508260] print_report+0xd1/0x650 [ 13.508283] ? __virt_addr_valid+0x1db/0x2d0 [ 13.508306] ? kasan_atomics_helper+0x5fe/0x5450 [ 13.508329] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.508353] ? kasan_atomics_helper+0x5fe/0x5450 [ 13.508377] kasan_report+0x141/0x180 [ 13.508400] ? kasan_atomics_helper+0x5fe/0x5450 [ 13.508429] kasan_check_range+0x10c/0x1c0 [ 13.508455] __kasan_check_write+0x18/0x20 [ 13.508476] kasan_atomics_helper+0x5fe/0x5450 [ 13.508500] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.508524] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.508548] ? kasan_atomics+0x152/0x310 [ 13.508573] kasan_atomics+0x1dc/0x310 [ 13.508593] ? __pfx_kasan_atomics+0x10/0x10 [ 13.508625] ? __pfx_read_tsc+0x10/0x10 [ 13.508647] ? ktime_get_ts64+0x86/0x230 [ 13.508674] kunit_try_run_case+0x1a5/0x480 [ 13.508695] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.508716] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.508758] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.508783] ? __kthread_parkme+0x82/0x180 [ 13.508805] ? preempt_count_sub+0x50/0x80 [ 13.508830] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.508852] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.508878] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.508905] kthread+0x337/0x6f0 [ 13.508926] ? trace_preempt_on+0x20/0xc0 [ 13.508950] ? __pfx_kthread+0x10/0x10 [ 13.508973] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.508996] ? calculate_sigpending+0x7b/0xa0 [ 13.509022] ? __pfx_kthread+0x10/0x10 [ 13.509044] ret_from_fork+0x116/0x1d0 [ 13.509064] ? __pfx_kthread+0x10/0x10 [ 13.509085] ret_from_fork_asm+0x1a/0x30 [ 13.509117] </TASK> [ 13.509129] [ 13.517399] Allocated by task 282: [ 13.517540] kasan_save_stack+0x45/0x70 [ 13.517764] kasan_save_track+0x18/0x40 [ 13.518163] kasan_save_alloc_info+0x3b/0x50 [ 13.518349] __kasan_kmalloc+0xb7/0xc0 [ 13.518526] __kmalloc_cache_noprof+0x189/0x420 [ 13.518801] kasan_atomics+0x95/0x310 [ 13.519137] kunit_try_run_case+0x1a5/0x480 [ 13.519313] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.519542] kthread+0x337/0x6f0 [ 13.519738] ret_from_fork+0x116/0x1d0 [ 13.519980] ret_from_fork_asm+0x1a/0x30 [ 13.520166] [ 13.520266] The buggy address belongs to the object at ffff888102fa7d80 [ 13.520266] which belongs to the cache kmalloc-64 of size 64 [ 13.520724] The buggy address is located 0 bytes to the right of [ 13.520724] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 13.521109] [ 13.521186] The buggy address belongs to the physical page: [ 13.521410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 13.521781] flags: 0x200000000000000(node=0|zone=2) [ 13.522021] page_type: f5(slab) [ 13.522195] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.522527] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.522781] page dumped because: kasan: bad access detected [ 13.523040] [ 13.523138] Memory state around the buggy address: [ 13.523371] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.523962] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.524247] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.524511] ^ [ 13.524714] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.525176] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.525455] ================================================================== [ 14.377398] ================================================================== [ 14.377870] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 14.378235] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 14.378572] [ 14.378686] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 14.378732] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.378746] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.378768] Call Trace: [ 14.378786] <TASK> [ 14.378802] dump_stack_lvl+0x73/0xb0 [ 14.378827] print_report+0xd1/0x650 [ 14.378850] ? __virt_addr_valid+0x1db/0x2d0 [ 14.378873] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.378896] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.378921] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.378945] kasan_report+0x141/0x180 [ 14.378969] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.378997] kasan_check_range+0x10c/0x1c0 [ 14.379022] __kasan_check_write+0x18/0x20 [ 14.379043] kasan_atomics_helper+0x1b22/0x5450 [ 14.379067] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.379091] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.379114] ? kasan_atomics+0x152/0x310 [ 14.379138] kasan_atomics+0x1dc/0x310 [ 14.379159] ? __pfx_kasan_atomics+0x10/0x10 [ 14.379181] ? __pfx_read_tsc+0x10/0x10 [ 14.379204] ? ktime_get_ts64+0x86/0x230 [ 14.379229] kunit_try_run_case+0x1a5/0x480 [ 14.379252] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.379273] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.379298] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.379324] ? __kthread_parkme+0x82/0x180 [ 14.379345] ? preempt_count_sub+0x50/0x80 [ 14.379370] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.379392] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.379417] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.379443] kthread+0x337/0x6f0 [ 14.379463] ? trace_preempt_on+0x20/0xc0 [ 14.379486] ? __pfx_kthread+0x10/0x10 [ 14.379510] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.379535] ? calculate_sigpending+0x7b/0xa0 [ 14.379560] ? __pfx_kthread+0x10/0x10 [ 14.379582] ret_from_fork+0x116/0x1d0 [ 14.379602] ? __pfx_kthread+0x10/0x10 [ 14.379635] ret_from_fork_asm+0x1a/0x30 [ 14.379667] </TASK> [ 14.379680] [ 14.387363] Allocated by task 282: [ 14.387545] kasan_save_stack+0x45/0x70 [ 14.387759] kasan_save_track+0x18/0x40 [ 14.387970] kasan_save_alloc_info+0x3b/0x50 [ 14.388157] __kasan_kmalloc+0xb7/0xc0 [ 14.388296] __kmalloc_cache_noprof+0x189/0x420 [ 14.388455] kasan_atomics+0x95/0x310 [ 14.388591] kunit_try_run_case+0x1a5/0x480 [ 14.388751] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.388936] kthread+0x337/0x6f0 [ 14.389063] ret_from_fork+0x116/0x1d0 [ 14.389202] ret_from_fork_asm+0x1a/0x30 [ 14.389406] [ 14.389505] The buggy address belongs to the object at ffff888102fa7d80 [ 14.389505] which belongs to the cache kmalloc-64 of size 64 [ 14.390046] The buggy address is located 0 bytes to the right of [ 14.390046] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 14.390620] [ 14.390721] The buggy address belongs to the physical page: [ 14.391072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 14.391381] flags: 0x200000000000000(node=0|zone=2) [ 14.391591] page_type: f5(slab) [ 14.391726] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.391969] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.392205] page dumped because: kasan: bad access detected [ 14.392386] [ 14.392459] Memory state around the buggy address: [ 14.392628] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.393190] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.393523] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.393969] ^ [ 14.394212] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.394552] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.394880] ================================================================== [ 14.126864] ================================================================== [ 14.127198] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 14.127485] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 14.127728] [ 14.127913] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 14.127958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.127972] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.127994] Call Trace: [ 14.128010] <TASK> [ 14.128026] dump_stack_lvl+0x73/0xb0 [ 14.128053] print_report+0xd1/0x650 [ 14.128076] ? __virt_addr_valid+0x1db/0x2d0 [ 14.128101] ? kasan_atomics_helper+0x1467/0x5450 [ 14.128124] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.128148] ? kasan_atomics_helper+0x1467/0x5450 [ 14.128172] kasan_report+0x141/0x180 [ 14.128195] ? kasan_atomics_helper+0x1467/0x5450 [ 14.128224] kasan_check_range+0x10c/0x1c0 [ 14.128249] __kasan_check_write+0x18/0x20 [ 14.128271] kasan_atomics_helper+0x1467/0x5450 [ 14.128295] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.128320] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.128342] ? kasan_atomics+0x152/0x310 [ 14.128366] kasan_atomics+0x1dc/0x310 [ 14.128387] ? __pfx_kasan_atomics+0x10/0x10 [ 14.128410] ? __pfx_read_tsc+0x10/0x10 [ 14.128432] ? ktime_get_ts64+0x86/0x230 [ 14.128457] kunit_try_run_case+0x1a5/0x480 [ 14.128480] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.128501] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.128527] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.128554] ? __kthread_parkme+0x82/0x180 [ 14.128575] ? preempt_count_sub+0x50/0x80 [ 14.128600] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.128636] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.128662] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.128689] kthread+0x337/0x6f0 [ 14.128709] ? trace_preempt_on+0x20/0xc0 [ 14.128732] ? __pfx_kthread+0x10/0x10 [ 14.128755] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.128802] ? calculate_sigpending+0x7b/0xa0 [ 14.128827] ? __pfx_kthread+0x10/0x10 [ 14.128850] ret_from_fork+0x116/0x1d0 [ 14.128870] ? __pfx_kthread+0x10/0x10 [ 14.128893] ret_from_fork_asm+0x1a/0x30 [ 14.128924] </TASK> [ 14.128936] [ 14.138596] Allocated by task 282: [ 14.139092] kasan_save_stack+0x45/0x70 [ 14.139721] kasan_save_track+0x18/0x40 [ 14.140553] kasan_save_alloc_info+0x3b/0x50 [ 14.141192] __kasan_kmalloc+0xb7/0xc0 [ 14.141847] __kmalloc_cache_noprof+0x189/0x420 [ 14.142222] kasan_atomics+0x95/0x310 [ 14.142374] kunit_try_run_case+0x1a5/0x480 [ 14.142528] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.143590] kthread+0x337/0x6f0 [ 14.144254] ret_from_fork+0x116/0x1d0 [ 14.144743] ret_from_fork_asm+0x1a/0x30 [ 14.145381] [ 14.145570] The buggy address belongs to the object at ffff888102fa7d80 [ 14.145570] which belongs to the cache kmalloc-64 of size 64 [ 14.146989] The buggy address is located 0 bytes to the right of [ 14.146989] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 14.148389] [ 14.148763] The buggy address belongs to the physical page: [ 14.149462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 14.150317] flags: 0x200000000000000(node=0|zone=2) [ 14.150500] page_type: f5(slab) [ 14.150647] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.151498] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.152635] page dumped because: kasan: bad access detected [ 14.153428] [ 14.153782] Memory state around the buggy address: [ 14.154239] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.154478] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.155023] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.155707] ^ [ 14.156269] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.156784] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.157150] ================================================================== [ 14.204690] ================================================================== [ 14.205051] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 14.205398] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 14.205969] [ 14.206106] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 14.206153] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.206167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.206189] Call Trace: [ 14.206205] <TASK> [ 14.206222] dump_stack_lvl+0x73/0xb0 [ 14.206248] print_report+0xd1/0x650 [ 14.206272] ? __virt_addr_valid+0x1db/0x2d0 [ 14.206296] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.206319] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.206344] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.206369] kasan_report+0x141/0x180 [ 14.206394] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.206422] kasan_check_range+0x10c/0x1c0 [ 14.206447] __kasan_check_write+0x18/0x20 [ 14.206469] kasan_atomics_helper+0x15b6/0x5450 [ 14.206493] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.206517] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.206546] ? kasan_atomics+0x152/0x310 [ 14.206583] kasan_atomics+0x1dc/0x310 [ 14.206604] ? __pfx_kasan_atomics+0x10/0x10 [ 14.206636] ? __pfx_read_tsc+0x10/0x10 [ 14.206660] ? ktime_get_ts64+0x86/0x230 [ 14.206685] kunit_try_run_case+0x1a5/0x480 [ 14.206712] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.206734] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.206760] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.206798] ? __kthread_parkme+0x82/0x180 [ 14.206822] ? preempt_count_sub+0x50/0x80 [ 14.206848] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.206871] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.206896] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.206924] kthread+0x337/0x6f0 [ 14.206946] ? trace_preempt_on+0x20/0xc0 [ 14.206970] ? __pfx_kthread+0x10/0x10 [ 14.206993] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.207016] ? calculate_sigpending+0x7b/0xa0 [ 14.207041] ? __pfx_kthread+0x10/0x10 [ 14.207064] ret_from_fork+0x116/0x1d0 [ 14.207084] ? __pfx_kthread+0x10/0x10 [ 14.207106] ret_from_fork_asm+0x1a/0x30 [ 14.207138] </TASK> [ 14.207150] [ 14.215171] Allocated by task 282: [ 14.215341] kasan_save_stack+0x45/0x70 [ 14.215514] kasan_save_track+0x18/0x40 [ 14.215669] kasan_save_alloc_info+0x3b/0x50 [ 14.215825] __kasan_kmalloc+0xb7/0xc0 [ 14.215964] __kmalloc_cache_noprof+0x189/0x420 [ 14.216125] kasan_atomics+0x95/0x310 [ 14.216262] kunit_try_run_case+0x1a5/0x480 [ 14.216455] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.216735] kthread+0x337/0x6f0 [ 14.216908] ret_from_fork+0x116/0x1d0 [ 14.217100] ret_from_fork_asm+0x1a/0x30 [ 14.217300] [ 14.217398] The buggy address belongs to the object at ffff888102fa7d80 [ 14.217398] which belongs to the cache kmalloc-64 of size 64 [ 14.218335] The buggy address is located 0 bytes to the right of [ 14.218335] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 14.218729] [ 14.218806] The buggy address belongs to the physical page: [ 14.218985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 14.219670] flags: 0x200000000000000(node=0|zone=2) [ 14.220086] page_type: f5(slab) [ 14.220259] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.220606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.220852] page dumped because: kasan: bad access detected [ 14.221031] [ 14.221105] Memory state around the buggy address: [ 14.221516] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.221951] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.222257] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.222559] ^ [ 14.222788] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.223056] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.223279] ================================================================== [ 14.323423] ================================================================== [ 14.323872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 14.324213] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 14.324481] [ 14.324596] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 14.324655] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.324669] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.324691] Call Trace: [ 14.324708] <TASK> [ 14.324723] dump_stack_lvl+0x73/0xb0 [ 14.324749] print_report+0xd1/0x650 [ 14.324783] ? __virt_addr_valid+0x1db/0x2d0 [ 14.324807] ? kasan_atomics_helper+0x194a/0x5450 [ 14.324829] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.324853] ? kasan_atomics_helper+0x194a/0x5450 [ 14.324877] kasan_report+0x141/0x180 [ 14.324903] ? kasan_atomics_helper+0x194a/0x5450 [ 14.324931] kasan_check_range+0x10c/0x1c0 [ 14.324955] __kasan_check_write+0x18/0x20 [ 14.324976] kasan_atomics_helper+0x194a/0x5450 [ 14.325000] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.325024] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.325055] ? kasan_atomics+0x152/0x310 [ 14.325079] kasan_atomics+0x1dc/0x310 [ 14.325101] ? __pfx_kasan_atomics+0x10/0x10 [ 14.325123] ? __pfx_read_tsc+0x10/0x10 [ 14.325147] ? ktime_get_ts64+0x86/0x230 [ 14.325172] kunit_try_run_case+0x1a5/0x480 [ 14.325194] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.325215] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.325240] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.325265] ? __kthread_parkme+0x82/0x180 [ 14.325287] ? preempt_count_sub+0x50/0x80 [ 14.325313] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.325335] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.325361] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.325387] kthread+0x337/0x6f0 [ 14.325408] ? trace_preempt_on+0x20/0xc0 [ 14.325431] ? __pfx_kthread+0x10/0x10 [ 14.325454] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.325477] ? calculate_sigpending+0x7b/0xa0 [ 14.325502] ? __pfx_kthread+0x10/0x10 [ 14.325525] ret_from_fork+0x116/0x1d0 [ 14.325545] ? __pfx_kthread+0x10/0x10 [ 14.325567] ret_from_fork_asm+0x1a/0x30 [ 14.325599] </TASK> [ 14.325623] [ 14.333274] Allocated by task 282: [ 14.333457] kasan_save_stack+0x45/0x70 [ 14.333645] kasan_save_track+0x18/0x40 [ 14.333858] kasan_save_alloc_info+0x3b/0x50 [ 14.334064] __kasan_kmalloc+0xb7/0xc0 [ 14.334225] __kmalloc_cache_noprof+0x189/0x420 [ 14.334411] kasan_atomics+0x95/0x310 [ 14.334605] kunit_try_run_case+0x1a5/0x480 [ 14.334843] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.335069] kthread+0x337/0x6f0 [ 14.335208] ret_from_fork+0x116/0x1d0 [ 14.335347] ret_from_fork_asm+0x1a/0x30 [ 14.335492] [ 14.335567] The buggy address belongs to the object at ffff888102fa7d80 [ 14.335567] which belongs to the cache kmalloc-64 of size 64 [ 14.336296] The buggy address is located 0 bytes to the right of [ 14.336296] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 14.336682] [ 14.336758] The buggy address belongs to the physical page: [ 14.337334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 14.337718] flags: 0x200000000000000(node=0|zone=2) [ 14.337961] page_type: f5(slab) [ 14.338166] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.338474] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.338746] page dumped because: kasan: bad access detected [ 14.339005] [ 14.339160] Memory state around the buggy address: [ 14.339359] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.339624] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.340091] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.340381] ^ [ 14.340585] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.340858] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.341081] ================================================================== [ 14.558922] ================================================================== [ 14.559407] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 14.559732] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 14.560087] [ 14.560240] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 14.560286] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.560300] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.560322] Call Trace: [ 14.560336] <TASK> [ 14.560350] dump_stack_lvl+0x73/0xb0 [ 14.560376] print_report+0xd1/0x650 [ 14.560402] ? __virt_addr_valid+0x1db/0x2d0 [ 14.560425] ? kasan_atomics_helper+0x2006/0x5450 [ 14.560456] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.560503] ? kasan_atomics_helper+0x2006/0x5450 [ 14.560527] kasan_report+0x141/0x180 [ 14.560551] ? kasan_atomics_helper+0x2006/0x5450 [ 14.560581] kasan_check_range+0x10c/0x1c0 [ 14.560618] __kasan_check_write+0x18/0x20 [ 14.560639] kasan_atomics_helper+0x2006/0x5450 [ 14.560664] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.560688] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.560711] ? kasan_atomics+0x152/0x310 [ 14.560735] kasan_atomics+0x1dc/0x310 [ 14.560755] ? __pfx_kasan_atomics+0x10/0x10 [ 14.560778] ? __pfx_read_tsc+0x10/0x10 [ 14.560800] ? ktime_get_ts64+0x86/0x230 [ 14.560826] kunit_try_run_case+0x1a5/0x480 [ 14.560848] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.560870] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.560905] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.560951] ? __kthread_parkme+0x82/0x180 [ 14.560973] ? preempt_count_sub+0x50/0x80 [ 14.560998] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.561021] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.561046] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.561072] kthread+0x337/0x6f0 [ 14.561094] ? trace_preempt_on+0x20/0xc0 [ 14.561117] ? __pfx_kthread+0x10/0x10 [ 14.561140] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.561163] ? calculate_sigpending+0x7b/0xa0 [ 14.561188] ? __pfx_kthread+0x10/0x10 [ 14.561210] ret_from_fork+0x116/0x1d0 [ 14.561230] ? __pfx_kthread+0x10/0x10 [ 14.561251] ret_from_fork_asm+0x1a/0x30 [ 14.561283] </TASK> [ 14.561294] [ 14.569134] Allocated by task 282: [ 14.569319] kasan_save_stack+0x45/0x70 [ 14.569512] kasan_save_track+0x18/0x40 [ 14.569688] kasan_save_alloc_info+0x3b/0x50 [ 14.569840] __kasan_kmalloc+0xb7/0xc0 [ 14.569979] __kmalloc_cache_noprof+0x189/0x420 [ 14.570149] kasan_atomics+0x95/0x310 [ 14.570429] kunit_try_run_case+0x1a5/0x480 [ 14.572124] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.572919] kthread+0x337/0x6f0 [ 14.573406] ret_from_fork+0x116/0x1d0 [ 14.573800] ret_from_fork_asm+0x1a/0x30 [ 14.574458] [ 14.574930] The buggy address belongs to the object at ffff888102fa7d80 [ 14.574930] which belongs to the cache kmalloc-64 of size 64 [ 14.576258] The buggy address is located 0 bytes to the right of [ 14.576258] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 14.577490] [ 14.577593] The buggy address belongs to the physical page: [ 14.578230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 14.578486] flags: 0x200000000000000(node=0|zone=2) [ 14.579056] page_type: f5(slab) [ 14.579745] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.580630] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.581412] page dumped because: kasan: bad access detected [ 14.581604] [ 14.581691] Memory state around the buggy address: [ 14.582416] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.583512] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.584317] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.584544] ^ [ 14.584721] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.585882] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.586800] ================================================================== [ 14.050389] ================================================================== [ 14.050933] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 14.051277] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 14.051600] [ 14.051793] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 14.051840] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.051854] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.051877] Call Trace: [ 14.051893] <TASK> [ 14.051908] dump_stack_lvl+0x73/0xb0 [ 14.051935] print_report+0xd1/0x650 [ 14.051958] ? __virt_addr_valid+0x1db/0x2d0 [ 14.051981] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.052004] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.052028] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.052052] kasan_report+0x141/0x180 [ 14.052076] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.052104] kasan_check_range+0x10c/0x1c0 [ 14.052129] __kasan_check_write+0x18/0x20 [ 14.052151] kasan_atomics_helper+0x12e6/0x5450 [ 14.052175] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.052199] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.052222] ? kasan_atomics+0x152/0x310 [ 14.052246] kasan_atomics+0x1dc/0x310 [ 14.052266] ? __pfx_kasan_atomics+0x10/0x10 [ 14.052288] ? __pfx_read_tsc+0x10/0x10 [ 14.052311] ? ktime_get_ts64+0x86/0x230 [ 14.052337] kunit_try_run_case+0x1a5/0x480 [ 14.052360] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.052381] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.052406] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.052432] ? __kthread_parkme+0x82/0x180 [ 14.052453] ? preempt_count_sub+0x50/0x80 [ 14.052479] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.052502] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.052527] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.052555] kthread+0x337/0x6f0 [ 14.052576] ? trace_preempt_on+0x20/0xc0 [ 14.052599] ? __pfx_kthread+0x10/0x10 [ 14.052631] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.052654] ? calculate_sigpending+0x7b/0xa0 [ 14.052679] ? __pfx_kthread+0x10/0x10 [ 14.052702] ret_from_fork+0x116/0x1d0 [ 14.052722] ? __pfx_kthread+0x10/0x10 [ 14.052780] ret_from_fork_asm+0x1a/0x30 [ 14.052811] </TASK> [ 14.052823] [ 14.061107] Allocated by task 282: [ 14.061270] kasan_save_stack+0x45/0x70 [ 14.061423] kasan_save_track+0x18/0x40 [ 14.061572] kasan_save_alloc_info+0x3b/0x50 [ 14.061879] __kasan_kmalloc+0xb7/0xc0 [ 14.062079] __kmalloc_cache_noprof+0x189/0x420 [ 14.062304] kasan_atomics+0x95/0x310 [ 14.062478] kunit_try_run_case+0x1a5/0x480 [ 14.062701] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.063089] kthread+0x337/0x6f0 [ 14.063229] ret_from_fork+0x116/0x1d0 [ 14.063449] ret_from_fork_asm+0x1a/0x30 [ 14.063595] [ 14.063704] The buggy address belongs to the object at ffff888102fa7d80 [ 14.063704] which belongs to the cache kmalloc-64 of size 64 [ 14.064341] The buggy address is located 0 bytes to the right of [ 14.064341] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 14.064831] [ 14.064908] The buggy address belongs to the physical page: [ 14.065090] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 14.065365] flags: 0x200000000000000(node=0|zone=2) [ 14.065603] page_type: f5(slab) [ 14.065782] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.066265] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.066638] page dumped because: kasan: bad access detected [ 14.067147] [ 14.067225] Memory state around the buggy address: [ 14.067388] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.067624] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.067874] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.068507] ^ [ 14.068747] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.069341] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.069655] ================================================================== [ 14.223702] ================================================================== [ 14.224337] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 14.224911] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 14.225335] [ 14.225442] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 14.225488] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.225503] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.225525] Call Trace: [ 14.225540] <TASK> [ 14.225555] dump_stack_lvl+0x73/0xb0 [ 14.225582] print_report+0xd1/0x650 [ 14.225606] ? __virt_addr_valid+0x1db/0x2d0 [ 14.225640] ? kasan_atomics_helper+0x164f/0x5450 [ 14.225665] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.225690] ? kasan_atomics_helper+0x164f/0x5450 [ 14.225714] kasan_report+0x141/0x180 [ 14.225739] ? kasan_atomics_helper+0x164f/0x5450 [ 14.225768] kasan_check_range+0x10c/0x1c0 [ 14.225794] __kasan_check_write+0x18/0x20 [ 14.225816] kasan_atomics_helper+0x164f/0x5450 [ 14.225842] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.225867] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.225891] ? kasan_atomics+0x152/0x310 [ 14.225916] kasan_atomics+0x1dc/0x310 [ 14.225937] ? __pfx_kasan_atomics+0x10/0x10 [ 14.225960] ? __pfx_read_tsc+0x10/0x10 [ 14.225982] ? ktime_get_ts64+0x86/0x230 [ 14.226009] kunit_try_run_case+0x1a5/0x480 [ 14.226032] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.226054] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.226079] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.226106] ? __kthread_parkme+0x82/0x180 [ 14.226128] ? preempt_count_sub+0x50/0x80 [ 14.226154] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.226177] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.226204] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.226231] kthread+0x337/0x6f0 [ 14.226252] ? trace_preempt_on+0x20/0xc0 [ 14.226277] ? __pfx_kthread+0x10/0x10 [ 14.226300] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.226324] ? calculate_sigpending+0x7b/0xa0 [ 14.226349] ? __pfx_kthread+0x10/0x10 [ 14.226373] ret_from_fork+0x116/0x1d0 [ 14.226393] ? __pfx_kthread+0x10/0x10 [ 14.226416] ret_from_fork_asm+0x1a/0x30 [ 14.226448] </TASK> [ 14.226460] [ 14.234050] Allocated by task 282: [ 14.234199] kasan_save_stack+0x45/0x70 [ 14.234369] kasan_save_track+0x18/0x40 [ 14.234574] kasan_save_alloc_info+0x3b/0x50 [ 14.234821] __kasan_kmalloc+0xb7/0xc0 [ 14.235007] __kmalloc_cache_noprof+0x189/0x420 [ 14.235171] kasan_atomics+0x95/0x310 [ 14.235308] kunit_try_run_case+0x1a5/0x480 [ 14.235520] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.235791] kthread+0x337/0x6f0 [ 14.235986] ret_from_fork+0x116/0x1d0 [ 14.236169] ret_from_fork_asm+0x1a/0x30 [ 14.236317] [ 14.236393] The buggy address belongs to the object at ffff888102fa7d80 [ 14.236393] which belongs to the cache kmalloc-64 of size 64 [ 14.237111] The buggy address is located 0 bytes to the right of [ 14.237111] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 14.237607] [ 14.237716] The buggy address belongs to the physical page: [ 14.237961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 14.238299] flags: 0x200000000000000(node=0|zone=2) [ 14.238516] page_type: f5(slab) [ 