Date
May 30, 2025, 4:14 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
x15 |
[ 49.182520] ================================================================== [ 49.189583] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 49.196873] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 49.204251] [ 49.205730] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 49.205779] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.205796] Hardware name: WinLink E850-96 board (DT) [ 49.205815] Call trace: [ 49.205828] show_stack+0x20/0x38 (C) [ 49.205862] dump_stack_lvl+0x8c/0xd0 [ 49.205899] print_report+0x118/0x608 [ 49.205933] kasan_report+0xdc/0x128 [ 49.205966] kasan_check_range+0x100/0x1a8 [ 49.206002] __kasan_check_write+0x20/0x30 [ 49.206032] kasan_atomics_helper+0x47c/0x4858 [ 49.206065] kasan_atomics+0x198/0x2e0 [ 49.206098] kunit_try_run_case+0x170/0x3f0 [ 49.206130] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.206168] kthread+0x328/0x630 [ 49.206197] ret_from_fork+0x10/0x20 [ 49.206228] [ 49.276819] Allocated by task 309: [ 49.280205] kasan_save_stack+0x3c/0x68 [ 49.284024] kasan_save_track+0x20/0x40 [ 49.287844] kasan_save_alloc_info+0x40/0x58 [ 49.292097] __kasan_kmalloc+0xd4/0xd8 [ 49.295830] __kmalloc_cache_noprof+0x15c/0x3c0 [ 49.300343] kasan_atomics+0xb8/0x2e0 [ 49.303989] kunit_try_run_case+0x170/0x3f0 [ 49.308156] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.313624] kthread+0x328/0x630 [ 49.316836] ret_from_fork+0x10/0x20 [ 49.320395] [ 49.321871] The buggy address belongs to the object at ffff000800c2e200 [ 49.321871] which belongs to the cache kmalloc-64 of size 64 [ 49.334197] The buggy address is located 0 bytes to the right of [ 49.334197] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 49.347044] [ 49.348520] The buggy address belongs to the physical page: [ 49.354076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 49.362061] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.368571] page_type: f5(slab) [ 49.371704] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.379429] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.387148] page dumped because: kasan: bad access detected [ 49.392703] [ 49.394179] Memory state around the buggy address: [ 49.398957] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.406161] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.413366] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.420567] ^ [ 49.425345] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.432550] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.439751] ================================================================== [ 52.618740] ================================================================== [ 52.625817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 52.633106] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 52.640484] [ 52.641963] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 52.642012] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.642029] Hardware name: WinLink E850-96 board (DT) [ 52.642049] Call trace: [ 52.642062] show_stack+0x20/0x38 (C) [ 52.642094] dump_stack_lvl+0x8c/0xd0 [ 52.642130] print_report+0x118/0x608 [ 52.642163] kasan_report+0xdc/0x128 [ 52.642195] kasan_check_range+0x100/0x1a8 [ 52.642230] __kasan_check_write+0x20/0x30 [ 52.642259] kasan_atomics_helper+0xa04/0x4858 [ 52.642294] kasan_atomics+0x198/0x2e0 [ 52.642326] kunit_try_run_case+0x170/0x3f0 [ 52.642358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.642396] kthread+0x328/0x630 [ 52.642423] ret_from_fork+0x10/0x20 [ 52.642456] [ 52.713052] Allocated by task 309: [ 52.716438] kasan_save_stack+0x3c/0x68 [ 52.720257] kasan_save_track+0x20/0x40 [ 52.724076] kasan_save_alloc_info+0x40/0x58 [ 52.728330] __kasan_kmalloc+0xd4/0xd8 [ 52.732062] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.736576] kasan_atomics+0xb8/0x2e0 [ 52.740222] kunit_try_run_case+0x170/0x3f0 [ 52.744389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.749857] kthread+0x328/0x630 [ 52.753069] ret_from_fork+0x10/0x20 [ 52.756628] [ 52.758104] The buggy address belongs to the object at ffff000800c2e200 [ 52.758104] which belongs to the cache kmalloc-64 of size 64 [ 52.770430] The buggy address is located 0 bytes to the right of [ 52.770430] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 52.783277] [ 52.784753] The buggy address belongs to the physical page: [ 52.790309] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 52.798294] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.804805] page_type: f5(slab) [ 52.807937] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.815662] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.823381] page dumped because: kasan: bad access detected [ 52.828936] [ 52.830411] Memory state around the buggy address: [ 52.835189] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.842394] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.849599] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.856800] ^ [ 52.861578] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.868783] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.875984] ================================================================== [ 51.563725] ================================================================== [ 51.570797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 51.578087] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 51.585465] [ 51.586945] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 51.586993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.587007] Hardware name: WinLink E850-96 board (DT) [ 51.587024] Call trace: [ 51.587037] show_stack+0x20/0x38 (C) [ 51.587069] dump_stack_lvl+0x8c/0xd0 [ 51.587104] print_report+0x118/0x608 [ 51.587136] kasan_report+0xdc/0x128 [ 51.587169] kasan_check_range+0x100/0x1a8 [ 51.587203] __kasan_check_write+0x20/0x30 [ 51.587235] kasan_atomics_helper+0x894/0x4858 [ 51.587268] kasan_atomics+0x198/0x2e0 [ 51.587297] kunit_try_run_case+0x170/0x3f0 [ 51.587333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.587371] kthread+0x328/0x630 [ 51.587397] ret_from_fork+0x10/0x20 [ 51.587430] [ 51.658033] Allocated by task 309: [ 51.661419] kasan_save_stack+0x3c/0x68 [ 51.665238] kasan_save_track+0x20/0x40 [ 51.669058] kasan_save_alloc_info+0x40/0x58 [ 51.673311] __kasan_kmalloc+0xd4/0xd8 [ 51.677044] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.681557] kasan_atomics+0xb8/0x2e0 [ 51.685203] kunit_try_run_case+0x170/0x3f0 [ 51.689370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.694838] kthread+0x328/0x630 [ 51.698050] ret_from_fork+0x10/0x20 [ 51.701610] [ 51.703085] The buggy address belongs to the object at ffff000800c2e200 [ 51.703085] which belongs to the cache kmalloc-64 of size 64 [ 51.715412] The buggy address is located 0 bytes to the right of [ 51.715412] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 51.728258] [ 51.729734] The buggy address belongs to the physical page: [ 51.735290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 51.743275] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.749786] page_type: f5(slab) [ 51.752919] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.760643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.768362] page dumped because: kasan: bad access detected [ 51.773917] [ 51.775393] Memory state around the buggy address: [ 51.780171] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.787375] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.794580] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.801781] ^ [ 51.806559] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.813764] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.820965] ================================================================== [ 56.567459] ================================================================== [ 56.574543] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 56.581918] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 56.589296] [ 56.590776] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 56.590822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.590838] Hardware name: WinLink E850-96 board (DT) [ 56.590856] Call trace: [ 56.590868] show_stack+0x20/0x38 (C) [ 56.590901] dump_stack_lvl+0x8c/0xd0 [ 56.590937] print_report+0x118/0x608 [ 56.590969] kasan_report+0xdc/0x128 [ 56.591001] __asan_report_store8_noabort+0x20/0x30 [ 56.591033] kasan_atomics_helper+0x3e5c/0x4858 [ 56.591066] kasan_atomics+0x198/0x2e0 [ 56.591097] kunit_try_run_case+0x170/0x3f0 [ 56.591131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.591170] kthread+0x328/0x630 [ 56.591196] ret_from_fork+0x10/0x20 [ 56.591227] [ 56.658653] Allocated by task 309: [ 56.662038] kasan_save_stack+0x3c/0x68 [ 56.665858] kasan_save_track+0x20/0x40 [ 56.669677] kasan_save_alloc_info+0x40/0x58 [ 56.673931] __kasan_kmalloc+0xd4/0xd8 [ 56.677663] __kmalloc_cache_noprof+0x15c/0x3c0 [ 56.682177] kasan_atomics+0xb8/0x2e0 [ 56.685823] kunit_try_run_case+0x170/0x3f0 [ 56.689989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.695458] kthread+0x328/0x630 [ 56.698670] ret_from_fork+0x10/0x20 [ 56.702229] [ 56.703704] The buggy address belongs to the object at ffff000800c2e200 [ 56.703704] which belongs to the cache kmalloc-64 of size 64 [ 56.716031] The buggy address is located 0 bytes to the right of [ 56.716031] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 56.728877] [ 56.730354] The buggy address belongs to the physical page: [ 56.735909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 56.743895] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.750405] page_type: f5(slab) [ 56.753538] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.761262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.768981] page dumped because: kasan: bad access detected [ 56.774537] [ 56.776012] Memory state around the buggy address: [ 56.780790] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.787995] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.795200] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.802401] ^ [ 56.807179] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.814383] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.821585] ================================================================== [ 62.116371] ================================================================== [ 62.123421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 62.130793] Read of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 62.138084] [ 62.139564] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 62.139608] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.139626] Hardware name: WinLink E850-96 board (DT) [ 62.139645] Call trace: [ 62.139655] show_stack+0x20/0x38 (C) [ 62.139690] dump_stack_lvl+0x8c/0xd0 [ 62.139724] print_report+0x118/0x608 [ 62.139761] kasan_report+0xdc/0x128 [ 62.139794] __asan_report_load8_noabort+0x20/0x30 [ 62.139824] kasan_atomics_helper+0x3df4/0x4858 [ 62.139858] kasan_atomics+0x198/0x2e0 [ 62.139890] kunit_try_run_case+0x170/0x3f0 [ 62.139924] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.139964] kthread+0x328/0x630 [ 62.139989] ret_from_fork+0x10/0x20 [ 62.140022] [ 62.207354] Allocated by task 309: [ 62.210741] kasan_save_stack+0x3c/0x68 [ 62.214559] kasan_save_track+0x20/0x40 [ 62.218379] kasan_save_alloc_info+0x40/0x58 [ 62.222632] __kasan_kmalloc+0xd4/0xd8 [ 62.226364] __kmalloc_cache_noprof+0x15c/0x3c0 [ 62.230878] kasan_atomics+0xb8/0x2e0 [ 62.234524] kunit_try_run_case+0x170/0x3f0 [ 62.238691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.244159] kthread+0x328/0x630 [ 62.247371] ret_from_fork+0x10/0x20 [ 62.250930] [ 62.252406] The buggy address belongs to the object at ffff000800c2e200 [ 62.252406] which belongs to the cache kmalloc-64 of size 64 [ 62.264732] The buggy address is located 0 bytes to the right of [ 62.264732] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 62.277579] [ 62.279055] The buggy address belongs to the physical page: [ 62.284611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 62.292596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.299106] page_type: f5(slab) [ 62.302239] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 62.309963] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.317683] page dumped because: kasan: bad access detected [ 62.323238] [ 62.324713] Memory state around the buggy address: [ 62.329492] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.336696] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.343901] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.351102] ^ [ 62.355880] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.363085] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.370286] ================================================================== [ 57.358098] ================================================================== [ 57.365156] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 57.372445] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 57.379822] [ 57.381302] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 57.381350] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.381366] Hardware name: WinLink E850-96 board (DT) [ 57.381384] Call trace: [ 57.381395] show_stack+0x20/0x38 (C) [ 57.381426] dump_stack_lvl+0x8c/0xd0 [ 57.381463] print_report+0x118/0x608 [ 57.381496] kasan_report+0xdc/0x128 [ 57.381530] kasan_check_range+0x100/0x1a8 [ 57.381565] __kasan_check_write+0x20/0x30 [ 57.381595] kasan_atomics_helper+0xf88/0x4858 [ 57.381628] kasan_atomics+0x198/0x2e0 [ 57.381659] kunit_try_run_case+0x170/0x3f0 [ 57.381691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.381729] kthread+0x328/0x630 [ 57.381755] ret_from_fork+0x10/0x20 [ 57.381787] [ 57.452391] Allocated by task 309: [ 57.455777] kasan_save_stack+0x3c/0x68 [ 57.459596] kasan_save_track+0x20/0x40 [ 57.463415] kasan_save_alloc_info+0x40/0x58 [ 57.467669] __kasan_kmalloc+0xd4/0xd8 [ 57.471401] __kmalloc_cache_noprof+0x15c/0x3c0 [ 57.475915] kasan_atomics+0xb8/0x2e0 [ 57.479561] kunit_try_run_case+0x170/0x3f0 [ 57.483727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.489196] kthread+0x328/0x630 [ 57.492408] ret_from_fork+0x10/0x20 [ 57.495967] [ 57.497442] The buggy address belongs to the object at ffff000800c2e200 [ 57.497442] which belongs to the cache kmalloc-64 of size 64 [ 57.509769] The buggy address is located 0 bytes to the right of [ 57.509769] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 57.522616] [ 57.524092] The buggy address belongs to the physical page: [ 57.529647] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 57.537633] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.544143] page_type: f5(slab) [ 57.547276] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.555000] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.562719] page dumped because: kasan: bad access detected [ 57.568275] [ 57.569750] Memory state around the buggy address: [ 57.574528] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.581733] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.588937] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.596139] ^ [ 57.600917] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.608121] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.615323] ================================================================== [ 57.622652] ================================================================== [ 57.629733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 57.637024] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 57.644402] [ 57.645882] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 57.645928] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.645943] Hardware name: WinLink E850-96 board (DT) [ 57.645962] Call trace: [ 57.645973] show_stack+0x20/0x38 (C) [ 57.646004] dump_stack_lvl+0x8c/0xd0 [ 57.646039] print_report+0x118/0x608 [ 57.646074] kasan_report+0xdc/0x128 [ 57.646105] kasan_check_range+0x100/0x1a8 [ 57.646141] __kasan_check_write+0x20/0x30 [ 57.646171] kasan_atomics_helper+0xff0/0x4858 [ 57.646204] kasan_atomics+0x198/0x2e0 [ 57.646235] kunit_try_run_case+0x170/0x3f0 [ 57.646269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.646307] kthread+0x328/0x630 [ 57.646334] ret_from_fork+0x10/0x20 [ 57.646364] [ 57.716970] Allocated by task 309: [ 57.720356] kasan_save_stack+0x3c/0x68 [ 57.724175] kasan_save_track+0x20/0x40 [ 57.727995] kasan_save_alloc_info+0x40/0x58 [ 57.732248] __kasan_kmalloc+0xd4/0xd8 [ 57.735981] __kmalloc_cache_noprof+0x15c/0x3c0 [ 57.740494] kasan_atomics+0xb8/0x2e0 [ 57.744140] kunit_try_run_case+0x170/0x3f0 [ 57.748307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.753775] kthread+0x328/0x630 [ 57.756987] ret_from_fork+0x10/0x20 [ 57.760546] [ 57.762022] The buggy address belongs to the object at ffff000800c2e200 [ 57.762022] which belongs to the cache kmalloc-64 of size 64 [ 57.774348] The buggy address is located 0 bytes to the right of [ 57.774348] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 57.787195] [ 57.788671] The buggy address belongs to the physical page: [ 57.794227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 57.802212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.808723] page_type: f5(slab) [ 57.811855] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.819579] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.827299] page dumped because: kasan: bad access detected [ 57.832854] [ 57.834330] Memory state around the buggy address: [ 57.839108] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.846312] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.853517] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.860718] ^ [ 57.865496] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.872701] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.879902] ================================================================== [ 54.199614] ================================================================== [ 54.206696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 54.213985] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 54.221363] [ 54.222842] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 54.222890] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.222906] Hardware name: WinLink E850-96 board (DT) [ 54.222924] Call trace: [ 54.222936] show_stack+0x20/0x38 (C) [ 54.222969] dump_stack_lvl+0x8c/0xd0 [ 54.223006] print_report+0x118/0x608 [ 54.223039] kasan_report+0xdc/0x128 [ 54.223071] kasan_check_range+0x100/0x1a8 [ 54.223107] __kasan_check_write+0x20/0x30 [ 54.223138] kasan_atomics_helper+0xc08/0x4858 [ 54.223172] kasan_atomics+0x198/0x2e0 [ 54.223204] kunit_try_run_case+0x170/0x3f0 [ 54.223239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.223279] kthread+0x328/0x630 [ 54.223304] ret_from_fork+0x10/0x20 [ 54.223336] [ 54.293931] Allocated by task 309: [ 54.297317] kasan_save_stack+0x3c/0x68 [ 54.301137] kasan_save_track+0x20/0x40 [ 54.304956] kasan_save_alloc_info+0x40/0x58 [ 54.309209] __kasan_kmalloc+0xd4/0xd8 [ 54.312942] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.317456] kasan_atomics+0xb8/0x2e0 [ 54.321101] kunit_try_run_case+0x170/0x3f0 [ 54.325268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.330736] kthread+0x328/0x630 [ 54.333948] ret_from_fork+0x10/0x20 [ 54.337507] [ 54.338983] The buggy address belongs to the object at ffff000800c2e200 [ 54.338983] which belongs to the cache kmalloc-64 of size 64 [ 54.351310] The buggy address is located 0 bytes to the right of [ 54.351310] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 54.364156] [ 54.365632] The buggy address belongs to the physical page: [ 54.371188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 54.379174] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.385684] page_type: f5(slab) [ 54.388816] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.396541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.404260] page dumped because: kasan: bad access detected [ 54.409815] [ 54.411291] Memory state around the buggy address: [ 54.416068] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.423274] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.430478] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.437679] ^ [ 54.442457] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.449662] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.456863] ================================================================== [ 51.034563] ================================================================== [ 51.041640] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 51.048928] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 51.056306] [ 51.057785] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 51.057832] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.057846] Hardware