14.238689] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.239051] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.239378] page dumped because: kasan: bad access detected [ 14.239621] [ 14.239699] Memory state around the buggy address: [ 14.239961] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.240217] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.240447] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.240680] ^ [ 14.240850] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.241145] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.241464] ================================================================== [ 14.304955] ================================================================== [ 14.305345] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 14.305996] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 14.306310] [ 14.306417] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 14.306465] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.306479] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.306501] Call Trace: [ 14.306518] <TASK> [ 14.306541] dump_stack_lvl+0x73/0xb0 [ 14.306569] print_report+0xd1/0x650 [ 14.306593] ? __virt_addr_valid+0x1db/0x2d0 [ 14.306630] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.306653] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.306677] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.306701] kasan_report+0x141/0x180 [ 14.306725] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.306753] kasan_check_range+0x10c/0x1c0 [ 14.306779] __kasan_check_write+0x18/0x20 [ 14.306799] kasan_atomics_helper+0x18b1/0x5450 [ 14.306824] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.306847] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.306870] ? kasan_atomics+0x152/0x310 [ 14.306905] kasan_atomics+0x1dc/0x310 [ 14.306925] ? __pfx_kasan_atomics+0x10/0x10 [ 14.306947] ? __pfx_read_tsc+0x10/0x10 [ 14.306968] ? ktime_get_ts64+0x86/0x230 [ 14.306994] kunit_try_run_case+0x1a5/0x480 [ 14.307016] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.307037] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.307062] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.307088] ? __kthread_parkme+0x82/0x180 [ 14.307110] ? preempt_count_sub+0x50/0x80 [ 14.307135] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.307158] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.307183] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.307209] kthread+0x337/0x6f0 [ 14.307230] ? trace_preempt_on+0x20/0xc0 [ 14.307253] ? __pfx_kthread+0x10/0x10 [ 14.307275] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.307299] ? calculate_sigpending+0x7b/0xa0 [ 14.307323] ? __pfx_kthread+0x10/0x10 [ 14.307346] ret_from_fork+0x116/0x1d0 [ 14.307365] ? __pfx_kthread+0x10/0x10 [ 14.307387] ret_from_fork_asm+0x1a/0x30 [ 14.307418] </TASK> [ 14.307430] [ 14.314863] Allocated by task 282: [ 14.315048] kasan_save_stack+0x45/0x70 [ 14.315218] kasan_save_track+0x18/0x40 [ 14.315360] kasan_save_alloc_info+0x3b/0x50 [ 14.315513] __kasan_kmalloc+0xb7/0xc0 [ 14.315724] __kmalloc_cache_noprof+0x189/0x420 [ 14.316067] kasan_atomics+0x95/0x310 [ 14.316258] kunit_try_run_case+0x1a5/0x480 [ 14.316478] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.316758] kthread+0x337/0x6f0 [ 14.316935] ret_from_fork+0x116/0x1d0 [ 14.317108] ret_from_fork_asm+0x1a/0x30 [ 14.317254] [ 14.317330] The buggy address belongs to the object at ffff888102fa7d80 [ 14.317330] which belongs to the cache kmalloc-64 of size 64 [ 14.317969] The buggy address is located 0 bytes to the right of [ 14.317969] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 14.318525] [ 14.318635] The buggy address belongs to the physical page: [ 14.318854] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 14.319110] flags: 0x200000000000000(node=0|zone=2) [ 14.319279] page_type: f5(slab) [ 14.319463] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.319835] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.320184] page dumped because: kasan: bad access detected [ 14.320412] [ 14.320485] Memory state around the buggy address: [ 14.320656] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.321178] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.321496] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.321727] ^ [ 14.322184] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.322505] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.322813] ================================================================== [ 13.744530] ================================================================== [ 13.745195] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 13.745934] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 13.746640] [ 13.746741] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.746788] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.746801] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.746826] Call Trace: [ 13.746842] <TASK> [ 13.746859] dump_stack_lvl+0x73/0xb0 [ 13.746887] print_report+0xd1/0x650 [ 13.746911] ? __virt_addr_valid+0x1db/0x2d0 [ 13.746934] ? kasan_atomics_helper+0xc70/0x5450 [ 13.746956] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.746980] ? kasan_atomics_helper+0xc70/0x5450 [ 13.747003] kasan_report+0x141/0x180 [ 13.747026] ? kasan_atomics_helper+0xc70/0x5450 [ 13.747055] kasan_check_range+0x10c/0x1c0 [ 13.747080] __kasan_check_write+0x18/0x20 [ 13.747100] kasan_atomics_helper+0xc70/0x5450 [ 13.747124] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.747148] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.747170] ? kasan_atomics+0x152/0x310 [ 13.747195] kasan_atomics+0x1dc/0x310 [ 13.747215] ? __pfx_kasan_atomics+0x10/0x10 [ 13.747237] ? __pfx_read_tsc+0x10/0x10 [ 13.747260] ? ktime_get_ts64+0x86/0x230 [ 13.747284] kunit_try_run_case+0x1a5/0x480 [ 13.747307] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.747328] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.747354] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.747379] ? __kthread_parkme+0x82/0x180 [ 13.747402] ? preempt_count_sub+0x50/0x80 [ 13.747427] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.747448] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.747474] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.747499] kthread+0x337/0x6f0 [ 13.747520] ? trace_preempt_on+0x20/0xc0 [ 13.747544] ? __pfx_kthread+0x10/0x10 [ 13.747566] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.747589] ? calculate_sigpending+0x7b/0xa0 [ 13.747634] ? __pfx_kthread+0x10/0x10 [ 13.747658] ret_from_fork+0x116/0x1d0 [ 13.747677] ? __pfx_kthread+0x10/0x10 [ 13.747699] ret_from_fork_asm+0x1a/0x30 [ 13.747731] </TASK> [ 13.747742] [ 13.764899] Allocated by task 282: [ 13.765057] kasan_save_stack+0x45/0x70 [ 13.765517] kasan_save_track+0x18/0x40 [ 13.766002] kasan_save_alloc_info+0x3b/0x50 [ 13.766566] __kasan_kmalloc+0xb7/0xc0 [ 13.767051] __kmalloc_cache_noprof+0x189/0x420 [ 13.767424] kasan_atomics+0x95/0x310 [ 13.767570] kunit_try_run_case+0x1a5/0x480 [ 13.767730] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.768409] kthread+0x337/0x6f0 [ 13.768764] ret_from_fork+0x116/0x1d0 [ 13.769187] ret_from_fork_asm+0x1a/0x30 [ 13.769681] [ 13.769856] The buggy address belongs to the object at ffff888102fa7d80 [ 13.769856] which belongs to the cache kmalloc-64 of size 64 [ 13.770817] The buggy address is located 0 bytes to the right of [ 13.770817] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 13.772207] [ 13.772291] The buggy address belongs to the physical page: [ 13.772479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 13.772741] flags: 0x200000000000000(node=0|zone=2) [ 13.773117] page_type: f5(slab) [ 13.773248] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.774063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.774777] page dumped because: kasan: bad access detected [ 13.775375] [ 13.775453] Memory state around the buggy address: [ 13.775621] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.775882] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.776113] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.776775] ^ [ 13.777246] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.777793] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.778572] ================================================================== [ 13.671434] ================================================================== [ 13.672286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 13.673173] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 13.674068] [ 13.674263] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.674312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.674325] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.674347] Call Trace: [ 13.674364] <TASK> [ 13.674381] dump_stack_lvl+0x73/0xb0 [ 13.674410] print_report+0xd1/0x650 [ 13.674433] ? __virt_addr_valid+0x1db/0x2d0 [ 13.674457] ? kasan_atomics_helper+0xa2b/0x5450 [ 13.674481] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.674505] ? kasan_atomics_helper+0xa2b/0x5450 [ 13.674528] kasan_report+0x141/0x180 [ 13.674559] ? kasan_atomics_helper+0xa2b/0x5450 [ 13.674587] kasan_check_range+0x10c/0x1c0 [ 13.674642] __kasan_check_write+0x18/0x20 [ 13.674663] kasan_atomics_helper+0xa2b/0x5450 [ 13.674688] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.674711] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.674734] ? kasan_atomics+0x152/0x310 [ 13.674775] kasan_atomics+0x1dc/0x310 [ 13.674805] ? __pfx_kasan_atomics+0x10/0x10 [ 13.674827] ? __pfx_read_tsc+0x10/0x10 [ 13.674850] ? ktime_get_ts64+0x86/0x230 [ 13.674875] kunit_try_run_case+0x1a5/0x480 [ 13.674897] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.674918] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.674944] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.674969] ? __kthread_parkme+0x82/0x180 [ 13.674992] ? preempt_count_sub+0x50/0x80 [ 13.675017] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.675039] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.675064] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.675090] kthread+0x337/0x6f0 [ 13.675112] ? trace_preempt_on+0x20/0xc0 [ 13.675139] ? __pfx_kthread+0x10/0x10 [ 13.675160] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.675184] ? calculate_sigpending+0x7b/0xa0 [ 13.675210] ? __pfx_kthread+0x10/0x10 [ 13.675232] ret_from_fork+0x116/0x1d0 [ 13.675252] ? __pfx_kthread+0x10/0x10 [ 13.675275] ret_from_fork_asm+0x1a/0x30 [ 13.675307] </TASK> [ 13.675318] [ 13.685767] Allocated by task 282: [ 13.685939] kasan_save_stack+0x45/0x70 [ 13.686290] kasan_save_track+0x18/0x40 [ 13.686474] kasan_save_alloc_info+0x3b/0x50 [ 13.686715] __kasan_kmalloc+0xb7/0xc0 [ 13.687070] __kmalloc_cache_noprof+0x189/0x420 [ 13.687238] kasan_atomics+0x95/0x310 [ 13.687373] kunit_try_run_case+0x1a5/0x480 [ 13.687574] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.687843] kthread+0x337/0x6f0 [ 13.688026] ret_from_fork+0x116/0x1d0 [ 13.688218] ret_from_fork_asm+0x1a/0x30 [ 13.688421] [ 13.688523] The buggy address belongs to the object at ffff888102fa7d80 [ 13.688523] which belongs to the cache kmalloc-64 of size 64 [ 13.689124] The buggy address is located 0 bytes to the right of [ 13.689124] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 13.689625] [ 13.689727] The buggy address belongs to the physical page: [ 13.690179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 13.690523] flags: 0x200000000000000(node=0|zone=2) [ 13.690790] page_type: f5(slab) [ 13.690965] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.691275] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.691549] page dumped because: kasan: bad access detected [ 13.691741] [ 13.691818] Memory state around the buggy address: [ 13.692041] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.692601] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.692838] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.693060] ^ [ 13.693562] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.694289] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.694659] ================================================================== [ 14.070109] ================================================================== [ 14.070452] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 14.070819] Read of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 14.071074] [ 14.071161] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 14.071210] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.071225] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.071250] Call Trace: [ 14.071265] <TASK> [ 14.071281] dump_stack_lvl+0x73/0xb0 [ 14.071307] print_report+0xd1/0x650 [ 14.071332] ? __virt_addr_valid+0x1db/0x2d0 [ 14.071356] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.071380] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.071404] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.071429] kasan_report+0x141/0x180 [ 14.071453] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.071483] __asan_report_load4_noabort+0x18/0x20 [ 14.071505] kasan_atomics_helper+0x49ce/0x5450 [ 14.071530] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.071554] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.071577] ? kasan_atomics+0x152/0x310 [ 14.071601] kasan_atomics+0x1dc/0x310 [ 14.071635] ? __pfx_kasan_atomics+0x10/0x10 [ 14.071658] ? __pfx_read_tsc+0x10/0x10 [ 14.071681] ? ktime_get_ts64+0x86/0x230 [ 14.071706] kunit_try_run_case+0x1a5/0x480 [ 14.071729] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.071787] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.071813] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.071838] ? __kthread_parkme+0x82/0x180 [ 14.071860] ? preempt_count_sub+0x50/0x80 [ 14.071886] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.071909] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.071935] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.071962] kthread+0x337/0x6f0 [ 14.071983] ? trace_preempt_on+0x20/0xc0 [ 14.072025] ? __pfx_kthread+0x10/0x10 [ 14.072048] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.072072] ? calculate_sigpending+0x7b/0xa0 [ 14.072097] ? __pfx_kthread+0x10/0x10 [ 14.072120] ret_from_fork+0x116/0x1d0 [ 14.072140] ? __pfx_kthread+0x10/0x10 [ 14.072163] ret_from_fork_asm+0x1a/0x30 [ 14.072195] </TASK> [ 14.072207] [ 14.080632] Allocated by task 282: [ 14.080841] kasan_save_stack+0x45/0x70 [ 14.081053] kasan_save_track+0x18/0x40 [ 14.081253] kasan_save_alloc_info+0x3b/0x50 [ 14.081457] __kasan_kmalloc+0xb7/0xc0 [ 14.081632] __kmalloc_cache_noprof+0x189/0x420 [ 14.081823] kasan_atomics+0x95/0x310 [ 14.081959] kunit_try_run_case+0x1a5/0x480 [ 14.082109] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.082368] kthread+0x337/0x6f0 [ 14.082548] ret_from_fork+0x116/0x1d0 [ 14.082830] ret_from_fork_asm+0x1a/0x30 [ 14.083070] [ 14.083188] The buggy address belongs to the object at ffff888102fa7d80 [ 14.083188] which belongs to the cache kmalloc-64 of size 64 [ 14.083664] The buggy address is located 0 bytes to the right of [ 14.083664] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 14.084237] [ 14.084337] The buggy address belongs to the physical page: [ 14.084581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 14.084916] flags: 0x200000000000000(node=0|zone=2) [ 14.085130] page_type: f5(slab) [ 14.085276] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.085520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.085813] page dumped because: kasan: bad access detected [ 14.085995] [ 14.086069] Memory state around the buggy address: [ 14.086230] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.086548] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.086915] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.087237] ^ [ 14.087465] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.087990] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.088329] ================================================================== [ 14.278464] ================================================================== [ 14.278718] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 14.278952] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 14.279174] [ 14.279352] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 14.279399] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.279412] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.279857] Call Trace: [ 14.279876] <TASK> [ 14.279892] dump_stack_lvl+0x73/0xb0 [ 14.279922] print_report+0xd1/0x650 [ 14.279946] ? __virt_addr_valid+0x1db/0x2d0 [ 14.279969] ? kasan_atomics_helper+0x1818/0x5450 [ 14.280471] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.280498] ? kasan_atomics_helper+0x1818/0x5450 [ 14.280523] kasan_report+0x141/0x180 [ 14.280551] ? kasan_atomics_helper+0x1818/0x5450 [ 14.280749] kasan_check_range+0x10c/0x1c0 [ 14.280792] __kasan_check_write+0x18/0x20 [ 14.280814] kasan_atomics_helper+0x1818/0x5450 [ 14.280839] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.280864] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.280887] ? kasan_atomics+0x152/0x310 [ 14.280911] kasan_atomics+0x1dc/0x310 [ 14.280948] ? __pfx_kasan_atomics+0x10/0x10 [ 14.280970] ? __pfx_read_tsc+0x10/0x10 [ 14.280993] ? ktime_get_ts64+0x86/0x230 [ 14.281018] kunit_try_run_case+0x1a5/0x480 [ 14.281041] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.281062] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.281088] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.281114] ? __kthread_parkme+0x82/0x180 [ 14.281136] ? preempt_count_sub+0x50/0x80 [ 14.281160] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.281183] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.281208] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.281234] kthread+0x337/0x6f0 [ 14.281254] ? trace_preempt_on+0x20/0xc0 [ 14.281278] ? __pfx_kthread+0x10/0x10 [ 14.281300] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.281324] ? calculate_sigpending+0x7b/0xa0 [ 14.281350] ? __pfx_kthread+0x10/0x10 [ 14.281374] ret_from_fork+0x116/0x1d0 [ 14.281394] ? __pfx_kthread+0x10/0x10 [ 14.281417] ret_from_fork_asm+0x1a/0x30 [ 14.281448] </TASK> [ 14.281460] [ 14.292605] Allocated by task 282: [ 14.293015] kasan_save_stack+0x45/0x70 [ 14.293330] kasan_save_track+0x18/0x40 [ 14.293539] kasan_save_alloc_info+0x3b/0x50 [ 14.293737] __kasan_kmalloc+0xb7/0xc0 [ 14.294213] __kmalloc_cache_noprof+0x189/0x420 [ 14.294505] kasan_atomics+0x95/0x310 [ 14.294821] kunit_try_run_case+0x1a5/0x480 [ 14.295031] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.295257] kthread+0x337/0x6f0 [ 14.295404] ret_from_fork+0x116/0x1d0 [ 14.295566] ret_from_fork_asm+0x1a/0x30 [ 14.295751] [ 14.295848] The buggy address belongs to the object at ffff888102fa7d80 [ 14.295848] which belongs to the cache kmalloc-64 of size 64 [ 14.296313] The buggy address is located 0 bytes to the right of [ 14.296313] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 14.297296] [ 14.297385] The buggy address belongs to the physical page: [ 14.297836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 14.298351] flags: 0x200000000000000(node=0|zone=2) [ 14.298781] page_type: f5(slab) [ 14.299064] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.299661] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.300185] page dumped because: kasan: bad access detected [ 14.300607] [ 14.300853] Memory state around the buggy address: [ 14.301205] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.301521] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.302028] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.302511] ^ [ 14.302860] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.303313] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.303617] ================================================================== [ 13.525977] ================================================================== [ 13.526290] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 13.526530] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 13.526856] [ 13.526969] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.527015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.527029] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.527051] Call Trace: [ 13.527066] <TASK> [ 13.527081] dump_stack_lvl+0x73/0xb0 [ 13.527106] print_report+0xd1/0x650 [ 13.527129] ? __virt_addr_valid+0x1db/0x2d0 [ 13.527151] ? kasan_atomics_helper+0x697/0x5450 [ 13.527174] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.527198] ? kasan_atomics_helper+0x697/0x5450 [ 13.527220] kasan_report+0x141/0x180 [ 13.527244] ? kasan_atomics_helper+0x697/0x5450 [ 13.527356] kasan_check_range+0x10c/0x1c0 [ 13.527388] __kasan_check_write+0x18/0x20 [ 13.527409] kasan_atomics_helper+0x697/0x5450 [ 13.527435] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.527459] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.527482] ? kasan_atomics+0x152/0x310 [ 13.527506] kasan_atomics+0x1dc/0x310 [ 13.527527] ? __pfx_kasan_atomics+0x10/0x10 [ 13.527549] ? __pfx_read_tsc+0x10/0x10 [ 13.527571] ? ktime_get_ts64+0x86/0x230 [ 13.527596] kunit_try_run_case+0x1a5/0x480 [ 13.527631] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.527653] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.527678] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.527704] ? __kthread_parkme+0x82/0x180 [ 13.527725] ? preempt_count_sub+0x50/0x80 [ 13.527750] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.527948] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.527976] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.528002] kthread+0x337/0x6f0 [ 13.528023] ? trace_preempt_on+0x20/0xc0 [ 13.528047] ? __pfx_kthread+0x10/0x10 [ 13.528069] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.528094] ? calculate_sigpending+0x7b/0xa0 [ 13.528120] ? __pfx_kthread+0x10/0x10 [ 13.528143] ret_from_fork+0x116/0x1d0 [ 13.528162] ? __pfx_kthread+0x10/0x10 [ 13.528185] ret_from_fork_asm+0x1a/0x30 [ 13.528217] </TASK> [ 13.528229] [ 13.536280] Allocated by task 282: [ 13.536426] kasan_save_stack+0x45/0x70 [ 13.536593] kasan_save_track+0x18/0x40 [ 13.536974] kasan_save_alloc_info+0x3b/0x50 [ 13.537197] __kasan_kmalloc+0xb7/0xc0 [ 13.537390] __kmalloc_cache_noprof+0x189/0x420 [ 13.537625] kasan_atomics+0x95/0x310 [ 13.537813] kunit_try_run_case+0x1a5/0x480 [ 13.538038] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.538394] kthread+0x337/0x6f0 [ 13.538542] ret_from_fork+0x116/0x1d0 [ 13.538799] ret_from_fork_asm+0x1a/0x30 [ 13.539003] [ 13.539088] The buggy address belongs to the object at ffff888102fa7d80 [ 13.539088] which belongs to the cache kmalloc-64 of size 64 [ 13.539582] The buggy address is located 0 bytes to the right of [ 13.539582] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 13.540277] [ 13.540389] The buggy address belongs to the physical page: [ 13.540626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 13.541003] flags: 0x200000000000000(node=0|zone=2) [ 13.541178] page_type: f5(slab) [ 13.541304] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.541597] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.542061] page dumped because: kasan: bad access detected [ 13.542463] [ 13.542545] Memory state around the buggy address: [ 13.542722] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.543482] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.543734] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.543993] ^ [ 13.544228] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.544893] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.545239] ================================================================== [ 14.588034] ================================================================== [ 14.588796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 14.589270] Read of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 14.589887] [ 14.590071] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 14.590150] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.590192] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.590216] Call Trace: [ 14.590233] <TASK> [ 14.590251] dump_stack_lvl+0x73/0xb0 [ 14.590277] print_report+0xd1/0x650 [ 14.590301] ? __virt_addr_valid+0x1db/0x2d0 [ 14.590325] ? kasan_atomics_helper+0x4f98/0x5450 [ 14.590347] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.590372] ? kasan_atomics_helper+0x4f98/0x5450 [ 14.590395] kasan_report+0x141/0x180 [ 14.590419] ? kasan_atomics_helper+0x4f98/0x5450 [ 14.590448] __asan_report_load8_noabort+0x18/0x20 [ 14.590471] kasan_atomics_helper+0x4f98/0x5450 [ 14.590496] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.590520] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.590549] ? kasan_atomics+0x152/0x310 [ 14.590574] kasan_atomics+0x1dc/0x310 [ 14.590594] ? __pfx_kasan_atomics+0x10/0x10 [ 14.590628] ? __pfx_read_tsc+0x10/0x10 [ 14.590650] ? ktime_get_ts64+0x86/0x230 [ 14.590676] kunit_try_run_case+0x1a5/0x480 [ 14.590698] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.590720] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.590746] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.590793] ? __kthread_parkme+0x82/0x180 [ 14.590815] ? preempt_count_sub+0x50/0x80 [ 14.590841] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.590863] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.590888] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.590914] kthread+0x337/0x6f0 [ 14.590934] ? trace_preempt_on+0x20/0xc0 [ 14.590959] ? __pfx_kthread+0x10/0x10 [ 14.590981] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.591006] ? calculate_sigpending+0x7b/0xa0 [ 14.591030] ? __pfx_kthread+0x10/0x10 [ 14.591053] ret_from_fork+0x116/0x1d0 [ 14.591073] ? __pfx_kthread+0x10/0x10 [ 14.591095] ret_from_fork_asm+0x1a/0x30 [ 14.591127] </TASK> [ 14.591138] [ 14.603468] Allocated by task 282: [ 14.603727] kasan_save_stack+0x45/0x70 [ 14.604166] kasan_save_track+0x18/0x40 [ 14.604390] kasan_save_alloc_info+0x3b/0x50 [ 14.604825] __kasan_kmalloc+0xb7/0xc0 [ 14.605115] __kmalloc_cache_noprof+0x189/0x420 [ 14.605278] kasan_atomics+0x95/0x310 [ 14.605414] kunit_try_run_case+0x1a5/0x480 [ 14.605563] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.605857] kthread+0x337/0x6f0 [ 14.606053] ret_from_fork+0x116/0x1d0 [ 14.606244] ret_from_fork_asm+0x1a/0x30 [ 14.606482] [ 14.606563] The buggy address belongs to the object at ffff888102fa7d80 [ 14.606563] which belongs to the cache kmalloc-64 of size 64 [ 14.607199] The buggy address is located 0 bytes to the right of [ 14.607199] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 14.607811] [ 14.607927] The buggy address belongs to the physical page: [ 14.608196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 14.608476] flags: 0x200000000000000(node=0|zone=2) [ 14.608785] page_type: f5(slab) [ 14.608937] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.609279] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.609653] page dumped because: kasan: bad access detected [ 14.609938] [ 14.610039] Memory state around the buggy address: [ 14.610315] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.610655] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.611106] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.611471] ^ [ 14.611696] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.612102] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.612426] ================================================================== [ 13.890381] ================================================================== [ 13.890840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 13.891197] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 13.891515] [ 13.891603] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.891661] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.891675] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.891697] Call Trace: [ 13.891710] <TASK> [ 13.891724] dump_stack_lvl+0x73/0xb0 [ 13.891944] print_report+0xd1/0x650 [ 13.891969] ? __virt_addr_valid+0x1db/0x2d0 [ 13.891993] ? kasan_atomics_helper+0xfa9/0x5450 [ 13.892016] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.892040] ? kasan_atomics_helper+0xfa9/0x5450 [ 13.892064] kasan_report+0x141/0x180 [ 13.892088] ? kasan_atomics_helper+0xfa9/0x5450 [ 13.892116] kasan_check_range+0x10c/0x1c0 [ 13.892141] __kasan_check_write+0x18/0x20 [ 13.892162] kasan_atomics_helper+0xfa9/0x5450 [ 13.892186] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.892211] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.892234] ? kasan_atomics+0x152/0x310 [ 13.892258] kasan_atomics+0x1dc/0x310 [ 13.892279] ? __pfx_kasan_atomics+0x10/0x10 [ 13.892301] ? __pfx_read_tsc+0x10/0x10 [ 13.892323] ? ktime_get_ts64+0x86/0x230 [ 13.892348] kunit_try_run_case+0x1a5/0x480 [ 13.892371] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.892392] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.892417] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.892443] ? __kthread_parkme+0x82/0x180 [ 13.892465] ? preempt_count_sub+0x50/0x80 [ 13.892490] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.892512] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.892539] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.892565] kthread+0x337/0x6f0 [ 13.892585] ? trace_preempt_on+0x20/0xc0 [ 13.892623] ? __pfx_kthread+0x10/0x10 [ 13.892646] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.892670] ? calculate_sigpending+0x7b/0xa0 [ 13.892695] ? __pfx_kthread+0x10/0x10 [ 13.892718] ret_from_fork+0x116/0x1d0 [ 13.892839] ? __pfx_kthread+0x10/0x10 [ 13.892868] ret_from_fork_asm+0x1a/0x30 [ 13.892899] </TASK> [ 