name: WinLink E850-96 board (DT) [ 51.057864] Call trace: [ 51.057876] show_stack+0x20/0x38 (C) [ 51.057908] dump_stack_lvl+0x8c/0xd0 [ 51.057942] print_report+0x118/0x608 [ 51.057975] kasan_report+0xdc/0x128 [ 51.058008] kasan_check_range+0x100/0x1a8 [ 51.058042] __kasan_check_write+0x20/0x30 [ 51.058072] kasan_atomics_helper+0x760/0x4858 [ 51.058104] kasan_atomics+0x198/0x2e0 [ 51.058134] kunit_try_run_case+0x170/0x3f0 [ 51.058166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.058207] kthread+0x328/0x630 [ 51.058234] ret_from_fork+0x10/0x20 [ 51.058266] [ 51.128875] Allocated by task 309: [ 51.132260] kasan_save_stack+0x3c/0x68 [ 51.136080] kasan_save_track+0x20/0x40 [ 51.139899] kasan_save_alloc_info+0x40/0x58 [ 51.144153] __kasan_kmalloc+0xd4/0xd8 [ 51.147885] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.152399] kasan_atomics+0xb8/0x2e0 [ 51.156044] kunit_try_run_case+0x170/0x3f0 [ 51.160211] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.165680] kthread+0x328/0x630 [ 51.168892] ret_from_fork+0x10/0x20 [ 51.172451] [ 51.173926] The buggy address belongs to the object at ffff000800c2e200 [ 51.173926] which belongs to the cache kmalloc-64 of size 64 [ 51.186253] The buggy address is located 0 bytes to the right of [ 51.186253] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 51.199099] [ 51.200575] The buggy address belongs to the physical page: [ 51.206131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 51.214117] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.220627] page_type: f5(slab) [ 51.223760] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.231484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.239203] page dumped because: kasan: bad access detected [ 51.244758] [ 51.246234] Memory state around the buggy address: [ 51.251012] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.258217] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.265421] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.272622] ^ [ 51.277401] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.284605] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.291806] ================================================================== [ 59.475791] ================================================================== [ 59.482832] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 59.490208] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 59.497586] [ 59.499066] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 59.499113] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.499130] Hardware name: WinLink E850-96 board (DT) [ 59.499148] Call trace: [ 59.499159] show_stack+0x20/0x38 (C) [ 59.499193] dump_stack_lvl+0x8c/0xd0 [ 59.499229] print_report+0x118/0x608 [ 59.499266] kasan_report+0xdc/0x128 [ 59.499298] kasan_check_range+0x100/0x1a8 [ 59.499332] __kasan_check_write+0x20/0x30 [ 59.499362] kasan_atomics_helper+0x12d8/0x4858 [ 59.499395] kasan_atomics+0x198/0x2e0 [ 59.499425] kunit_try_run_case+0x170/0x3f0 [ 59.499458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.499497] kthread+0x328/0x630 [ 59.499523] ret_from_fork+0x10/0x20 [ 59.499554] [ 59.570241] Allocated by task 309: [ 59.573627] kasan_save_stack+0x3c/0x68 [ 59.577446] kasan_save_track+0x20/0x40 [ 59.581265] kasan_save_alloc_info+0x40/0x58 [ 59.585519] __kasan_kmalloc+0xd4/0xd8 [ 59.589251] __kmalloc_cache_noprof+0x15c/0x3c0 [ 59.593765] kasan_atomics+0xb8/0x2e0 [ 59.597411] kunit_try_run_case+0x170/0x3f0 [ 59.601577] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.607046] kthread+0x328/0x630 [ 59.610258] ret_from_fork+0x10/0x20 [ 59.613817] [ 59.615294] The buggy address belongs to the object at ffff000800c2e200 [ 59.615294] which belongs to the cache kmalloc-64 of size 64 [ 59.627619] The buggy address is located 0 bytes to the right of [ 59.627619] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 59.640466] [ 59.641941] The buggy address belongs to the physical page: [ 59.647498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 59.655483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.661993] page_type: f5(slab) [ 59.665126] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.672851] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.680570] page dumped because: kasan: bad access detected [ 59.686126] [ 59.687600] Memory state around the buggy address: [ 59.692379] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.699583] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.706788] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.713989] ^ [ 59.718766] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.725971] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.733173] ================================================================== [ 63.168413] ================================================================== [ 63.175487] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 63.182861] Read of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 63.190152] [ 63.191632] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 63.191678] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.191694] Hardware name: WinLink E850-96 board (DT) [ 63.191715] Call trace: [ 63.191726] show_stack+0x20/0x38 (C) [ 63.191761] dump_stack_lvl+0x8c/0xd0 [ 63.191796] print_report+0x118/0x608 [ 63.191833] kasan_report+0xdc/0x128 [ 63.191866] __asan_report_load8_noabort+0x20/0x30 [ 63.191899] kasan_atomics_helper+0x3e20/0x4858 [ 63.191931] kasan_atomics+0x198/0x2e0 [ 63.191961] kunit_try_run_case+0x170/0x3f0 [ 63.191994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.192032] kthread+0x328/0x630 [ 63.192059] ret_from_fork+0x10/0x20 [ 63.192091] [ 63.259422] Allocated by task 309: [ 63.262807] kasan_save_stack+0x3c/0x68 [ 63.266627] kasan_save_track+0x20/0x40 [ 63.270446] kasan_save_alloc_info+0x40/0x58 [ 63.274699] __kasan_kmalloc+0xd4/0xd8 [ 63.278432] __kmalloc_cache_noprof+0x15c/0x3c0 [ 63.282946] kasan_atomics+0xb8/0x2e0 [ 63.286592] kunit_try_run_case+0x170/0x3f0 [ 63.290758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.296227] kthread+0x328/0x630 [ 63.299439] ret_from_fork+0x10/0x20 [ 63.302998] [ 63.304473] The buggy address belongs to the object at ffff000800c2e200 [ 63.304473] which belongs to the cache kmalloc-64 of size 64 [ 63.316800] The buggy address is located 0 bytes to the right of [ 63.316800] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 63.329646] [ 63.331122] The buggy address belongs to the physical page: [ 63.336678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 63.344663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.351174] page_type: f5(slab) [ 63.354307] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 63.362031] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.369750] page dumped because: kasan: bad access detected [ 63.375307] [ 63.376781] Memory state around the buggy address: [ 63.381559] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.388764] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.395969] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.403170] ^ [ 63.407947] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.415152] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.422353] ================================================================== [ 54.725478] ================================================================== [ 54.732557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 54.739845] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 54.747223] [ 54.748703] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 54.748752] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.748768] Hardware name: WinLink E850-96 board (DT) [ 54.748786] Call trace: [ 54.748798] show_stack+0x20/0x38 (C) [ 54.748832] dump_stack_lvl+0x8c/0xd0 [ 54.748868] print_report+0x118/0x608 [ 54.748902] kasan_report+0xdc/0x128 [ 54.748933] kasan_check_range+0x100/0x1a8 [ 54.748968] __kasan_check_write+0x20/0x30 [ 54.748998] kasan_atomics_helper+0xca0/0x4858 [ 54.749031] kasan_atomics+0x198/0x2e0 [ 54.749065] kunit_try_run_case+0x170/0x3f0 [ 54.749098] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.749138] kthread+0x328/0x630 [ 54.749164] ret_from_fork+0x10/0x20 [ 54.749194] [ 54.819791] Allocated by task 309: [ 54.823177] kasan_save_stack+0x3c/0x68 [ 54.826996] kasan_save_track+0x20/0x40 [ 54.830816] kasan_save_alloc_info+0x40/0x58 [ 54.835069] __kasan_kmalloc+0xd4/0xd8 [ 54.838802] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.843316] kasan_atomics+0xb8/0x2e0 [ 54.846961] kunit_try_run_case+0x170/0x3f0 [ 54.851128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.856597] kthread+0x328/0x630 [ 54.859808] ret_from_fork+0x10/0x20 [ 54.863367] [ 54.864843] The buggy address belongs to the object at ffff000800c2e200 [ 54.864843] which belongs to the cache kmalloc-64 of size 64 [ 54.877169] The buggy address is located 0 bytes to the right of [ 54.877169] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 54.890016] [ 54.891494] The buggy address belongs to the physical page: [ 54.897048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 54.905033] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.911544] page_type: f5(slab) [ 54.914676] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.922401] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.930120] page dumped because: kasan: bad access detected [ 54.935675] [ 54.937151] Memory state around the buggy address: [ 54.941929] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.949134] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.956338] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.963540] ^ [ 54.968317] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.975522] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.982723] ================================================================== [ 49.447087] ================================================================== [ 49.454163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 49.461452] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 49.468830] [ 49.470310] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 49.470358] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.470372] Hardware name: WinLink E850-96 board (DT) [ 49.470390] Call trace: [ 49.470403] show_stack+0x20/0x38 (C) [ 49.470434] dump_stack_lvl+0x8c/0xd0 [ 49.470470] print_report+0x118/0x608 [ 49.470506] kasan_report+0xdc/0x128 [ 49.470538] kasan_check_range+0x100/0x1a8 [ 49.470573] __kasan_check_write+0x20/0x30 [ 49.470603] kasan_atomics_helper+0x4e4/0x4858 [ 49.470637] kasan_atomics+0x198/0x2e0 [ 49.470668] kunit_try_run_case+0x170/0x3f0 [ 49.470700] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.470738] kthread+0x328/0x630 [ 49.470764] ret_from_fork+0x10/0x20 [ 49.470796] [ 49.541398] Allocated by task 309: [ 49.544784] kasan_save_stack+0x3c/0x68 [ 49.548604] kasan_save_track+0x20/0x40 [ 49.552423] kasan_save_alloc_info+0x40/0x58 [ 49.556676] __kasan_kmalloc+0xd4/0xd8 [ 49.560409] __kmalloc_cache_noprof+0x15c/0x3c0 [ 49.564923] kasan_atomics+0xb8/0x2e0 [ 49.568568] kunit_try_run_case+0x170/0x3f0 [ 49.572735] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.578204] kthread+0x328/0x630 [ 49.581416] ret_from_fork+0x10/0x20 [ 49.584974] [ 49.586450] The buggy address belongs to the object at ffff000800c2e200 [ 49.586450] which belongs to the cache kmalloc-64 of size 64 [ 49.598777] The buggy address is located 0 bytes to the right of [ 49.598777] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 49.611623] [ 49.613099] The buggy address belongs to the physical page: [ 49.618655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 49.626641] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.633151] page_type: f5(slab) [ 49.636284] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.644008] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.651727] page dumped because: kasan: bad access detected [ 49.657282] [ 49.658758] Memory state around the buggy address: [ 49.663536] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.670741] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.677945] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.685147] ^ [ 49.689924] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.697129] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.704330] ================================================================== [ 47.865999] ================================================================== [ 47.873112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 47.880486] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 47.887778] [ 47.889258] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 47.889312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.889327] Hardware name: WinLink E850-96 board (DT) [ 47.889348] Call trace: [ 47.889360] show_stack+0x20/0x38 (C) [ 47.889391] dump_stack_lvl+0x8c/0xd0 [ 47.889429] print_report+0x118/0x608 [ 47.889464] kasan_report+0xdc/0x128 [ 47.889496] __asan_report_load4_noabort+0x20/0x30 [ 47.889528] kasan_atomics_helper+0x40fc/0x4858 [ 47.889560] kasan_atomics+0x198/0x2e0 [ 47.889590] kunit_try_run_case+0x170/0x3f0 [ 47.889626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.889665] kthread+0x328/0x630 [ 47.889693] ret_from_fork+0x10/0x20 [ 47.889727] [ 47.957047] Allocated by task 309: [ 47.960433] kasan_save_stack+0x3c/0x68 [ 47.964252] kasan_save_track+0x20/0x40 [ 47.968072] kasan_save_alloc_info+0x40/0x58 [ 47.972325] __kasan_kmalloc+0xd4/0xd8 [ 47.976058] __kmalloc_cache_noprof+0x15c/0x3c0 [ 47.980571] kasan_atomics+0xb8/0x2e0 [ 47.984217] kunit_try_run_case+0x170/0x3f0 [ 47.988384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.993853] kthread+0x328/0x630 [ 47.997064] ret_from_fork+0x10/0x20 [ 48.000623] [ 48.002100] The buggy address belongs to the object at ffff000800c2e200 [ 48.002100] which belongs to the cache kmalloc-64 of size 64 [ 48.014426] The buggy address is located 0 bytes to the right of [ 48.014426] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 48.027272] [ 48.028750] The buggy address belongs to the physical page: [ 48.034304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 48.042291] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.048800] page_type: f5(slab) [ 48.051934] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.059657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.067376] page dumped because: kasan: bad access detected [ 48.072931] [ 48.074407] Memory state around the buggy address: [ 48.079187] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.086389] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.093596] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.100794] ^ [ 48.105573] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.112778] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.119979] ================================================================== [ 51.828322] ================================================================== [ 51.835377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 51.842753] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 51.850045] [ 51.851524] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 51.851570] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.851586] Hardware name: WinLink E850-96 board (DT) [ 51.851602] Call trace: [ 51.851614] show_stack+0x20/0x38 (C) [ 51.851649] dump_stack_lvl+0x8c/0xd0 [ 51.851684] print_report+0x118/0x608 [ 51.851718] kasan_report+0xdc/0x128 [ 51.851749] __asan_report_load4_noabort+0x20/0x30 [ 51.851780] kasan_atomics_helper+0x42d8/0x4858 [ 51.851814] kasan_atomics+0x198/0x2e0 [ 51.851844] kunit_try_run_case+0x170/0x3f0 [ 51.851877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.851915] kthread+0x328/0x630 [ 51.851942] ret_from_fork+0x10/0x20 [ 51.851974] [ 51.919314] Allocated by task 309: [ 51.922700] kasan_save_stack+0x3c/0x68 [ 51.926519] kasan_save_track+0x20/0x40 [ 51.930338] kasan_save_alloc_info+0x40/0x58 [ 51.934592] __kasan_kmalloc+0xd4/0xd8 [ 51.938325] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.942838] kasan_atomics+0xb8/0x2e0 [ 51.946484] kunit_try_run_case+0x170/0x3f0 [ 51.950651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.956119] kthread+0x328/0x630 [ 51.959331] ret_from_fork+0x10/0x20 [ 51.962890] [ 51.964365] The buggy address belongs to the object at ffff000800c2e200 [ 51.964365] which belongs to the cache kmalloc-64 of size 64 [ 51.976693] The buggy address is located 0 bytes to the right of [ 51.976693] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 51.989539] [ 51.991015] The buggy address belongs to the physical page: [ 51.996571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 52.004557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.011066] page_type: f5(slab) [ 52.014199] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.021924] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.029642] page dumped because: kasan: bad access detected [ 52.035198] [ 52.036674] Memory state around the buggy address: [ 52.041452] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.048656] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.055861] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.063062] ^ [ 52.067840] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.075045] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.082246] ================================================================== [ 56.302907] ================================================================== [ 56.309963] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 56.317252] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 56.324630] [ 56.326109] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 56.326156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.326172] Hardware name: WinLink E850-96 board (DT) [ 56.326190] Call trace: [ 56.326200] show_stack+0x20/0x38 (C) [ 56.326233] dump_stack_lvl+0x8c/0xd0 [ 56.326268] print_report+0x118/0x608 [ 56.326302] kasan_report+0xdc/0x128 [ 56.326335] kasan_check_range+0x100/0x1a8 [ 56.326370] __kasan_check_write+0x20/0x30 [ 56.326400] kasan_atomics_helper+0xe44/0x4858 [ 56.326432] kasan_atomics+0x198/0x2e0 [ 56.326464] kunit_try_run_case+0x170/0x3f0 [ 56.326497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.326536] kthread+0x328/0x630 [ 56.326563] ret_from_fork+0x10/0x20 [ 56.326593] [ 56.397198] Allocated by task 309: [ 56.400584] kasan_save_stack+0x3c/0x68 [ 56.404403] kasan_save_track+0x20/0x40 [ 56.408223] kasan_save_alloc_info+0x40/0x58 [ 56.412476] __kasan_kmalloc+0xd4/0xd8 [ 56.416209] __kmalloc_cache_noprof+0x15c/0x3c0 [ 56.420723] kasan_atomics+0xb8/0x2e0 [ 56.424368] kunit_try_run_case+0x170/0x3f0 [ 56.428535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.434004] kthread+0x328/0x630 [ 56.437215] ret_from_fork+0x10/0x20 [ 56.440774] [ 56.442250] The buggy address belongs to the object at ffff000800c2e200 [ 56.442250] which belongs to the cache kmalloc-64 of size 64 [ 56.454577] The buggy address is located 0 bytes to the right of [ 56.454577] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 56.467423] [ 56.468899] The buggy address belongs to the physical page: [ 56.474455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 56.482441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.488951] page_type: f5(slab) [ 56.492083] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.499808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.507527] page dumped because: kasan: bad access detected [ 56.513082] [ 56.514558] Memory state around the buggy address: [ 56.519336] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.526541] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.533745] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.540946] ^ [ 56.545724] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.552929] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.560130] ================================================================== [ 61.851567] ================================================================== [ 61.858668] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 61.866040] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 61.873418] [ 61.874900] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 61.874947] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.874962] Hardware name: WinLink E850-96 board (DT) [ 61.874980] Call trace: [ 61.874993] show_stack+0x20/0x38 (C) [ 61.875028] dump_stack_lvl+0x8c/0xd0 [ 61.875062] print_report+0x118/0x608 [ 61.875098] kasan_report+0xdc/0x128 [ 61.875131] kasan_check_range+0x100/0x1a8 [ 61.875167] __kasan_check_write+0x20/0x30 [ 61.875195] kasan_atomics_helper+0x1644/0x4858 [ 61.875230] kasan_atomics+0x198/0x2e0 [ 61.875260] kunit_try_run_case+0x170/0x3f0 [ 61.875295] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.875334] kthread+0x328/0x630 [ 61.875360] ret_from_fork+0x10/0x20 [ 61.875392] [ 61.946073] Allocated by task 309: [ 61.949462] kasan_save_stack+0x3c/0x68 [ 61.953279] kasan_save_track+0x20/0x40 [ 61.957098] kasan_save_alloc_info+0x40/0x58 [ 61.961351] __kasan_kmalloc+0xd4/0xd8 [ 61.965084] __kmalloc_cache_noprof+0x15c/0x3c0 [ 61.969598] kasan_atomics+0xb8/0x2e0 [ 61.973243] kunit_try_run_case+0x170/0x3f0 [ 61.977410] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.982879] kthread+0x328/0x630 [ 61.986090] ret_from_fork+0x10/0x20 [ 61.989649] [ 61.991125] The buggy address belongs to the object at ffff000800c2e200 [ 61.991125] which belongs to the cache kmalloc-64 of size 64 [ 62.003452] The buggy address is located 0 bytes to the right of [ 62.003452] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 62.016298] [ 62.017774] The buggy address belongs to the physical page: [ 62.023330] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 62.031317] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.037826] page_type: f5(slab) [ 62.040958] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 62.048682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.056402] page dumped because: kasan: bad access detected [ 62.061957] [ 62.063432] Memory state around the buggy address: [ 62.068211] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.075416] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.082620] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.089821] ^ [ 62.094599] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.101804] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.109005] ================================================================== [ 60.005265] ================================================================== [ 60.012340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 60.019714] Read of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 60.027005] [ 60.028485] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 60.028530] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.028545] Hardware name: WinLink E850-96 board (DT) [ 60.028562] Call trace: [ 60.028575] show_stack+0x20/0x38 (C) [ 60.028609] dump_stack_lvl+0x8c/0xd0 [ 60.028644] print_report+0x118/0x608 [ 60.028680] kasan_report+0xdc/0x128 [ 60.028713] __asan_report_load8_noabort+0x20/0x30 [ 60.028746] kasan_atomics_helper+0x3f04/0x4858 [ 60.028781] kasan_atomics+0x198/0x2e0 [ 60.028811] kunit_try_run_case+0x170/0x3f0 [ 60.028846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.028885] kthread+0x328/0x630 [ 60.028913] ret_from_fork+0x10/0x20 [ 60.028943] [ 60.096275] Allocated by task 309: [ 60.099660] kasan_save_stack+0x3c/0x68 [ 60.103480] kasan_save_track+0x20/0x40 [ 60.107299] kasan_save_alloc_info+0x40/0x58 [ 60.111552] __kasan_kmalloc+0xd4/0xd8 [ 60.115285] __kmalloc_cache_noprof+0x15c/0x3c0 [ 60.119799] kasan_atomics+0xb8/0x2e0 [ 60.123445] kunit_try_run_case+0x170/0x3f0 [ 60.127611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.133080] kthread+0x328/0x630 [ 60.136292] ret_from_fork+0x10/0x20 [ 60.139851] [ 60.141328] The buggy address belongs to the object at ffff000800c2e200 [ 60.141328] which belongs to the cache kmalloc-64 of size 64 [ 60.153654] The buggy address is located 0 bytes to the right of [ 60.153654] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 60.166499] [ 60.167976] The buggy address belongs to the physical page: [ 60.173531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 60.181517] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.188027] page_type: f5(slab) [ 60.191160] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.198884] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.206603] page dumped because: kasan: bad access detected [ 60.212160] [ 60.213634] Memory state around the buggy address: [ 60.218412] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.225617] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.232821] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.240023] ^ [ 60.244801] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.252005] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.259206] ================================================================== [ 48.391917] ================================================================== [ 48.398969] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 48.406347] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 48.413725] [ 48.415207] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 48.415256] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.415272] Hardware name: WinLink E850-96 board (DT) [ 48.415292] Call trace: [ 48.415305] show_stack+0x20/0x38 (C) [ 48.415339] dump_stack_lvl+0x8c/0xd0 [ 48.415374] print_report+0x118/0x608 [ 48.415410] kasan_report+0xdc/0x128 [ 48.415443] __asan_report_store4_noabort+0x20/0x30 [ 48.415475] kasan_atomics_helper+0x3f94/0x4858 [ 48.415509] kasan_atomics+0x198/0x2e0 [ 48.415539] kunit_try_run_case+0x170/0x3f0 [ 48.415574] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.415614] kthread+0x328/0x630 [ 48.415641] ret_from_fork+0x10/0x20 [ 48.415674] [ 48.483081] Allocated by task 309: [ 48.486468] kasan_save_stack+0x3c/0x68 [ 48.490286] kasan_save_track+0x20/0x40 [ 48.494106] kasan_save_alloc_info+0x40/0x58 [ 48.498359] __kasan_kmalloc+0xd4/0xd8 [ 48.502091] __kmalloc_cache_noprof+0x15c/0x3c0 [ 48.506605] kasan_atomics+0xb8/0x2e0 [ 48.510251] kunit_try_run_case+0x170/0x3f0 [ 48.514418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.519886] kthread+0x328/0x630 [ 48.523098] ret_from_fork+0x10/0x20 [ 48.526657] [ 48.528133] The buggy address belongs to the object at ffff000800c2e200 [ 48.528133] which belongs to the cache kmalloc-64 of size 64 [ 48.540461] The buggy address is located 0 bytes to the right of [ 48.540461] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 48.553306] [ 48.554782] The buggy address belongs to the physical page: [ 48.560339] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 48.568325] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.574833] page_type: f5(slab) [ 48.577966] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.585690] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.593410] page dumped because: kasan: bad access detected [ 48.598965] [ 48.600440] Memory state around the buggy address: [ 48.605218] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.612423] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.619630] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.626829] ^ [ 48.631607] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.638812] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.646013] ================================================================== [ 62.642405] ================================================================== [ 62.649453] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 62.656827] Read of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 62.664118] [ 62.665597] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 62.665647] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.665664] Hardware name: WinLink E850-96 board (DT) [ 62.665681] Call trace: [ 62.665693] show_stack+0x20/0x38 (C) [ 62.665726] dump_stack_lvl+0x8c/0xd0 [ 62.665760] print_report+0x118/0x608 [ 62.665795] kasan_report+0xdc/0x128 [ 62.665827] __asan_report_load8_noabort+0x20/0x30 [ 62.665859] kasan_atomics_helper+0x3e10/0x4858 [ 62.665891] kasan_atomics+0x198/0x2e0 [ 62.665924] kunit_try_run_case+0x170/0x3f0 [ 62.665957] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.665997] kthread+0x328/0x630 [ 62.666024] ret_from_fork+0x10/0x20 [ 62.666055] [ 62.733388] Allocated by task 309: [ 62.736777] kasan_save_stack+0x3c/0x68 [ 62.740593] kasan_save_track+0x20/0x40 [ 62.744412] kasan_save_alloc_info+0x40/0x58 [ 62.748666] __kasan_kmalloc+0xd4/0xd8 [ 62.752398] __kmalloc_cache_noprof+0x15c/0x3c0 [ 62.756912] kasan_atomics+0xb8/0x2e0 [ 62.760558] kunit_try_run_case+0x170/0x3f0 [ 62.764724] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.770193] kthread+0x328/0x630 [ 62.773405] ret_from_fork+0x10/0x20 [ 62.776964] [ 62.778440] The buggy address belongs to the object at ffff000800c2e200 [ 62.778440] which belongs to the cache kmalloc-64 of size 64 [ 62.790766] The buggy address is located 0 bytes to the right of [ 62.790766] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 62.803613] [ 62.805089] The buggy address belongs to the physical page: [ 62.810645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 62.818630] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.825140] page_type: f5(slab) [ 62.828273] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 62.835997] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.843716] page dumped because: kasan: bad access detected [ 62.849273] [ 62.850747] Memory state around the buggy address: [ 62.855525] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.862730] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.869935] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.877136] ^ [ 62.881914] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.889118] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.896320] ================================================================== [ 53.938347] ================================================================== [ 53.945415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 53.952791] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 53.960082] [ 53.961562] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 53.961610] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.961625] Hardware name: WinLink E850-96 board (DT) [ 53.961643] Call trace: [ 53.961655] show_stack+0x20/0x38 (C) [ 53.961685] dump_stack_lvl+0x8c/0xd0 [ 53.961720] print_report+0x118/0x608 [ 53.961756] kasan_report+0xdc/0x128 [ 53.961789] __asan_report_load4_noabort+0x20/0x30 [ 53.961821] kasan_atomics_helper+0x3dbc/0x4858 [ 53.961854] kasan_atomics+0x198/0x2e0 [ 53.961886] kunit_try_run_case+0x170/0x3f0 [ 53.961919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.961957] kthread+0x328/0x630 [ 53.961984] ret_from_fork+0x10/0x20 [ 53.962015] [ 54.029352] Allocated by task 309: [ 54.032738] kasan_save_stack+0x3c/0x68 [ 54.036557] kasan_save_track+0x20/0x40 [ 54.040376] kasan_save_alloc_info+0x40/0x58 [ 54.044630] __kasan_kmalloc+0xd4/0xd8 [ 54.048362] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.052876] kasan_atomics+0xb8/0x2e0 [ 54.056522] kunit_try_run_case+0x170/0x3f0 [ 54.060688] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.066157] kthread+0x328/0x630 [ 54.069369] ret_from_fork+0x10/0x20 [ 54.072928] [ 54.074403] The buggy address belongs to the object at ffff000800c2e200 [ 54.074403] which belongs to the cache kmalloc-64 of size 64 [ 54.086730] The buggy address is located 0 bytes to the right of [ 54.086730] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 54.099577] [ 54.101052] The buggy address belongs to the physical page: [ 54.106609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 54.114594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.121104] page_type: f5(slab) [ 54.124237] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.131961] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.139680] page dumped because: kasan: bad access detected [ 54.145236] [ 54.146711] Memory state around the buggy address: [ 54.151489] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.158694] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.165899] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.173100] ^ [ 54.177878] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.185082] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.192284] ================================================================== [ 47.601600] ================================================================== [ 47.608707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 47.615996] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 47.623285] [ 47.624765] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 47.624814] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.624831] Hardware name: WinLink E850-96 board (DT) [ 47.624853] Call trace: [ 47.624865] show_stack+0x20/0x38 (C) [ 47.624900] dump_stack_lvl+0x8c/0xd0 [ 47.624939] print_report+0x118/0x608 [ 47.624974] kasan_report+0xdc/0x128 [ 47.625007] kasan_check_range+0x100/0x1a8 [ 47.625044] __kasan_check_read+0x20/0x30 [ 47.625072] kasan_atomics_helper+0x2b0/0x4858 [ 47.625105] kasan_atomics+0x198/0x2e0 [ 47.625137] kunit_try_run_case+0x170/0x3f0 [ 47.625173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.625214] kthread+0x328/0x630 [ 47.625240] ret_from_fork+0x10/0x20 [ 47.625274] [ 47.695768] Allocated by task 309: [ 47.699152] kasan_save_stack+0x3c/0x68 [ 47.702972] kasan_save_track+0x20/0x40 [ 47.706791] kasan_save_alloc_info+0x40/0x58 [ 47.711044] __kasan_kmalloc+0xd4/0xd8 [ 47.714777] __kmalloc_cache_noprof+0x15c/0x3c0 [ 47.719291] kasan_atomics+0xb8/0x2e0 [ 47.722936] kunit_try_run_case+0x170/0x3f0 [ 47.727103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.732572] kthread+0x328/0x630 [ 47.735783] ret_from_fork+0x10/0x20 [ 47.739343] [ 47.740821] The buggy address belongs to the object at ffff000800c2e200 [ 47.740821] which belongs to the cache kmalloc-64 of size 64 [ 47.753145] The buggy address is located 0 bytes to the right of [ 47.753145] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 47.765991] [ 47.767469] The buggy address belongs to the physical page: [ 47.773023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 47.781010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.787520] page_type: f5(slab) [ 47.790653] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.798375] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.806095] page dumped because: kasan: bad access detected [ 47.811652] [ 47.813126] Memory state around the buggy address: [ 47.817907] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.825108] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.832317] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.839515] ^ [ 47.844292] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.851497] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.858698] ================================================================== [ 53.147897] ================================================================== [ 53.154975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 53.162265] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 53.169643] [ 53.171122] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 53.171170] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.171187] Hardware name: WinLink E850-96 board (DT) [ 53.171205] Call trace: [ 53.171217] show_stack+0x20/0x38 (C) [ 53.171248] dump_stack_lvl+0x8c/0xd0 [ 53.171282] print_report+0x118/0x608 [ 53.171320] kasan_report+0xdc/0x128 [ 53.171352] kasan_check_range+0x100/0x1a8 [ 53.171386] __kasan_check_write+0x20/0x30 [ 53.171415] kasan_atomics_helper+0xad4/0x4858 [ 53.171450] kasan_atomics+0x198/0x2e0 [ 53.171481] kunit_try_run_case+0x170/0x3f0 [ 53.171513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.171553] kthread+0x328/0x630 [ 53.171579] ret_from_fork+0x10/0x20 [ 53.171611] [ 53.242211] Allocated by task 309: [ 53.245596] kasan_save_stack+0x3c/0x68 [ 53.249416] kasan_save_track+0x20/0x40 [ 53.253235] kasan_save_alloc_info+0x40/0x58 [ 53.257489] __kasan_kmalloc+0xd4/0xd8 [ 53.261221] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.265735] kasan_atomics+0xb8/0x2e0 [ 53.269381] kunit_try_run_case+0x170/0x3f0 [ 53.273548] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.279016] kthread+0x328/0x630 [ 53.282228] ret_from_fork+0x10/0x20 [ 53.285787] [ 53.287263] The buggy address belongs to the object at ffff000800c2e200 [ 53.287263] which belongs to the cache kmalloc-64 of size 64 [ 53.299589] The buggy address is located 0 bytes to the right of [ 53.299589] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 53.312436] [ 53.313911] The buggy address belongs to the physical page: [ 53.319468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 53.327453] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.333963] page_type: f5(slab) [ 53.337096] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.344821] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.352539] page dumped because: kasan: bad access detected [ 53.358095] [ 53.359570] Memory state around the buggy address: [ 53.364348] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.371553] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.378758] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.385959] ^ [ 53.390737] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.397941] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.405143] ================================================================== [ 58.681481] ================================================================== [ 58.688575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 58.695949] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 58.703327] [ 58.704806] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 58.704855] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.704872] Hardware name: WinLink E850-96 board (DT) [ 58.704889] Call trace: [ 58.704902] show_stack+0x20/0x38 (C) [ 58.704936] dump_stack_lvl+0x8c/0xd0 [ 58.704971] print_report+0x118/0x608 [ 58.705004] kasan_report+0xdc/0x128 [ 58.705036] kasan_check_range+0x100/0x1a8 [ 58.705071] __kasan_check_write+0x20/0x30 [ 58.705101] kasan_atomics_helper+0x1190/0x4858 [ 58.705134] kasan_atomics+0x198/0x2e0 [ 58.705165] kunit_try_run_case+0x170/0x3f0 [ 58.705197] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.705237] kthread+0x328/0x630 [ 58.705264] ret_from_fork+0x10/0x20 [ 58.705295] [ 58.775982] Allocated by task 309: [ 58.779368] kasan_save_stack+0x3c/0x68 [ 58.783187] kasan_save_track+0x20/0x40 [ 58.787006] kasan_save_alloc_info+0x40/0x58 [ 58.791260] __kasan_kmalloc+0xd4/0xd8 [ 58.794992] __kmalloc_cache_noprof+0x15c/0x3c0 [ 58.799506] kasan_atomics+0xb8/0x2e0 [ 58.803152] kunit_try_run_case+0x170/0x3f0 [ 58.807318] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.812787] kthread+0x328/0x630 [ 58.815999] ret_from_fork+0x10/0x20 [ 58.819558] [ 58.821035] The buggy address belongs to the object at ffff000800c2e200 [ 58.821035] which belongs to the cache kmalloc-64 of size 64 [ 58.833360] The buggy address is located 0 bytes to the right of [ 58.833360] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 58.846207] [ 58.847683] The buggy address belongs to the physical page: [ 58.853239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 58.861224] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.867734] page_type: f5(slab) [ 58.870867] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.878591] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.886311] page dumped because: kasan: bad access detected [ 58.891867] [ 58.893341] Memory state around the buggy address: [ 58.898120] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.905324] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.912529] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.919730] ^ [ 58.924508] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.931713] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.938914] ================================================================== [ 46.542852] ================================================================== [ 46.556985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 46.564363] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 46.571651] [ 46.573141] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 46.573202] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.573219] Hardware name: WinLink E850-96 board (DT) [ 46.573242] Call trace: [ 46.573257] show_stack+0x20/0x38 (C) [ 46.573296] dump_stack_lvl+0x8c/0xd0 [ 46.573333] print_report+0x118/0x608 [ 46.573370] kasan_report+0xdc/0x128 [ 46.573402] __asan_report_load4_noabort+0x20/0x30 [ 46.573436] kasan_atomics_helper+0x40a8/0x4858 [ 46.573472] kasan_atomics+0x198/0x2e0 [ 46.573504] kunit_try_run_case+0x170/0x3f0 [ 46.573541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.573582] kthread+0x328/0x630 [ 46.573611] ret_from_fork+0x10/0x20 [ 46.573650] [ 46.640923] Allocated by task 309: [ 46.644311] kasan_save_stack+0x3c/0x68 [ 46.648126] kasan_save_track+0x20/0x40 [ 46.651946] kasan_save_alloc_info+0x40/0x58 [ 46.656199] __kasan_kmalloc+0xd4/0xd8 [ 46.659932] __kmalloc_cache_noprof+0x15c/0x3c0 [ 46.664445] kasan_atomics+0xb8/0x2e0 [ 46.668091] kunit_try_run_case+0x170/0x3f0 [ 46.672258] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.677728] kthread+0x328/0x630 [ 