13.892912] [ 13.901390] Allocated by task 282: [ 13.901585] kasan_save_stack+0x45/0x70 [ 13.901893] kasan_save_track+0x18/0x40 [ 13.902082] kasan_save_alloc_info+0x3b/0x50 [ 13.902295] __kasan_kmalloc+0xb7/0xc0 [ 13.902474] __kmalloc_cache_noprof+0x189/0x420 [ 13.902706] kasan_atomics+0x95/0x310 [ 13.902986] kunit_try_run_case+0x1a5/0x480 [ 13.903178] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.903420] kthread+0x337/0x6f0 [ 13.903589] ret_from_fork+0x116/0x1d0 [ 13.904005] ret_from_fork_asm+0x1a/0x30 [ 13.904180] [ 13.904284] The buggy address belongs to the object at ffff888102fa7d80 [ 13.904284] which belongs to the cache kmalloc-64 of size 64 [ 13.904902] The buggy address is located 0 bytes to the right of [ 13.904902] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 13.905432] [ 13.905531] The buggy address belongs to the physical page: [ 13.905878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 13.906162] flags: 0x200000000000000(node=0|zone=2) [ 13.906335] page_type: f5(slab) [ 13.906461] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.906900] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.907247] page dumped because: kasan: bad access detected [ 13.907503] [ 13.907580] Memory state around the buggy address: [ 13.907947] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.908291] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.908629] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.909064] ^ [ 13.909306] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.909651] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.910016] ================================================================== [ 14.157815] ================================================================== [ 14.158519] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 14.159405] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 14.160135] [ 14.160339] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 14.160403] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.160426] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.160448] Call Trace: [ 14.160464] <TASK> [ 14.160483] dump_stack_lvl+0x73/0xb0 [ 14.160522] print_report+0xd1/0x650 [ 14.160546] ? __virt_addr_valid+0x1db/0x2d0 [ 14.160570] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.160593] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.160627] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.160650] kasan_report+0x141/0x180 [ 14.160674] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.160702] __asan_report_store8_noabort+0x1b/0x30 [ 14.160725] kasan_atomics_helper+0x50d4/0x5450 [ 14.160749] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.160787] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.160814] ? kasan_atomics+0x152/0x310 [ 14.160839] kasan_atomics+0x1dc/0x310 [ 14.160859] ? __pfx_kasan_atomics+0x10/0x10 [ 14.160883] ? __pfx_read_tsc+0x10/0x10 [ 14.160905] ? ktime_get_ts64+0x86/0x230 [ 14.160931] kunit_try_run_case+0x1a5/0x480 [ 14.160954] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.160976] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.161003] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.161028] ? __kthread_parkme+0x82/0x180 [ 14.161050] ? preempt_count_sub+0x50/0x80 [ 14.161076] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.161098] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.161124] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.161150] kthread+0x337/0x6f0 [ 14.161170] ? trace_preempt_on+0x20/0xc0 [ 14.161194] ? __pfx_kthread+0x10/0x10 [ 14.161216] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.161240] ? calculate_sigpending+0x7b/0xa0 [ 14.161266] ? __pfx_kthread+0x10/0x10 [ 14.161288] ret_from_fork+0x116/0x1d0 [ 14.161308] ? __pfx_kthread+0x10/0x10 [ 14.161329] ret_from_fork_asm+0x1a/0x30 [ 14.161362] </TASK> [ 14.161374] [ 14.173823] Allocated by task 282: [ 14.174211] kasan_save_stack+0x45/0x70 [ 14.174452] kasan_save_track+0x18/0x40 [ 14.174855] kasan_save_alloc_info+0x3b/0x50 [ 14.175047] __kasan_kmalloc+0xb7/0xc0 [ 14.175419] __kmalloc_cache_noprof+0x189/0x420 [ 14.175788] kasan_atomics+0x95/0x310 [ 14.176093] kunit_try_run_case+0x1a5/0x480 [ 14.176246] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.176433] kthread+0x337/0x6f0 [ 14.176559] ret_from_fork+0x116/0x1d0 [ 14.176719] ret_from_fork_asm+0x1a/0x30 [ 14.177099] [ 14.177275] The buggy address belongs to the object at ffff888102fa7d80 [ 14.177275] which belongs to the cache kmalloc-64 of size 64 [ 14.178184] The buggy address is located 0 bytes to the right of [ 14.178184] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 14.178722] [ 14.178825] The buggy address belongs to the physical page: [ 14.179325] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 14.180093] flags: 0x200000000000000(node=0|zone=2) [ 14.180547] page_type: f5(slab) [ 14.180873] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.181280] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.181518] page dumped because: kasan: bad access detected [ 14.181709] [ 14.181808] Memory state around the buggy address: [ 14.182260] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.182970] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.183596] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.184271] ^ [ 14.184723] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.185563] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.186066] ================================================================== [ 13.972137] ================================================================== [ 13.972440] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 13.972882] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 13.973201] [ 13.973308] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.973353] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.973368] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.973390] Call Trace: [ 13.973404] <TASK> [ 13.973419] dump_stack_lvl+0x73/0xb0 [ 13.973445] print_report+0xd1/0x650 [ 13.973468] ? __virt_addr_valid+0x1db/0x2d0 [ 13.973492] ? kasan_atomics_helper+0x1148/0x5450 [ 13.973515] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.973539] ? kasan_atomics_helper+0x1148/0x5450 [ 13.973563] kasan_report+0x141/0x180 [ 13.973586] ? kasan_atomics_helper+0x1148/0x5450 [ 13.973627] kasan_check_range+0x10c/0x1c0 [ 13.973653] __kasan_check_write+0x18/0x20 [ 13.973674] kasan_atomics_helper+0x1148/0x5450 [ 13.973698] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.973722] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.973822] ? kasan_atomics+0x152/0x310 [ 13.973848] kasan_atomics+0x1dc/0x310 [ 13.973868] ? __pfx_kasan_atomics+0x10/0x10 [ 13.973890] ? __pfx_read_tsc+0x10/0x10 [ 13.973913] ? ktime_get_ts64+0x86/0x230 [ 13.973939] kunit_try_run_case+0x1a5/0x480 [ 13.973961] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.973982] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.974008] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.974034] ? __kthread_parkme+0x82/0x180 [ 13.974056] ? preempt_count_sub+0x50/0x80 [ 13.974081] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.974104] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.974130] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.974156] kthread+0x337/0x6f0 [ 13.974177] ? trace_preempt_on+0x20/0xc0 [ 13.974200] ? __pfx_kthread+0x10/0x10 [ 13.974223] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.974246] ? calculate_sigpending+0x7b/0xa0 [ 13.974271] ? __pfx_kthread+0x10/0x10 [ 13.974293] ret_from_fork+0x116/0x1d0 [ 13.974313] ? __pfx_kthread+0x10/0x10 [ 13.974335] ret_from_fork_asm+0x1a/0x30 [ 13.974366] </TASK> [ 13.974378] [ 13.982902] Allocated by task 282: [ 13.983095] kasan_save_stack+0x45/0x70 [ 13.983274] kasan_save_track+0x18/0x40 [ 13.983476] kasan_save_alloc_info+0x3b/0x50 [ 13.983674] __kasan_kmalloc+0xb7/0xc0 [ 13.984121] __kmalloc_cache_noprof+0x189/0x420 [ 13.984361] kasan_atomics+0x95/0x310 [ 13.984553] kunit_try_run_case+0x1a5/0x480 [ 13.984748] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.985009] kthread+0x337/0x6f0 [ 13.985180] ret_from_fork+0x116/0x1d0 [ 13.985336] ret_from_fork_asm+0x1a/0x30 [ 13.985529] [ 13.985959] The buggy address belongs to the object at ffff888102fa7d80 [ 13.985959] which belongs to the cache kmalloc-64 of size 64 [ 13.986334] The buggy address is located 0 bytes to the right of [ 13.986334] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 13.987008] [ 13.987112] The buggy address belongs to the physical page: [ 13.987328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 13.987604] flags: 0x200000000000000(node=0|zone=2) [ 13.988075] page_type: f5(slab) [ 13.988258] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.988623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.989056] page dumped because: kasan: bad access detected [ 13.989295] [ 13.989401] Memory state around the buggy address: [ 13.989631] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.989995] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.990310] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.990569] ^ [ 13.990838] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.991178] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.991499] ================================================================== [ 13.849847] ================================================================== [ 13.850192] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 13.850639] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 13.851203] [ 13.851323] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.851371] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.851384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.851406] Call Trace: [ 13.851422] <TASK> [ 13.851437] dump_stack_lvl+0x73/0xb0 [ 13.851466] print_report+0xd1/0x650 [ 13.851489] ? __virt_addr_valid+0x1db/0x2d0 [ 13.851513] ? kasan_atomics_helper+0xe78/0x5450 [ 13.851537] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.851562] ? kasan_atomics_helper+0xe78/0x5450 [ 13.851585] kasan_report+0x141/0x180 [ 13.851624] ? kasan_atomics_helper+0xe78/0x5450 [ 13.851653] kasan_check_range+0x10c/0x1c0 [ 13.851678] __kasan_check_write+0x18/0x20 [ 13.851699] kasan_atomics_helper+0xe78/0x5450 [ 13.851724] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.851748] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.851770] ? kasan_atomics+0x152/0x310 [ 13.851794] kasan_atomics+0x1dc/0x310 [ 13.851815] ? __pfx_kasan_atomics+0x10/0x10 [ 13.851837] ? __pfx_read_tsc+0x10/0x10 [ 13.851923] ? ktime_get_ts64+0x86/0x230 [ 13.851950] kunit_try_run_case+0x1a5/0x480 [ 13.851986] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.852008] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.852034] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.852060] ? __kthread_parkme+0x82/0x180 [ 13.852082] ? preempt_count_sub+0x50/0x80 [ 13.852107] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.852129] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.852154] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.852181] kthread+0x337/0x6f0 [ 13.852202] ? trace_preempt_on+0x20/0xc0 [ 13.852226] ? __pfx_kthread+0x10/0x10 [ 13.852248] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.852272] ? calculate_sigpending+0x7b/0xa0 [ 13.852297] ? __pfx_kthread+0x10/0x10 [ 13.852320] ret_from_fork+0x116/0x1d0 [ 13.852340] ? __pfx_kthread+0x10/0x10 [ 13.852365] ret_from_fork_asm+0x1a/0x30 [ 13.852397] </TASK> [ 13.852409] [ 13.860953] Allocated by task 282: [ 13.861091] kasan_save_stack+0x45/0x70 [ 13.861246] kasan_save_track+0x18/0x40 [ 13.861411] kasan_save_alloc_info+0x3b/0x50 [ 13.861636] __kasan_kmalloc+0xb7/0xc0 [ 13.861827] __kmalloc_cache_noprof+0x189/0x420 [ 13.862058] kasan_atomics+0x95/0x310 [ 13.862364] kunit_try_run_case+0x1a5/0x480 [ 13.862580] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.863049] kthread+0x337/0x6f0 [ 13.863195] ret_from_fork+0x116/0x1d0 [ 13.863335] ret_from_fork_asm+0x1a/0x30 [ 13.863492] [ 13.863593] The buggy address belongs to the object at ffff888102fa7d80 [ 13.863593] which belongs to the cache kmalloc-64 of size 64 [ 13.864245] The buggy address is located 0 bytes to the right of [ 13.864245] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 13.865011] [ 13.865121] The buggy address belongs to the physical page: [ 13.865381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 13.865685] flags: 0x200000000000000(node=0|zone=2) [ 13.865858] page_type: f5(slab) [ 13.865983] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.866268] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.866764] page dumped because: kasan: bad access detected [ 13.867230] [ 13.867309] Memory state around the buggy address: [ 13.867471] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.867733] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.868154] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.868482] ^ [ 13.868731] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.869118] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.869415] ================================================================== [ 13.585170] ================================================================== [ 13.585522] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 13.585915] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 13.586278] [ 13.586367] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.586415] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.586429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.586452] Call Trace: [ 13.586470] <TASK> [ 13.586487] dump_stack_lvl+0x73/0xb0 [ 13.586514] print_report+0xd1/0x650 [ 13.586543] ? __virt_addr_valid+0x1db/0x2d0 [ 13.586566] ? kasan_atomics_helper+0x860/0x5450 [ 13.586590] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.586627] ? kasan_atomics_helper+0x860/0x5450 [ 13.586651] kasan_report+0x141/0x180 [ 13.586675] ? kasan_atomics_helper+0x860/0x5450 [ 13.586703] kasan_check_range+0x10c/0x1c0 [ 13.586729] __kasan_check_write+0x18/0x20 [ 13.586752] kasan_atomics_helper+0x860/0x5450 [ 13.586775] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.586799] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.586822] ? kasan_atomics+0x152/0x310 [ 13.586845] kasan_atomics+0x1dc/0x310 [ 13.586866] ? __pfx_kasan_atomics+0x10/0x10 [ 13.586888] ? __pfx_read_tsc+0x10/0x10 [ 13.586911] ? ktime_get_ts64+0x86/0x230 [ 13.586936] kunit_try_run_case+0x1a5/0x480 [ 13.587139] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.587162] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.587188] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.587214] ? __kthread_parkme+0x82/0x180 [ 13.587236] ? preempt_count_sub+0x50/0x80 [ 13.587262] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.587285] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.587310] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.587336] kthread+0x337/0x6f0 [ 13.587358] ? trace_preempt_on+0x20/0xc0 [ 13.587382] ? __pfx_kthread+0x10/0x10 [ 13.587404] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.587427] ? calculate_sigpending+0x7b/0xa0 [ 13.587453] ? __pfx_kthread+0x10/0x10 [ 13.587476] ret_from_fork+0x116/0x1d0 [ 13.587496] ? __pfx_kthread+0x10/0x10 [ 13.587517] ret_from_fork_asm+0x1a/0x30 [ 13.587550] </TASK> [ 13.587561] [ 13.595834] Allocated by task 282: [ 13.596269] kasan_save_stack+0x45/0x70 [ 13.596480] kasan_save_track+0x18/0x40 [ 13.596698] kasan_save_alloc_info+0x3b/0x50 [ 13.596973] __kasan_kmalloc+0xb7/0xc0 [ 13.597146] __kmalloc_cache_noprof+0x189/0x420 [ 13.597372] kasan_atomics+0x95/0x310 [ 13.597510] kunit_try_run_case+0x1a5/0x480 [ 13.597729] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.598038] kthread+0x337/0x6f0 [ 13.598195] ret_from_fork+0x116/0x1d0 [ 13.598384] ret_from_fork_asm+0x1a/0x30 [ 13.598586] [ 13.598695] The buggy address belongs to the object at ffff888102fa7d80 [ 13.598695] which belongs to the cache kmalloc-64 of size 64 [ 13.599255] The buggy address is located 0 bytes to the right of [ 13.599255] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 13.599714] [ 13.599791] The buggy address belongs to the physical page: [ 13.599970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 13.600239] flags: 0x200000000000000(node=0|zone=2) [ 13.600769] page_type: f5(slab) [ 13.600960] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.601433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.601845] page dumped because: kasan: bad access detected [ 13.602092] [ 13.602166] Memory state around the buggy address: [ 13.602329] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.602654] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.603238] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.603526] ^ [ 13.603782] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.604047] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.604362] ================================================================== [ 13.931105] ================================================================== [ 13.931437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 13.932042] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 13.932369] [ 13.932481] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.932545] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.932572] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.932594] Call Trace: [ 13.932634] <TASK> [ 13.932650] dump_stack_lvl+0x73/0xb0 [ 13.932676] print_report+0xd1/0x650 [ 13.932715] ? __virt_addr_valid+0x1db/0x2d0 [ 13.932889] ? kasan_atomics_helper+0x1079/0x5450 [ 13.932916] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.932940] ? kasan_atomics_helper+0x1079/0x5450 [ 13.932964] kasan_report+0x141/0x180 [ 13.932988] ? kasan_atomics_helper+0x1079/0x5450 [ 13.933016] kasan_check_range+0x10c/0x1c0 [ 13.933041] __kasan_check_write+0x18/0x20 [ 13.933063] kasan_atomics_helper+0x1079/0x5450 [ 13.933088] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.933112] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.933135] ? kasan_atomics+0x152/0x310 [ 13.933159] kasan_atomics+0x1dc/0x310 [ 13.933180] ? __pfx_kasan_atomics+0x10/0x10 [ 13.933202] ? __pfx_read_tsc+0x10/0x10 [ 13.933225] ? ktime_get_ts64+0x86/0x230 [ 13.933251] kunit_try_run_case+0x1a5/0x480 [ 13.933273] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.933294] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.933320] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.933346] ? __kthread_parkme+0x82/0x180 [ 13.933367] ? preempt_count_sub+0x50/0x80 [ 13.933392] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.933414] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.933440] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.933466] kthread+0x337/0x6f0 [ 13.933487] ? trace_preempt_on+0x20/0xc0 [ 13.933511] ? __pfx_kthread+0x10/0x10 [ 13.933533] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.933557] ? calculate_sigpending+0x7b/0xa0 [ 13.933582] ? __pfx_kthread+0x10/0x10 [ 13.933604] ret_from_fork+0x116/0x1d0 [ 13.933635] ? __pfx_kthread+0x10/0x10 [ 13.933657] ret_from_fork_asm+0x1a/0x30 [ 13.933689] </TASK> [ 13.933699] [ 13.943027] Allocated by task 282: [ 13.943219] kasan_save_stack+0x45/0x70 [ 13.943426] kasan_save_track+0x18/0x40 [ 13.943634] kasan_save_alloc_info+0x3b/0x50 [ 13.944051] __kasan_kmalloc+0xb7/0xc0 [ 13.944291] __kmalloc_cache_noprof+0x189/0x420 [ 13.944535] kasan_atomics+0x95/0x310 [ 13.944898] kunit_try_run_case+0x1a5/0x480 [ 13.945153] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.945456] kthread+0x337/0x6f0 [ 13.945642] ret_from_fork+0x116/0x1d0 [ 13.945896] ret_from_fork_asm+0x1a/0x30 [ 13.946108] [ 13.946233] The buggy address belongs to the object at ffff888102fa7d80 [ 13.946233] which belongs to the cache kmalloc-64 of size 64 [ 13.946923] The buggy address is located 0 bytes to the right of [ 13.946923] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 13.947521] [ 13.947646] The buggy address belongs to the physical page: [ 13.947914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 13.948241] flags: 0x200000000000000(node=0|zone=2) [ 13.948479] page_type: f5(slab) [ 13.948920] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.949242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.949558] page dumped because: kasan: bad access detected [ 13.949890] [ 13.949978] Memory state around the buggy address: [ 13.950188] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.950490] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.950898] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.951205] ^ [ 13.951376] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.951673] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.952191] ================================================================== [ 13.992142] ================================================================== [ 13.992480] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 13.992931] Read of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 13.993203] [ 13.993319] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.993364] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.993377] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.993400] Call Trace: [ 13.993417] <TASK> [ 13.993433] dump_stack_lvl+0x73/0xb0 [ 13.993461] print_report+0xd1/0x650 [ 13.993485] ? __virt_addr_valid+0x1db/0x2d0 [ 13.993507] ? kasan_atomics_helper+0x4a02/0x5450 [ 13.993530] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.993554] ? kasan_atomics_helper+0x4a02/0x5450 [ 13.993577] kasan_report+0x141/0x180 [ 13.993602] ? kasan_atomics_helper+0x4a02/0x5450 [ 13.993644] __asan_report_load4_noabort+0x18/0x20 [ 13.993666] kasan_atomics_helper+0x4a02/0x5450 [ 13.993691] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.993715] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.993814] ? kasan_atomics+0x152/0x310 [ 13.993841] kasan_atomics+0x1dc/0x310 [ 13.993862] ? __pfx_kasan_atomics+0x10/0x10 [ 13.993885] ? __pfx_read_tsc+0x10/0x10 [ 13.993908] ? ktime_get_ts64+0x86/0x230 [ 13.993933] kunit_try_run_case+0x1a5/0x480 [ 13.993955] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.993976] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.994002] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.994028] ? __kthread_parkme+0x82/0x180 [ 13.994050] ? preempt_count_sub+0x50/0x80 [ 13.994075] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.994097] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.994123] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.994149] kthread+0x337/0x6f0 [ 13.994169] ? trace_preempt_on+0x20/0xc0 [ 13.994193] ? __pfx_kthread+0x10/0x10 [ 13.994215] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.994239] ? calculate_sigpending+0x7b/0xa0 [ 13.994264] ? __pfx_kthread+0x10/0x10 [ 13.994287] ret_from_fork+0x116/0x1d0 [ 13.994307] ? __pfx_kthread+0x10/0x10 [ 13.994329] ret_from_fork_asm+0x1a/0x30 [ 13.994360] </TASK> [ 13.994372] [ 14.002595] Allocated by task 282: [ 14.002858] kasan_save_stack+0x45/0x70 [ 14.003078] kasan_save_track+0x18/0x40 [ 14.003286] kasan_save_alloc_info+0x3b/0x50 [ 14.003501] __kasan_kmalloc+0xb7/0xc0 [ 14.003710] __kmalloc_cache_noprof+0x189/0x420 [ 14.004119] kasan_atomics+0x95/0x310 [ 14.004319] kunit_try_run_case+0x1a5/0x480 [ 14.004482] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.004681] kthread+0x337/0x6f0 [ 14.004959] ret_from_fork+0x116/0x1d0 [ 14.005158] ret_from_fork_asm+0x1a/0x30 [ 14.005359] [ 14.005459] The buggy address belongs to the object at ffff888102fa7d80 [ 14.005459] which belongs to the cache kmalloc-64 of size 64 [ 14.006072] The buggy address is located 0 bytes to the right of [ 14.006072] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 14.006537] [ 14.006623] The buggy address belongs to the physical page: [ 14.006941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 14.007322] flags: 0x200000000000000(node=0|zone=2) [ 14.007572] page_type: f5(slab) [ 14.007944] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.008240] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.008530] page dumped because: kasan: bad access detected [ 14.008726] [ 14.008952] Memory state around the buggy address: [ 14.009185] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.009514] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.009857] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.010185] ^ [ 14.010421] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.010690] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.011113] ================================================================== [ 14.260387] ================================================================== [ 14.260770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 14.261123] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 14.261407] [ 14.261518] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 14.261563] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.261578] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.261600] Call Trace: [ 14.261625] <TASK> [ 14.261640] dump_stack_lvl+0x73/0xb0 [ 14.261665] print_report+0xd1/0x650 [ 14.261689] ? __virt_addr_valid+0x1db/0x2d0 [ 14.261712] ? kasan_atomics_helper+0x177f/0x5450 [ 14.261736] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.261760] ? kasan_atomics_helper+0x177f/0x5450 [ 14.261784] kasan_report+0x141/0x180 [ 14.261808] ? kasan_atomics_helper+0x177f/0x5450 [ 14.261845] kasan_check_range+0x10c/0x1c0 [ 14.261871] __kasan_check_write+0x18/0x20 [ 14.261893] kasan_atomics_helper+0x177f/0x5450 [ 14.261918] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.261942] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.261965] ? kasan_atomics+0x152/0x310 [ 14.261989] kasan_atomics+0x1dc/0x310 [ 14.262010] ? __pfx_kasan_atomics+0x10/0x10 [ 14.262033] ? __pfx_read_tsc+0x10/0x10 [ 14.262056] ? ktime_get_ts64+0x86/0x230 [ 14.262081] kunit_try_run_case+0x1a5/0x480 [ 14.262104] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.262125] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.262152] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.262178] ? __kthread_parkme+0x82/0x180 [ 14.262199] ? preempt_count_sub+0x50/0x80 [ 14.262225] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.262248] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.262274] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.262300] kthread+0x337/0x6f0 [ 14.262322] ? trace_preempt_on+0x20/0xc0 [ 14.262347] ? __pfx_kthread+0x10/0x10 [ 14.262370] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.262394] ? calculate_sigpending+0x7b/0xa0 [ 14.262419] ? __pfx_kthread+0x10/0x10 [ 14.262441] ret_from_fork+0x116/0x1d0 [ 14.262462] ? __pfx_kthread+0x10/0x10 [ 14.262484] ret_from_fork_asm+0x1a/0x30 [ 14.262515] </TASK> [ 14.262527] [ 14.269917] Allocated by task 282: [ 14.270105] kasan_save_stack+0x45/0x70 [ 14.270323] kasan_save_track+0x18/0x40 [ 14.270538] kasan_save_alloc_info+0x3b/0x50 [ 14.270917] __kasan_kmalloc+0xb7/0xc0 [ 14.271124] __kmalloc_cache_noprof+0x189/0x420 [ 14.271286] kasan_atomics+0x95/0x310 [ 14.271422] kunit_try_run_case+0x1a5/0x480 [ 14.271573] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.271793] kthread+0x337/0x6f0 [ 14.271970] ret_from_fork+0x116/0x1d0 [ 14.272161] ret_from_fork_asm+0x1a/0x30 [ 14.272362] [ 14.272459] The buggy address belongs to the object at ffff888102fa7d80 [ 14.272459] which belongs to the cache kmalloc-64 of size 64 [ 14.272999] The buggy address is located 0 bytes to the right of [ 14.272999] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 14.273462] [ 14.273539] The buggy address belongs to the physical page: [ 14.273979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 14.274336] flags: 0x200000000000000(node=0|zone=2) [ 14.274555] page_type: f5(slab) [ 14.274690] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.275234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.275534] page dumped because: kasan: bad access detected [ 14.275792] [ 14.275889] Memory state around the buggy address: [ 14.276055] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.276281] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.276506] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.276837] ^ [ 14.277068] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.277636] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.278012] ================================================================== [ 13.565241] ================================================================== [ 13.565559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 13.565952] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 13.566200] [ 13.566286] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.566331] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.566345] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.566368] Call Trace: [ 13.566384] <TASK> [ 13.566400] dump_stack_lvl+0x73/0xb0 [ 13.566425] print_report+0xd1/0x650 [ 13.566449] ? __virt_addr_valid+0x1db/0x2d0 [ 13.566472] ? kasan_atomics_helper+0x7c7/0x5450 [ 13.566495] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.566522] ? kasan_atomics_helper+0x7c7/0x5450 [ 13.566551] kasan_report+0x141/0x180 [ 13.566574] ? kasan_atomics_helper+0x7c7/0x5450 [ 13.566602] kasan_check_range+0x10c/0x1c0 [ 13.566638] __kasan_check_write+0x18/0x20 [ 13.566659] kasan_atomics_helper+0x7c7/0x5450 [ 13.566684] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.566709] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.566731] ? kasan_atomics+0x152/0x310 [ 13.566756] kasan_atomics+0x1dc/0x310 [ 13.566777] ? __pfx_kasan_atomics+0x10/0x10 [ 13.566799] ? __pfx_read_tsc+0x10/0x10 [ 13.566821] ? ktime_get_ts64+0x86/0x230 [ 13.566846] kunit_try_run_case+0x1a5/0x480 [ 13.566868] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.566889] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.566915] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.566941] ? __kthread_parkme+0x82/0x180 [ 13.566963] ? preempt_count_sub+0x50/0x80 [ 13.566987] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.567009] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.567035] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.567061] kthread+0x337/0x6f0 [ 13.567082] ? trace_preempt_on+0x20/0xc0 [ 13.567107] ? __pfx_kthread+0x10/0x10 [ 13.567128] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.567153] ? calculate_sigpending+0x7b/0xa0 [ 13.567177] ? __pfx_kthread+0x10/0x10 [ 13.567200] ret_from_fork+0x116/0x1d0 [ 13.567219] ? __pfx_kthread+0x10/0x10 [ 13.567242] ret_from_fork_asm+0x1a/0x30 [ 13.567273] </TASK> [ 13.567342] [ 13.575812] Allocated by task 282: [ 13.576121] kasan_save_stack+0x45/0x70 [ 13.576344] kasan_save_track+0x18/0x40 [ 13.576538] kasan_save_alloc_info+0x3b/0x50 [ 13.576726] __kasan_kmalloc+0xb7/0xc0 [ 13.576950] __kmalloc_cache_noprof+0x189/0x420 [ 13.577286] kasan_atomics+0x95/0x310 [ 13.577547] kunit_try_run_case+0x1a5/0x480 [ 13.577716] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.577914] kthread+0x337/0x6f0 [ 13.578441] ret_from_fork+0x116/0x1d0 [ 13.578667] ret_from_fork_asm+0x1a/0x30 [ 13.578931] [ 13.579012] The buggy address belongs to the object at ffff888102fa7d80 [ 13.579012] which belongs to the cache kmalloc-64 of size 64 [ 13.579507] The buggy address is located 0 bytes to the right of [ 13.579507] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 13.579974] [ 13.580050] The buggy address belongs to the physical page: [ 13.580233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 13.580494] flags: 0x200000000000000(node=0|zone=2) [ 13.580740] page_type: f5(slab) [ 13.580999] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.581391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.581738] page dumped because: kasan: bad access detected [ 13.581938] [ 13.582011] Memory state around the buggy address: [ 13.582176] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.582409] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.583068] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.583404] ^ [ 13.583658] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.584106] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.584634] ================================================================== [ 13.358516] ================================================================== [ 13.359136] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 13.359637] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 13.360355] [ 13.360477] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.360657] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.360674] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.360697] Call Trace: [ 13.360712] <TASK> [ 13.360729] dump_stack_lvl+0x73/0xb0 [ 13.360823] print_report+0xd1/0x650 [ 13.360849] ? __virt_addr_valid+0x1db/0x2d0 [ 13.360983] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.361007] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.361050] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.361074] kasan_report+0x141/0x180 [ 13.361098] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.361126] __asan_report_store4_noabort+0x1b/0x30 [ 13.361149] kasan_atomics_helper+0x4b6e/0x5450 [ 13.361174] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.361198] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.361221] ? kasan_atomics+0x152/0x310 [ 13.361245] kasan_atomics+0x1dc/0x310 [ 13.361265] ? __pfx_kasan_atomics+0x10/0x10 [ 13.361287] ? __pfx_read_tsc+0x10/0x10 [ 13.361310] ? ktime_get_ts64+0x86/0x230 [ 13.361336] kunit_try_run_case+0x1a5/0x480 [ 13.361359] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.361379] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.361405] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.361431] ? __kthread_parkme+0x82/0x180 [ 13.361453] ? preempt_count_sub+0x50/0x80 [ 13.361478] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.361500] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.361526] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.361553] kthread+0x337/0x6f0 [ 13.361574] ? trace_preempt_on+0x20/0xc0 [ 13.361600] ? __pfx_kthread+0x10/0x10 [ 13.361634] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.361658] ? calculate_sigpending+0x7b/0xa0 [ 13.361683] ? __pfx_kthread+0x10/0x10 [ 13.361706] ret_from_fork+0x116/0x1d0 [ 13.361726] ? __pfx_kthread+0x10/0x10 [ 13.361894] ret_from_fork_asm+0x1a/0x30 [ 13.361938] </TASK> [ 13.361952] [ 13.372654] Allocated by task 282: [ 13.372906] kasan_save_stack+0x45/0x70 [ 13.373312] kasan_save_track+0x18/0x40 [ 13.373509] kasan_save_alloc_info+0x3b/0x50 [ 13.374037] __kasan_kmalloc+0xb7/0xc0 [ 13.374339] __kmalloc_cache_noprof+0x189/0x420 [ 13.374644] kasan_atomics+0x95/0x310 [ 13.375022] kunit_try_run_case+0x1a5/0x480 [ 13.375198] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.375458] kthread+0x337/0x6f0 [ 13.375644] ret_from_fork+0x116/0x1d0 [ 13.376198] ret_from_fork_asm+0x1a/0x30 [ 13.376385] [ 13.376485] The buggy address belongs to the object at ffff888102fa7d80 [ 13.376485] which belongs to the cache kmalloc-64 of size 64 [ 13.377252] The buggy address is located 0 bytes to the right of [ 13.377252] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 13.378040] [ 13.378166] The buggy address belongs to the physical page: [ 13.378373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 13.378842] flags: 0x200000000000000(node=0|zone=2) [ 13.379205] page_type: f5(slab) [ 13.379510] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.379953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.380343] page dumped because: kasan: bad access detected [ 13.380590] [ 13.380784] Memory state around the buggy address: [ 13.381173] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.381497] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.381991] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.382380] ^ [ 13.382570] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.383099] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.383408] ================================================================== [ 14.672939] ================================================================== [ 14.673599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 14.674074] Read of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 14.674865] [ 14.675063] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 14.675114] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.675129] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.675151] Call Trace: [ 14.675167] <TASK> [ 14.675184] dump_stack_lvl+0x73/0xb0 [ 14.675212] print_report+0xd1/0x650 [ 14.675236] ? __virt_addr_valid+0x1db/0x2d0 [ 14.675259] ? kasan_atomics_helper+0x4fa5/0x5450 [ 14.675282] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.675306] ? kasan_atomics_helper+0x4fa5/0x5450 [ 14.675330] kasan_report+0x141/0x180 [ 14.675354] ? kasan_atomics_helper+0x4fa5/0x5450 [ 14.675382] __asan_report_load8_noabort+0x18/0x20 [ 14.675404] kasan_atomics_helper+0x4fa5/0x5450 [ 14.675429] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.675568] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.675596] ? kasan_atomics+0x152/0x310 [ 14.675635] kasan_atomics+0x1dc/0x310 [ 14.675656] ? __pfx_kasan_atomics+0x10/0x10 [ 14.675679] ? __pfx_read_tsc+0x10/0x10 [ 14.675701] ? ktime_get_ts64+0x86/0x230 [ 14.675728] kunit_try_run_case+0x1a5/0x480 [ 14.675750] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.675796] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.675821] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.675848] ? __kthread_parkme+0x82/0x180 [ 14.675870] ? preempt_count_sub+0x50/0x80 [ 14.675895] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.675918] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.675943] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.675970] kthread+0x337/0x6f0 [ 14.675990] ? trace_preempt_on+0x20/0xc0 [ 14.676014] ? __pfx_kthread+0x10/0x10 [ 14.676036] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.676059] ? calculate_sigpending+0x7b/0xa0 [ 14.676085] ? __pfx_kthread+0x10/0x10 [ 14.676108] ret_from_fork+0x116/0x1d0 [ 14.676127] ? __pfx_kthread+0x10/0x10 [ 14.676149] ret_from_fork_asm+0x1a/0x30 [ 14.676180] </TASK> [ 14.676191] [ 14.686064] Allocated by task 282: [ 14.686361] kasan_save_stack+0x45/0x70 [ 14.686583] kasan_save_track+0x18/0x40 [ 14.686960] kasan_save_alloc_info+0x3b/0x50 [ 14.687238] __kasan_kmalloc+0xb7/0xc0 [ 14.687499] __kmalloc_cache_noprof+0x189/0x420 [ 14.687825] kasan_atomics+0x95/0x310 [ 14.687988] kunit_try_run_case+0x1a5/0x480 [ 14.688206] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.688443] kthread+0x337/0x6f0 [ 14.688606] ret_from_fork+0x116/0x1d0 [ 14.689063] ret_from_fork_asm+0x1a/0x30 [ 14.689225] [ 14.689454] The buggy address belongs to the object at ffff888102fa7d80 [ 14.689454] which belongs to the cache kmalloc-64 of size 64 [ 14.690011] The buggy address is located 0 bytes to the right of [ 14.690011] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 14.690458] [ 14.690565] The buggy address belongs to the physical page: [ 14.690839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 14.691197] flags: 0x200000000000000(node=0|zone=2) [ 14.691400] page_type: f5(slab) [ 14.691526] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.691904] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.692215] page dumped because: kasan: bad access detected [ 14.692417] [ 14.692515] Memory state around the buggy address: [ 14.692749] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.693042] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.693371] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.693659] ^ [ 14.693902] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.694171] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.694498] ================================================================== [ 13.779077] ================================================================== [ 13.779312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 13.779543] Read of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 13.780208] [ 13.780394] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.780442] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.780455] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.780477] Call Trace: [ 13.780494] <TASK> [ 13.780511] dump_stack_lvl+0x73/0xb0 [ 13.780538] print_report+0xd1/0x650 [ 13.780562] ? __virt_addr_valid+0x1db/0x2d0 [ 13.780585] ? kasan_atomics_helper+0x4a84/0x5450 [ 13.780621] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.780646] ? kasan_atomics_helper+0x4a84/0x5450 [ 13.780669] kasan_report+0x141/0x180 [ 13.780693] ? kasan_atomics_helper+0x4a84/0x5450 [ 13.780721] __asan_report_load4_noabort+0x18/0x20 [ 13.780742] kasan_atomics_helper+0x4a84/0x5450 [ 13.780937] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.780962] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.780985] ? kasan_atomics+0x152/0x310 [ 13.781009] kasan_atomics+0x1dc/0x310 [ 13.781030] ? __pfx_kasan_atomics+0x10/0x10 [ 13.781051] ? __pfx_read_tsc+0x10/0x10 [ 13.781074] ? ktime_get_ts64+0x86/0x230 [ 13.781100] kunit_try_run_case+0x1a5/0x480 [ 13.781122] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.781143] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.781169] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.781203] ? __kthread_parkme+0x82/0x180 [ 13.781225] ? preempt_count_sub+0x50/0x80 [ 13.781249] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.781271] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.781296] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.781322] kthread+0x337/0x6f0 [ 13.781343] ? trace_preempt_on+0x20/0xc0 [ 13.781366] ? __pfx_kthread+0x10/0x10 [ 13.781388] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.781411] ? calculate_sigpending+0x7b/0xa0 [ 13.781436] ? __pfx_kthread+0x10/0x10 [ 13.781458] ret_from_fork+0x116/0x1d0 [ 13.781477] ? __pfx_kthread+0x10/0x10 [ 13.781499] ret_from_fork_asm+0x1a/0x30 [ 13.781531] </TASK> [ 13.781543] [ 13.791060] Allocated by task 282: [ 13.791215] kasan_save_stack+0x45/0x70 [ 13.791370] kasan_save_track+0x18/0x40 [ 13.791512] kasan_save_alloc_info+0x3b/0x50 [ 13.791745] __kasan_kmalloc+0xb7/0xc0 [ 13.791939] __kmalloc_cache_noprof+0x189/0x420 [ 13.792161] kasan_atomics+0x95/0x310 [ 13.792548] kunit_try_run_case+0x1a5/0x480 [ 13.793668] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.794165] kthread+0x337/0x6f0 [ 13.794580] ret_from_fork+0x116/0x1d0 [ 13.794877] ret_from_fork_asm+0x1a/0x30 [ 13.795309] [ 13.795428] The buggy address belongs to the object at ffff888102fa7d80 [ 13.795428] which belongs to the cache kmalloc-64 of size 64 [ 13.796462] The buggy address is located 0 bytes to the right of [ 13.796462] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 13.797757] [ 13.797965] The buggy address belongs to the physical page: [ 13.798399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 13.799094] flags: 0x200000000000000(node=0|zone=2) [ 13.799459] page_type: f5(slab) [ 13.799653] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.800510] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.801596] page dumped because: kasan: bad access detected [ 13.802073] [ 13.802172] Memory state around the buggy address: [ 13.802383] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.802675] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.803569] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.804288] ^ [ 13.804714] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.805263] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.805777] ================================================================== [ 14.503735] ================================================================== [ 14.504120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 14.504454] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 14.504714] [ 14.504804] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 14.504851] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.504865] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.504911] Call Trace: [ 14.504929] <TASK> [ 14.504947] dump_stack_lvl+0x73/0xb0 [ 14.504975] print_report+0xd1/0x650 [ 14.504999] ? __virt_addr_valid+0x1db/0x2d0 [ 14.505022] ? kasan_atomics_helper+0x1eaa/0x5450 [ 14.505045] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.505071] ? kasan_atomics_helper+0x1eaa/0x5450 [ 14.505112] kasan_report+0x141/0x180 [ 14.505136] ? kasan_atomics_helper+0x1eaa/0x5450 [ 14.505166] kasan_check_range+0x10c/0x1c0 [ 14.505192] __kasan_check_write+0x18/0x20 [ 14.505213] kasan_atomics_helper+0x1eaa/0x5450 [ 14.505237] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.505260] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.505282] ? kasan_atomics+0x152/0x310 [ 14.505307] kasan_atomics+0x1dc/0x310 [ 14.505327] ? __pfx_kasan_atomics+0x10/0x10 [ 14.505349] ? __pfx_read_tsc+0x10/0x10 [ 14.505370] ? ktime_get_ts64+0x86/0x230 [ 14.505414] kunit_try_run_case+0x1a5/0x480 [ 14.505437] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.505458] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.505482] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.505508] ? __kthread_parkme+0x82/0x180 [ 14.505530] ? preempt_count_sub+0x50/0x80 [ 14.505554] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.505576] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.505602] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.505636] kthread+0x337/0x6f0 [ 14.505656] ? trace_preempt_on+0x20/0xc0 [ 14.505680] ? __pfx_kthread+0x10/0x10 [ 14.505701] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.505725] ? calculate_sigpending+0x7b/0xa0 [ 14.505750] ? __pfx_kthread+0x10/0x10 [ 14.505780] ret_from_fork+0x116/0x1d0 [ 14.505799] ? __pfx_kthread+0x10/0x10 [ 14.505821] ret_from_fork_asm+0x1a/0x30 [ 14.505852] </TASK> [ 14.505862] [ 14.513556] Allocated by task 282: [ 14.513719] kasan_save_stack+0x45/0x70 [ 14.513951] kasan_save_track+0x18/0x40 [ 14.514174] kasan_save_alloc_info+0x3b/0x50 [ 14.514379] __kasan_kmalloc+0xb7/0xc0 [ 14.514518] __kmalloc_cache_noprof+0x189/0x420 [ 14.514691] kasan_atomics+0x95/0x310 [ 14.515023] kunit_try_run_case+0x1a5/0x480 [ 14.515233] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.515511] kthread+0x337/0x6f0 [ 14.515692] ret_from_fork+0x116/0x1d0 [ 14.515922] ret_from_fork_asm+0x1a/0x30 [ 14.516126] [ 14.516202] The buggy address belongs to the object at ffff888102fa7d80 [ 14.516202] which belongs to the cache kmalloc-64 of size 64 [ 14.516725] The buggy address is located 0 bytes to the right of [ 14.516725] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 14.517255] [ 14.517356] The buggy address belongs to the physical page: [ 14.517557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 14.517922] flags: 0x200000000000000(node=0|zone=2) [ 14.518179] page_type: f5(slab) [ 14.518349] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.518657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.519162] page dumped because: kasan: bad access detected [ 14.519398] [ 14.519471] Memory state around the buggy address: [ 14.519639] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.519864] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.520212] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.520552] ^ [ 14.520803] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.521142] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.521370] ================================================================== [ 13.607975] ================================================================== [ 13.608681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 13.609352] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 13.609871] [ 13.610020] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.610070] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.610084] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.610108] Call Trace: [ 13.610121] <TASK> [ 13.610138] dump_stack_lvl+0x73/0xb0 [ 13.610165] print_report+0xd1/0x650 [ 13.610190] ? __virt_addr_valid+0x1db/0x2d0 [ 13.610231] ? kasan_atomics_helper+0x8f9/0x5450 [ 13.610255] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.610279] ? kasan_atomics_helper+0x8f9/0x5450 [ 13.610304] kasan_report+0x141/0x180 [ 13.610327] ? kasan_atomics_helper+0x8f9/0x5450 [ 13.610355] kasan_check_range+0x10c/0x1c0 [ 13.610381] __kasan_check_write+0x18/0x20 [ 13.610403] kasan_atomics_helper+0x8f9/0x5450 [ 13.610427] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.610452] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.610476] ? kasan_atomics+0x152/0x310 [ 13.610501] kasan_atomics+0x1dc/0x310 [ 13.610520] ? __pfx_kasan_atomics+0x10/0x10 [ 13.610548] ? __pfx_read_tsc+0x10/0x10 [ 13.610571] ? ktime_get_ts64+0x86/0x230 [ 13.610596] kunit_try_run_case+0x1a5/0x480 [ 13.610637] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.610660] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.610686] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.610712] ? __kthread_parkme+0x82/0x180 [ 13.610734] ? preempt_count_sub+0x50/0x80 [ 13.610980] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.611009] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.611035] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.611061] kthread+0x337/0x6f0 [ 13.611082] ? trace_preempt_on+0x20/0xc0 [ 13.611107] ? __pfx_kthread+0x10/0x10 [ 13.611129] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.611153] ? calculate_sigpending+0x7b/0xa0 [ 13.611178] ? __pfx_kthread+0x10/0x10 [ 13.611201] ret_from_fork+0x116/0x1d0 [ 13.611220] ? __pfx_kthread+0x10/0x10 [ 13.611242] ret_from_fork_asm+0x1a/0x30 [ 13.611273] </TASK> [ 13.611285] [ 13.627171] Allocated by task 282: [ 13.627544] kasan_save_stack+0x45/0x70 [ 13.627993] kasan_save_track+0x18/0x40 [ 13.628528] kasan_save_alloc_info+0x3b/0x50 [ 13.629011] __kasan_kmalloc+0xb7/0xc0 [ 13.629374] __kmalloc_cache_noprof+0x189/0x420 [ 13.629543] kasan_atomics+0x95/0x310 [ 13.629689] kunit_try_run_case+0x1a5/0x480 [ 13.630060] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.630595] kthread+0x337/0x6f0 [ 13.631074] ret_from_fork+0x116/0x1d0 [ 13.631538] ret_from_fork_asm+0x1a/0x30 [ 13.632030] [ 13.632221] The buggy address belongs to the object at ffff888102fa7d80 [ 13.632221] which belongs to the cache kmalloc-64 of size 64 [ 13.633396] The buggy address is located 0 bytes to the right of [ 13.633396] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 13.633870] [ 13.634117] The buggy address belongs to the physical page: [ 13.634663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 13.635727] flags: 0x200000000000000(node=0|zone=2) [ 13.636330] page_type: f5(slab) [ 13.636646] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.637337] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.637970] page dumped because: kasan: bad access detected [ 13.638157] [ 13.638233] Memory state around the buggy address: [ 13.638398] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.638742] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.639074] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.639348] ^ [ 13.639539] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.640156] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.640402] ================================================================== [ 14.461267] ================================================================== [ 14.461909] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 14.462255] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 14.462546] [ 14.462675] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 14.462722] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.462736] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.462758] Call Trace: [ 14.462776] <TASK> [ 14.462792] dump_stack_lvl+0x73/0xb0 [ 14.462818] print_report+0xd1/0x650 [ 14.462841] ? __virt_addr_valid+0x1db/0x2d0 [ 14.462864] ? kasan_atomics_helper+0x1d7a/0x5450 [ 14.462887] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.462911] ? kasan_atomics_helper+0x1d7a/0x5450 [ 14.462934] kasan_report+0x141/0x180 [ 14.462957] ? kasan_atomics_helper+0x1d7a/0x5450 [ 14.462985] kasan_check_range+0x10c/0x1c0 [ 14.463012] __kasan_check_write+0x18/0x20 [ 14.463033] kasan_atomics_helper+0x1d7a/0x5450 [ 14.463057] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.463082] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.463104] ? kasan_atomics+0x152/0x310 [ 14.463129] kasan_atomics+0x1dc/0x310 [ 14.463149] ? __pfx_kasan_atomics+0x10/0x10 [ 14.463171] ? __pfx_read_tsc+0x10/0x10 [ 14.463192] ? ktime_get_ts64+0x86/0x230 [ 14.463219] kunit_try_run_case+0x1a5/0x480 [ 14.463242] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.463263] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.463288] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.463314] ? __kthread_parkme+0x82/0x180 [ 14.463335] ? preempt_count_sub+0x50/0x80 [ 14.463359] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.463382] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.463408] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.463434] kthread+0x337/0x6f0 [ 14.463454] ? trace_preempt_on+0x20/0xc0 [ 14.463478] ? __pfx_kthread+0x10/0x10 [ 14.463499] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.463523] ? calculate_sigpending+0x7b/0xa0 [ 14.463547] ? __pfx_kthread+0x10/0x10 [ 14.463570] ret_from_fork+0x116/0x1d0 [ 14.463589] ? __pfx_kthread+0x10/0x10 [ 14.463621] ret_from_fork_asm+0x1a/0x30 [ 14.463653] </TASK> [ 14.463664] [ 14.471209] Allocated by task 282: [ 14.471377] kasan_save_stack+0x45/0x70 [ 14.471562] kasan_save_track+0x18/0x40 [ 14.471752] kasan_save_alloc_info+0x3b/0x50 [ 14.471933] __kasan_kmalloc+0xb7/0xc0 [ 14.472108] __kmalloc_cache_noprof+0x189/0x420 [ 14.472303] kasan_atomics+0x95/0x310 [ 14.472470] kunit_try_run_case+0x1a5/0x480 [ 14.472911] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.474051] kthread+0x337/0x6f0 [ 14.474314] ret_from_fork+0x116/0x1d0 [ 14.474715] ret_from_fork_asm+0x1a/0x30 [ 14.475206] [ 14.475306] The buggy address belongs to the object at ffff888102fa7d80 [ 14.475306] which belongs to the cache kmalloc-64 of size 64 [ 14.475979] The buggy address is located 0 bytes to the right of [ 14.475979] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 14.476740] [ 14.477002] The buggy address belongs to the physical page: [ 14.477478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 14.477905] flags: 0x200000000000000(node=0|zone=2) [ 14.478266] page_type: f5(slab) [ 14.478433] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.478761] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.479070] page dumped because: kasan: bad access detected [ 14.479296] [ 14.479387] Memory state around the buggy address: [ 14.479591] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.480286] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.480915] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.481353] ^ [ 14.481729] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.482349] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.482822] ================================================================== [ 14.436994] ================================================================== [ 14.437345] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 14.437762] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 14.438073] [ 14.438185] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 14.438231] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.438244] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.438267] Call Trace: [ 14.438281] <TASK> [ 14.438296] dump_stack_lvl+0x73/0xb0 [ 14.438322] print_report+0xd1/0x650 [ 14.438347] ? __virt_addr_valid+0x1db/0x2d0 [ 14.438370] ? kasan_atomics_helper+0x1ce1/0x5450 [ 14.438394] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.438419] ? kasan_atomics_helper+0x1ce1/0x5450 [ 14.438443] kasan_report+0x141/0x180 [ 14.438467] ? kasan_atomics_helper+0x1ce1/0x5450 [ 14.439129] kasan_check_range+0x10c/0x1c0 [ 14.439155] __kasan_check_write+0x18/0x20 [ 14.440064] kasan_atomics_helper+0x1ce1/0x5450 [ 14.440092] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.440116] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.440138] ? kasan_atomics+0x152/0x310 [ 14.440163] kasan_atomics+0x1dc/0x310 [ 14.440495] ? __pfx_kasan_atomics+0x10/0x10 [ 14.440518] ? __pfx_read_tsc+0x10/0x10 [ 14.440542] ? ktime_get_ts64+0x86/0x230 [ 14.440568] kunit_try_run_case+0x1a5/0x480 [ 14.440591] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.440622] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.440648] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.440674] ? __kthread_parkme+0x82/0x180 [ 14.440696] ? preempt_count_sub+0x50/0x80 [ 14.440720] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.440742] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.440787] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.440813] kthread+0x337/0x6f0 [ 14.440834] ? trace_preempt_on+0x20/0xc0 [ 14.440857] ? __pfx_kthread+0x10/0x10 [ 14.440879] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.440903] ? calculate_sigpending+0x7b/0xa0 [ 14.440928] ? __pfx_kthread+0x10/0x10 [ 14.440950] ret_from_fork+0x116/0x1d0 [ 14.440969] ? __pfx_kthread+0x10/0x10 [ 14.440991] ret_from_fork_asm+0x1a/0x30 [ 14.441022] </TASK> [ 14.441034] [ 14.450743] Allocated by task 282: [ 14.450902] kasan_save_stack+0x45/0x70 [ 14.451484] kasan_save_track+0x18/0x40 [ 14.451734] kasan_save_alloc_info+0x3b/0x50 [ 14.452066] __kasan_kmalloc+0xb7/0xc0 [ 14.452328] __kmalloc_cache_noprof+0x189/0x420 [ 14.452513] kasan_atomics+0x95/0x310 [ 14.452841] kunit_try_run_case+0x1a5/0x480 [ 14.453128] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.453428] kthread+0x337/0x6f0 [ 14.453675] ret_from_fork+0x116/0x1d0 [ 14.453831] ret_from_fork_asm+0x1a/0x30 [ 14.454136] [ 14.454234] The buggy address belongs to the object at ffff888102fa7d80 [ 14.454234] which belongs to the cache kmalloc-64 of size 64 [ 14.454745] The buggy address is located 0 bytes to the right of [ 14.454745] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 14.455235] [ 14.455336] The buggy address belongs to the physical page: [ 14.455552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 14.456298] flags: 0x200000000000000(node=0|zone=2) [ 14.456597] page_type: f5(slab) [ 14.456844] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.457233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.457629] page dumped because: kasan: bad access detected [ 14.457867] [ 14.457982] Memory state around the buggy address: [ 14.458367] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.458735] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.459117] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.459504] ^ [ 14.459704] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.460134] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.460532] ================================================================== [ 14.613218] ================================================================== [ 14.613551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 14.614044] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 14.614390] [ 