46.680938] ret_from_fork+0x10/0x20 [ 46.684497] [ 46.685975] The buggy address belongs to the object at ffff000800c2e200 [ 46.685975] which belongs to the cache kmalloc-64 of size 64 [ 46.698301] The buggy address is located 0 bytes to the right of [ 46.698301] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 46.711146] [ 46.712624] The buggy address belongs to the physical page: [ 46.718181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 46.726168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.732675] page_type: f5(slab) [ 46.735812] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 46.743531] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.751251] page dumped because: kasan: bad access detected [ 46.756807] [ 46.758281] Memory state around the buggy address: [ 46.763062] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.770263] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.777470] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 46.784669] ^ [ 46.789447] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.796652] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.803854] ================================================================== [ 50.769991] ================================================================== [ 50.777059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 50.784349] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 50.791727] [ 50.793207] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 50.793254] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.793271] Hardware name: WinLink E850-96 board (DT) [ 50.793290] Call trace: [ 50.793302] show_stack+0x20/0x38 (C) [ 50.793336] dump_stack_lvl+0x8c/0xd0 [ 50.793371] print_report+0x118/0x608 [ 50.793405] kasan_report+0xdc/0x128 [ 50.793438] kasan_check_range+0x100/0x1a8 [ 50.793473] __kasan_check_write+0x20/0x30 [ 50.793502] kasan_atomics_helper+0x6ec/0x4858 [ 50.793535] kasan_atomics+0x198/0x2e0 [ 50.793566] kunit_try_run_case+0x170/0x3f0 [ 50.793599] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.793637] kthread+0x328/0x630 [ 50.793663] ret_from_fork+0x10/0x20 [ 50.793692] [ 50.864295] Allocated by task 309: [ 50.867681] kasan_save_stack+0x3c/0x68 [ 50.871500] kasan_save_track+0x20/0x40 [ 50.875320] kasan_save_alloc_info+0x40/0x58 [ 50.879573] __kasan_kmalloc+0xd4/0xd8 [ 50.883305] __kmalloc_cache_noprof+0x15c/0x3c0 [ 50.887819] kasan_atomics+0xb8/0x2e0 [ 50.891465] kunit_try_run_case+0x170/0x3f0 [ 50.895632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.901101] kthread+0x328/0x630 [ 50.904312] ret_from_fork+0x10/0x20 [ 50.907871] [ 50.909347] The buggy address belongs to the object at ffff000800c2e200 [ 50.909347] which belongs to the cache kmalloc-64 of size 64 [ 50.921673] The buggy address is located 0 bytes to the right of [ 50.921673] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 50.934520] [ 50.935996] The buggy address belongs to the physical page: [ 50.941552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 50.949538] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.956047] page_type: f5(slab) [ 50.959180] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.966905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.974624] page dumped because: kasan: bad access detected [ 50.980179] [ 50.981655] Memory state around the buggy address: [ 50.986433] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.993638] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.000842] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.008043] ^ [ 51.012821] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.020026] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.027227] ================================================================== [ 56.041603] ================================================================== [ 56.048683] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 56.056058] Read of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 56.063349] [ 56.064829] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 56.064875] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.064890] Hardware name: WinLink E850-96 board (DT) [ 56.064908] Call trace: [ 56.064920] show_stack+0x20/0x38 (C) [ 56.064952] dump_stack_lvl+0x8c/0xd0 [ 56.064987] print_report+0x118/0x608 [ 56.065021] kasan_report+0xdc/0x128 [ 56.065054] __asan_report_load8_noabort+0x20/0x30 [ 56.065086] kasan_atomics_helper+0x3f58/0x4858 [ 56.065120] kasan_atomics+0x198/0x2e0 [ 56.065151] kunit_try_run_case+0x170/0x3f0 [ 56.065185] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.065223] kthread+0x328/0x630 [ 56.065248] ret_from_fork+0x10/0x20 [ 56.065279] [ 56.132619] Allocated by task 309: [ 56.136004] kasan_save_stack+0x3c/0x68 [ 56.139824] kasan_save_track+0x20/0x40 [ 56.143643] kasan_save_alloc_info+0x40/0x58 [ 56.147897] __kasan_kmalloc+0xd4/0xd8 [ 56.151629] __kmalloc_cache_noprof+0x15c/0x3c0 [ 56.156143] kasan_atomics+0xb8/0x2e0 [ 56.159789] kunit_try_run_case+0x170/0x3f0 [ 56.163956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.169424] kthread+0x328/0x630 [ 56.172636] ret_from_fork+0x10/0x20 [ 56.176195] [ 56.177671] The buggy address belongs to the object at ffff000800c2e200 [ 56.177671] which belongs to the cache kmalloc-64 of size 64 [ 56.189997] The buggy address is located 0 bytes to the right of [ 56.189997] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 56.202844] [ 56.204320] The buggy address belongs to the physical page: [ 56.209875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 56.217861] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.224371] page_type: f5(slab) [ 56.227504] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.235229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.242948] page dumped because: kasan: bad access detected [ 56.248503] [ 56.249978] Memory state around the buggy address: [ 56.254756] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.261961] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.269166] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.276367] ^ [ 56.281145] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.288349] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.295551] ================================================================== [ 50.240898] ================================================================== [ 50.247900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 50.255190] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 50.262568] [ 50.264048] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 50.264095] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.264113] Hardware name: WinLink E850-96 board (DT) [ 50.264129] Call trace: [ 50.264141] show_stack+0x20/0x38 (C) [ 50.264175] dump_stack_lvl+0x8c/0xd0 [ 50.264214] print_report+0x118/0x608 [ 50.264251] kasan_report+0xdc/0x128 [ 50.264284] kasan_check_range+0x100/0x1a8 [ 50.264318] __kasan_check_write+0x20/0x30 [ 50.264348] kasan_atomics_helper+0x61c/0x4858 [ 50.264380] kasan_atomics+0x198/0x2e0 [ 50.264410] kunit_try_run_case+0x170/0x3f0 [ 50.264443] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.264483] kthread+0x328/0x630 [ 50.264511] ret_from_fork+0x10/0x20 [ 50.264541] [ 50.335137] Allocated by task 309: [ 50.338522] kasan_save_stack+0x3c/0x68 [ 50.342342] kasan_save_track+0x20/0x40 [ 50.346161] kasan_save_alloc_info+0x40/0x58 [ 50.350414] __kasan_kmalloc+0xd4/0xd8 [ 50.354147] __kmalloc_cache_noprof+0x15c/0x3c0 [ 50.358661] kasan_atomics+0xb8/0x2e0 [ 50.362306] kunit_try_run_case+0x170/0x3f0 [ 50.366473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.371942] kthread+0x328/0x630 [ 50.375154] ret_from_fork+0x10/0x20 [ 50.378713] [ 50.380188] The buggy address belongs to the object at ffff000800c2e200 [ 50.380188] which belongs to the cache kmalloc-64 of size 64 [ 50.392515] The buggy address is located 0 bytes to the right of [ 50.392515] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 50.405361] [ 50.406838] The buggy address belongs to the physical page: [ 50.412393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 50.420378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.426889] page_type: f5(slab) [ 50.430023] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.437746] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.445465] page dumped because: kasan: bad access detected [ 50.451021] [ 50.452496] Memory state around the buggy address: [ 50.457274] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.464479] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.471684] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.478884] ^ [ 50.483662] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.490867] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.498068] ================================================================== [ 59.211010] ================================================================== [ 59.218081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 59.225455] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 59.232833] [ 59.234314] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 59.234359] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.234376] Hardware name: WinLink E850-96 board (DT) [ 59.234393] Call trace: [ 59.234404] show_stack+0x20/0x38 (C) [ 59.234438] dump_stack_lvl+0x8c/0xd0 [ 59.234473] print_report+0x118/0x608 [ 59.234510] kasan_report+0xdc/0x128 [ 59.234543] kasan_check_range+0x100/0x1a8 [ 59.234577] __kasan_check_write+0x20/0x30 [ 59.234609] kasan_atomics_helper+0x126c/0x4858 [ 59.234644] kasan_atomics+0x198/0x2e0 [ 59.234675] kunit_try_run_case+0x170/0x3f0 [ 59.234711] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.234749] kthread+0x328/0x630 [ 59.234775] ret_from_fork+0x10/0x20 [ 59.234805] [ 59.305488] Allocated by task 309: [ 59.308875] kasan_save_stack+0x3c/0x68 [ 59.312693] kasan_save_track+0x20/0x40 [ 59.316513] kasan_save_alloc_info+0x40/0x58 [ 59.320766] __kasan_kmalloc+0xd4/0xd8 [ 59.324498] __kmalloc_cache_noprof+0x15c/0x3c0 [ 59.329012] kasan_atomics+0xb8/0x2e0 [ 59.332658] kunit_try_run_case+0x170/0x3f0 [ 59.336825] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.342293] kthread+0x328/0x630 [ 59.345505] ret_from_fork+0x10/0x20 [ 59.349064] [ 59.350540] The buggy address belongs to the object at ffff000800c2e200 [ 59.350540] which belongs to the cache kmalloc-64 of size 64 [ 59.362866] The buggy address is located 0 bytes to the right of [ 59.362866] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 59.375713] [ 59.377188] The buggy address belongs to the physical page: [ 59.382745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 59.390730] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.397240] page_type: f5(slab) [ 59.400373] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.408097] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.415816] page dumped because: kasan: bad access detected [ 59.421373] [ 59.422847] Memory state around the buggy address: [ 59.427625] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.434830] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.442035] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.449236] ^ [ 59.454014] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.461218] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.468420] ================================================================== [ 62.377633] ================================================================== [ 62.384699] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 62.392074] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 62.399452] [ 62.400934] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 62.400983] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.401000] Hardware name: WinLink E850-96 board (DT) [ 62.401016] Call trace: [ 62.401027] show_stack+0x20/0x38 (C) [ 62.401062] dump_stack_lvl+0x8c/0xd0 [ 62.401097] print_report+0x118/0x608 [ 62.401133] kasan_report+0xdc/0x128 [ 62.401166] kasan_check_range+0x100/0x1a8 [ 62.401201] __kasan_check_write+0x20/0x30 [ 62.401229] kasan_atomics_helper+0x16d0/0x4858 [ 62.401262] kasan_atomics+0x198/0x2e0 [ 62.401294] kunit_try_run_case+0x170/0x3f0 [ 62.401326] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.401365] kthread+0x328/0x630 [ 62.401392] ret_from_fork+0x10/0x20 [ 62.401425] [ 62.472107] Allocated by task 309: [ 62.475494] kasan_save_stack+0x3c/0x68 [ 62.479312] kasan_save_track+0x20/0x40 [ 62.483132] kasan_save_alloc_info+0x40/0x58 [ 62.487385] __kasan_kmalloc+0xd4/0xd8 [ 62.491118] __kmalloc_cache_noprof+0x15c/0x3c0 [ 62.495632] kasan_atomics+0xb8/0x2e0 [ 62.499277] kunit_try_run_case+0x170/0x3f0 [ 62.503444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.508912] kthread+0x328/0x630 [ 62.512124] ret_from_fork+0x10/0x20 [ 62.515683] [ 62.517160] The buggy address belongs to the object at ffff000800c2e200 [ 62.517160] which belongs to the cache kmalloc-64 of size 64 [ 62.529486] The buggy address is located 0 bytes to the right of [ 62.529486] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 62.542332] [ 62.543809] The buggy address belongs to the physical page: [ 62.549364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 62.557349] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.563860] page_type: f5(slab) [ 62.566992] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 62.574717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.582435] page dumped because: kasan: bad access detected [ 62.587992] [ 62.589466] Memory state around the buggy address: [ 62.594245] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.601449] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.608654] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.615855] ^ [ 62.620633] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.627838] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.635039] ================================================================== [ 54.990081] ================================================================== [ 54.997135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 55.004511] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 55.011803] [ 55.013282] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 55.013330] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.013346] Hardware name: WinLink E850-96 board (DT) [ 55.013367] Call trace: [ 55.013379] show_stack+0x20/0x38 (C) [ 55.013412] dump_stack_lvl+0x8c/0xd0 [ 55.013448] print_report+0x118/0x608 [ 55.013482] kasan_report+0xdc/0x128 [ 55.013515] __asan_report_load4_noabort+0x20/0x30 [ 55.013546] kasan_atomics_helper+0x3dd8/0x4858 [ 55.013580] kasan_atomics+0x198/0x2e0 [ 55.013611] kunit_try_run_case+0x170/0x3f0 [ 55.013646] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.013684] kthread+0x328/0x630 [ 55.013711] ret_from_fork+0x10/0x20 [ 55.013743] [ 55.081072] Allocated by task 309: [ 55.084458] kasan_save_stack+0x3c/0x68 [ 55.088277] kasan_save_track+0x20/0x40 [ 55.092097] kasan_save_alloc_info+0x40/0x58 [ 55.096350] __kasan_kmalloc+0xd4/0xd8 [ 55.100083] __kmalloc_cache_noprof+0x15c/0x3c0 [ 55.104596] kasan_atomics+0xb8/0x2e0 [ 55.108242] kunit_try_run_case+0x170/0x3f0 [ 55.112409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.117877] kthread+0x328/0x630 [ 55.121089] ret_from_fork+0x10/0x20 [ 55.124648] [ 55.126124] The buggy address belongs to the object at ffff000800c2e200 [ 55.126124] which belongs to the cache kmalloc-64 of size 64 [ 55.138450] The buggy address is located 0 bytes to the right of [ 55.138450] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 55.151297] [ 55.152773] The buggy address belongs to the physical page: [ 55.158329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 55.166314] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.172825] page_type: f5(slab) [ 55.175957] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.183682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.191400] page dumped because: kasan: bad access detected [ 55.196956] [ 55.198432] Memory state around the buggy address: [ 55.203209] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.210414] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.217619] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.224820] ^ [ 55.229598] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.236803] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.244004] ================================================================== [ 59.740516] ================================================================== [ 59.747587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 59.754961] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 59.762339] [ 59.763819] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 59.763863] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.763881] Hardware name: WinLink E850-96 board (DT) [ 59.763898] Call trace: [ 59.763910] show_stack+0x20/0x38 (C) [ 59.763945] dump_stack_lvl+0x8c/0xd0 [ 59.763980] print_report+0x118/0x608 [ 59.764018] kasan_report+0xdc/0x128 [ 59.764049] kasan_check_range+0x100/0x1a8 [ 59.764083] __kasan_check_write+0x20/0x30 [ 59.764114] kasan_atomics_helper+0x1384/0x4858 [ 59.764148] kasan_atomics+0x198/0x2e0 [ 59.764180] kunit_try_run_case+0x170/0x3f0 [ 59.764214] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.764253] kthread+0x328/0x630 [ 59.764281] ret_from_fork+0x10/0x20 [ 59.764312] [ 59.834994] Allocated by task 309: [ 59.838380] kasan_save_stack+0x3c/0x68 [ 59.842199] kasan_save_track+0x20/0x40 [ 59.846018] kasan_save_alloc_info+0x40/0x58 [ 59.850272] __kasan_kmalloc+0xd4/0xd8 [ 59.854004] __kmalloc_cache_noprof+0x15c/0x3c0 [ 59.858518] kasan_atomics+0xb8/0x2e0 [ 59.862164] kunit_try_run_case+0x170/0x3f0 [ 59.866331] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.871799] kthread+0x328/0x630 [ 59.875011] ret_from_fork+0x10/0x20 [ 59.878570] [ 59.880047] The buggy address belongs to the object at ffff000800c2e200 [ 59.880047] which belongs to the cache kmalloc-64 of size 64 [ 59.892372] The buggy address is located 0 bytes to the right of [ 59.892372] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 59.905219] [ 59.906696] The buggy address belongs to the physical page: [ 59.912251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 59.920236] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.926746] page_type: f5(slab) [ 59.929879] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.937604] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.945322] page dumped because: kasan: bad access detected [ 59.950879] [ 59.952353] Memory state around the buggy address: [ 59.957131] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.964336] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.971541] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.978742] ^ [ 59.983520] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.990724] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.997925] ================================================================== [ 49.711690] ================================================================== [ 49.718742] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 49.726032] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 49.733410] [ 49.734889] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 49.734938] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.734956] Hardware name: WinLink E850-96 board (DT) [ 49.734973] Call trace: [ 49.734985] show_stack+0x20/0x38 (C) [ 49.735020] dump_stack_lvl+0x8c/0xd0 [ 49.735056] print_report+0x118/0x608 [ 49.735093] kasan_report+0xdc/0x128 [ 49.735126] kasan_check_range+0x100/0x1a8 [ 49.735161] __kasan_check_write+0x20/0x30 [ 49.735190] kasan_atomics_helper+0x54c/0x4858 [ 49.735225] kasan_atomics+0x198/0x2e0 [ 49.735257] kunit_try_run_case+0x170/0x3f0 [ 49.735289] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.735327] kthread+0x328/0x630 [ 49.735354] ret_from_fork+0x10/0x20 [ 49.735384] [ 49.805978] Allocated by task 309: [ 49.809364] kasan_save_stack+0x3c/0x68 [ 49.813183] kasan_save_track+0x20/0x40 [ 49.817002] kasan_save_alloc_info+0x40/0x58 [ 49.821255] __kasan_kmalloc+0xd4/0xd8 [ 49.824988] __kmalloc_cache_noprof+0x15c/0x3c0 [ 49.829502] kasan_atomics+0xb8/0x2e0 [ 49.833148] kunit_try_run_case+0x170/0x3f0 [ 49.837314] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.842783] kthread+0x328/0x630 [ 49.845995] ret_from_fork+0x10/0x20 [ 49.849554] [ 49.851029] The buggy address belongs to the object at ffff000800c2e200 [ 49.851029] which belongs to the cache kmalloc-64 of size 64 [ 49.863356] The buggy address is located 0 bytes to the right of [ 49.863356] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 49.876203] [ 49.877679] The buggy address belongs to the physical page: [ 49.883234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 49.891220] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.897730] page_type: f5(slab) [ 49.900863] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.908587] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.916306] page dumped because: kasan: bad access detected [ 49.921861] [ 49.923337] Memory state around the buggy address: [ 49.928115] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.935320] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.942525] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.949726] ^ [ 49.954503] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.961709] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.968910] ================================================================== [ 60.531331] ================================================================== [ 60.538375] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 60.545748] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 60.553126] [ 60.554605] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 60.554652] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.554668] Hardware name: WinLink E850-96 board (DT) [ 60.554686] Call trace: [ 60.554699] show_stack+0x20/0x38 (C) [ 60.554733] dump_stack_lvl+0x8c/0xd0 [ 60.554767] print_report+0x118/0x608 [ 60.554803] kasan_report+0xdc/0x128 [ 60.554835] kasan_check_range+0x100/0x1a8 [ 60.554871] __kasan_check_write+0x20/0x30 [ 60.554899] kasan_atomics_helper+0x147c/0x4858 [ 60.554934] kasan_atomics+0x198/0x2e0 [ 60.554966] kunit_try_run_case+0x170/0x3f0 [ 60.554999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.555038] kthread+0x328/0x630 [ 60.555066] ret_from_fork+0x10/0x20 [ 60.555098] [ 60.625781] Allocated by task 309: [ 60.629168] kasan_save_stack+0x3c/0x68 [ 60.632986] kasan_save_track+0x20/0x40 [ 60.636805] kasan_save_alloc_info+0x40/0x58 [ 60.641058] __kasan_kmalloc+0xd4/0xd8 [ 60.644791] __kmalloc_cache_noprof+0x15c/0x3c0 [ 60.649305] kasan_atomics+0xb8/0x2e0 [ 60.652951] kunit_try_run_case+0x170/0x3f0 [ 60.657117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.662586] kthread+0x328/0x630 [ 60.665798] ret_from_fork+0x10/0x20 [ 60.669357] [ 60.670832] The buggy address belongs to the object at ffff000800c2e200 [ 60.670832] which belongs to the cache kmalloc-64 of size 64 [ 60.683159] The buggy address is located 0 bytes to the right of [ 60.683159] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 60.696006] [ 60.697482] The buggy address belongs to the physical page: [ 60.703037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 60.711023] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.717533] page_type: f5(slab) [ 60.720666] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.728390] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.736109] page dumped because: kasan: bad access detected [ 60.741666] [ 60.743140] Memory state around the buggy address: [ 60.747920] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.755123] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.762328] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.769528] ^ [ 60.774307] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.781511] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.788713] ================================================================== [ 48.653380] ================================================================== [ 48.660426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 48.667714] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 48.675092] [ 48.676573] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 48.676620] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.676636] Hardware name: WinLink E850-96 board (DT) [ 48.676656] Call trace: [ 48.676670] show_stack+0x20/0x38 (C) [ 48.676701] dump_stack_lvl+0x8c/0xd0 [ 48.676737] print_report+0x118/0x608 [ 48.676772] kasan_report+0xdc/0x128 [ 48.676805] kasan_check_range+0x100/0x1a8 [ 48.676843] __kasan_check_write+0x20/0x30 [ 48.676872] kasan_atomics_helper+0x3ac/0x4858 [ 48.676904] kasan_atomics+0x198/0x2e0 [ 48.676935] kunit_try_run_case+0x170/0x3f0 [ 48.676968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.677007] kthread+0x328/0x630 [ 48.677035] ret_from_fork+0x10/0x20 [ 48.677066] [ 48.747661] Allocated by task 309: [ 48.751046] kasan_save_stack+0x3c/0x68 [ 48.754866] kasan_save_track+0x20/0x40 [ 48.758685] kasan_save_alloc_info+0x40/0x58 [ 48.762938] __kasan_kmalloc+0xd4/0xd8 [ 48.766671] __kmalloc_cache_noprof+0x15c/0x3c0 [ 48.771185] kasan_atomics+0xb8/0x2e0 [ 48.774830] kunit_try_run_case+0x170/0x3f0 [ 48.778997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.784466] kthread+0x328/0x630 [ 48.787677] ret_from_fork+0x10/0x20 [ 48.791236] [ 48.792712] The buggy address belongs to the object at ffff000800c2e200 [ 48.792712] which belongs to the cache kmalloc-64 of size 64 [ 48.805039] The buggy address is located 0 bytes to the right of [ 48.805039] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 48.817885] [ 48.819361] The buggy address belongs to the physical page: [ 48.824917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 48.832903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.839413] page_type: f5(slab) [ 48.842546] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.850270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.857989] page dumped because: kasan: bad access detected [ 48.863544] [ 48.865020] Memory state around the buggy address: [ 48.869798] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.877002] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.884209] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.891408] ^ [ 48.896186] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.903391] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.910592] ================================================================== [ 50.505432] ================================================================== [ 50.512480] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 50.519770] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 50.527147] [ 50.528629] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 50.528674] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.528690] Hardware name: WinLink E850-96 board (DT) [ 50.528708] Call trace: [ 50.528720] show_stack+0x20/0x38 (C) [ 50.528753] dump_stack_lvl+0x8c/0xd0 [ 50.528788] print_report+0x118/0x608 [ 50.528821] kasan_report+0xdc/0x128 [ 50.528854] kasan_check_range+0x100/0x1a8 [ 50.528891] __kasan_check_write+0x20/0x30 [ 50.528922] kasan_atomics_helper+0x684/0x4858 [ 50.528957] kasan_atomics+0x198/0x2e0 [ 50.528987] kunit_try_run_case+0x170/0x3f0 [ 50.529020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.529058] kthread+0x328/0x630 [ 50.529084] ret_from_fork+0x10/0x20 [ 50.529114] [ 50.599716] Allocated by task 309: [ 50.603101] kasan_save_stack+0x3c/0x68 [ 50.606921] kasan_save_track+0x20/0x40 [ 50.610740] kasan_save_alloc_info+0x40/0x58 [ 50.614994] __kasan_kmalloc+0xd4/0xd8 [ 50.618726] __kmalloc_cache_noprof+0x15c/0x3c0 [ 50.623240] kasan_atomics+0xb8/0x2e0 [ 50.626886] kunit_try_run_case+0x170/0x3f0 [ 50.631053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.636521] kthread+0x328/0x630 [ 50.639733] ret_from_fork+0x10/0x20 [ 50.643292] [ 50.644767] The buggy address belongs to the object at ffff000800c2e200 [ 50.644767] which belongs to the cache kmalloc-64 of size 64 [ 50.657094] The buggy address is located 0 bytes to the right of [ 50.657094] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 50.669941] [ 50.671416] The buggy address belongs to the physical page: [ 50.676973] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 50.684958] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.691468] page_type: f5(slab) [ 50.694601] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.702325] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.710044] page dumped because: kasan: bad access detected [ 50.715599] [ 50.717075] Memory state around the buggy address: [ 50.721853] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.729058] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.736263] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.743464] ^ [ 50.748242] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.755447] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.762648] ================================================================== [ 52.354168] ================================================================== [ 52.361237] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 52.368527] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 52.375905] [ 52.377384] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 52.377430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.377445] Hardware name: WinLink E850-96 board (DT) [ 52.377463] Call trace: [ 52.377475] show_stack+0x20/0x38 (C) [ 52.377507] dump_stack_lvl+0x8c/0xd0 [ 52.377542] print_report+0x118/0x608 [ 52.377576] kasan_report+0xdc/0x128 [ 52.377609] kasan_check_range+0x100/0x1a8 [ 52.377642] __kasan_check_write+0x20/0x30 [ 52.377671] kasan_atomics_helper+0x99c/0x4858 [ 52.377704] kasan_atomics+0x198/0x2e0 [ 52.377735] kunit_try_run_case+0x170/0x3f0 [ 52.377769] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.377806] kthread+0x328/0x630 [ 52.377833] ret_from_fork+0x10/0x20 [ 52.377864] [ 52.448473] Allocated by task 309: [ 52.451859] kasan_save_stack+0x3c/0x68 [ 52.455678] kasan_save_track+0x20/0x40 [ 52.459497] kasan_save_alloc_info+0x40/0x58 [ 52.463751] __kasan_kmalloc+0xd4/0xd8 [ 52.467483] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.471997] kasan_atomics+0xb8/0x2e0 [ 52.475643] kunit_try_run_case+0x170/0x3f0 [ 52.479809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.485278] kthread+0x328/0x630 [ 52.488490] ret_from_fork+0x10/0x20 [ 52.492049] [ 52.493524] The buggy address belongs to the object at ffff000800c2e200 [ 52.493524] which belongs to the cache kmalloc-64 of size 64 [ 52.505851] The buggy address is located 0 bytes to the right of [ 52.505851] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 52.518698] [ 52.520174] The buggy address belongs to the physical page: [ 52.525729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 52.533715] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.540225] page_type: f5(slab) [ 52.543358] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.551082] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.558801] page dumped because: kasan: bad access detected [ 52.564357] [ 52.565832] Memory state around the buggy address: [ 52.570610] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.577815] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.585020] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.592221] ^ [ 52.596999] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.604204] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.611405] ================================================================== [ 53.412507] ================================================================== [ 53.419556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 53.426931] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 53.434222] [ 53.435702] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 53.435749] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.435766] Hardware name: WinLink E850-96 board (DT) [ 53.435784] Call trace: [ 53.435796] show_stack+0x20/0x38 (C) [ 53.435830] dump_stack_lvl+0x8c/0xd0 [ 53.435865] print_report+0x118/0x608 [ 53.435896] kasan_report+0xdc/0x128 [ 53.435930] __asan_report_load4_noabort+0x20/0x30 [ 53.435961] kasan_atomics_helper+0x3dcc/0x4858 [ 53.435996] kasan_atomics+0x198/0x2e0 [ 53.436027] kunit_try_run_case+0x170/0x3f0 [ 53.436062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.436100] kthread+0x328/0x630 [ 53.436129] ret_from_fork+0x10/0x20 [ 53.436161] [ 53.503492] Allocated by task 309: [ 53.506878] kasan_save_stack+0x3c/0x68 [ 53.510697] kasan_save_track+0x20/0x40 [ 53.514516] kasan_save_alloc_info+0x40/0x58 [ 53.518770] __kasan_kmalloc+0xd4/0xd8 [ 53.522502] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.527016] kasan_atomics+0xb8/0x2e0 [ 53.530662] kunit_try_run_case+0x170/0x3f0 [ 53.534828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.540297] kthread+0x328/0x630 [ 53.543509] ret_from_fork+0x10/0x20 [ 53.547068] [ 53.548543] The buggy address belongs to the object at ffff000800c2e200 [ 53.548543] which belongs to the cache kmalloc-64 of size 64 [ 53.560870] The buggy address is located 0 bytes to the right of [ 53.560870] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 53.573717] [ 53.575192] The buggy address belongs to the physical page: [ 53.580748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 53.588734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.595244] page_type: f5(slab) [ 53.598377] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.606101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.613820] page dumped because: kasan: bad access detected [ 53.619376] [ 53.620851] Memory state around the buggy address: [ 53.625629] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.632834] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.640039] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.647240] ^ [ 53.652018] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.659222] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.666423] ================================================================== [ 55.251322] ================================================================== [ 55.258416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 55.265706] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 55.273083] [ 55.274563] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 55.274611] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.274628] Hardware name: WinLink E850-96 board (DT) [ 55.274648] Call trace: [ 55.274661] show_stack+0x20/0x38 (C) [ 55.274693] dump_stack_lvl+0x8c/0xd0 [ 55.274728] print_report+0x118/0x608 [ 55.274762] kasan_report+0xdc/0x128 [ 55.274796] kasan_check_range+0x100/0x1a8 [ 55.274832] __kasan_check_write+0x20/0x30 [ 55.274861] kasan_atomics_helper+0xd3c/0x4858 [ 55.274895] kasan_atomics+0x198/0x2e0 [ 55.274927] kunit_try_run_case+0x170/0x3f0 [ 55.274960] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.274998] kthread+0x328/0x630 [ 55.275024] ret_from_fork+0x10/0x20 [ 55.275058] [ 55.345652] Allocated by task 309: [ 55.349038] kasan_save_stack+0x3c/0x68 [ 55.352857] kasan_save_track+0x20/0x40 [ 55.356676] kasan_save_alloc_info+0x40/0x58 [ 55.360929] __kasan_kmalloc+0xd4/0xd8 [ 55.364662] __kmalloc_cache_noprof+0x15c/0x3c0 [ 55.369176] kasan_atomics+0xb8/0x2e0 [ 55.372822] kunit_try_run_case+0x170/0x3f0 [ 55.376988] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.382457] kthread+0x328/0x630 [ 55.385669] ret_from_fork+0x10/0x20 [ 55.389227] [ 55.390703] The buggy address belongs to the object at ffff000800c2e200 [ 55.390703] which belongs to the cache kmalloc-64 of size 64 [ 55.403030] The buggy address is located 0 bytes to the right of [ 55.403030] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 55.415877] [ 55.417353] The buggy address belongs to the physical page: [ 55.422908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 55.430894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.437404] page_type: f5(slab) [ 55.440536] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.448261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.455980] page dumped because: kasan: bad access detected [ 55.461535] [ 55.463011] Memory state around the buggy address: [ 55.467789] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.474994] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.482199] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.489399] ^ [ 55.494177] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.501382] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.508583] ================================================================== [ 52.883344] ================================================================== [ 52.890397] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 52.897685] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 52.905064] [ 52.906543] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 52.906590] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.906604] Hardware name: WinLink E850-96 board (DT) [ 52.906624] Call trace: [ 52.906634] show_stack+0x20/0x38 (C) [ 52.906668] dump_stack_lvl+0x8c/0xd0 [ 52.906701] print_report+0x118/0x608 [ 52.906738] kasan_report+0xdc/0x128 [ 52.906771] kasan_check_range+0x100/0x1a8 [ 52.906805] __kasan_check_write+0x20/0x30 [ 52.906834] kasan_atomics_helper+0xa6c/0x4858 [ 52.906867] kasan_atomics+0x198/0x2e0 [ 52.906900] kunit_try_run_case+0x170/0x3f0 [ 52.906932] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.906971] kthread+0x328/0x630 [ 52.906998] ret_from_fork+0x10/0x20 [ 52.907029] [ 52.977632] Allocated by task 309: [ 52.981017] kasan_save_stack+0x3c/0x68 [ 52.984837] kasan_save_track+0x20/0x40 [ 52.988656] kasan_save_alloc_info+0x40/0x58 [ 52.992910] __kasan_kmalloc+0xd4/0xd8 [ 52.996642] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.001156] kasan_atomics+0xb8/0x2e0 [ 53.004802] kunit_try_run_case+0x170/0x3f0 [ 53.008968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.014437] kthread+0x328/0x630 [ 53.017648] ret_from_fork+0x10/0x20 [ 53.021208] [ 53.022683] The buggy address belongs to the object at ffff000800c2e200 [ 53.022683] which belongs to the cache kmalloc-64 of size 64 [ 53.035010] The buggy address is located 0 bytes to the right of [ 53.035010] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 53.047856] [ 53.049332] The buggy address belongs to the physical page: [ 53.054888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 53.062874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.069384] page_type: f5(slab) [ 53.072517] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.080241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.087960] page dumped because: kasan: bad access detected [ 53.093515] [ 53.094991] Memory state around the buggy address: [ 53.099769] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.106974] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.114178] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.121380] ^ [ 53.126157] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.133363] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.140564] ================================================================== [ 47.337022] ================================================================== [ 47.344127] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 47.351414] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 47.358793] [ 47.360274] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 47.360327] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.360345] Hardware name: WinLink E850-96 board (DT) [ 47.360365] Call trace: [ 47.360377] show_stack+0x20/0x38 (C) [ 47.360412] dump_stack_lvl+0x8c/0xd0 [ 47.360450] print_report+0x118/0x608 [ 47.360487] kasan_report+0xdc/0x128 [ 47.360522] kasan_check_range+0x100/0x1a8 [ 47.360559] __kasan_check_write+0x20/0x30 [ 47.360587] kasan_atomics_helper+0x24c/0x4858 [ 47.360624] kasan_atomics+0x198/0x2e0 [ 47.360654] kunit_try_run_case+0x170/0x3f0 [ 47.360691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.360731] kthread+0x328/0x630 [ 47.360759] ret_from_fork+0x10/0x20 [ 47.360792] [ 47.431361] Allocated by task 309: [ 47.434748] kasan_save_stack+0x3c/0x68 [ 47.438567] kasan_save_track+0x20/0x40 [ 47.442385] kasan_save_alloc_info+0x40/0x58 [ 47.446638] __kasan_kmalloc+0xd4/0xd8 [ 47.450371] __kmalloc_cache_noprof+0x15c/0x3c0 [ 47.454885] kasan_atomics+0xb8/0x2e0 [ 47.458531] kunit_try_run_case+0x170/0x3f0 [ 47.462697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.468166] kthread+0x328/0x630 [ 47.471378] ret_from_fork+0x10/0x20 [ 47.474937] [ 47.476415] The buggy address belongs to the object at ffff000800c2e200 [ 47.476415] which belongs to the cache kmalloc-64 of size 64 [ 47.488740] The buggy address is located 0 bytes to the right of [ 47.488740] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 47.501585] [ 47.503063] The buggy address belongs to the physical page: [ 47.508617] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 47.516604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.523114] page_type: f5(slab) [ 47.526248] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.533970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.541689] page dumped because: kasan: bad access detected [ 47.547246] [ 47.548720] Memory state around the buggy address: [ 47.553500] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.560703] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.567909] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.575109] ^ [ 47.579887] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.587091] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.594292] ================================================================== [ 46.811247] ================================================================== [ 46.818268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 46.825641] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 46.833019] [ 46.834505] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 46.834561] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.834576] Hardware name: WinLink E850-96 board (DT) [ 46.834598] Call trace: [ 46.834612] show_stack+0x20/0x38 (C) [ 46.834646] dump_stack_lvl+0x8c/0xd0 [ 46.834685] print_report+0x118/0x608 [ 46.834720] kasan_report+0xdc/0x128 [ 46.834752] __asan_report_store4_noabort+0x20/0x30 [ 46.834785] kasan_atomics_helper+0x3f7c/0x4858 [ 46.834818] kasan_atomics+0x198/0x2e0 [ 46.834849] kunit_try_run_case+0x170/0x3f0 [ 46.834886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.834926] kthread+0x328/0x630 [ 46.834959] ret_from_fork+0x10/0x20 [ 46.834992] [ 46.902376] Allocated by task 309: [ 46.905763] kasan_save_stack+0x3c/0x68 [ 46.909580] kasan_save_track+0x20/0x40 [ 46.913400] kasan_save_alloc_info+0x40/0x58 [ 46.917653] __kasan_kmalloc+0xd4/0xd8 [ 46.921386] __kmalloc_cache_noprof+0x15c/0x3c0 [ 46.925900] kasan_atomics+0xb8/0x2e0 [ 46.929545] kunit_try_run_case+0x170/0x3f0 [ 46.933712] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.939181] kthread+0x328/0x630 [ 46.942393] ret_from_fork+0x10/0x20 [ 46.945951] [ 46.947430] The buggy address belongs to the object at ffff000800c2e200 [ 46.947430] which belongs to the cache kmalloc-64 of size 64 [ 46.959755] The buggy address is located 0 bytes to the right of [ 46.959755] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 46.972600] [ 46.974078] The buggy address belongs to the physical page: [ 46.979634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 46.987621] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.994129] page_type: f5(slab) [ 46.997263] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.004985] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.012704] page dumped because: kasan: bad access detected [ 47.018260] [ 47.019735] Memory state around the buggy address: [ 47.024515] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.031718] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.038924] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.046124] ^ [ 47.050901] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.058106] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.065307] ================================================================== [ 48.127288] ================================================================== [ 48.134393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 48.141680] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 48.149058] [ 48.150541] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 48.150593] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.150610] Hardware name: WinLink E850-96 board (DT) [ 48.150631] Call trace: [ 48.150644] show_stack+0x20/0x38 (C) [ 48.150680] dump_stack_lvl+0x8c/0xd0 [ 48.150717] print_report+0x118/0x608 [ 48.150753] kasan_report+0xdc/0x128 [ 48.150785] kasan_check_range+0x100/0x1a8 [ 48.150822] __kasan_check_write+0x20/0x30 [ 48.150851] kasan_atomics_helper+0x32c/0x4858 [ 48.150886] kasan_atomics+0x198/0x2e0 [ 48.150917] kunit_try_run_case+0x170/0x3f0 [ 48.150952] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.150990] kthread+0x328/0x630 [ 48.151018] ret_from_fork+0x10/0x20 [ 48.151050] [ 48.221627] Allocated by task 309: [ 48.225012] kasan_save_stack+0x3c/0x68 [ 48.228832] kasan_save_track+0x20/0x40 [ 48.232651] kasan_save_alloc_info+0x40/0x58 [ 48.236904] __kasan_kmalloc+0xd4/0xd8 [ 48.240637] __kmalloc_cache_noprof+0x15c/0x3c0 [ 48.245151] kasan_atomics+0xb8/0x2e0 [ 48.248797] kunit_try_run_case+0x170/0x3f0 [ 48.252963] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.258432] kthread+0x328/0x630 [ 48.261643] ret_from_fork+0x10/0x20 [ 48.265202] [ 48.266679] The buggy address belongs to the object at ffff000800c2e200 [ 48.266679] which belongs to the cache kmalloc-64 of size 64 [ 48.279005] The buggy address is located 0 bytes to the right of [ 48.279005] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 48.291851] [ 48.293329] The buggy address belongs to the physical page: [ 48.298884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 48.306870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.313379] page_type: f5(slab) [ 48.316513] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.324236] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.331955] page dumped because: kasan: bad access detected [ 48.337512] [ 48.338986] Memory state around the buggy address: [ 48.343767] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.350969] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.358175] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.365375] ^ [ 48.370152] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.377357] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.384559] ================================================================== [ 55.515923] ================================================================== [ 55.522995] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 55.530371] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 55.537663] [ 55.539142] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 55.539191] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.539207] Hardware name: WinLink E850-96 board (DT) [ 55.539228] Call trace: [ 55.539240] show_stack+0x20/0x38 (C) [ 55.539271] dump_stack_lvl+0x8c/0xd0 [ 55.539304] print_report+0x118/0x608 [ 55.539338] kasan_report+0xdc/0x128 [ 55.539369] __asan_report_load4_noabort+0x20/0x30 [ 55.539400] kasan_atomics_helper+0x3e04/0x4858 [ 55.539435] kasan_atomics+0x198/0x2e0 [ 55.539467] kunit_try_run_case+0x170/0x3f0 [ 55.539501] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.539538] kthread+0x328/0x630 [ 55.539565] ret_from_fork+0x10/0x20 [ 55.539596] [ 55.606933] Allocated by task 309: [ 55.610319] kasan_save_stack+0x3c/0x68 [ 55.614138] kasan_save_track+0x20/0x40 [ 55.617957] kasan_save_alloc_info+0x40/0x58 [ 55.622210] __kasan_kmalloc+0xd4/0xd8 [ 55.625943] __kmalloc_cache_noprof+0x15c/0x3c0 [ 55.630457] kasan_atomics+0xb8/0x2e0 [ 55.634102] kunit_try_run_case+0x170/0x3f0 [ 55.638269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.643738] kthread+0x328/0x630 [ 55.646949] ret_from_fork+0x10/0x20 [ 55.650509] [ 55.651984] The buggy address belongs to the object at ffff000800c2e200 [ 55.651984] which belongs to the cache kmalloc-64 of size 64 [ 55.664311] The buggy address is located 0 bytes to the right of [ 55.664311] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 55.677157] [ 55.678633] The buggy address belongs to the physical page: [ 55.684189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 55.692174] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.698684] page_type: f5(slab) [ 55.701817] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.709542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.717261] page dumped because: kasan: bad access detected [ 55.722816] [ 55.724292] Memory state around the buggy address: [ 55.729070] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.736275] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.743479] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.750680] ^ [ 55.755458] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.762663] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.769864] ================================================================== [ 63.429675] ================================================================== [ 63.436768] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 63.444141] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 63.451520] [ 63.452999] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 63.453047] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.453064] Hardware name: WinLink E850-96 board (DT) [ 63.453082] Call trace: [ 63.453096] show_stack+0x20/0x38 (C) [ 63.453127] dump_stack_lvl+0x8c/0xd0 [ 63.453166] print_report+0x118/0x608 [ 63.453200] kasan_report+0xdc/0x128 [ 63.453234] kasan_check_range+0x100/0x1a8 [ 63.453268] __kasan_check_write+0x20/0x30 [ 63.453299] kasan_atomics_helper+0x17ec/0x4858 [ 63.453333] kasan_atomics+0x198/0x2e0 [ 63.453365] kunit_try_run_case+0x170/0x3f0 [ 63.453396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.453437] kthread+0x328/0x630 [ 63.453464] ret_from_fork+0x10/0x20 [ 63.453497] [ 63.524175] Allocated by task 309: [ 63.527560] kasan_save_stack+0x3c/0x68 [ 63.531380] kasan_save_track+0x20/0x40 [ 63.535199] kasan_save_alloc_info+0x40/0x58 [ 63.539452] __kasan_kmalloc+0xd4/0xd8 [ 63.543185] __kmalloc_cache_noprof+0x15c/0x3c0 [ 63.547699] kasan_atomics+0xb8/0x2e0 [ 63.551345] kunit_try_run_case+0x170/0x3f0 [ 63.555511] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.560980] kthread+0x328/0x630 [ 63.564192] ret_from_fork+0x10/0x20 [ 63.567751] [ 63.569226] The buggy address belongs to the object at ffff000800c2e200 [ 63.569226] which belongs to the cache kmalloc-64 of size 64 [ 63.581553] The buggy address is located 0 bytes to the right of [ 63.581553] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 63.594399] [ 63.595875] The buggy address belongs to the physical page: [ 63.601431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 63.609416] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.615927] page_type: f5(slab) [ 63.619060] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 63.626784] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.634503] page dumped because: kasan: bad access detected [ 63.640060] [ 63.641534] Memory state around the buggy address: [ 63.646314] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.653517] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.660722] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.667923] ^ [ 63.672701] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.679905] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.687107] ================================================================== [ 60.266528] ================================================================== [ 60.273621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 60.280995] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 60.288373] [ 60.289852] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 60.289899] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.289915] Hardware name: WinLink E850-96 board (DT) [ 60.289934] Call trace: [ 60.289946] show_stack+0x20/0x38 (C) [ 60.289979] dump_stack_lvl+0x8c/0xd0 [ 60.290012] print_report+0x118/0x608 [ 60.290048] kasan_report+0xdc/0x128 [ 60.290080] kasan_check_range+0x100/0x1a8 [ 60.290114] __kasan_check_write+0x20/0x30 [ 60.290143] kasan_atomics_helper+0x1414/0x4858 [ 60.290177] kasan_atomics+0x198/0x2e0 [ 60.290207] kunit_try_run_case+0x170/0x3f0 [ 60.290240] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.290279] kthread+0x328/0x630 [ 60.290306] ret_from_fork+0x10/0x20 [ 60.290336] [ 60.361028] Allocated by task 309: [ 60.364414] kasan_save_stack+0x3c/0x68 [ 60.368233] kasan_save_track+0x20/0x40 [ 60.372052] kasan_save_alloc_info+0x40/0x58 [ 60.376306] __kasan_kmalloc+0xd4/0xd8 [ 60.380038] __kmalloc_cache_noprof+0x15c/0x3c0 [ 60.384552] kasan_atomics+0xb8/0x2e0 [ 60.388198] kunit_try_run_case+0x170/0x3f0 [ 60.392364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.397833] kthread+0x328/0x630 [ 60.401044] ret_from_fork+0x10/0x20 [ 60.404604] [ 60.406080] The buggy address belongs to the object at ffff000800c2e200 [ 60.406080] which belongs to the cache kmalloc-64 of size 64 [ 60.418406] The buggy address is located 0 bytes to the right of [ 60.418406] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 60.431252] [ 60.432729] The buggy address belongs to the physical page: [ 60.438284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 60.446270] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.452780] page_type: f5(slab) [ 60.455913] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.463637] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.471356] page dumped because: kasan: bad access detected [ 60.476913] [ 60.478387] Memory state around the buggy address: [ 60.483165] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.490370] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.497574] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.504776] ^ [ 60.509554] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.516759] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.523959] ================================================================== [ 56.828929] ================================================================== [ 56.835998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 56.843286] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 56.850664] [ 56.852143] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 56.852190] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.852206] Hardware name: WinLink E850-96 board (DT) [ 56.852223] Call trace: [ 56.852235] show_stack+0x20/0x38 (C) [ 56.852265] dump_stack_lvl+0x8c/0xd0 [ 56.852301] print_report+0x118/0x608 [ 56.852334] kasan_report+0xdc/0x128 [ 56.852369] kasan_check_range+0x100/0x1a8 [ 56.852405] __kasan_check_write+0x20/0x30 [ 56.852435] kasan_atomics_helper+0xeb8/0x4858 [ 56.852468] kasan_atomics+0x198/0x2e0 [ 56.852499] kunit_try_run_case+0x170/0x3f0 [ 56.852532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.852570] kthread+0x328/0x630 [ 56.852596] ret_from_fork+0x10/0x20 [ 56.852627] [ 56.923232] Allocated by task 309: [ 56.926618] kasan_save_stack+0x3c/0x68 [ 56.930437] kasan_save_track+0x20/0x40 [ 56.934257] kasan_save_alloc_info+0x40/0x58 [ 56.938510] __kasan_kmalloc+0xd4/0xd8 [ 56.942242] __kmalloc_cache_noprof+0x15c/0x3c0 [ 56.946756] kasan_atomics+0xb8/0x2e0 [ 56.950402] kunit_try_run_case+0x170/0x3f0 [ 56.954568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.960037] kthread+0x328/0x630 [ 56.963249] ret_from_fork+0x10/0x20 [ 56.966808] [ 56.968284] The buggy address belongs to the object at ffff000800c2e200 [ 56.968284] which belongs to the cache kmalloc-64 of size 64 [ 56.980610] The buggy address is located 0 bytes to the right of [ 56.980610] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 56.993457] [ 56.994933] The buggy address belongs to the physical page: [ 57.000488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 57.008474] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.014984] page_type: f5(slab) [ 57.018117] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.025842] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.033561] page dumped because: kasan: bad access detected [ 57.039116] [ 57.040591] Memory state around the buggy address: [ 57.045369] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.052574] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.059779] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.066980] ^ [ 57.071758] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.078963] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.086164] ================================================================== [ 53.673738] ================================================================== [ 53.680836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 53.688125] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 53.695503] [ 53.696982] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 53.697030] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.697047] Hardware name: WinLink E850-96 board (DT) [ 53.697065] Call trace: [ 53.697079] show_stack+0x20/0x38 (C) [ 53.697109] dump_stack_lvl+0x8c/0xd0 [ 53.697143] print_report+0x118/0x608 [ 53.697177] kasan_report+0xdc/0x128 [ 53.697212] kasan_check_range+0x100/0x1a8 [ 53.697247] __kasan_check_write+0x20/0x30 [ 53.697277] kasan_atomics_helper+0xb70/0x4858 [ 53.697311] kasan_atomics+0x198/0x2e0 [ 53.697344] kunit_try_run_case+0x170/0x3f0 [ 53.697377] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.697414] kthread+0x328/0x630 [ 53.697440] ret_from_fork+0x10/0x20 [ 53.697471] [ 53.768071] Allocated by task 309: [ 53.771457] kasan_save_stack+0x3c/0x68 [ 53.775276] kasan_save_track+0x20/0x40 [ 53.779096] kasan_save_alloc_info+0x40/0x58 [ 53.783349] __kasan_kmalloc+0xd4/0xd8 [ 53.787082] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.791595] kasan_atomics+0xb8/0x2e0 [ 53.795241] kunit_try_run_case+0x170/0x3f0 [ 53.799408] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.804876] kthread+0x328/0x630 [ 53.808088] ret_from_fork+0x10/0x20 [ 53.811647] [ 53.813123] The buggy address belongs to the object at ffff000800c2e200 [ 53.813123] which belongs to the cache kmalloc-64 of size 64 [ 53.825449] The buggy address is located 0 bytes to the right of [ 53.825449] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 53.838296] [ 53.839772] The buggy address belongs to the physical page: [ 53.845328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 53.853313] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.859823] page_type: f5(slab) [ 53.862956] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.870681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.878400] page dumped because: kasan: bad access detected [ 53.883955] [ 53.885430] Memory state around the buggy address: [ 53.890208] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.897413] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.904618] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.911819] ^ [ 53.916597] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.923802] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.931003] ================================================================== [ 61.325569] ================================================================== [ 61.332632] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 61.340007] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 61.347385] [ 61.348864] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 61.348918] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.348933] Hardware name: WinLink E850-96 board (DT) [ 61.348951] Call trace: [ 61.348964] show_stack+0x20/0x38 (C) [ 61.348998] dump_stack_lvl+0x8c/0xd0 [ 61.349033] print_report+0x118/0x608 [ 61.349069] kasan_report+0xdc/0x128 [ 61.349101] kasan_check_range+0x100/0x1a8 [ 61.349135] __kasan_check_write+0x20/0x30 [ 61.349164] kasan_atomics_helper+0x15b4/0x4858 [ 61.349197] kasan_atomics+0x198/0x2e0 [ 61.349229] kunit_try_run_case+0x170/0x3f0 [ 61.349263] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.349304] kthread+0x328/0x630 [ 61.349332] ret_from_fork+0x10/0x20 [ 61.349363] [ 61.420040] Allocated by task 309: [ 61.423427] kasan_save_stack+0x3c/0x68 [ 61.427245] kasan_save_track+0x20/0x40 [ 61.431064] kasan_save_alloc_info+0x40/0x58 [ 61.435317] __kasan_kmalloc+0xd4/0xd8 [ 61.439050] __kmalloc_cache_noprof+0x15c/0x3c0 [ 61.443564] kasan_atomics+0xb8/0x2e0 [ 61.447209] kunit_try_run_case+0x170/0x3f0 [ 61.451376] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.456845] kthread+0x328/0x630 [ 61.460056] ret_from_fork+0x10/0x20 [ 61.463615] [ 61.465091] The buggy address belongs to the object at ffff000800c2e200 [ 61.465091] which belongs to the cache kmalloc-64 of size 64 [ 61.477418] The buggy address is located 0 bytes to the right of [ 61.477418] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 61.490264] [ 61.491740] The buggy address belongs to the physical page: [ 61.497296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 61.505282] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.511792] page_type: f5(slab) [ 61.514925] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 61.522649] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.530368] page dumped because: kasan: bad access detected [ 61.535923] [ 61.537399] Memory state around the buggy address: [ 61.542177] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.549381] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.556586] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.563788] ^ [ 61.568566] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.575770] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.582972] ================================================================== [ 51.299168] ================================================================== [ 51.306217] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 