14.614508] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 14.614562] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.614576] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.614599] Call Trace: [ 14.614626] <TASK> [ 14.614642] dump_stack_lvl+0x73/0xb0 [ 14.614670] print_report+0xd1/0x650 [ 14.614694] ? __virt_addr_valid+0x1db/0x2d0 [ 14.614718] ? kasan_atomics_helper+0x20c8/0x5450 [ 14.614748] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.614772] ? kasan_atomics_helper+0x20c8/0x5450 [ 14.614796] kasan_report+0x141/0x180 [ 14.614820] ? kasan_atomics_helper+0x20c8/0x5450 [ 14.614848] kasan_check_range+0x10c/0x1c0 [ 14.614874] __kasan_check_write+0x18/0x20 [ 14.614896] kasan_atomics_helper+0x20c8/0x5450 [ 14.614921] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.614945] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.614968] ? kasan_atomics+0x152/0x310 [ 14.614992] kasan_atomics+0x1dc/0x310 [ 14.615013] ? __pfx_kasan_atomics+0x10/0x10 [ 14.615035] ? __pfx_read_tsc+0x10/0x10 [ 14.615058] ? ktime_get_ts64+0x86/0x230 [ 14.615084] kunit_try_run_case+0x1a5/0x480 [ 14.615106] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.615127] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.615153] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.615180] ? __kthread_parkme+0x82/0x180 [ 14.615202] ? preempt_count_sub+0x50/0x80 [ 14.615227] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.615249] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.615275] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.615303] kthread+0x337/0x6f0 [ 14.615323] ? trace_preempt_on+0x20/0xc0 [ 14.615346] ? __pfx_kthread+0x10/0x10 [ 14.615368] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.615392] ? calculate_sigpending+0x7b/0xa0 [ 14.615416] ? __pfx_kthread+0x10/0x10 [ 14.615439] ret_from_fork+0x116/0x1d0 [ 14.615460] ? __pfx_kthread+0x10/0x10 [ 14.615482] ret_from_fork_asm+0x1a/0x30 [ 14.615513] </TASK> [ 14.615525] [ 14.626864] Allocated by task 282: [ 14.627082] kasan_save_stack+0x45/0x70 [ 14.627297] kasan_save_track+0x18/0x40 [ 14.627496] kasan_save_alloc_info+0x3b/0x50 [ 14.627668] __kasan_kmalloc+0xb7/0xc0 [ 14.627887] __kmalloc_cache_noprof+0x189/0x420 [ 14.628084] kasan_atomics+0x95/0x310 [ 14.628275] kunit_try_run_case+0x1a5/0x480 [ 14.628434] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.628627] kthread+0x337/0x6f0 [ 14.628772] ret_from_fork+0x116/0x1d0 [ 14.628972] ret_from_fork_asm+0x1a/0x30 [ 14.629173] [ 14.629271] The buggy address belongs to the object at ffff888102fa7d80 [ 14.629271] which belongs to the cache kmalloc-64 of size 64 [ 14.629734] The buggy address is located 0 bytes to the right of [ 14.629734] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 14.630315] [ 14.630416] The buggy address belongs to the physical page: [ 14.630681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 14.631027] flags: 0x200000000000000(node=0|zone=2) [ 14.631250] page_type: f5(slab) [ 14.631418] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.631733] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.632058] page dumped because: kasan: bad access detected [ 14.632296] [ 14.632383] Memory state around the buggy address: [ 14.632596] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.632859] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.633141] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.633469] ^ [ 14.633659] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.633911] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.634237] ================================================================== [ 14.419888] ================================================================== [ 14.420147] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 14.420476] Read of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 14.420789] [ 14.420929] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 14.420995] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.421009] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.421031] Call Trace: [ 14.421049] <TASK> [ 14.421066] dump_stack_lvl+0x73/0xb0 [ 14.421094] print_report+0xd1/0x650 [ 14.421117] ? __virt_addr_valid+0x1db/0x2d0 [ 14.421141] ? kasan_atomics_helper+0x4f30/0x5450 [ 14.421163] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.421189] ? kasan_atomics_helper+0x4f30/0x5450 [ 14.421215] kasan_report+0x141/0x180 [ 14.421240] ? kasan_atomics_helper+0x4f30/0x5450 [ 14.421269] __asan_report_load8_noabort+0x18/0x20 [ 14.421293] kasan_atomics_helper+0x4f30/0x5450 [ 14.421317] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.421342] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.421365] ? kasan_atomics+0x152/0x310 [ 14.421390] kasan_atomics+0x1dc/0x310 [ 14.421411] ? __pfx_kasan_atomics+0x10/0x10 [ 14.421433] ? __pfx_read_tsc+0x10/0x10 [ 14.421456] ? ktime_get_ts64+0x86/0x230 [ 14.421481] kunit_try_run_case+0x1a5/0x480 [ 14.421504] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.421525] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.421550] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.421576] ? __kthread_parkme+0x82/0x180 [ 14.421597] ? preempt_count_sub+0x50/0x80 [ 14.421634] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.421656] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.421681] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.421707] kthread+0x337/0x6f0 [ 14.421727] ? trace_preempt_on+0x20/0xc0 [ 14.421752] ? __pfx_kthread+0x10/0x10 [ 14.421774] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.421797] ? calculate_sigpending+0x7b/0xa0 [ 14.421822] ? __pfx_kthread+0x10/0x10 [ 14.421845] ret_from_fork+0x116/0x1d0 [ 14.421864] ? __pfx_kthread+0x10/0x10 [ 14.421885] ret_from_fork_asm+0x1a/0x30 [ 14.421918] </TASK> [ 14.421930] [ 14.429041] Allocated by task 282: [ 14.429237] kasan_save_stack+0x45/0x70 [ 14.429406] kasan_save_track+0x18/0x40 [ 14.429588] kasan_save_alloc_info+0x3b/0x50 [ 14.429749] __kasan_kmalloc+0xb7/0xc0 [ 14.429926] __kmalloc_cache_noprof+0x189/0x420 [ 14.430203] kasan_atomics+0x95/0x310 [ 14.430397] kunit_try_run_case+0x1a5/0x480 [ 14.430584] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.430873] kthread+0x337/0x6f0 [ 14.431031] ret_from_fork+0x116/0x1d0 [ 14.431203] ret_from_fork_asm+0x1a/0x30 [ 14.431359] [ 14.431447] The buggy address belongs to the object at ffff888102fa7d80 [ 14.431447] which belongs to the cache kmalloc-64 of size 64 [ 14.431949] The buggy address is located 0 bytes to the right of [ 14.431949] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 14.432447] [ 14.432549] The buggy address belongs to the physical page: [ 14.432801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 14.433127] flags: 0x200000000000000(node=0|zone=2) [ 14.433339] page_type: f5(slab) [ 14.433487] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.433834] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.434142] page dumped because: kasan: bad access detected [ 14.434362] [ 14.434456] Memory state around the buggy address: [ 14.434639] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.434863] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.435087] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.435352] ^ [ 14.435581] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.436093] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.436417] ================================================================== [ 13.545711] ================================================================== [ 13.546040] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 13.546392] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 13.546706] [ 13.546795] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.546839] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.546853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.546874] Call Trace: [ 13.546891] <TASK> [ 13.546907] dump_stack_lvl+0x73/0xb0 [ 13.546991] print_report+0xd1/0x650 [ 13.547015] ? __virt_addr_valid+0x1db/0x2d0 [ 13.547039] ? kasan_atomics_helper+0x72f/0x5450 [ 13.547061] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.547086] ? kasan_atomics_helper+0x72f/0x5450 [ 13.547110] kasan_report+0x141/0x180 [ 13.547133] ? kasan_atomics_helper+0x72f/0x5450 [ 13.547162] kasan_check_range+0x10c/0x1c0 [ 13.547187] __kasan_check_write+0x18/0x20 [ 13.547208] kasan_atomics_helper+0x72f/0x5450 [ 13.547232] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.547256] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.547279] ? kasan_atomics+0x152/0x310 [ 13.547303] kasan_atomics+0x1dc/0x310 [ 13.547323] ? __pfx_kasan_atomics+0x10/0x10 [ 13.547345] ? __pfx_read_tsc+0x10/0x10 [ 13.547367] ? ktime_get_ts64+0x86/0x230 [ 13.547393] kunit_try_run_case+0x1a5/0x480 [ 13.547415] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.547436] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.547461] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.547487] ? __kthread_parkme+0x82/0x180 [ 13.547508] ? preempt_count_sub+0x50/0x80 [ 13.547533] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.547556] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.547581] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.547607] kthread+0x337/0x6f0 [ 13.547639] ? trace_preempt_on+0x20/0xc0 [ 13.547662] ? __pfx_kthread+0x10/0x10 [ 13.547685] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.547708] ? calculate_sigpending+0x7b/0xa0 [ 13.547733] ? __pfx_kthread+0x10/0x10 [ 13.547755] ret_from_fork+0x116/0x1d0 [ 13.547775] ? __pfx_kthread+0x10/0x10 [ 13.547797] ret_from_fork_asm+0x1a/0x30 [ 13.547828] </TASK> [ 13.547840] [ 13.556055] Allocated by task 282: [ 13.556214] kasan_save_stack+0x45/0x70 [ 13.556422] kasan_save_track+0x18/0x40 [ 13.556592] kasan_save_alloc_info+0x3b/0x50 [ 13.556874] __kasan_kmalloc+0xb7/0xc0 [ 13.557055] __kmalloc_cache_noprof+0x189/0x420 [ 13.557229] kasan_atomics+0x95/0x310 [ 13.557367] kunit_try_run_case+0x1a5/0x480 [ 13.557518] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.557715] kthread+0x337/0x6f0 [ 13.557890] ret_from_fork+0x116/0x1d0 [ 13.558242] ret_from_fork_asm+0x1a/0x30 [ 13.558448] [ 13.558551] The buggy address belongs to the object at ffff888102fa7d80 [ 13.558551] which belongs to the cache kmalloc-64 of size 64 [ 13.559235] The buggy address is located 0 bytes to the right of [ 13.559235] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 13.560142] [ 13.560259] The buggy address belongs to the physical page: [ 13.560522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 13.560942] flags: 0x200000000000000(node=0|zone=2) [ 13.561153] page_type: f5(slab) [ 13.561318] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.561578] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.561872] page dumped because: kasan: bad access detected [ 13.562350] [ 13.562454] Memory state around the buggy address: [ 13.562677] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.563099] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.563375] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.563599] ^ [ 13.563849] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.564370] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.564830] ================================================================== [ 13.309911] ================================================================== [ 13.310165] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 13.310505] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 13.311115] [ 13.311390] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.311505] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.311519] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.311550] Call Trace: [ 13.311563] <TASK> [ 13.311578] dump_stack_lvl+0x73/0xb0 [ 13.311606] print_report+0xd1/0x650 [ 13.311638] ? __virt_addr_valid+0x1db/0x2d0 [ 13.311661] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.311683] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.311706] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.311728] kasan_report+0x141/0x180 [ 13.311751] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.311825] __asan_report_store4_noabort+0x1b/0x30 [ 13.311850] kasan_atomics_helper+0x4ba2/0x5450 [ 13.311873] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.311896] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.311918] ? kasan_atomics+0x152/0x310 [ 13.311941] kasan_atomics+0x1dc/0x310 [ 13.311961] ? __pfx_kasan_atomics+0x10/0x10 [ 13.311982] ? __pfx_read_tsc+0x10/0x10 [ 13.312003] ? ktime_get_ts64+0x86/0x230 [ 13.312027] kunit_try_run_case+0x1a5/0x480 [ 13.312050] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.312070] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.312097] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.312123] ? __kthread_parkme+0x82/0x180 [ 13.312144] ? preempt_count_sub+0x50/0x80 [ 13.312168] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.312189] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.312214] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.312239] kthread+0x337/0x6f0 [ 13.312259] ? trace_preempt_on+0x20/0xc0 [ 13.312282] ? __pfx_kthread+0x10/0x10 [ 13.312302] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.312326] ? calculate_sigpending+0x7b/0xa0 [ 13.312349] ? __pfx_kthread+0x10/0x10 [ 13.312371] ret_from_fork+0x116/0x1d0 [ 13.312390] ? __pfx_kthread+0x10/0x10 [ 13.312411] ret_from_fork_asm+0x1a/0x30 [ 13.312442] </TASK> [ 13.312452] [ 13.322112] Allocated by task 282: [ 13.322648] kasan_save_stack+0x45/0x70 [ 13.323104] kasan_save_track+0x18/0x40 [ 13.323290] kasan_save_alloc_info+0x3b/0x50 [ 13.323561] __kasan_kmalloc+0xb7/0xc0 [ 13.323709] __kmalloc_cache_noprof+0x189/0x420 [ 13.323862] kasan_atomics+0x95/0x310 [ 13.324007] kunit_try_run_case+0x1a5/0x480 [ 13.324267] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.324785] kthread+0x337/0x6f0 [ 13.324970] ret_from_fork+0x116/0x1d0 [ 13.325162] ret_from_fork_asm+0x1a/0x30 [ 13.325363] [ 13.325446] The buggy address belongs to the object at ffff888102fa7d80 [ 13.325446] which belongs to the cache kmalloc-64 of size 64 [ 13.326345] The buggy address is located 0 bytes to the right of [ 13.326345] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 13.327041] [ 13.327142] The buggy address belongs to the physical page: [ 13.327579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 13.328202] flags: 0x200000000000000(node=0|zone=2) [ 13.328401] page_type: f5(slab) [ 13.328574] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.328943] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.329326] page dumped because: kasan: bad access detected [ 13.329649] [ 13.329723] Memory state around the buggy address: [ 13.329945] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.330358] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.330856] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.331345] ^ [ 13.331639] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.332083] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.332414] ================================================================== [ 13.383864] ================================================================== [ 13.384115] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 13.384435] Read of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 13.385362] [ 13.385479] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.385526] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.385540] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.385563] Call Trace: [ 13.385578] <TASK> [ 13.385716] dump_stack_lvl+0x73/0xb0 [ 13.385749] print_report+0xd1/0x650 [ 13.385791] ? __virt_addr_valid+0x1db/0x2d0 [ 13.385815] ? kasan_atomics_helper+0x3df/0x5450 [ 13.385850] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.385874] ? kasan_atomics_helper+0x3df/0x5450 [ 13.385898] kasan_report+0x141/0x180 [ 13.385922] ? kasan_atomics_helper+0x3df/0x5450 [ 13.385949] kasan_check_range+0x10c/0x1c0 [ 13.385974] __kasan_check_read+0x15/0x20 [ 13.385995] kasan_atomics_helper+0x3df/0x5450 [ 13.386020] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.386044] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.386067] ? kasan_atomics+0x152/0x310 [ 13.386091] kasan_atomics+0x1dc/0x310 [ 13.386111] ? __pfx_kasan_atomics+0x10/0x10 [ 13.386135] ? __pfx_read_tsc+0x10/0x10 [ 13.386159] ? ktime_get_ts64+0x86/0x230 [ 13.386185] kunit_try_run_case+0x1a5/0x480 [ 13.386207] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.386228] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.386253] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.386279] ? __kthread_parkme+0x82/0x180 [ 13.386300] ? preempt_count_sub+0x50/0x80 [ 13.386326] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.386348] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.386374] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.386400] kthread+0x337/0x6f0 [ 13.386421] ? trace_preempt_on+0x20/0xc0 [ 13.386444] ? __pfx_kthread+0x10/0x10 [ 13.386467] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.386491] ? calculate_sigpending+0x7b/0xa0 [ 13.386515] ? __pfx_kthread+0x10/0x10 [ 13.386551] ret_from_fork+0x116/0x1d0 [ 13.386570] ? __pfx_kthread+0x10/0x10 [ 13.386592] ret_from_fork_asm+0x1a/0x30 [ 13.386634] </TASK> [ 13.386646] [ 13.399745] Allocated by task 282: [ 13.400074] kasan_save_stack+0x45/0x70 [ 13.400439] kasan_save_track+0x18/0x40 [ 13.400649] kasan_save_alloc_info+0x3b/0x50 [ 13.401035] __kasan_kmalloc+0xb7/0xc0 [ 13.401219] __kmalloc_cache_noprof+0x189/0x420 [ 13.401521] kasan_atomics+0x95/0x310 [ 13.401764] kunit_try_run_case+0x1a5/0x480 [ 13.402073] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.402500] kthread+0x337/0x6f0 [ 13.402759] ret_from_fork+0x116/0x1d0 [ 13.403079] ret_from_fork_asm+0x1a/0x30 [ 13.403279] [ 13.403454] The buggy address belongs to the object at ffff888102fa7d80 [ 13.403454] which belongs to the cache kmalloc-64 of size 64 [ 13.404206] The buggy address is located 0 bytes to the right of [ 13.404206] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 13.404762] [ 13.404971] The buggy address belongs to the physical page: [ 13.405363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 13.405892] flags: 0x200000000000000(node=0|zone=2) [ 13.406220] page_type: f5(slab) [ 13.406523] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.406990] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.407530] page dumped because: kasan: bad access detected [ 13.407831] [ 13.407925] Memory state around the buggy address: [ 13.408160] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.408745] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.409194] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.409535] ^ [ 13.409745] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.410424] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.410717] ================================================================== [ 13.641080] ================================================================== [ 13.641413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 13.641787] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 13.642207] [ 13.642305] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.642352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.642366] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.642388] Call Trace: [ 13.642403] <TASK> [ 13.642420] dump_stack_lvl+0x73/0xb0 [ 13.642448] print_report+0xd1/0x650 [ 13.642471] ? __virt_addr_valid+0x1db/0x2d0 [ 13.642495] ? kasan_atomics_helper+0x992/0x5450 [ 13.642517] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.642545] ? kasan_atomics_helper+0x992/0x5450 [ 13.642569] kasan_report+0x141/0x180 [ 13.642592] ? kasan_atomics_helper+0x992/0x5450 [ 13.642630] kasan_check_range+0x10c/0x1c0 [ 13.642656] __kasan_check_write+0x18/0x20 [ 13.642677] kasan_atomics_helper+0x992/0x5450 [ 13.642702] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.642725] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.642748] ? kasan_atomics+0x152/0x310 [ 13.642997] kasan_atomics+0x1dc/0x310 [ 13.643020] ? __pfx_kasan_atomics+0x10/0x10 [ 13.643043] ? __pfx_read_tsc+0x10/0x10 [ 13.643066] ? ktime_get_ts64+0x86/0x230 [ 13.643093] kunit_try_run_case+0x1a5/0x480 [ 13.643115] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.643136] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.643162] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.643188] ? __kthread_parkme+0x82/0x180 [ 13.643210] ? preempt_count_sub+0x50/0x80 [ 13.643236] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.643259] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.643285] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.643311] kthread+0x337/0x6f0 [ 13.643332] ? trace_preempt_on+0x20/0xc0 [ 13.643355] ? __pfx_kthread+0x10/0x10 [ 13.643377] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.643401] ? calculate_sigpending+0x7b/0xa0 [ 13.643426] ? __pfx_kthread+0x10/0x10 [ 13.643449] ret_from_fork+0x116/0x1d0 [ 13.643469] ? __pfx_kthread+0x10/0x10 [ 13.643491] ret_from_fork_asm+0x1a/0x30 [ 13.643522] </TASK> [ 13.643534] [ 13.655715] Allocated by task 282: [ 13.656403] kasan_save_stack+0x45/0x70 [ 13.657049] kasan_save_track+0x18/0x40 [ 13.657548] kasan_save_alloc_info+0x3b/0x50 [ 13.658187] __kasan_kmalloc+0xb7/0xc0 [ 13.658690] __kmalloc_cache_noprof+0x189/0x420 [ 13.659203] kasan_atomics+0x95/0x310 [ 13.659352] kunit_try_run_case+0x1a5/0x480 [ 13.659508] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.659710] kthread+0x337/0x6f0 [ 13.660179] ret_from_fork+0x116/0x1d0 [ 13.660568] ret_from_fork_asm+0x1a/0x30 [ 13.661220] [ 13.661394] The buggy address belongs to the object at ffff888102fa7d80 [ 13.661394] which belongs to the cache kmalloc-64 of size 64 [ 13.662530] The buggy address is located 0 bytes to the right of [ 13.662530] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 13.663652] [ 13.663736] The buggy address belongs to the physical page: [ 13.664336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 13.665425] flags: 0x200000000000000(node=0|zone=2) [ 13.665619] page_type: f5(slab) [ 13.665748] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.665988] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.666235] page dumped because: kasan: bad access detected [ 13.666418] [ 13.666492] Memory state around the buggy address: [ 13.666667] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.667268] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.668011] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.668635] ^ [ 13.669237] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.669941] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.670572] ================================================================== [ 14.341484] ================================================================== [ 14.341944] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 14.342324] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 14.342723] [ 14.342818] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 14.342862] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.342875] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.342897] Call Trace: [ 14.342912] <TASK> [ 14.342926] dump_stack_lvl+0x73/0xb0 [ 14.342951] print_report+0xd1/0x650 [ 14.342974] ? __virt_addr_valid+0x1db/0x2d0 [ 14.342997] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.343020] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.343045] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.343068] kasan_report+0x141/0x180 [ 14.343091] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.343119] kasan_check_range+0x10c/0x1c0 [ 14.343145] __kasan_check_write+0x18/0x20 [ 14.343165] kasan_atomics_helper+0x19e3/0x5450 [ 14.343190] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.343214] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.343236] ? kasan_atomics+0x152/0x310 [ 14.343260] kasan_atomics+0x1dc/0x310 [ 14.343280] ? __pfx_kasan_atomics+0x10/0x10 [ 14.343302] ? __pfx_read_tsc+0x10/0x10 [ 14.343323] ? ktime_get_ts64+0x86/0x230 [ 14.343349] kunit_try_run_case+0x1a5/0x480 [ 14.343371] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.343392] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.343417] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.343443] ? __kthread_parkme+0x82/0x180 [ 14.343465] ? preempt_count_sub+0x50/0x80 [ 14.343489] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.343512] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.343539] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.343565] kthread+0x337/0x6f0 [ 14.343585] ? trace_preempt_on+0x20/0xc0 [ 14.343622] ? __pfx_kthread+0x10/0x10 [ 14.343645] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.343669] ? calculate_sigpending+0x7b/0xa0 [ 14.343693] ? __pfx_kthread+0x10/0x10 [ 14.343716] ret_from_fork+0x116/0x1d0 [ 14.343737] ? __pfx_kthread+0x10/0x10 [ 14.343760] ret_from_fork_asm+0x1a/0x30 [ 14.343804] </TASK> [ 14.343815] [ 14.351451] Allocated by task 282: [ 14.351622] kasan_save_stack+0x45/0x70 [ 14.351846] kasan_save_track+0x18/0x40 [ 14.351999] kasan_save_alloc_info+0x3b/0x50 [ 14.352212] __kasan_kmalloc+0xb7/0xc0 [ 14.352385] __kmalloc_cache_noprof+0x189/0x420 [ 14.352546] kasan_atomics+0x95/0x310 [ 14.352694] kunit_try_run_case+0x1a5/0x480 [ 14.352845] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.353029] kthread+0x337/0x6f0 [ 14.353156] ret_from_fork+0x116/0x1d0 [ 14.353296] ret_from_fork_asm+0x1a/0x30 [ 14.353440] [ 14.353516] The buggy address belongs to the object at ffff888102fa7d80 [ 14.353516] which belongs to the cache kmalloc-64 of size 64 [ 14.354189] The buggy address is located 0 bytes to the right of [ 14.354189] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 14.354777] [ 14.354877] The buggy address belongs to the physical page: [ 14.355134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 14.355451] flags: 0x200000000000000(node=0|zone=2) [ 14.355628] page_type: f5(slab) [ 14.355752] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.355990] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.356223] page dumped because: kasan: bad access detected [ 14.356401] [ 14.356474] Memory state around the buggy address: [ 14.356722] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.357402] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.357742] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.358073] ^ [ 14.358304] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.358657] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.359121] ================================================================== [ 14.088896] ================================================================== [ 14.089336] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 14.089781] Read of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 14.090250] [ 14.090435] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 14.090481] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.090494] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.090516] Call Trace: [ 14.090538] <TASK> [ 14.090553] dump_stack_lvl+0x73/0xb0 [ 14.090578] print_report+0xd1/0x650 [ 14.090602] ? __virt_addr_valid+0x1db/0x2d0 [ 14.090636] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.090660] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.090684] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.090707] kasan_report+0x141/0x180 [ 14.090731] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.090796] kasan_check_range+0x10c/0x1c0 [ 14.090821] __kasan_check_read+0x15/0x20 [ 14.090842] kasan_atomics_helper+0x13b5/0x5450 [ 14.090867] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.090891] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.090913] ? kasan_atomics+0x152/0x310 [ 14.090938] kasan_atomics+0x1dc/0x310 [ 14.090959] ? __pfx_kasan_atomics+0x10/0x10 [ 14.090981] ? __pfx_read_tsc+0x10/0x10 [ 14.091004] ? ktime_get_ts64+0x86/0x230 [ 14.091030] kunit_try_run_case+0x1a5/0x480 [ 14.091053] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.091074] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.091100] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.091126] ? __kthread_parkme+0x82/0x180 [ 14.091149] ? preempt_count_sub+0x50/0x80 [ 14.091174] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.091196] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.091221] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.091248] kthread+0x337/0x6f0 [ 14.091269] ? trace_preempt_on+0x20/0xc0 [ 14.091292] ? __pfx_kthread+0x10/0x10 [ 14.091314] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.091338] ? calculate_sigpending+0x7b/0xa0 [ 14.091363] ? __pfx_kthread+0x10/0x10 [ 14.091386] ret_from_fork+0x116/0x1d0 [ 14.091406] ? __pfx_kthread+0x10/0x10 [ 14.091428] ret_from_fork_asm+0x1a/0x30 [ 14.091459] </TASK> [ 14.091470] [ 14.099412] Allocated by task 282: [ 14.099646] kasan_save_stack+0x45/0x70 [ 14.099989] kasan_save_track+0x18/0x40 [ 14.100192] kasan_save_alloc_info+0x3b/0x50 [ 14.100408] __kasan_kmalloc+0xb7/0xc0 [ 14.100618] __kmalloc_cache_noprof+0x189/0x420 [ 14.100842] kasan_atomics+0x95/0x310 [ 14.101002] kunit_try_run_case+0x1a5/0x480 [ 14.101188] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.101446] kthread+0x337/0x6f0 [ 14.101628] ret_from_fork+0x116/0x1d0 [ 14.101869] ret_from_fork_asm+0x1a/0x30 [ 14.102036] [ 14.102139] The buggy address belongs to the object at ffff888102fa7d80 [ 14.102139] which belongs to the cache kmalloc-64 of size 64 [ 14.102622] The buggy address is located 0 bytes to the right of [ 14.102622] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 14.103017] [ 14.103094] The