51.313507] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 51.320886] [ 51.322365] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 51.322412] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.322427] Hardware name: WinLink E850-96 board (DT) [ 51.322443] Call trace: [ 51.322456] show_stack+0x20/0x38 (C) [ 51.322492] dump_stack_lvl+0x8c/0xd0 [ 51.322527] print_report+0x118/0x608 [ 51.322562] kasan_report+0xdc/0x128 [ 51.322593] kasan_check_range+0x100/0x1a8 [ 51.322632] __kasan_check_write+0x20/0x30 [ 51.322661] kasan_atomics_helper+0x7cc/0x4858 [ 51.322694] kasan_atomics+0x198/0x2e0 [ 51.322725] kunit_try_run_case+0x170/0x3f0 [ 51.322757] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.322795] kthread+0x328/0x630 [ 51.322823] ret_from_fork+0x10/0x20 [ 51.322852] [ 51.393454] Allocated by task 309: [ 51.396840] kasan_save_stack+0x3c/0x68 [ 51.400659] kasan_save_track+0x20/0x40 [ 51.404478] kasan_save_alloc_info+0x40/0x58 [ 51.408732] __kasan_kmalloc+0xd4/0xd8 [ 51.412464] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.416978] kasan_atomics+0xb8/0x2e0 [ 51.420624] kunit_try_run_case+0x170/0x3f0 [ 51.424791] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.430259] kthread+0x328/0x630 [ 51.433471] ret_from_fork+0x10/0x20 [ 51.437030] [ 51.438505] The buggy address belongs to the object at ffff000800c2e200 [ 51.438505] which belongs to the cache kmalloc-64 of size 64 [ 51.450832] The buggy address is located 0 bytes to the right of [ 51.450832] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 51.463679] [ 51.465155] The buggy address belongs to the physical page: [ 51.470711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 51.478696] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.485206] page_type: f5(slab) [ 51.488339] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.496063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.503783] page dumped because: kasan: bad access detected [ 51.509338] [ 51.510813] Memory state around the buggy address: [ 51.515591] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.522796] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.530001] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.537202] ^ [ 51.541980] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.549185] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.556386] ================================================================== [ 61.590316] ================================================================== [ 61.597384] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 61.604760] Read of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 61.612051] [ 61.613532] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 61.613579] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.613596] Hardware name: WinLink E850-96 board (DT) [ 61.613615] Call trace: [ 61.613627] show_stack+0x20/0x38 (C) [ 61.613660] dump_stack_lvl+0x8c/0xd0 [ 61.613695] print_report+0x118/0x608 [ 61.613729] kasan_report+0xdc/0x128 [ 61.613761] __asan_report_load8_noabort+0x20/0x30 [ 61.613792] kasan_atomics_helper+0x3db0/0x4858 [ 61.613828] kasan_atomics+0x198/0x2e0 [ 61.613859] kunit_try_run_case+0x170/0x3f0 [ 61.613896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.613932] kthread+0x328/0x630 [ 61.613958] ret_from_fork+0x10/0x20 [ 61.613991] [ 61.681320] Allocated by task 309: [ 61.684706] kasan_save_stack+0x3c/0x68 [ 61.688525] kasan_save_track+0x20/0x40 [ 61.692345] kasan_save_alloc_info+0x40/0x58 [ 61.696598] __kasan_kmalloc+0xd4/0xd8 [ 61.700331] __kmalloc_cache_noprof+0x15c/0x3c0 [ 61.704845] kasan_atomics+0xb8/0x2e0 [ 61.708490] kunit_try_run_case+0x170/0x3f0 [ 61.712657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.718126] kthread+0x328/0x630 [ 61.721337] ret_from_fork+0x10/0x20 [ 61.724896] [ 61.726372] The buggy address belongs to the object at ffff000800c2e200 [ 61.726372] which belongs to the cache kmalloc-64 of size 64 [ 61.738698] The buggy address is located 0 bytes to the right of [ 61.738698] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 61.751545] [ 61.753021] The buggy address belongs to the physical page: [ 61.758577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 61.766563] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.773072] page_type: f5(slab) [ 61.776205] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 61.783930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.791649] page dumped because: kasan: bad access detected [ 61.797204] [ 61.798680] Memory state around the buggy address: [ 61.803458] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.810663] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.817867] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.825068] ^ [ 61.829846] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.837051] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.844252] ================================================================== [ 55.777199] ================================================================== [ 55.784277] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 55.791565] Read of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 55.798857] [ 55.800336] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 55.800382] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.800396] Hardware name: WinLink E850-96 board (DT) [ 55.800416] Call trace: [ 55.800430] show_stack+0x20/0x38 (C) [ 55.800462] dump_stack_lvl+0x8c/0xd0 [ 55.800497] print_report+0x118/0x608 [ 55.800532] kasan_report+0xdc/0x128 [ 55.800565] kasan_check_range+0x100/0x1a8 [ 55.800601] __kasan_check_read+0x20/0x30 [ 55.800630] kasan_atomics_helper+0xdd4/0x4858 [ 55.800664] kasan_atomics+0x198/0x2e0 [ 55.800695] kunit_try_run_case+0x170/0x3f0 [ 55.800730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.800767] kthread+0x328/0x630 [ 55.800795] ret_from_fork+0x10/0x20 [ 55.800827] [ 55.871338] Allocated by task 309: [ 55.874724] kasan_save_stack+0x3c/0x68 [ 55.878543] kasan_save_track+0x20/0x40 [ 55.882363] kasan_save_alloc_info+0x40/0x58 [ 55.886616] __kasan_kmalloc+0xd4/0xd8 [ 55.890348] __kmalloc_cache_noprof+0x15c/0x3c0 [ 55.894862] kasan_atomics+0xb8/0x2e0 [ 55.898508] kunit_try_run_case+0x170/0x3f0 [ 55.902675] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.908143] kthread+0x328/0x630 [ 55.911355] ret_from_fork+0x10/0x20 [ 55.914914] [ 55.916389] The buggy address belongs to the object at ffff000800c2e200 [ 55.916389] which belongs to the cache kmalloc-64 of size 64 [ 55.928717] The buggy address is located 0 bytes to the right of [ 55.928717] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 55.941563] [ 55.943039] The buggy address belongs to the physical page: [ 55.948595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 55.956580] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.963091] page_type: f5(slab) [ 55.966223] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.973947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.981667] page dumped because: kasan: bad access detected [ 55.987222] [ 55.988697] Memory state around the buggy address: [ 55.993475] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.000681] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.007885] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.015086] ^ [ 56.019864] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.027069] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.034270] ================================================================== [ 47.072642] ================================================================== [ 47.079724] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 47.087009] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 47.094300] [ 47.095784] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 47.095837] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.095859] Hardware name: WinLink E850-96 board (DT) [ 47.095880] Call trace: [ 47.095893] show_stack+0x20/0x38 (C) [ 47.095929] dump_stack_lvl+0x8c/0xd0 [ 47.095964] print_report+0x118/0x608 [ 47.096002] kasan_report+0xdc/0x128 [ 47.096034] kasan_check_range+0x100/0x1a8 [ 47.096071] __kasan_check_read+0x20/0x30 [ 47.096101] kasan_atomics_helper+0x1ec/0x4858 [ 47.096134] kasan_atomics+0x198/0x2e0 [ 47.096166] kunit_try_run_case+0x170/0x3f0 [ 47.096205] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.096242] kthread+0x328/0x630 [ 47.096273] ret_from_fork+0x10/0x20 [ 47.096306] [ 47.166781] Allocated by task 309: [ 47.170168] kasan_save_stack+0x3c/0x68 [ 47.173986] kasan_save_track+0x20/0x40 [ 47.177806] kasan_save_alloc_info+0x40/0x58 [ 47.182059] __kasan_kmalloc+0xd4/0xd8 [ 47.185792] __kmalloc_cache_noprof+0x15c/0x3c0 [ 47.190306] kasan_atomics+0xb8/0x2e0 [ 47.193951] kunit_try_run_case+0x170/0x3f0 [ 47.198118] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.203586] kthread+0x328/0x630 [ 47.206799] ret_from_fork+0x10/0x20 [ 47.210357] [ 47.211836] The buggy address belongs to the object at ffff000800c2e200 [ 47.211836] which belongs to the cache kmalloc-64 of size 64 [ 47.224162] The buggy address is located 0 bytes to the right of [ 47.224162] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 47.237006] [ 47.238483] The buggy address belongs to the physical page: [ 47.244041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 47.252027] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.258535] page_type: f5(slab) [ 47.261670] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.269391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.277111] page dumped because: kasan: bad access detected [ 47.282666] [ 47.284141] Memory state around the buggy address: [ 47.288922] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.296123] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.303330] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.310530] ^ [ 47.315307] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.322512] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.329713] ================================================================== [ 57.093478] ================================================================== [ 57.100576] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 57.107865] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 57.115243] [ 57.116723] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 57.116769] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.116786] Hardware name: WinLink E850-96 board (DT) [ 57.116803] Call trace: [ 57.116815] show_stack+0x20/0x38 (C) [ 57.116846] dump_stack_lvl+0x8c/0xd0 [ 57.116882] print_report+0x118/0x608 [ 57.116916] kasan_report+0xdc/0x128 [ 57.116947] kasan_check_range+0x100/0x1a8 [ 57.116981] __kasan_check_write+0x20/0x30 [ 57.117011] kasan_atomics_helper+0xf20/0x4858 [ 57.117044] kasan_atomics+0x198/0x2e0 [ 57.117075] kunit_try_run_case+0x170/0x3f0 [ 57.117109] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.117150] kthread+0x328/0x630 [ 57.117176] ret_from_fork+0x10/0x20 [ 57.117206] [ 57.187812] Allocated by task 309: [ 57.191199] kasan_save_stack+0x3c/0x68 [ 57.195017] kasan_save_track+0x20/0x40 [ 57.198836] kasan_save_alloc_info+0x40/0x58 [ 57.203089] __kasan_kmalloc+0xd4/0xd8 [ 57.206822] __kmalloc_cache_noprof+0x15c/0x3c0 [ 57.211336] kasan_atomics+0xb8/0x2e0 [ 57.214981] kunit_try_run_case+0x170/0x3f0 [ 57.219148] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.224617] kthread+0x328/0x630 [ 57.227828] ret_from_fork+0x10/0x20 [ 57.231388] [ 57.232863] The buggy address belongs to the object at ffff000800c2e200 [ 57.232863] which belongs to the cache kmalloc-64 of size 64 [ 57.245190] The buggy address is located 0 bytes to the right of [ 57.245190] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 57.258036] [ 57.259512] The buggy address belongs to the physical page: [ 57.265068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 57.273054] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.279564] page_type: f5(slab) [ 57.282697] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.290421] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.298140] page dumped because: kasan: bad access detected [ 57.303695] [ 57.305170] Memory state around the buggy address: [ 57.309949] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.317153] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.324359] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.331560] ^ [ 57.336338] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.343542] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.350743] ================================================================== [ 58.416751] ================================================================== [ 58.423821] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 58.431197] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 58.438574] [ 58.440057] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 58.440104] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.440121] Hardware name: WinLink E850-96 board (DT) [ 58.440138] Call trace: [ 58.440151] show_stack+0x20/0x38 (C) [ 58.440181] dump_stack_lvl+0x8c/0xd0 [ 58.440216] print_report+0x118/0x608 [ 58.440251] kasan_report+0xdc/0x128 [ 58.440283] kasan_check_range+0x100/0x1a8 [ 58.440319] __kasan_check_write+0x20/0x30 [ 58.440350] kasan_atomics_helper+0x1128/0x4858 [ 58.440383] kasan_atomics+0x198/0x2e0 [ 58.440413] kunit_try_run_case+0x170/0x3f0 [ 58.440447] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.440485] kthread+0x328/0x630 [ 58.440511] ret_from_fork+0x10/0x20 [ 58.440544] [ 58.511229] Allocated by task 309: [ 58.514615] kasan_save_stack+0x3c/0x68 [ 58.518434] kasan_save_track+0x20/0x40 [ 58.522254] kasan_save_alloc_info+0x40/0x58 [ 58.526507] __kasan_kmalloc+0xd4/0xd8 [ 58.530239] __kmalloc_cache_noprof+0x15c/0x3c0 [ 58.534753] kasan_atomics+0xb8/0x2e0 [ 58.538399] kunit_try_run_case+0x170/0x3f0 [ 58.542566] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.548034] kthread+0x328/0x630 [ 58.551246] ret_from_fork+0x10/0x20 [ 58.554805] [ 58.556282] The buggy address belongs to the object at ffff000800c2e200 [ 58.556282] which belongs to the cache kmalloc-64 of size 64 [ 58.568608] The buggy address is located 0 bytes to the right of [ 58.568608] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 58.581454] [ 58.582930] The buggy address belongs to the physical page: [ 58.588486] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 58.596471] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.602982] page_type: f5(slab) [ 58.606115] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.613838] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.621558] page dumped because: kasan: bad access detected [ 58.627114] [ 58.628588] Memory state around the buggy address: [ 58.633367] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.640571] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.647776] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.654977] ^ [ 58.659755] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.666959] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.674161] ================================================================== [ 58.151989] ================================================================== [ 58.159067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 58.166443] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 58.173821] [ 58.175301] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 58.175347] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.175363] Hardware name: WinLink E850-96 board (DT) [ 58.175378] Call trace: [ 58.175392] show_stack+0x20/0x38 (C) [ 58.175424] dump_stack_lvl+0x8c/0xd0 [ 58.175458] print_report+0x118/0x608 [ 58.175496] kasan_report+0xdc/0x128 [ 58.175527] kasan_check_range+0x100/0x1a8 [ 58.175562] __kasan_check_write+0x20/0x30 [ 58.175593] kasan_atomics_helper+0x10c0/0x4858 [ 58.175626] kasan_atomics+0x198/0x2e0 [ 58.175657] kunit_try_run_case+0x170/0x3f0 [ 58.175691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.175729] kthread+0x328/0x630 [ 58.175759] ret_from_fork+0x10/0x20 [ 58.175789] [ 58.246476] Allocated by task 309: [ 58.249862] kasan_save_stack+0x3c/0x68 [ 58.253681] kasan_save_track+0x20/0x40 [ 58.257501] kasan_save_alloc_info+0x40/0x58 [ 58.261754] __kasan_kmalloc+0xd4/0xd8 [ 58.265486] __kmalloc_cache_noprof+0x15c/0x3c0 [ 58.270000] kasan_atomics+0xb8/0x2e0 [ 58.273646] kunit_try_run_case+0x170/0x3f0 [ 58.277813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.283281] kthread+0x328/0x630 [ 58.286493] ret_from_fork+0x10/0x20 [ 58.290052] [ 58.291527] The buggy address belongs to the object at ffff000800c2e200 [ 58.291527] which belongs to the cache kmalloc-64 of size 64 [ 58.303854] The buggy address is located 0 bytes to the right of [ 58.303854] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 58.316701] [ 58.318177] The buggy address belongs to the physical page: [ 58.323733] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 58.331718] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.338229] page_type: f5(slab) [ 58.341361] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.349085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.356805] page dumped because: kasan: bad access detected [ 58.362360] [ 58.363836] Memory state around the buggy address: [ 58.368613] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.375818] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.383023] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.390224] ^ [ 58.395002] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.402207] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.409408] ================================================================== [ 62.903663] ================================================================== [ 62.910734] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 62.918108] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 62.925486] [ 62.926965] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 62.927012] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.927028] Hardware name: WinLink E850-96 board (DT) [ 62.927046] Call trace: [ 62.927060] show_stack+0x20/0x38 (C) [ 62.927092] dump_stack_lvl+0x8c/0xd0 [ 62.927128] print_report+0x118/0x608 [ 62.927162] kasan_report+0xdc/0x128 [ 62.927195] kasan_check_range+0x100/0x1a8 [ 62.927231] __kasan_check_write+0x20/0x30 [ 62.927262] kasan_atomics_helper+0x175c/0x4858 [ 62.927296] kasan_atomics+0x198/0x2e0 [ 62.927327] kunit_try_run_case+0x170/0x3f0 [ 62.927360] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.927401] kthread+0x328/0x630 [ 62.927427] ret_from_fork+0x10/0x20 [ 62.927459] [ 62.998141] Allocated by task 309: [ 63.001528] kasan_save_stack+0x3c/0x68 [ 63.005346] kasan_save_track+0x20/0x40 [ 63.009166] kasan_save_alloc_info+0x40/0x58 [ 63.013418] __kasan_kmalloc+0xd4/0xd8 [ 63.017151] __kmalloc_cache_noprof+0x15c/0x3c0 [ 63.021665] kasan_atomics+0xb8/0x2e0 [ 63.025311] kunit_try_run_case+0x170/0x3f0 [ 63.029477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.034946] kthread+0x328/0x630 [ 63.038158] ret_from_fork+0x10/0x20 [ 63.041717] [ 63.043192] The buggy address belongs to the object at ffff000800c2e200 [ 63.043192] which belongs to the cache kmalloc-64 of size 64 [ 63.055519] The buggy address is located 0 bytes to the right of [ 63.055519] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 63.068366] [ 63.069842] The buggy address belongs to the physical page: [ 63.075397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 63.083383] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.089893] page_type: f5(slab) [ 63.093026] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 63.100750] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.108469] page dumped because: kasan: bad access detected [ 63.114026] [ 63.115500] Memory state around the buggy address: [ 63.120278] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.127483] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.134688] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.141889] ^ [ 63.146667] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.153872] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.161072] ================================================================== [ 52.089568] ================================================================== [ 52.096659] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 52.103947] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 52.111325] [ 52.112805] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 52.112853] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.112868] Hardware name: WinLink E850-96 board (DT) [ 52.112886] Call trace: [ 52.112898] show_stack+0x20/0x38 (C) [ 52.112930] dump_stack_lvl+0x8c/0xd0 [ 52.112966] print_report+0x118/0x608 [ 52.113000] kasan_report+0xdc/0x128 [ 