buggy address belongs to the physical page: [ 14.103274] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 14.103527] flags: 0x200000000000000(node=0|zone=2) [ 14.103815] page_type: f5(slab) [ 14.103991] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.104342] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.104690] page dumped because: kasan: bad access detected [ 14.104970] [ 14.105146] Memory state around the buggy address: [ 14.105424] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.105942] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.106521] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.106804] ^ [ 14.107032] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.107422] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.107656] ================================================================== [ 13.695228] ================================================================== [ 13.695512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 13.695856] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 13.696209] [ 13.696302] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.696350] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.696364] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.696385] Call Trace: [ 13.696400] <TASK> [ 13.696417] dump_stack_lvl+0x73/0xb0 [ 13.696443] print_report+0xd1/0x650 [ 13.696468] ? __virt_addr_valid+0x1db/0x2d0 [ 13.696492] ? kasan_atomics_helper+0xac7/0x5450 [ 13.696515] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.696539] ? kasan_atomics_helper+0xac7/0x5450 [ 13.696563] kasan_report+0x141/0x180 [ 13.696587] ? kasan_atomics_helper+0xac7/0x5450 [ 13.696627] kasan_check_range+0x10c/0x1c0 [ 13.696653] __kasan_check_write+0x18/0x20 [ 13.696674] kasan_atomics_helper+0xac7/0x5450 [ 13.696698] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.696723] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.696745] ? kasan_atomics+0x152/0x310 [ 13.696770] kasan_atomics+0x1dc/0x310 [ 13.696790] ? __pfx_kasan_atomics+0x10/0x10 [ 13.696811] ? __pfx_read_tsc+0x10/0x10 [ 13.696834] ? ktime_get_ts64+0x86/0x230 [ 13.696860] kunit_try_run_case+0x1a5/0x480 [ 13.696881] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.696902] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.696928] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.696954] ? __kthread_parkme+0x82/0x180 [ 13.696976] ? preempt_count_sub+0x50/0x80 [ 13.697000] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.697023] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.697048] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.697075] kthread+0x337/0x6f0 [ 13.697096] ? trace_preempt_on+0x20/0xc0 [ 13.697119] ? __pfx_kthread+0x10/0x10 [ 13.697141] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.697164] ? calculate_sigpending+0x7b/0xa0 [ 13.697189] ? __pfx_kthread+0x10/0x10 [ 13.697229] ret_from_fork+0x116/0x1d0 [ 13.697249] ? __pfx_kthread+0x10/0x10 [ 13.697271] ret_from_fork_asm+0x1a/0x30 [ 13.697303] </TASK> [ 13.697314] [ 13.705814] Allocated by task 282: [ 13.705998] kasan_save_stack+0x45/0x70 [ 13.706176] kasan_save_track+0x18/0x40 [ 13.706321] kasan_save_alloc_info+0x3b/0x50 [ 13.706474] __kasan_kmalloc+0xb7/0xc0 [ 13.706686] __kmalloc_cache_noprof+0x189/0x420 [ 13.706915] kasan_atomics+0x95/0x310 [ 13.707242] kunit_try_run_case+0x1a5/0x480 [ 13.707553] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.707750] kthread+0x337/0x6f0 [ 13.707878] ret_from_fork+0x116/0x1d0 [ 13.708074] ret_from_fork_asm+0x1a/0x30 [ 13.708429] [ 13.708845] The buggy address belongs to the object at ffff888102fa7d80 [ 13.708845] which belongs to the cache kmalloc-64 of size 64 [ 13.709386] The buggy address is located 0 bytes to the right of [ 13.709386] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 13.710020] [ 13.710114] The buggy address belongs to the physical page: [ 13.710354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 13.710680] flags: 0x200000000000000(node=0|zone=2) [ 13.710975] page_type: f5(slab) [ 13.711099] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.711340] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.711574] page dumped because: kasan: bad access detected [ 13.711836] [ 13.711936] Memory state around the buggy address: [ 13.712165] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.712490] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.713081] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.713313] ^ [ 13.713484] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.713950] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.714277] ================================================================== [ 13.806445] ================================================================== [ 13.806985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 13.807601] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 13.808437] [ 13.808843] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.808900] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.808915] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.808938] Call Trace: [ 13.808954] <TASK> [ 13.808970] dump_stack_lvl+0x73/0xb0 [ 13.809046] print_report+0xd1/0x650 [ 13.809071] ? __virt_addr_valid+0x1db/0x2d0 [ 13.809095] ? kasan_atomics_helper+0xd47/0x5450 [ 13.809117] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.809141] ? kasan_atomics_helper+0xd47/0x5450 [ 13.809164] kasan_report+0x141/0x180 [ 13.809188] ? kasan_atomics_helper+0xd47/0x5450 [ 13.809216] kasan_check_range+0x10c/0x1c0 [ 13.809241] __kasan_check_write+0x18/0x20 [ 13.809263] kasan_atomics_helper+0xd47/0x5450 [ 13.809287] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.809311] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.809333] ? kasan_atomics+0x152/0x310 [ 13.809357] kasan_atomics+0x1dc/0x310 [ 13.809377] ? __pfx_kasan_atomics+0x10/0x10 [ 13.809398] ? __pfx_read_tsc+0x10/0x10 [ 13.809420] ? ktime_get_ts64+0x86/0x230 [ 13.809445] kunit_try_run_case+0x1a5/0x480 [ 13.809468] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.809488] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.809513] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.809540] ? __kthread_parkme+0x82/0x180 [ 13.809560] ? preempt_count_sub+0x50/0x80 [ 13.809586] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.809619] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.809645] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.809671] kthread+0x337/0x6f0 [ 13.809692] ? trace_preempt_on+0x20/0xc0 [ 13.809714] ? __pfx_kthread+0x10/0x10 [ 13.809736] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.809767] ? calculate_sigpending+0x7b/0xa0 [ 13.809791] ? __pfx_kthread+0x10/0x10 [ 13.809832] ret_from_fork+0x116/0x1d0 [ 13.809854] ? __pfx_kthread+0x10/0x10 [ 13.809879] ret_from_fork_asm+0x1a/0x30 [ 13.809911] </TASK> [ 13.809923] [ 13.820288] Allocated by task 282: [ 13.820436] kasan_save_stack+0x45/0x70 [ 13.820661] kasan_save_track+0x18/0x40 [ 13.820862] kasan_save_alloc_info+0x3b/0x50 [ 13.821078] __kasan_kmalloc+0xb7/0xc0 [ 13.821453] __kmalloc_cache_noprof+0x189/0x420 [ 13.821706] kasan_atomics+0x95/0x310 [ 13.822012] kunit_try_run_case+0x1a5/0x480 [ 13.822173] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.822443] kthread+0x337/0x6f0 [ 13.822642] ret_from_fork+0x116/0x1d0 [ 13.822932] ret_from_fork_asm+0x1a/0x30 [ 13.823102] [ 13.823206] The buggy address belongs to the object at ffff888102fa7d80 [ 13.823206] which belongs to the cache kmalloc-64 of size 64 [ 13.823707] The buggy address is located 0 bytes to the right of [ 13.823707] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 13.824391] [ 13.824497] The buggy address belongs to the physical page: [ 13.824708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 13.824960] flags: 0x200000000000000(node=0|zone=2) [ 13.825204] page_type: f5(slab) [ 13.825533] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.825890] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.826275] page dumped because: kasan: bad access detected [ 13.826455] [ 13.826529] Memory state around the buggy address: [ 13.827018] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.827368] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.827709] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.828085] ^ [ 13.828294] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.828585] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.828920] ================================================================== [ 13.332906] ================================================================== [ 13.333146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 13.333470] Read of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 13.334430] [ 13.334530] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.334668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.334681] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.334703] Call Trace: [ 13.334718] <TASK> [ 13.334734] dump_stack_lvl+0x73/0xb0 [ 13.334776] print_report+0xd1/0x650 [ 13.334799] ? __virt_addr_valid+0x1db/0x2d0 [ 13.334823] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.334846] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.334870] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.334893] kasan_report+0x141/0x180 [ 13.334917] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.335016] __asan_report_load4_noabort+0x18/0x20 [ 13.335041] kasan_atomics_helper+0x4b88/0x5450 [ 13.335064] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.335087] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.335109] ? kasan_atomics+0x152/0x310 [ 13.335132] kasan_atomics+0x1dc/0x310 [ 13.335151] ? __pfx_kasan_atomics+0x10/0x10 [ 13.335172] ? __pfx_read_tsc+0x10/0x10 [ 13.335194] ? ktime_get_ts64+0x86/0x230 [ 13.335218] kunit_try_run_case+0x1a5/0x480 [ 13.335239] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.335259] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.335283] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.335308] ? __kthread_parkme+0x82/0x180 [ 13.335328] ? preempt_count_sub+0x50/0x80 [ 13.335352] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.335373] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.335398] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.335423] kthread+0x337/0x6f0 [ 13.335442] ? trace_preempt_on+0x20/0xc0 [ 13.335467] ? __pfx_kthread+0x10/0x10 [ 13.335488] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.335512] ? calculate_sigpending+0x7b/0xa0 [ 13.335537] ? __pfx_kthread+0x10/0x10 [ 13.335559] ret_from_fork+0x116/0x1d0 [ 13.335577] ? __pfx_kthread+0x10/0x10 [ 13.335598] ret_from_fork_asm+0x1a/0x30 [ 13.335640] </TASK> [ 13.335650] [ 13.346804] Allocated by task 282: [ 13.347057] kasan_save_stack+0x45/0x70 [ 13.347363] kasan_save_track+0x18/0x40 [ 13.347644] kasan_save_alloc_info+0x3b/0x50 [ 13.347981] __kasan_kmalloc+0xb7/0xc0 [ 13.348140] __kmalloc_cache_noprof+0x189/0x420 [ 13.348372] kasan_atomics+0x95/0x310 [ 13.348541] kunit_try_run_case+0x1a5/0x480 [ 13.348760] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.349383] kthread+0x337/0x6f0 [ 13.349564] ret_from_fork+0x116/0x1d0 [ 13.349745] ret_from_fork_asm+0x1a/0x30 [ 13.350228] [ 13.350310] The buggy address belongs to the object at ffff888102fa7d80 [ 13.350310] which belongs to the cache kmalloc-64 of size 64 [ 13.351012] The buggy address is located 0 bytes to the right of [ 13.351012] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 13.351731] [ 13.352013] The buggy address belongs to the physical page: [ 13.352228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 13.352600] flags: 0x200000000000000(node=0|zone=2) [ 13.352870] page_type: f5(slab) [ 13.353018] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.353359] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.354218] page dumped because: kasan: bad access detected [ 13.354575] [ 13.354693] Memory state around the buggy address: [ 13.355142] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.355463] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.355988] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.356407] ^ [ 13.356734] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.357226] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.357544] ================================================================== [ 14.395344] ================================================================== [ 14.395627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 14.396168] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 14.396453] [ 14.396566] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 14.396618] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.396631] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.396653] Call Trace: [ 14.396667] <TASK> [ 14.396682] dump_stack_lvl+0x73/0xb0 [ 14.396707] print_report+0xd1/0x650 [ 14.396731] ? __virt_addr_valid+0x1db/0x2d0 [ 14.396754] ? kasan_atomics_helper+0x1c18/0x5450 [ 14.396788] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.396812] ? kasan_atomics_helper+0x1c18/0x5450 [ 14.396836] kasan_report+0x141/0x180 [ 14.396860] ? kasan_atomics_helper+0x1c18/0x5450 [ 14.396888] kasan_check_range+0x10c/0x1c0 [ 14.396914] __kasan_check_write+0x18/0x20 [ 14.396936] kasan_atomics_helper+0x1c18/0x5450 [ 14.396960] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.396985] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.397008] ? kasan_atomics+0x152/0x310 [ 14.397033] kasan_atomics+0x1dc/0x310 [ 14.397057] ? __pfx_kasan_atomics+0x10/0x10 [ 14.397081] ? __pfx_read_tsc+0x10/0x10 [ 14.397105] ? ktime_get_ts64+0x86/0x230 [ 14.397131] kunit_try_run_case+0x1a5/0x480 [ 14.397153] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.397175] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.397201] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.397228] ? __kthread_parkme+0x82/0x180 [ 14.397250] ? preempt_count_sub+0x50/0x80 [ 14.397275] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.397298] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.397326] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.397352] kthread+0x337/0x6f0 [ 14.397372] ? trace_preempt_on+0x20/0xc0 [ 14.397396] ? __pfx_kthread+0x10/0x10 [ 14.397419] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.397442] ? calculate_sigpending+0x7b/0xa0 [ 14.397467] ? __pfx_kthread+0x10/0x10 [ 14.397491] ret_from_fork+0x116/0x1d0 [ 14.397511] ? __pfx_kthread+0x10/0x10 [ 14.397533] ret_from_fork_asm+0x1a/0x30 [ 14.397565] </TASK> [ 14.397576] [ 14.407592] Allocated by task 282: [ 14.408021] kasan_save_stack+0x45/0x70 [ 14.408281] kasan_save_track+0x18/0x40 [ 14.408589] kasan_save_alloc_info+0x3b/0x50 [ 14.409066] __kasan_kmalloc+0xb7/0xc0 [ 14.409268] __kmalloc_cache_noprof+0x189/0x420 [ 14.409467] kasan_atomics+0x95/0x310 [ 14.409653] kunit_try_run_case+0x1a5/0x480 [ 14.410038] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.410458] kthread+0x337/0x6f0 [ 14.410771] ret_from_fork+0x116/0x1d0 [ 14.411191] ret_from_fork_asm+0x1a/0x30 [ 14.411415] [ 14.411512] The buggy address belongs to the object at ffff888102fa7d80 [ 14.411512] which belongs to the cache kmalloc-64 of size 64 [ 14.412337] The buggy address is located 0 bytes to the right of [ 14.412337] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 14.413119] [ 14.413223] The buggy address belongs to the physical page: [ 14.413464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 14.414060] flags: 0x200000000000000(node=0|zone=2) [ 14.414332] page_type: f5(slab) [ 14.414740] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.415222] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.415676] page dumped because: kasan: bad access detected [ 14.416104] [ 14.416331] Memory state around the buggy address: [ 14.416679] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.417151] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.417458] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.417749] ^ [ 14.418238] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.418735] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.419246] ================================================================== [ 14.483352] ================================================================== [ 14.483631] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 14.483994] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 14.484306] [ 14.484427] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 14.484474] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.484488] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.484510] Call Trace: [ 14.484525] <TASK> [ 14.484541] dump_stack_lvl+0x73/0xb0 [ 14.484567] print_report+0xd1/0x650 [ 14.484591] ? __virt_addr_valid+0x1db/0x2d0 [ 14.484625] ? kasan_atomics_helper+0x1e12/0x5450 [ 14.484648] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.484673] ? kasan_atomics_helper+0x1e12/0x5450 [ 14.484696] kasan_report+0x141/0x180 [ 14.484719] ? kasan_atomics_helper+0x1e12/0x5450 [ 14.484747] kasan_check_range+0x10c/0x1c0 [ 14.484772] __kasan_check_write+0x18/0x20 [ 14.484793] kasan_atomics_helper+0x1e12/0x5450 [ 14.484818] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.484844] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.484866] ? kasan_atomics+0x152/0x310 [ 14.484891] kasan_atomics+0x1dc/0x310 [ 14.484911] ? __pfx_kasan_atomics+0x10/0x10 [ 14.484934] ? __pfx_read_tsc+0x10/0x10 [ 14.484955] ? ktime_get_ts64+0x86/0x230 [ 14.484981] kunit_try_run_case+0x1a5/0x480 [ 14.485002] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.485023] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.485048] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.485074] ? __kthread_parkme+0x82/0x180 [ 14.485096] ? preempt_count_sub+0x50/0x80 [ 14.485121] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.485143] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.485169] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.485196] kthread+0x337/0x6f0 [ 14.485216] ? trace_preempt_on+0x20/0xc0 [ 14.485240] ? __pfx_kthread+0x10/0x10 [ 14.485261] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.485285] ? calculate_sigpending+0x7b/0xa0 [ 14.485309] ? __pfx_kthread+0x10/0x10 [ 14.485332] ret_from_fork+0x116/0x1d0 [ 14.485351] ? __pfx_kthread+0x10/0x10 [ 14.485373] ret_from_fork_asm+0x1a/0x30 [ 14.485403] </TASK> [ 14.485414] [ 14.494864] Allocated by task 282: [ 14.495061] kasan_save_stack+0x45/0x70 [ 14.495273] kasan_save_track+0x18/0x40 [ 14.495473] kasan_save_alloc_info+0x3b/0x50 [ 14.495648] __kasan_kmalloc+0xb7/0xc0 [ 14.495798] __kmalloc_cache_noprof+0x189/0x420 [ 14.496044] kasan_atomics+0x95/0x310 [ 14.496233] kunit_try_run_case+0x1a5/0x480 [ 14.496430] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.496625] kthread+0x337/0x6f0 [ 14.496750] ret_from_fork+0x116/0x1d0 [ 14.496942] ret_from_fork_asm+0x1a/0x30 [ 14.497225] [ 14.497324] The buggy address belongs to the object at ffff888102fa7d80 [ 14.497324] which belongs to the cache kmalloc-64 of size 64 [ 14.497803] The buggy address is located 0 bytes to the right of [ 14.497803] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 14.498711] [ 14.498833] The buggy address belongs to the physical page: [ 14.499096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 14.499531] flags: 0x200000000000000(node=0|zone=2) [ 14.499827] page_type: f5(slab) [ 14.500042] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.500366] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.500735] page dumped because: kasan: bad access detected [ 14.501019] [ 14.501090] Memory state around the buggy address: [ 14.501249] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.501572] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.501921] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.502184] ^ [ 14.502345] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.502617] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.503150] ================================================================== [ 13.910397] ================================================================== [ 13.910913] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 13.911237] Read of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 13.911525] [ 13.911655] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.911703] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.911717] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.911917] Call Trace: [ 13.911940] <TASK> [ 13.911957] dump_stack_lvl+0x73/0xb0 [ 13.911986] print_report+0xd1/0x650 [ 13.912010] ? __virt_addr_valid+0x1db/0x2d0 [ 13.912033] ? kasan_atomics_helper+0x4a36/0x5450 [ 13.912056] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.912080] ? kasan_atomics_helper+0x4a36/0x5450 [ 13.912104] kasan_report+0x141/0x180 [ 13.912128] ? kasan_atomics_helper+0x4a36/0x5450 [ 13.912156] __asan_report_load4_noabort+0x18/0x20 [ 13.912179] kasan_atomics_helper+0x4a36/0x5450 [ 13.912203] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.912228] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.912250] ? kasan_atomics+0x152/0x310 [ 13.912275] kasan_atomics+0x1dc/0x310 [ 13.912295] ? __pfx_kasan_atomics+0x10/0x10 [ 13.912317] ? __pfx_read_tsc+0x10/0x10 [ 13.912339] ? ktime_get_ts64+0x86/0x230 [ 13.912365] kunit_try_run_case+0x1a5/0x480 [ 13.912387] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.912408] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.912434] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.912461] ? __kthread_parkme+0x82/0x180 [ 13.912483] ? preempt_count_sub+0x50/0x80 [ 13.912507] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.912531] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.912556] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.912583] kthread+0x337/0x6f0 [ 13.912604] ? trace_preempt_on+0x20/0xc0 [ 13.912645] ? __pfx_kthread+0x10/0x10 [ 13.912667] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.912691] ? calculate_sigpending+0x7b/0xa0 [ 13.912717] ? __pfx_kthread+0x10/0x10 [ 13.912838] ret_from_fork+0x116/0x1d0 [ 13.912864] ? __pfx_kthread+0x10/0x10 [ 13.912886] ret_from_fork_asm+0x1a/0x30 [ 13.912919] </TASK> [ 13.912931] [ 13.921508] Allocated by task 282: [ 13.921713] kasan_save_stack+0x45/0x70 [ 13.922001] kasan_save_track+0x18/0x40 [ 13.922207] kasan_save_alloc_info+0x3b/0x50 [ 13.922373] __kasan_kmalloc+0xb7/0xc0 [ 13.922585] __kmalloc_cache_noprof+0x189/0x420 [ 13.922949] kasan_atomics+0x95/0x310 [ 13.923150] kunit_try_run_case+0x1a5/0x480 [ 13.923365] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.923597] kthread+0x337/0x6f0 [ 13.924031] ret_from_fork+0x116/0x1d0 [ 13.924235] ret_from_fork_asm+0x1a/0x30 [ 13.924457] [ 13.924544] The buggy address belongs to the object at ffff888102fa7d80 [ 13.924544] which belongs to the cache kmalloc-64 of size 64 [ 13.925220] The buggy address is located 0 bytes to the right of [ 13.925220] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 13.925851] [ 13.925982] The buggy address belongs to the physical page: [ 13.926269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 13.926569] flags: 0x200000000000000(node=0|zone=2) [ 13.926964] page_type: f5(slab) [ 13.927162] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.927396] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.927973] page dumped because: kasan: bad access detected [ 13.928233] [ 13.928307] Memory state around the buggy address: [ 13.928501] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.928826] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.929111] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.929879] ^ [ 13.930108] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.930329] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.930550] ================================================================== [ 13.436926] ================================================================== [ 13.437264] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 13.438264] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 13.438556] [ 13.438661] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.438707] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.438721] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.438744] Call Trace: [ 13.439119] <TASK> [ 13.439140] dump_stack_lvl+0x73/0xb0 [ 13.439172] print_report+0xd1/0x650 [ 13.439196] ? __virt_addr_valid+0x1db/0x2d0 [ 13.439220] ? kasan_atomics_helper+0x4a0/0x5450 [ 13.439243] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.439268] ? kasan_atomics_helper+0x4a0/0x5450 [ 13.439290] kasan_report+0x141/0x180 [ 13.439315] ? kasan_atomics_helper+0x4a0/0x5450 [ 13.439342] kasan_check_range+0x10c/0x1c0 [ 13.439367] __kasan_check_write+0x18/0x20 [ 13.439389] kasan_atomics_helper+0x4a0/0x5450 [ 13.439413] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.439439] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.439461] ? kasan_atomics+0x152/0x310 [ 13.439485] kasan_atomics+0x1dc/0x310 [ 13.439506] ? __pfx_kasan_atomics+0x10/0x10 [ 13.439528] ? __pfx_read_tsc+0x10/0x10 [ 13.439550] ? ktime_get_ts64+0x86/0x230 [ 13.439575] kunit_try_run_case+0x1a5/0x480 [ 13.439598] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.439633] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.439660] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.439686] ? __kthread_parkme+0x82/0x180 [ 13.439709] ? preempt_count_sub+0x50/0x80 [ 13.439734] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.439830] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.439860] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.439887] kthread+0x337/0x6f0 [ 13.439908] ? trace_preempt_on+0x20/0xc0 [ 13.439933] ? __pfx_kthread+0x10/0x10 [ 13.439955] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.439979] ? calculate_sigpending+0x7b/0xa0 [ 13.440004] ? __pfx_kthread+0x10/0x10 [ 13.440027] ret_from_fork+0x116/0x1d0 [ 13.440047] ? __pfx_kthread+0x10/0x10 [ 13.440069] ret_from_fork_asm+0x1a/0x30 [ 13.440101] </TASK> [ 13.440114] [ 13.451451] Allocated by task 282: [ 13.451842] kasan_save_stack+0x45/0x70 [ 13.452214] kasan_save_track+0x18/0x40 [ 13.452408] kasan_save_alloc_info+0x3b/0x50 [ 13.452627] __kasan_kmalloc+0xb7/0xc0 [ 13.453031] __kmalloc_cache_noprof+0x189/0x420 [ 13.453257] kasan_atomics+0x95/0x310 [ 13.453568] kunit_try_run_case+0x1a5/0x480 [ 13.453793] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.454370] kthread+0x337/0x6f0 [ 13.454551] ret_from_fork+0x116/0x1d0 [ 13.454955] ret_from_fork_asm+0x1a/0x30 [ 13.455313] [ 13.455422] The buggy address belongs to the object at ffff888102fa7d80 [ 13.455422] which belongs to the cache kmalloc-64 of size 64 [ 13.456225] The buggy address is located 0 bytes to the right of [ 13.456225] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 13.457014] [ 13.457109] The buggy address belongs to the physical page: [ 13.457359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 13.457833] flags: 0x200000000000000(node=0|zone=2) [ 13.458055] page_type: f5(slab) [ 13.458274] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.458995] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.459337] page dumped because: kasan: bad access detected [ 13.459581] [ 13.459678] Memory state around the buggy address: [ 13.460190] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.460560] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.461029] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.461409] ^ [ 13.461621] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.462295] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.462574] ================================================================== [ 13.463407] ================================================================== [ 13.463812] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 13.464122] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 13.464428] [ 13.464534] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.464580] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.464593] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.464627] Call Trace: [ 13.464643] <TASK> [ 13.464659] dump_stack_lvl+0x73/0xb0 [ 13.464685] print_report+0xd1/0x650 [ 13.464707] ? __virt_addr_valid+0x1db/0x2d0 [ 13.464731] ? kasan_atomics_helper+0x4b3a/0x5450 [ 13.464820] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.464847] ? kasan_atomics_helper+0x4b3a/0x5450 [ 13.464871] kasan_report+0x141/0x180 [ 13.464895] ? kasan_atomics_helper+0x4b3a/0x5450 [ 13.464931] __asan_report_store4_noabort+0x1b/0x30 [ 13.464953] kasan_atomics_helper+0x4b3a/0x5450 [ 13.464977] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.465002] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.465025] ? kasan_atomics+0x152/0x310 [ 13.465048] kasan_atomics+0x1dc/0x310 [ 13.465069] ? __pfx_kasan_atomics+0x10/0x10 [ 13.465090] ? __pfx_read_tsc+0x10/0x10 [ 13.465113] ? ktime_get_ts64+0x86/0x230 [ 13.465139] kunit_try_run_case+0x1a5/0x480 [ 13.465163] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.465184] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.465209] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.465236] ? __kthread_parkme+0x82/0x180 [ 13.465257] ? preempt_count_sub+0x50/0x80 [ 13.465282] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.465305] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.465329] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.465356] kthread+0x337/0x6f0 [ 13.465377] ? trace_preempt_on+0x20/0xc0 [ 13.465401] ? __pfx_kthread+0x10/0x10 [ 13.465423] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.465447] ? calculate_sigpending+0x7b/0xa0 [ 13.465472] ? __pfx_kthread+0x10/0x10 [ 13.465495] ret_from_fork+0x116/0x1d0 [ 13.465514] ? __pfx_kthread+0x10/0x10 [ 13.465536] ret_from_fork_asm+0x1a/0x30 [ 13.465568] </TASK> [ 13.465581] [ 13.473872] Allocated by task 282: [ 13.474063] kasan_save_stack+0x45/0x70 [ 13.474273] kasan_save_track+0x18/0x40 [ 13.474464] kasan_save_alloc_info+0x3b/0x50 [ 13.474634] __kasan_kmalloc+0xb7/0xc0 [ 13.475066] __kmalloc_cache_noprof+0x189/0x420 [ 13.475315] kasan_atomics+0x95/0x310 [ 13.475507] kunit_try_run_case+0x1a5/0x480 [ 13.475679] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.475863] kthread+0x337/0x6f0 [ 13.476026] ret_from_fork+0x116/0x1d0 [ 13.476319] ret_from_fork_asm+0x1a/0x30 [ 13.476646] [ 13.476727] The buggy address belongs to the object at ffff888102fa7d80 [ 13.476727] which belongs to the cache kmalloc-64 of size 64 [ 13.477384] The buggy address is located 0 bytes to the right of [ 13.477384] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 13.477790] [ 13.477928] The buggy address belongs to the physical page: [ 13.478200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 13.478574] flags: 0x200000000000000(node=0|zone=2) [ 13.479061] page_type: f5(slab) [ 13.479330] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.479680] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.480016] page dumped because: kasan: bad access detected [ 13.480340] [ 13.480420] Memory state around the buggy address: [ 13.480645] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.480965] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.481210] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.481532] ^ [ 13.481739] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.482142] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.482484] ================================================================== [ 13.829487] ================================================================== [ 13.830044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 13.830372] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 13.830660] [ 13.830943] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.830996] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.831010] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.831033] Call Trace: [ 13.831051] <TASK> [ 13.831069] dump_stack_lvl+0x73/0xb0 [ 13.831097] print_report+0xd1/0x650 [ 13.831120] ? __virt_addr_valid+0x1db/0x2d0 [ 13.831143] ? kasan_atomics_helper+0xde0/0x5450 [ 13.831167] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.831192] ? kasan_atomics_helper+0xde0/0x5450 [ 13.831216] kasan_report+0x141/0x180 [ 13.831241] ? kasan_atomics_helper+0xde0/0x5450 [ 13.831269] kasan_check_range+0x10c/0x1c0 [ 13.831294] __kasan_check_write+0x18/0x20 [ 13.831316] kasan_atomics_helper+0xde0/0x5450 [ 13.831340] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.831364] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.831388] ? kasan_atomics+0x152/0x310 [ 13.831412] kasan_atomics+0x1dc/0x310 [ 13.831432] ? __pfx_kasan_atomics+0x10/0x10 [ 13.831455] ? __pfx_read_tsc+0x10/0x10 [ 13.831477] ? ktime_get_ts64+0x86/0x230 [ 13.831503] kunit_try_run_case+0x1a5/0x480 [ 13.831525] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.831546] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.831572] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.831598] ? __kthread_parkme+0x82/0x180 [ 13.831636] ? preempt_count_sub+0x50/0x80 [ 13.831661] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.831684] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.831709] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.831736] kthread+0x337/0x6f0 [ 13.831827] ? trace_preempt_on+0x20/0xc0 [ 13.831854] ? __pfx_kthread+0x10/0x10 [ 13.831877] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.831900] ? calculate_sigpending+0x7b/0xa0 [ 13.831925] ? __pfx_kthread+0x10/0x10 [ 13.831949] ret_from_fork+0x116/0x1d0 [ 13.831968] ? __pfx_kthread+0x10/0x10 [ 13.831990] ret_from_fork_asm+0x1a/0x30 [ 13.832022] </TASK> [ 13.832033] [ 13.840824] Allocated by task 282: [ 13.840968] kasan_save_stack+0x45/0x70 [ 13.841289] kasan_save_track+0x18/0x40 [ 13.841629] kasan_save_alloc_info+0x3b/0x50 [ 13.841880] __kasan_kmalloc+0xb7/0xc0 [ 13.842047] __kmalloc_cache_noprof+0x189/0x420 [ 13.842249] kasan_atomics+0x95/0x310 [ 13.842394] kunit_try_run_case+0x1a5/0x480 [ 13.842619] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.843064] kthread+0x337/0x6f0 [ 13.843246] ret_from_fork+0x116/0x1d0 [ 13.843442] ret_from_fork_asm+0x1a/0x30 [ 13.843627] [ 13.843727] The buggy address belongs to the object at ffff888102fa7d80 [ 13.843727] which belongs to the cache kmalloc-64 of size 64 [ 13.844199] The buggy address is located 0 bytes to the right of [ 13.844199] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 13.844597] [ 13.844706] The buggy address belongs to the physical page: [ 13.845028] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 13.845401] flags: 0x200000000000000(node=0|zone=2) [ 13.845590] page_type: f5(slab) [ 13.845729] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.846373] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.846749] page dumped because: kasan: bad access detected [ 13.847162] [ 13.847249] Memory state around the buggy address: [ 13.847449] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.847688] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.847983] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.848305] ^ [ 13.848543] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.849033] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.849445] ================================================================== [ 14.011563] ================================================================== [ 14.012089] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 14.012389] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 14.012711] [ 14.012944] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 14.012993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.013007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.013027] Call Trace: [ 14.013043] <TASK> [ 14.013058] dump_stack_lvl+0x73/0xb0 [ 14.013085] print_report+0xd1/0x650 [ 14.013109] ? __virt_addr_valid+0x1db/0x2d0 [ 14.013132] ? kasan_atomics_helper+0x1217/0x5450 [ 14.013155] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.013180] ? kasan_atomics_helper+0x1217/0x5450 [ 14.013204] kasan_report+0x141/0x180 [ 14.013228] ? kasan_atomics_helper+0x1217/0x5450 [ 14.013256] kasan_check_range+0x10c/0x1c0 [ 14.013281] __kasan_check_write+0x18/0x20 [ 14.013302] kasan_atomics_helper+0x1217/0x5450 [ 14.013327] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.013351] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.013374] ? kasan_atomics+0x152/0x310 [ 14.013398] kasan_atomics+0x1dc/0x310 [ 14.013419] ? __pfx_kasan_atomics+0x10/0x10 [ 14.013441] ? __pfx_read_tsc+0x10/0x10 [ 14.013463] ? ktime_get_ts64+0x86/0x230 [ 14.013488] kunit_try_run_case+0x1a5/0x480 [ 14.013512] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.013533] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.013559] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.013585] ? __kthread_parkme+0x82/0x180 [ 14.013620] ? preempt_count_sub+0x50/0x80 [ 14.013645] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.013667] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.013693] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.013719] kthread+0x337/0x6f0 [ 14.013815] ? trace_preempt_on+0x20/0xc0 [ 14.013843] ? __pfx_kthread+0x10/0x10 [ 14.013866] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.013891] ? calculate_sigpending+0x7b/0xa0 [ 14.013916] ? __pfx_kthread+0x10/0x10 [ 14.013940] ret_from_fork+0x116/0x1d0 [ 14.013960] ? __pfx_kthread+0x10/0x10 [ 14.013982] ret_from_fork_asm+0x1a/0x30 [ 14.014014] </TASK> [ 14.014026] [ 14.022412] Allocated by task 282: [ 14.022592] kasan_save_stack+0x45/0x70 [ 14.022914] kasan_save_track+0x18/0x40 [ 14.023098] kasan_save_alloc_info+0x3b/0x50 [ 14.023285] __kasan_kmalloc+0xb7/0xc0 [ 14.023477] __kmalloc_cache_noprof+0x189/0x420 [ 14.023680] kasan_atomics+0x95/0x310 [ 14.024073] kunit_try_run_case+0x1a5/0x480 [ 14.024294] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.024527] kthread+0x337/0x6f0 [ 14.024669] ret_from_fork+0x116/0x1d0 [ 14.024996] ret_from_fork_asm+0x1a/0x30 [ 14.025183] [ 14.025279] The buggy address belongs to the object at ffff888102fa7d80 [ 14.025279] which belongs to the cache kmalloc-64 of size 64 [ 14.025855] The buggy address is located 0 bytes to the right of [ 14.025855] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 14.026291] [ 14.026369] The buggy address belongs to the physical page: [ 14.026555] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 14.027032] flags: 0x200000000000000(node=0|zone=2) [ 14.027278] page_type: f5(slab) [ 14.027451] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.027980] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.028304] page dumped because: kasan: bad access detected [ 14.028507] [ 14.028581] Memory state around the buggy address: [ 14.028802] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.029136] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.029468] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.029948] ^ [ 14.030177] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.030450] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.030877] ================================================================== [ 14.186517] ================================================================== [ 14.186910] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 14.187253] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 14.187542] [ 14.187673] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 14.187719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.187732] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.187755] Call Trace: [ 14.187771] <TASK> [ 14.187787] dump_stack_lvl+0x73/0xb0 [ 14.187815] print_report+0xd1/0x650 [ 14.187838] ? __virt_addr_valid+0x1db/0x2d0 [ 14.187862] ? kasan_atomics_helper+0x151d/0x5450 [ 14.187885] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.187910] ? kasan_atomics_helper+0x151d/0x5450 [ 14.187933] kasan_report+0x141/0x180 [ 14.187957] ? kasan_atomics_helper+0x151d/0x5450 [ 14.187985] kasan_check_range+0x10c/0x1c0 [ 14.188011] __kasan_check_write+0x18/0x20 [ 14.188033] kasan_atomics_helper+0x151d/0x5450 [ 14.188058] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.188082] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.188105] ? kasan_atomics+0x152/0x310 [ 14.188129] kasan_atomics+0x1dc/0x310 [ 14.188149] ? __pfx_kasan_atomics+0x10/0x10 [ 14.188171] ? __pfx_read_tsc+0x10/0x10 [ 14.188194] ? ktime_get_ts64+0x86/0x230 [ 14.188220] kunit_try_run_case+0x1a5/0x480 [ 14.188242] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.188263] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.188290] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.188316] ? __kthread_parkme+0x82/0x180 [ 14.188338] ? preempt_count_sub+0x50/0x80 [ 14.188362] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.188384] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.188409] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.188434] kthread+0x337/0x6f0 [ 14.188455] ? trace_preempt_on+0x20/0xc0 [ 14.188479] ? __pfx_kthread+0x10/0x10 [ 14.188501] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.188524] ? calculate_sigpending+0x7b/0xa0 [ 14.188549] ? __pfx_kthread+0x10/0x10 [ 14.188572] ret_from_fork+0x116/0x1d0 [ 14.188592] ? __pfx_kthread+0x10/0x10 [ 14.188622] ret_from_fork_asm+0x1a/0x30 [ 14.188654] </TASK> [ 14.188665] [ 14.196091] Allocated by task 282: [ 14.196226] kasan_save_stack+0x45/0x70 [ 14.196376] kasan_save_track+0x18/0x40 [ 14.196640] kasan_save_alloc_info+0x3b/0x50 [ 14.196859] __kasan_kmalloc+0xb7/0xc0 [ 14.197069] __kmalloc_cache_noprof+0x189/0x420 [ 14.197274] kasan_atomics+0x95/0x310 [ 14.197410] kunit_try_run_case+0x1a5/0x480 [ 14.197561] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.197763] kthread+0x337/0x6f0 [ 14.197947] ret_from_fork+0x116/0x1d0 [ 14.198143] ret_from_fork_asm+0x1a/0x30 [ 14.198345] [ 14.198446] The buggy address belongs to the object at ffff888102fa7d80 [ 14.198446] which belongs to the cache kmalloc-64 of size 64 [ 14.199233] The buggy address is located 0 bytes to the right of [ 14.199233] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 14.199721] [ 14.199868] The buggy address belongs to the physical page: [ 14.200078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 14.200377] flags: 0x200000000000000(node=0|zone=2) [ 14.200546] page_type: f5(slab) [ 14.200731] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.201306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.201573] page dumped because: kasan: bad access detected [ 14.201762] [ 14.201836] Memory state around the buggy address: [ 14.201998] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.202410] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.202745] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.203418] ^ [ 14.203659] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.203921] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.204149] ================================================================== [ 14.241992] ================================================================== [ 14.242436] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 14.242987] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 14.243328] [ 14.243423] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 14.243471] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.243485] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.243508] Call Trace: [ 14.243525] <TASK> [ 14.243542] dump_stack_lvl+0x73/0xb0 [ 14.243568] print_report+0xd1/0x650 [ 14.243592] ? __virt_addr_valid+0x1db/0x2d0 [ 14.243627] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.243651] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.243676] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.243701] kasan_report+0x141/0x180 [ 14.243725] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.243754] kasan_check_range+0x10c/0x1c0 [ 14.243791] __kasan_check_write+0x18/0x20 [ 14.243813] kasan_atomics_helper+0x16e7/0x5450 [ 14.243839] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.243864] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.243887] ? kasan_atomics+0x152/0x310 [ 14.243912] kasan_atomics+0x1dc/0x310 [ 14.243934] ? __pfx_kasan_atomics+0x10/0x10 [ 14.243956] ? __pfx_read_tsc+0x10/0x10 [ 14.243979] ? ktime_get_ts64+0x86/0x230 [ 14.244006] kunit_try_run_case+0x1a5/0x480 [ 14.244030] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.244052] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.244078] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.244104] ? __kthread_parkme+0x82/0x180 [ 14.244127] ? preempt_count_sub+0x50/0x80 [ 14.244153] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.244176] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.244203] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.244229] kthread+0x337/0x6f0 [ 14.244251] ? trace_preempt_on+0x20/0xc0 [ 14.244276] ? __pfx_kthread+0x10/0x10 [ 14.244299] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.244323] ? calculate_sigpending+0x7b/0xa0 [ 14.244349] ? __pfx_kthread+0x10/0x10 [ 14.244372] ret_from_fork+0x116/0x1d0 [ 14.244393] ? __pfx_kthread+0x10/0x10 [ 14.244416] ret_from_fork_asm+0x1a/0x30 [ 14.244449] </TASK> [ 14.244460] [ 14.252054] Allocated by task 282: [ 14.252246] kasan_save_stack+0x45/0x70 [ 14.252441] kasan_save_track+0x18/0x40 [ 14.252650] kasan_save_alloc_info+0x3b/0x50 [ 14.252866] __kasan_kmalloc+0xb7/0xc0 [ 14.253050] __kmalloc_cache_noprof+0x189/0x420 [ 14.253279] kasan_atomics+0x95/0x310 [ 14.253454] kunit_try_run_case+0x1a5/0x480 [ 14.253629] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.253854] kthread+0x337/0x6f0 [ 14.254031] ret_from_fork+0x116/0x1d0 [ 14.254224] ret_from_fork_asm+0x1a/0x30 [ 14.254436] [ 14.254539] The buggy address belongs to the object at ffff888102fa7d80 [ 14.254539] which belongs to the cache kmalloc-64 of size 64 [ 14.255044] The buggy address is located 0 bytes to the right of [ 14.255044] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 14.255533] [ 14.255640] The buggy address belongs to the physical page: [ 14.255890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 14.256143] flags: 0x200000000000000(node=0|zone=2) [ 14.256313] page_type: f5(slab) [ 14.256440] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.256724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.257210] page dumped because: kasan: bad access detected [ 14.257468] [ 14.257570] Memory state around the buggy address: [ 14.257877] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.258105] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.258329] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.258556] ^ [ 14.258930] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.259264] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.259595] ================================================================== [ 14.540641] ================================================================== [ 14.541104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 14.541438] Read of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 14.541708] [ 14.541860] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 14.541907] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.541921] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.541942] Call Trace: [ 14.541959] <TASK> [ 14.541976] dump_stack_lvl+0x73/0xb0 [ 14.542001] print_report+0xd1/0x650 [ 14.542024] ? __virt_addr_valid+0x1db/0x2d0 [ 14.542048] ? kasan_atomics_helper+0x4f71/0x5450 [ 14.542071] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.542097] ? kasan_atomics_helper+0x4f71/0x5450 [ 14.542122] kasan_report+0x141/0x180 [ 14.542146] ? kasan_atomics_helper+0x4f71/0x5450 [ 14.542175] __asan_report_load8_noabort+0x18/0x20 [ 14.542198] kasan_atomics_helper+0x4f71/0x5450 [ 14.542223] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.542250] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.542274] ? kasan_atomics+0x152/0x310 [ 14.542299] kasan_atomics+0x1dc/0x310 [ 14.542320] ? __pfx_kasan_atomics+0x10/0x10 [ 14.542363] ? __pfx_read_tsc+0x10/0x10 [ 14.542387] ? ktime_get_ts64+0x86/0x230 [ 14.542413] kunit_try_run_case+0x1a5/0x480 [ 14.542436] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.542457] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.542483] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.542510] ? __kthread_parkme+0x82/0x180 [ 14.542536] ? preempt_count_sub+0x50/0x80 [ 14.542561] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.542584] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.542619] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.542645] kthread+0x337/0x6f0 [ 14.542666] ? trace_preempt_on+0x20/0xc0 [ 14.542689] ? __pfx_kthread+0x10/0x10 [ 14.542711] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.542734] ? calculate_sigpending+0x7b/0xa0 [ 14.542759] ? __pfx_kthread+0x10/0x10 [ 14.542781] ret_from_fork+0x116/0x1d0 [ 14.542801] ? __pfx_kthread+0x10/0x10 [ 14.542823] ret_from_fork_asm+0x1a/0x30 [ 14.542855] </TASK> [ 14.542866] [ 14.550529] Allocated by task 282: [ 14.550744] kasan_save_stack+0x45/0x70 [ 14.550949] kasan_save_track+0x18/0x40 [ 14.551239] kasan_save_alloc_info+0x3b/0x50 [ 14.551438] __kasan_kmalloc+0xb7/0xc0 [ 14.551578] __kmalloc_cache_noprof+0x189/0x420 [ 14.551745] kasan_atomics+0x95/0x310 [ 14.551946] kunit_try_run_case+0x1a5/0x480 [ 14.552180] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.552443] kthread+0x337/0x6f0 [ 14.552644] ret_from_fork+0x116/0x1d0 [ 14.552849] ret_from_fork_asm+0x1a/0x30 [ 14.553026] [ 14.553146] The buggy address belongs to the object at ffff888102fa7d80 [ 14.553146] which belongs to the cache kmalloc-64 of size 64 [ 14.553551] The buggy address is located 0 bytes to the right of [ 14.553551] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 14.554031] [ 14.554130] The buggy address belongs to the physical page: [ 14.554387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 14.554941] flags: 0x200000000000000(node=0|zone=2) [ 14.555113] page_type: f5(slab) [ 14.555265] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.555624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.556086] page dumped because: kasan: bad access detected [ 14.556341] [ 14.556438] Memory state around the buggy address: [ 14.556656] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.556962] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.557187] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.557507] ^ [ 14.557769] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.558047] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.558293] ================================================================== [ 13.285451] ================================================================== [ 13.286079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 13.286730] Read of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 13.287967] [ 13.288073] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.288124] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.288137] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.288160] Call Trace: [ 13.288174] <TASK> [ 13.288190] dump_stack_lvl+0x73/0xb0 [ 13.288221] print_report+0xd1/0x650 [ 13.288244] ? __virt_addr_valid+0x1db/0x2d0 [ 13.288268] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.288290] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.288313] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.288336] kasan_report+0x141/0x180 [ 13.288358] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.288385] __asan_report_load4_noabort+0x18/0x20 [ 13.288406] kasan_atomics_helper+0x4bbc/0x5450 [ 13.288429] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.288452] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.288474] ? kasan_atomics+0x152/0x310 [ 13.288497] kasan_atomics+0x1dc/0x310 [ 13.288516] ? __pfx_kasan_atomics+0x10/0x10 [ 13.288537] ? __pfx_read_tsc+0x10/0x10 [ 13.288559] ? ktime_get_ts64+0x86/0x230 [ 13.288585] kunit_try_run_case+0x1a5/0x480 [ 13.288607] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.288643] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.288668] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.288693] ? __kthread_parkme+0x82/0x180 [ 13.288713] ? preempt_count_sub+0x50/0x80 [ 13.288737] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.288758] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.288783] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.288810] kthread+0x337/0x6f0 [ 13.288831] ? trace_preempt_on+0x20/0xc0 [ 13.288854] ? __pfx_kthread+0x10/0x10 [ 13.288875] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.288898] ? calculate_sigpending+0x7b/0xa0 [ 13.288922] ? __pfx_kthread+0x10/0x10 [ 13.288945] ret_from_fork+0x116/0x1d0 [ 13.289026] ? __pfx_kthread+0x10/0x10 [ 13.289047] ret_from_fork_asm+0x1a/0x30 [ 13.289091] </TASK> [ 13.289103] [ 13.298996] Allocated by task 282: [ 13.299329] kasan_save_stack+0x45/0x70 [ 13.299550] kasan_save_track+0x18/0x40 [ 13.299916] kasan_save_alloc_info+0x3b/0x50 [ 13.300246] __kasan_kmalloc+0xb7/0xc0 [ 13.300431] __kmalloc_cache_noprof+0x189/0x420 [ 13.300666] kasan_atomics+0x95/0x310 [ 13.300986] kunit_try_run_case+0x1a5/0x480 [ 13.301264] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.301795] kthread+0x337/0x6f0 [ 13.302065] ret_from_fork+0x116/0x1d0 [ 13.302244] ret_from_fork_asm+0x1a/0x30 [ 13.302447] [ 13.302672] The buggy address belongs to the object at ffff888102fa7d80 [ 13.302672] which belongs to the cache kmalloc-64 of size 64 [ 13.303359] The buggy address is located 0 bytes to the right of [ 13.303359] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 13.304231] [ 13.304328] The buggy address belongs to the physical page: [ 13.304584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 13.305017] flags: 0x200000000000000(node=0|zone=2) [ 13.305237] page_type: f5(slab) [ 13.305409] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.305953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.306384] page dumped because: kasan: bad access detected [ 13.306840] [ 13.306940] Memory state around the buggy address: [ 13.307163] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.307546] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.308072] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.308434] ^ [ 13.308705] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.309050] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.309383] ================================================================== [ 14.359606] ================================================================== [ 14.359953] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 14.360260] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 14.360522] [ 14.360622] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 14.360668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.360681] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.360703] Call Trace: [ 14.360718] <TASK> [ 14.360733] dump_stack_lvl+0x73/0xb0 [ 14.360759] print_report+0xd1/0x650 [ 14.360782] ? __virt_addr_valid+0x1db/0x2d0 [ 14.360820] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.360843] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.360868] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.360892] kasan_report+0x141/0x180 [ 14.360916] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.360944] kasan_check_range+0x10c/0x1c0 [ 14.360969] __kasan_check_write+0x18/0x20 [ 14.360990] kasan_atomics_helper+0x1a7f/0x5450 [ 14.361015] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.361038] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.361061] ? kasan_atomics+0x152/0x310 [ 14.361085] kasan_atomics+0x1dc/0x310 [ 14.361105] ? __pfx_kasan_atomics+0x10/0x10 [ 14.361127] ? __pfx_read_tsc+0x10/0x10 [ 14.361149] ? ktime_get_ts64+0x86/0x230 [ 14.361176] kunit_try_run_case+0x1a5/0x480 [ 14.361198] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.361219] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.361244] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.361270] ? __kthread_parkme+0x82/0x180 [ 14.361291] ? preempt_count_sub+0x50/0x80 [ 14.361315] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.361337] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.361362] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.361388] kthread+0x337/0x6f0 [ 14.361409] ? trace_preempt_on+0x20/0xc0 [ 14.361434] ? __pfx_kthread+0x10/0x10 [ 14.361456] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.361479] ? calculate_sigpending+0x7b/0xa0 [ 14.361504] ? __pfx_kthread+0x10/0x10 [ 14.361526] ret_from_fork+0x116/0x1d0 [ 14.361546] ? __pfx_kthread+0x10/0x10 [ 14.361567] ret_from_fork_asm+0x1a/0x30 [ 14.361598] </TASK> [ 14.361619] [ 14.369399] Allocated by task 282: [ 14.369586] kasan_save_stack+0x45/0x70 [ 14.369823] kasan_save_track+0x18/0x40 [ 14.370029] kasan_save_alloc_info+0x3b/0x50 [ 14.370242] __kasan_kmalloc+0xb7/0xc0 [ 14.370426] __kmalloc_cache_noprof+0x189/0x420 [ 14.370652] kasan_atomics+0x95/0x310 [ 14.370854] kunit_try_run_case+0x1a5/0x480 [ 14.371045] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.371281] kthread+0x337/0x6f0 [ 14.371433] ret_from_fork+0x116/0x1d0 [ 14.371602] ret_from_fork_asm+0x1a/0x30 [ 14.371760] [ 14.371873] The buggy address belongs to the object at ffff888102fa7d80 [ 14.371873] which belongs to the cache kmalloc-64 of size 64 [ 14.372382] The buggy address is located 0 bytes to the right of [ 14.372382] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 14.372950] [ 14.373038] The buggy address belongs to the physical page: [ 14.373240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 14.373587] flags: 0x200000000000000(node=0|zone=2) [ 14.373768] page_type: f5(slab) [ 14.373944] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.374283] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.374525] page dumped because: kasan: bad access detected [ 14.374799] [ 14.374897] Memory state around the buggy address: [ 14.375126] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.375388] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.375622] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.376033] ^ [ 14.376260] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.376585] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.376914] ================================================================== [ 14.521775] ================================================================== [ 14.522130] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 14.522798] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 14.523138] [ 14.523224] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 14.523270] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.523283] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.523306] Call Trace: [ 14.523321] <TASK> [ 14.523337] dump_stack_lvl+0x73/0xb0 [ 14.523363] print_report+0xd1/0x650 [ 14.523388] ? __virt_addr_valid+0x1db/0x2d0 [ 14.523412] ? kasan_atomics_helper+0x1f43/0x5450 [ 14.523458] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.523484] ? kasan_atomics_helper+0x1f43/0x5450 [ 14.523508] kasan_report+0x141/0x180 [ 14.523532] ? kasan_atomics_helper+0x1f43/0x5450 [ 14.523583] kasan_check_range+0x10c/0x1c0 [ 14.523620] __kasan_check_write+0x18/0x20 [ 14.523642] kasan_atomics_helper+0x1f43/0x5450 [ 14.523667] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.523692] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.523714] ? kasan_atomics+0x152/0x310 [ 14.523738] kasan_atomics+0x1dc/0x310 [ 14.523758] ? __pfx_kasan_atomics+0x10/0x10 [ 14.523795] ? __pfx_read_tsc+0x10/0x10 [ 14.523817] ? ktime_get_ts64+0x86/0x230 [ 14.523844] kunit_try_run_case+0x1a5/0x480 [ 14.523866] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.523887] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.523913] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.523939] ? __kthread_parkme+0x82/0x180 [ 14.523961] ? preempt_count_sub+0x50/0x80 [ 14.523985] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.524007] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.524033] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.524059] kthread+0x337/0x6f0 [ 14.524079] ? trace_preempt_on+0x20/0xc0 [ 14.524103] ? __pfx_kthread+0x10/0x10 [ 14.524125] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.524149] ? calculate_sigpending+0x7b/0xa0 [ 14.524174] ? __pfx_kthread+0x10/0x10 [ 14.524211] ret_from_fork+0x116/0x1d0 [ 14.524231] ? __pfx_kthread+0x10/0x10 [ 14.524253] ret_from_fork_asm+0x1a/0x30 [ 14.524284] </TASK> [ 14.524295] [ 14.532094] Allocated by task 282: [ 14.532281] kasan_save_stack+0x45/0x70 [ 14.532498] kasan_save_track+0x18/0x40 [ 14.532732] kasan_save_alloc_info+0x3b/0x50 [ 14.532958] __kasan_kmalloc+0xb7/0xc0 [ 14.533099] __kmalloc_cache_noprof+0x189/0x420 [ 14.533343] kasan_atomics+0x95/0x310 [ 14.533530] kunit_try_run_case+0x1a5/0x480 [ 14.533734] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.534079] kthread+0x337/0x6f0 [ 14.534207] ret_from_fork+0x116/0x1d0 [ 14.534345] ret_from_fork_asm+0x1a/0x30 [ 14.534489] [ 14.534569] The buggy address belongs to the object at ffff888102fa7d80 [ 14.534569] which belongs to the cache kmalloc-64 of size 64 [ 14.535123] The buggy address is located 0 bytes to the right of [ 14.535123] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 14.535992] [ 14.536067] The buggy address belongs to the physical page: [ 14.536247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 14.536577] flags: 0x200000000000000(node=0|zone=2) [ 14.536880] page_type: f5(slab) [ 14.537075] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.537427] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.537758] page dumped because: kasan: bad access detected [ 14.537938] [ 14.538012] Memory state around the buggy address: [ 14.538241] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.538663] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.538987] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.539211] ^ [ 14.539400] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.539745] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.540105] ================================================================== [ 14.653261] ================================================================== [ 14.653620] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 14.654117] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 14.654413] [ 14.654525] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 14.654574] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.654588] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.654621] Call Trace: [ 14.654636] <TASK> [ 14.654652] dump_stack_lvl+0x73/0xb0 [ 14.654677] print_report+0xd1/0x650 [ 14.654701] ? __virt_addr_valid+0x1db/0x2d0 [ 14.654725] ? kasan_atomics_helper+0x218a/0x5450 [ 14.654748] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.654794] ? kasan_atomics_helper+0x218a/0x5450 [ 14.654818] kasan_report+0x141/0x180 [ 14.654841] ? kasan_atomics_helper+0x218a/0x5450 [ 14.654869] kasan_check_range+0x10c/0x1c0 [ 14.654895] __kasan_check_write+0x18/0x20 [ 14.654916] kasan_atomics_helper+0x218a/0x5450 [ 14.654941] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.654965] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.654988] ? kasan_atomics+0x152/0x310 [ 14.655012] kasan_atomics+0x1dc/0x310 [ 14.655032] ? __pfx_kasan_atomics+0x10/0x10 [ 14.655055] ? __pfx_read_tsc+0x10/0x10 [ 14.655077] ? ktime_get_ts64+0x86/0x230 [ 14.655102] kunit_try_run_case+0x1a5/0x480 [ 14.655124] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.655145] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.655170] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.655198] ? __kthread_parkme+0x82/0x180 [ 14.655219] ? preempt_count_sub+0x50/0x80 [ 14.655244] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.655266] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.655292] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.655318] kthread+0x337/0x6f0 [ 14.655339] ? trace_preempt_on+0x20/0xc0 [ 14.655362] ? __pfx_kthread+0x10/0x10 [ 14.655384] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.655409] ? calculate_sigpending+0x7b/0xa0 [ 14.655434] ? __pfx_kthread+0x10/0x10 [ 14.655457] ret_from_fork+0x116/0x1d0 [ 14.655476] ? __pfx_kthread+0x10/0x10 [ 14.655497] ret_from_fork_asm+0x1a/0x30 [ 14.655529] </TASK> [ 14.655540] [ 14.662992] Allocated by task 282: [ 14.663133] kasan_save_stack+0x45/0x70 [ 14.663339] kasan_save_track+0x18/0x40 [ 14.663535] kasan_save_alloc_info+0x3b/0x50 [ 14.663775] __kasan_kmalloc+0xb7/0xc0 [ 14.663917] __kmalloc_cache_noprof+0x189/0x420 [ 14.664125] kasan_atomics+0x95/0x310 [ 14.664313] kunit_try_run_case+0x1a5/0x480 [ 14.664522] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.664786] kthread+0x337/0x6f0 [ 14.664916] ret_from_fork+0x116/0x1d0 [ 14.665103] ret_from_fork_asm+0x1a/0x30 [ 14.665305] [ 14.665404] The buggy address belongs to the object at ffff888102fa7d80 [ 14.665404] which belongs to the cache kmalloc-64 of size 64 [ 14.665945] The buggy address is located 0 bytes to the right of [ 14.665945] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 14.666382] [ 14.666457] The buggy address belongs to the physical page: [ 14.667371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 14.667693] flags: 0x200000000000000(node=0|zone=2) [ 14.667935] page_type: f5(slab) [ 14.668075] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.668400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.668721] page dumped because: kasan: bad access detected [ 14.668953] [ 14.669040] Memory state around the buggy address: [ 14.669246] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.669541] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.670719] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.671151] ^ [ 14.671466] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.671873] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.672152] ================================================================== [ 13.714755] ================================================================== [ 13.715119] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 13.715427] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 13.715732] [ 13.715891] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.715936] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.715950] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.715971] Call Trace: [ 13.715987] <TASK> [ 13.716002] dump_stack_lvl+0x73/0xb0 [ 13.716027] print_report+0xd1/0x650 [ 13.716051] ? __virt_addr_valid+0x1db/0x2d0 [ 13.716073] ? kasan_atomics_helper+0xb6a/0x5450 [ 13.716096] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.716121] ? kasan_atomics_helper+0xb6a/0x5450 [ 13.716144] kasan_report+0x141/0x180 [ 13.716168] ? kasan_atomics_helper+0xb6a/0x5450 [ 13.716196] kasan_check_range+0x10c/0x1c0 [ 13.716221] __kasan_check_write+0x18/0x20 [ 13.716242] kasan_atomics_helper+0xb6a/0x5450 [ 13.716266] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.716290] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.716313] ? kasan_atomics+0x152/0x310 [ 13.716336] kasan_atomics+0x1dc/0x310 [ 13.716356] ? __pfx_kasan_atomics+0x10/0x10 [ 13.716379] ? __pfx_read_tsc+0x10/0x10 [ 13.716401] ? ktime_get_ts64+0x86/0x230 [ 13.716426] kunit_try_run_case+0x1a5/0x480 [ 13.716448] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.716471] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.716497] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.716523] ? __kthread_parkme+0x82/0x180 [ 13.716544] ? preempt_count_sub+0x50/0x80 [ 13.716580] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.716603] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.717217] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.717243] kthread+0x337/0x6f0 [ 13.717263] ? trace_preempt_on+0x20/0xc0 [ 13.717287] ? __pfx_kthread+0x10/0x10 [ 13.717309] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.717333] ? calculate_sigpending+0x7b/0xa0 [ 13.717377] ? __pfx_kthread+0x10/0x10 [ 13.717399] ret_from_fork+0x116/0x1d0 [ 13.717419] ? __pfx_kthread+0x10/0x10 [ 13.717440] ret_from_fork_asm+0x1a/0x30 [ 13.717472] </TASK> [ 13.717483] [ 13.727042] Allocated by task 282: [ 13.727188] kasan_save_stack+0x45/0x70 [ 13.727347] kasan_save_track+0x18/0x40 [ 13.727490] kasan_save_alloc_info+0x3b/0x50 [ 13.727706] __kasan_kmalloc+0xb7/0xc0 [ 13.728047] __kmalloc_cache_noprof+0x189/0x420 [ 13.728505] kasan_atomics+0x95/0x310 [ 13.729142] kunit_try_run_case+0x1a5/0x480 [ 13.729634] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.730169] kthread+0x337/0x6f0 [ 13.730645] ret_from_fork+0x116/0x1d0 [ 13.731148] ret_from_fork_asm+0x1a/0x30 [ 13.731577] [ 13.731781] The buggy address belongs to the object at ffff888102fa7d80 [ 13.731781] which belongs to the cache kmalloc-64 of size 64 [ 13.733218] The buggy address is located 0 bytes to the right of [ 13.733218] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 13.734493] [ 13.734680] The buggy address belongs to the physical page: [ 13.735317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 13.736227] flags: 0x200000000000000(node=0|zone=2) [ 13.736928] page_type: f5(slab) [ 13.737253] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.737991] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.738818] page dumped because: kasan: bad access detected [ 13.739390] [ 13.739556] Memory state around the buggy address: [ 13.740084] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.740731] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.741340] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.741570] ^ [ 13.742075] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.742807] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.743471] ================================================================== [ 13.871054] ================================================================== [ 13.871340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 13.871670] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 13.872261] [ 13.872354] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.872401] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.872415] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.872436] Call Trace: [ 13.872454] <TASK> [ 13.872471] dump_stack_lvl+0x73/0xb0 [ 13.872496] print_report+0xd1/0x650 [ 13.872519] ? __virt_addr_valid+0x1db/0x2d0 [ 13.872543] ? kasan_atomics_helper+0xf10/0x5450 [ 13.872566] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.872589] ? kasan_atomics_helper+0xf10/0x5450 [ 13.872627] kasan_report+0x141/0x180 [ 13.872651] ? kasan_atomics_helper+0xf10/0x5450 [ 13.872679] kasan_check_range+0x10c/0x1c0 [ 13.872705] __kasan_check_write+0x18/0x20 [ 13.872726] kasan_atomics_helper+0xf10/0x5450 [ 13.872751] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.872793] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.872816] ? kasan_atomics+0x152/0x310 [ 13.872841] kasan_atomics+0x1dc/0x310 [ 13.872861] ? __pfx_kasan_atomics+0x10/0x10 [ 13.872883] ? __pfx_read_tsc+0x10/0x10 [ 13.872906] ? ktime_get_ts64+0x86/0x230 [ 13.872930] kunit_try_run_case+0x1a5/0x480 [ 13.872953] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.872974] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.873000] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.873025] ? __kthread_parkme+0x82/0x180 [ 13.873047] ? preempt_count_sub+0x50/0x80 [ 13.873071] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.873093] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.873119] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.873146] kthread+0x337/0x6f0 [ 13.873166] ? trace_preempt_on+0x20/0xc0 [ 13.873190] ? __pfx_kthread+0x10/0x10 [ 13.873213] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.873236] ? calculate_sigpending+0x7b/0xa0 [ 13.873260] ? __pfx_kthread+0x10/0x10 [ 13.873282] ret_from_fork+0x116/0x1d0 [ 13.873302] ? __pfx_kthread+0x10/0x10 [ 13.873323] ret_from_fork_asm+0x1a/0x30 [ 13.873355] </TASK> [ 13.873367] [ 13.881686] Allocated by task 282: [ 13.881858] kasan_save_stack+0x45/0x70 [ 13.882010] kasan_save_track+0x18/0x40 [ 13.882151] kasan_save_alloc_info+0x3b/0x50 [ 13.882303] __kasan_kmalloc+0xb7/0xc0 [ 13.882822] __kmalloc_cache_noprof+0x189/0x420 [ 13.883060] kasan_atomics+0x95/0x310 [ 13.883248] kunit_try_run_case+0x1a5/0x480 [ 13.883462] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.883733] kthread+0x337/0x6f0 [ 13.884075] ret_from_fork+0x116/0x1d0 [ 13.884272] ret_from_fork_asm+0x1a/0x30 [ 13.884418] [ 13.884495] The buggy address belongs to the object at ffff888102fa7d80 [ 13.884495] which belongs to the cache kmalloc-64 of size 64 [ 13.884938] The buggy address is located 0 bytes to the right of [ 13.884938] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 13.885778] [ 13.885882] The buggy address belongs to the physical page: [ 13.886066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 13.886314] flags: 0x200000000000000(node=0|zone=2) [ 13.886539] page_type: f5(slab) [ 13.886707] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.886996] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.887303] page dumped because: kasan: bad access detected [ 13.887525] [ 13.887891] Memory state around the buggy address: [ 13.888132] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.888435] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.888850] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.889159] ^ [ 13.889356] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.889586] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.889936] ================================================================== [ 14.634889] ================================================================== [ 14.635441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 14.636442] Read of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 14.636972] [ 14.637094] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 14.637141] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.637155] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.637177] Call Trace: [ 14.637194] <TASK> [ 14.637210] dump_stack_lvl+0x73/0xb0 [ 14.637237] print_report+0xd1/0x650 [ 14.637260] ? __virt_addr_valid+0x1db/0x2d0 [ 14.637283] ? kasan_atomics_helper+0x4fb2/0x5450 [ 14.637307] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.637332] ? kasan_atomics_helper+0x4fb2/0x5450 [ 14.637356] kasan_report+0x141/0x180 [ 14.637380] ? kasan_atomics_helper+0x4fb2/0x5450 [ 14.637409] __asan_report_load8_noabort+0x18/0x20 [ 14.637431] kasan_atomics_helper+0x4fb2/0x5450 [ 14.637455] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.637480] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.637503] ? kasan_atomics+0x152/0x310 [ 14.637527] kasan_atomics+0x1dc/0x310 [ 14.637548] ? __pfx_kasan_atomics+0x10/0x10 [ 14.637570] ? __pfx_read_tsc+0x10/0x10 [ 14.637593] ? ktime_get_ts64+0x86/0x230 [ 14.637632] kunit_try_run_case+0x1a5/0x480 [ 14.637655] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.637677] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.637702] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.637729] ? __kthread_parkme+0x82/0x180 [ 14.637751] ? preempt_count_sub+0x50/0x80 [ 14.637798] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.637822] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.637848] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.637874] kthread+0x337/0x6f0 [ 14.637894] ? trace_preempt_on+0x20/0xc0 [ 14.637919] ? __pfx_kthread+0x10/0x10 [ 14.637941] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.637965] ? calculate_sigpending+0x7b/0xa0 [ 14.637990] ? __pfx_kthread+0x10/0x10 [ 14.638012] ret_from_fork+0x116/0x1d0 [ 14.638032] ? __pfx_kthread+0x10/0x10 [ 14.638053] ret_from_fork_asm+0x1a/0x30 [ 14.638084] </TASK> [ 14.638095] [ 14.645451] Allocated by task 282: [ 14.645623] kasan_save_stack+0x45/0x70 [ 14.645849] kasan_save_track+0x18/0x40 [ 14.646010] kasan_save_alloc_info+0x3b/0x50 [ 14.646163] __kasan_kmalloc+0xb7/0xc0 [ 14.646312] __kmalloc_cache_noprof+0x189/0x420 [ 14.646552] kasan_atomics+0x95/0x310 [ 14.646751] kunit_try_run_case+0x1a5/0x480 [ 14.646950] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.647134] kthread+0x337/0x6f0 [ 14.647305] ret_from_fork+0x116/0x1d0 [ 14.647497] ret_from_fork_asm+0x1a/0x30 [ 14.647711] [ 14.647842] The buggy address belongs to the object at ffff888102fa7d80 [ 14.647842] which belongs to the cache kmalloc-64 of size 64 [ 14.648329] The buggy address is located 0 bytes to the right of [ 14.648329] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 14.648870] [ 14.648964] The buggy address belongs to the physical page: [ 14.649215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 14.649534] flags: 0x200000000000000(node=0|zone=2) [ 14.649714] page_type: f5(slab) [ 14.649862] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.650103] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.650418] page dumped because: kasan: bad access detected [ 14.650690] [ 14.650814] Memory state around the buggy address: [ 14.651041] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.651305] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.651531] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.651779] ^ [ 14.652016] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.652350] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.652699] ================================================================== [ 13.952588] ================================================================== [ 13.953064] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 13.953385] Read of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 13.953662] [ 13.953863] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.953910] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.953923] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.953945] Call Trace: [ 13.953961] <TASK> [ 13.953978] dump_stack_lvl+0x73/0xb0 [ 13.954004] print_report+0xd1/0x650 [ 13.954028] ? __virt_addr_valid+0x1db/0x2d0 [ 13.954051] ? kasan_atomics_helper+0x4a1c/0x5450 [ 13.954074] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.954098] ? kasan_atomics_helper+0x4a1c/0x5450 [ 13.954122] kasan_report+0x141/0x180 [ 13.954145] ? kasan_atomics_helper+0x4a1c/0x5450 [ 13.954174] __asan_report_load4_noabort+0x18/0x20 [ 13.954196] kasan_atomics_helper+0x4a1c/0x5450 [ 13.954220] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.954245] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.954268] ? kasan_atomics+0x152/0x310 [ 13.954292] kasan_atomics+0x1dc/0x310 [ 13.954312] ? __pfx_kasan_atomics+0x10/0x10 [ 13.954334] ? __pfx_read_tsc+0x10/0x10 [ 13.954356] ? ktime_get_ts64+0x86/0x230 [ 13.954382] kunit_try_run_case+0x1a5/0x480 [ 13.954404] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.954425] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.954451] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.954476] ? __kthread_parkme+0x82/0x180 [ 13.954498] ? preempt_count_sub+0x50/0x80 [ 13.954523] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.954552] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.954578] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.954603] kthread+0x337/0x6f0 [ 13.954635] ? trace_preempt_on+0x20/0xc0 [ 13.954659] ? __pfx_kthread+0x10/0x10 [ 13.954681] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.954704] ? calculate_sigpending+0x7b/0xa0 [ 13.954729] ? __pfx_kthread+0x10/0x10 [ 13.954853] ret_from_fork+0x116/0x1d0 [ 13.954874] ? __pfx_kthread+0x10/0x10 [ 13.954896] ret_from_fork_asm+0x1a/0x30 [ 13.954929] </TASK> [ 13.954941] [ 13.963142] Allocated by task 282: [ 13.963335] kasan_save_stack+0x45/0x70 [ 13.963535] kasan_save_track+0x18/0x40 [ 13.963719] kasan_save_alloc_info+0x3b/0x50 [ 13.964108] __kasan_kmalloc+0xb7/0xc0 [ 13.964279] __kmalloc_cache_noprof+0x189/0x420 [ 13.964506] kasan_atomics+0x95/0x310 [ 13.964663] kunit_try_run_case+0x1a5/0x480 [ 13.964926] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.965201] kthread+0x337/0x6f0 [ 13.965381] ret_from_fork+0x116/0x1d0 [ 13.965573] ret_from_fork_asm+0x1a/0x30 [ 13.965837] [ 13.965917] The buggy address belongs to the object at ffff888102fa7d80 [ 13.965917] which belongs to the cache kmalloc-64 of size 64 [ 13.966395] The buggy address is located 0 bytes to the right of [ 13.966395] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 13.967077] [ 13.967180] The buggy address belongs to the physical page: [ 13.967363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 13.967682] flags: 0x200000000000000(node=0|zone=2) [ 13.968097] page_type: f5(slab) [ 13.968275] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.968569] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.969035] page dumped because: kasan: bad access detected [ 13.969257] [ 13.969356] Memory state around the buggy address: [ 13.969586] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.969941] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.970242] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.970570] ^ [ 13.970900] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.971195] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.971489] ================================================================== [ 14.108023] ================================================================== [ 14.108263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 14.108875] Read of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 14.109207] [ 14.109318] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 14.109363] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.109376] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.109398] Call Trace: [ 14.109413] <TASK> [ 14.109430] dump_stack_lvl+0x73/0xb0 [ 14.109457] print_report+0xd1/0x650 [ 14.109480] ? __virt_addr_valid+0x1db/0x2d0 [ 14.109503] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.109526] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.109551] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.109574] kasan_report+0x141/0x180 [ 14.109598] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.109639] __asan_report_load8_noabort+0x18/0x20 [ 14.109660] kasan_atomics_helper+0x4eae/0x5450 [ 14.109685] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.109710] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.109732] ? kasan_atomics+0x152/0x310 [ 14.109763] kasan_atomics+0x1dc/0x310 [ 14.109783] ? __pfx_kasan_atomics+0x10/0x10 [ 14.109806] ? __pfx_read_tsc+0x10/0x10 [ 14.109828] ? ktime_get_ts64+0x86/0x230 [ 14.109854] kunit_try_run_case+0x1a5/0x480 [ 14.109877] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.109898] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.109925] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.109950] ? __kthread_parkme+0x82/0x180 [ 14.109972] ? preempt_count_sub+0x50/0x80 [ 14.109997] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.110019] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.110045] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.110071] kthread+0x337/0x6f0 [ 14.110091] ? trace_preempt_on+0x20/0xc0 [ 14.110116] ? __pfx_kthread+0x10/0x10 [ 14.110138] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.110162] ? calculate_sigpending+0x7b/0xa0 [ 14.110186] ? __pfx_kthread+0x10/0x10 [ 14.110210] ret_from_fork+0x116/0x1d0 [ 14.110229] ? __pfx_kthread+0x10/0x10 [ 14.110251] ret_from_fork_asm+0x1a/0x30 [ 14.110283] </TASK> [ 14.110294] [ 14.118338] Allocated by task 282: [ 14.118475] kasan_save_stack+0x45/0x70 [ 14.118650] kasan_save_track+0x18/0x40 [ 14.118886] kasan_save_alloc_info+0x3b/0x50 [ 14.119110] __kasan_kmalloc+0xb7/0xc0 [ 14.119306] __kmalloc_cache_noprof+0x189/0x420 [ 14.119528] kasan_atomics+0x95/0x310 [ 14.119849] kunit_try_run_case+0x1a5/0x480 [ 14.120036] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.120223] kthread+0x337/0x6f0 [ 14.120411] ret_from_fork+0x116/0x1d0 [ 14.120646] ret_from_fork_asm+0x1a/0x30 [ 14.120940] [ 14.121041] The buggy address belongs to the object at ffff888102fa7d80 [ 14.121041] which belongs to the cache kmalloc-64 of size 64 [ 14.121511] The buggy address is located 0 bytes to the right of [ 14.121511] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 14.122029] [ 14.122132] The buggy address belongs to the physical page: [ 14.122349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 14.122747] flags: 0x200000000000000(node=0|zone=2) [ 14.122976] page_type: f5(slab) [ 14.123153] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.123483] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.123861] page dumped because: kasan: bad access detected [ 14.124047] [ 14.124121] Memory state around the buggy address: [ 14.124284] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.124691] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.125150] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.125401] ^ [ 14.125565] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.125940] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.126262] ================================================================== [ 14.712855] ================================================================== [ 14.713225] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 14.713536] Read of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282 [ 14.713901] [ 14.714016] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 14.714060] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.714075] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.714098] Call Trace: [ 14.714114] <TASK> [ 14.714130] dump_stack_lvl+0x73/0xb0 [ 14.714156] print_report+0xd1/0x650 [ 14.714179] ? __virt_addr_valid+0x1db/0x2d0 [ 14.714202] ? kasan_atomics_helper+0x5115/0x5450 [ 14.714226] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.714250] ? kasan_atomics_helper+0x5115/0x5450 [ 14.714273] kasan_report+0x141/0x180 [ 14.714297] ? kasan_atomics_helper+0x5115/0x5450 [ 14.714325] __asan_report_load8_noabort+0x18/0x20 [ 14.714347] kasan_atomics_helper+0x5115/0x5450 [ 14.714372] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.714395] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.714418] ? kasan_atomics+0x152/0x310 [ 14.714442] kasan_atomics+0x1dc/0x310 [ 14.714463] ? __pfx_kasan_atomics+0x10/0x10 [ 14.714485] ? __pfx_read_tsc+0x10/0x10 [ 14.714507] ? ktime_get_ts64+0x86/0x230 [ 14.714539] kunit_try_run_case+0x1a5/0x480 [ 14.714562] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.714583] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.714619] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.714646] ? __kthread_parkme+0x82/0x180 [ 14.714668] ? preempt_count_sub+0x50/0x80 [ 14.714693] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.714715] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.714741] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.714788] kthread+0x337/0x6f0 [ 14.714809] ? trace_preempt_on+0x20/0xc0 [ 14.714833] ? __pfx_kthread+0x10/0x10 [ 14.714856] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.714880] ? calculate_sigpending+0x7b/0xa0 [ 14.714905] ? __pfx_kthread+0x10/0x10 [ 14.714928] ret_from_fork+0x116/0x1d0 [ 14.714948] ? __pfx_kthread+0x10/0x10 [ 14.714971] ret_from_fork_asm+0x1a/0x30 [ 14.715001] </TASK> [ 14.715013] [ 14.722089] Allocated by task 282: [ 14.722272] kasan_save_stack+0x45/0x70 [ 14.722476] kasan_save_track+0x18/0x40 [ 14.722696] kasan_save_alloc_info+0x3b/0x50 [ 14.722939] __kasan_kmalloc+0xb7/0xc0 [ 14.723132] __kmalloc_cache_noprof+0x189/0x420 [ 14.723350] kasan_atomics+0x95/0x310 [ 14.723514] kunit_try_run_case+0x1a5/0x480 [ 14.723721] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.723986] kthread+0x337/0x6f0 [ 14.724141] ret_from_fork+0x116/0x1d0 [ 14.724288] ret_from_fork_asm+0x1a/0x30 [ 14.724490] [ 14.724588] The buggy address belongs to the object at ffff888102fa7d80 [ 14.724588] which belongs to the cache kmalloc-64 of size 64 [ 14.725087] The buggy address is located 0 bytes to the right of [ 14.725087] allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0) [ 14.725594] [ 14.725693] The buggy address belongs to the physical page: [ 14.725955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7 [ 14.726262] flags: 0x200000000000000(node=0|zone=2) [ 14.726462] page_type: f5(slab) [ 14.726590] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.726975] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.727270] page dumped because: kasan: bad access detected [ 14.727464] [ 14.727563] Memory state around the buggy address: [ 14.727826] ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.728140] ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.728416] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.728700] ^ [ 14.728932] ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.729224] ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.729513] ==================================================================