52.113032] kasan_check_range+0x100/0x1a8 [ 52.113066] __kasan_check_write+0x20/0x30 [ 52.113098] kasan_atomics_helper+0x934/0x4858 [ 52.113130] kasan_atomics+0x198/0x2e0 [ 52.113161] kunit_try_run_case+0x170/0x3f0 [ 52.113193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.113230] kthread+0x328/0x630 [ 52.113257] ret_from_fork+0x10/0x20 [ 52.113287] [ 52.183894] Allocated by task 309: [ 52.187279] kasan_save_stack+0x3c/0x68 [ 52.191099] kasan_save_track+0x20/0x40 [ 52.194918] kasan_save_alloc_info+0x40/0x58 [ 52.199171] __kasan_kmalloc+0xd4/0xd8 [ 52.202904] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.207418] kasan_atomics+0xb8/0x2e0 [ 52.211064] kunit_try_run_case+0x170/0x3f0 [ 52.215230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.220699] kthread+0x328/0x630 [ 52.223910] ret_from_fork+0x10/0x20 [ 52.227470] [ 52.228945] The buggy address belongs to the object at ffff000800c2e200 [ 52.228945] which belongs to the cache kmalloc-64 of size 64 [ 52.241272] The buggy address is located 0 bytes to the right of [ 52.241272] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 52.254118] [ 52.255594] The buggy address belongs to the physical page: [ 52.261150] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 52.269136] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.275646] page_type: f5(slab) [ 52.278779] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.286503] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.294222] page dumped because: kasan: bad access detected [ 52.299777] [ 52.301253] Memory state around the buggy address: [ 52.306031] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.313236] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.320440] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.327641] ^ [ 52.332419] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.339624] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.346825] ================================================================== [ 57.887256] ================================================================== [ 57.894314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 57.901690] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 57.909070] [ 57.910548] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 57.910595] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.910611] Hardware name: WinLink E850-96 board (DT) [ 57.910630] Call trace: [ 57.910643] show_stack+0x20/0x38 (C) [ 57.910674] dump_stack_lvl+0x8c/0xd0 [ 57.910709] print_report+0x118/0x608 [ 57.910742] kasan_report+0xdc/0x128 [ 57.910774] kasan_check_range+0x100/0x1a8 [ 57.910810] __kasan_check_write+0x20/0x30 [ 57.910840] kasan_atomics_helper+0x1058/0x4858 [ 57.910874] kasan_atomics+0x198/0x2e0 [ 57.910904] kunit_try_run_case+0x170/0x3f0 [ 57.910940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.910981] kthread+0x328/0x630 [ 57.911008] ret_from_fork+0x10/0x20 [ 57.911040] [ 57.981723] Allocated by task 309: [ 57.985109] kasan_save_stack+0x3c/0x68 [ 57.988928] kasan_save_track+0x20/0x40 [ 57.992748] kasan_save_alloc_info+0x40/0x58 [ 57.997001] __kasan_kmalloc+0xd4/0xd8 [ 58.000734] __kmalloc_cache_noprof+0x15c/0x3c0 [ 58.005247] kasan_atomics+0xb8/0x2e0 [ 58.008893] kunit_try_run_case+0x170/0x3f0 [ 58.013060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.018529] kthread+0x328/0x630 [ 58.021740] ret_from_fork+0x10/0x20 [ 58.025299] [ 58.026775] The buggy address belongs to the object at ffff000800c2e200 [ 58.026775] which belongs to the cache kmalloc-64 of size 64 [ 58.039101] The buggy address is located 0 bytes to the right of [ 58.039101] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 58.051948] [ 58.053424] The buggy address belongs to the physical page: [ 58.058980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 58.066965] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.073475] page_type: f5(slab) [ 58.076608] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.084333] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.092051] page dumped because: kasan: bad access detected [ 58.097607] [ 58.099083] Memory state around the buggy address: [ 58.103860] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.111065] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.118270] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.125471] ^ [ 58.130249] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.137454] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.144655] ================================================================== [ 48.917915] ================================================================== [ 48.925003] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 48.932293] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 48.939672] [ 48.941152] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 48.941200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.941217] Hardware name: WinLink E850-96 board (DT) [ 48.941237] Call trace: [ 48.941249] show_stack+0x20/0x38 (C) [ 48.941281] dump_stack_lvl+0x8c/0xd0 [ 48.941317] print_report+0x118/0x608 [ 48.941355] kasan_report+0xdc/0x128 [ 48.941387] kasan_check_range+0x100/0x1a8 [ 48.941423] __kasan_check_write+0x20/0x30 [ 48.941453] kasan_atomics_helper+0x414/0x4858 [ 48.941488] kasan_atomics+0x198/0x2e0 [ 48.941520] kunit_try_run_case+0x170/0x3f0 [ 48.941554] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.941592] kthread+0x328/0x630 [ 48.941617] ret_from_fork+0x10/0x20 [ 48.941651] [ 49.012240] Allocated by task 309: [ 49.015625] kasan_save_stack+0x3c/0x68 [ 49.019445] kasan_save_track+0x20/0x40 [ 49.023264] kasan_save_alloc_info+0x40/0x58 [ 49.027518] __kasan_kmalloc+0xd4/0xd8 [ 49.031250] __kmalloc_cache_noprof+0x15c/0x3c0 [ 49.035764] kasan_atomics+0xb8/0x2e0 [ 49.039411] kunit_try_run_case+0x170/0x3f0 [ 49.043576] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.049045] kthread+0x328/0x630 [ 49.052257] ret_from_fork+0x10/0x20 [ 49.055816] [ 49.057291] The buggy address belongs to the object at ffff000800c2e200 [ 49.057291] which belongs to the cache kmalloc-64 of size 64 [ 49.069618] The buggy address is located 0 bytes to the right of [ 49.069618] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 49.082465] [ 49.083941] The buggy address belongs to the physical page: [ 49.089496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 49.097482] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.103992] page_type: f5(slab) [ 49.107125] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.114849] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.122568] page dumped because: kasan: bad access detected [ 49.128124] [ 49.129599] Memory state around the buggy address: [ 49.134377] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.141582] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.148788] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.155988] ^ [ 49.160765] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.167970] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.175171] ================================================================== [ 58.946286] ================================================================== [ 58.953327] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 58.960702] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 58.968080] [ 58.969560] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 58.969604] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.969619] Hardware name: WinLink E850-96 board (DT) [ 58.969637] Call trace: [ 58.969649] show_stack+0x20/0x38 (C) [ 58.969687] dump_stack_lvl+0x8c/0xd0 [ 58.969721] print_report+0x118/0x608 [ 58.969758] kasan_report+0xdc/0x128 [ 58.969792] kasan_check_range+0x100/0x1a8 [ 58.969826] __kasan_check_write+0x20/0x30 [ 58.969856] kasan_atomics_helper+0x11f8/0x4858 [ 58.969890] kasan_atomics+0x198/0x2e0 [ 58.969920] kunit_try_run_case+0x170/0x3f0 [ 58.969952] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.969992] kthread+0x328/0x630 [ 58.970018] ret_from_fork+0x10/0x20 [ 58.970050] [ 59.040735] Allocated by task 309: [ 59.044121] kasan_save_stack+0x3c/0x68 [ 59.047940] kasan_save_track+0x20/0x40 [ 59.051759] kasan_save_alloc_info+0x40/0x58 [ 59.056013] __kasan_kmalloc+0xd4/0xd8 [ 59.059745] __kmalloc_cache_noprof+0x15c/0x3c0 [ 59.064259] kasan_atomics+0xb8/0x2e0 [ 59.067905] kunit_try_run_case+0x170/0x3f0 [ 59.072071] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.077540] kthread+0x328/0x630 [ 59.080752] ret_from_fork+0x10/0x20 [ 59.084311] [ 59.085787] The buggy address belongs to the object at ffff000800c2e200 [ 59.085787] which belongs to the cache kmalloc-64 of size 64 [ 59.098113] The buggy address is located 0 bytes to the right of [ 59.098113] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 59.110959] [ 59.112436] The buggy address belongs to the physical page: [ 59.117992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 59.125977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.132487] page_type: f5(slab) [ 59.135620] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.143345] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.151064] page dumped because: kasan: bad access detected [ 59.156620] [ 59.158095] Memory state around the buggy address: [ 59.162872] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.170077] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.177284] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.184483] ^ [ 59.189261] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.196466] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.203667] ================================================================== [ 60.796057] ================================================================== [ 60.803126] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 60.810501] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 60.817879] [ 60.819358] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 60.819404] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.819422] Hardware name: WinLink E850-96 board (DT) [ 60.819438] Call trace: [ 60.819452] show_stack+0x20/0x38 (C) [ 60.819482] dump_stack_lvl+0x8c/0xd0 [ 60.819517] print_report+0x118/0x608 [ 60.819553] kasan_report+0xdc/0x128 [ 60.819586] kasan_check_range+0x100/0x1a8 [ 60.819619] __kasan_check_write+0x20/0x30 [ 60.819648] kasan_atomics_helper+0x14e4/0x4858 [ 60.819681] kasan_atomics+0x198/0x2e0 [ 60.819713] kunit_try_run_case+0x170/0x3f0 [ 60.819747] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.819787] kthread+0x328/0x630 [ 60.819813] ret_from_fork+0x10/0x20 [ 60.819846] [ 60.890534] Allocated by task 309: [ 60.893921] kasan_save_stack+0x3c/0x68 [ 60.897739] kasan_save_track+0x20/0x40 [ 60.901558] kasan_save_alloc_info+0x40/0x58 [ 60.905812] __kasan_kmalloc+0xd4/0xd8 [ 60.909544] __kmalloc_cache_noprof+0x15c/0x3c0 [ 60.914058] kasan_atomics+0xb8/0x2e0 [ 60.917704] kunit_try_run_case+0x170/0x3f0 [ 60.921870] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.927339] kthread+0x328/0x630 [ 60.930551] ret_from_fork+0x10/0x20 [ 60.934109] [ 60.935585] The buggy address belongs to the object at ffff000800c2e200 [ 60.935585] which belongs to the cache kmalloc-64 of size 64 [ 60.947911] The buggy address is located 0 bytes to the right of [ 60.947911] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 60.960758] [ 60.962236] The buggy address belongs to the physical page: [ 60.967790] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 60.975776] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.982286] page_type: f5(slab) [ 60.985419] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.993143] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.000862] page dumped because: kasan: bad access detected [ 61.006419] [ 61.007893] Memory state around the buggy address: [ 61.012671] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.019875] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.027080] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.034282] ^ [ 61.039059] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.046264] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.053465] ================================================================== [ 61.060946] ================================================================== [ 61.067878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 61.075253] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 61.082632] [ 61.084113] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 61.084162] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.084179] Hardware name: WinLink E850-96 board (DT) [ 61.084198] Call trace: [ 61.084210] show_stack+0x20/0x38 (C) [ 61.084240] dump_stack_lvl+0x8c/0xd0 [ 61.084275] print_report+0x118/0x608 [ 61.084307] kasan_report+0xdc/0x128 [ 61.084339] kasan_check_range+0x100/0x1a8 [ 61.084374] __kasan_check_write+0x20/0x30 [ 61.084403] kasan_atomics_helper+0x154c/0x4858 [ 61.084438] kasan_atomics+0x198/0x2e0 [ 61.084470] kunit_try_run_case+0x170/0x3f0 [ 61.084502] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.084544] kthread+0x328/0x630 [ 61.084571] ret_from_fork+0x10/0x20 [ 61.084602] [ 61.155287] Allocated by task 309: [ 61.158675] kasan_save_stack+0x3c/0x68 [ 61.162492] kasan_save_track+0x20/0x40 [ 61.166311] kasan_save_alloc_info+0x40/0x58 [ 61.170564] __kasan_kmalloc+0xd4/0xd8 [ 61.174297] __kmalloc_cache_noprof+0x15c/0x3c0 [ 61.178811] kasan_atomics+0xb8/0x2e0 [ 61.182457] kunit_try_run_case+0x170/0x3f0 [ 61.186623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.192092] kthread+0x328/0x630 [ 61.195304] ret_from_fork+0x10/0x20 [ 61.198863] [ 61.200340] The buggy address belongs to the object at ffff000800c2e200 [ 61.200340] which belongs to the cache kmalloc-64 of size 64 [ 61.212665] The buggy address is located 0 bytes to the right of [ 61.212665] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 61.225511] [ 61.226989] The buggy address belongs to the physical page: [ 61.232544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 61.240529] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.247039] page_type: f5(slab) [ 61.250172] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 61.257896] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.265615] page dumped because: kasan: bad access detected [ 61.271172] [ 61.272646] Memory state around the buggy address: [ 61.277424] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.284629] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.291834] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.299034] ^ [ 61.303813] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.311017] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.318219] ================================================================== [ 54.464222] ================================================================== [ 54.471276] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 54.478651] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 54.485943] [ 54.487422] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 54.487470] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.487488] Hardware name: WinLink E850-96 board (DT) [ 54.487506] Call trace: [ 54.487516] show_stack+0x20/0x38 (C) [ 54.487549] dump_stack_lvl+0x8c/0xd0 [ 54.487583] print_report+0x118/0x608 [ 54.487617] kasan_report+0xdc/0x128 [ 54.487650] __asan_report_load4_noabort+0x20/0x30 [ 54.487681] kasan_atomics_helper+0x3de4/0x4858 [ 54.487714] kasan_atomics+0x198/0x2e0 [ 54.487747] kunit_try_run_case+0x170/0x3f0 [ 54.487779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.487819] kthread+0x328/0x630 [ 54.487845] ret_from_fork+0x10/0x20 [ 54.487877] [ 54.555212] Allocated by task 309: [ 54.558598] kasan_save_stack+0x3c/0x68 [ 54.562417] kasan_save_track+0x20/0x40 [ 54.566237] kasan_save_alloc_info+0x40/0x58 [ 54.570490] __kasan_kmalloc+0xd4/0xd8 [ 54.574223] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.578736] kasan_atomics+0xb8/0x2e0 [ 54.582382] kunit_try_run_case+0x170/0x3f0 [ 54.586549] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.592017] kthread+0x328/0x630 [ 54.595229] ret_from_fork+0x10/0x20 [ 54.598788] [ 54.600263] The buggy address belongs to the object at ffff000800c2e200 [ 54.600263] which belongs to the cache kmalloc-64 of size 64 [ 54.612590] The buggy address is located 0 bytes to the right of [ 54.612590] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 54.625437] [ 54.626913] The buggy address belongs to the physical page: [ 54.632469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 54.640454] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.646964] page_type: f5(slab) [ 54.650097] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.657822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.665540] page dumped because: kasan: bad access detected [ 54.671096] [ 54.672571] Memory state around the buggy address: [ 54.677349] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.684554] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.691759] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.698960] ^ [ 54.703738] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.710943] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.718144] ================================================================== [ 49.976240] ================================================================== [ 49.983321] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 49.990611] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309 [ 49.997989] [ 49.999469] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 49.999517] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.999535] Hardware name: WinLink E850-96 board (DT) [ 49.999551] Call trace: [ 49.999563] show_stack+0x20/0x38 (C) [ 49.999596] dump_stack_lvl+0x8c/0xd0 [ 49.999632] print_report+0x118/0x608 [ 49.999666] kasan_report+0xdc/0x128 [ 49.999701] kasan_check_range+0x100/0x1a8 [ 49.999736] __kasan_check_write+0x20/0x30 [ 49.999766] kasan_atomics_helper+0x5b4/0x4858 [ 49.999800] kasan_atomics+0x198/0x2e0 [ 49.999831] kunit_try_run_case+0x170/0x3f0 [ 49.999865] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.999904] kthread+0x328/0x630 [ 49.999930] ret_from_fork+0x10/0x20 [ 49.999963] [ 50.070557] Allocated by task 309: [ 50.073943] kasan_save_stack+0x3c/0x68 [ 50.077762] kasan_save_track+0x20/0x40 [ 50.081581] kasan_save_alloc_info+0x40/0x58 [ 50.085835] __kasan_kmalloc+0xd4/0xd8 [ 50.089567] __kmalloc_cache_noprof+0x15c/0x3c0 [ 50.094081] kasan_atomics+0xb8/0x2e0 [ 50.097727] kunit_try_run_case+0x170/0x3f0 [ 50.101894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.107362] kthread+0x328/0x630 [ 50.110574] ret_from_fork+0x10/0x20 [ 50.114133] [ 50.115609] The buggy address belongs to the object at ffff000800c2e200 [ 50.115609] which belongs to the cache kmalloc-64 of size 64 [ 50.127936] The buggy address is located 0 bytes to the right of [ 50.127936] allocated 48-byte region [ffff000800c2e200, ffff000800c2e230) [ 50.140782] [ 50.142258] The buggy address belongs to the physical page: [ 50.147814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e [ 50.155800] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.162310] page_type: f5(slab) [ 50.165442] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.173167] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.180886] page dumped because: kasan: bad access detected [ 50.186441] [ 50.187917] Memory state around the buggy address: [ 50.192695] ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.199899] ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.207104] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.214305] ^ [ 50.219083] ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.226288] ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.233489] ==================================================================
[ 29.330678] ================================================================== [ 29.331107] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 29.331324] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.331513] [ 29.331613] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.331839] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.331946] Hardware name: linux,dummy-virt (DT) [ 29.332029] Call trace: [ 29.332086] show_stack+0x20/0x38 (C) [ 29.332204] dump_stack_lvl+0x8c/0xd0 [ 29.332327] print_report+0x118/0x608 [ 29.332472] kasan_report+0xdc/0x128 [ 29.332596] kasan_check_range+0x100/0x1a8 [ 29.332741] __kasan_check_write+0x20/0x30 [ 29.332948] kasan_atomics_helper+0xf20/0x4858 [ 29.333453] kasan_atomics+0x198/0x2e0 [ 29.333777] kunit_try_run_case+0x170/0x3f0 [ 29.334032] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.334221] kthread+0x328/0x630 [ 29.334342] ret_from_fork+0x10/0x20 [ 29.335031] [ 29.335274] Allocated by task 266: [ 29.335593] kasan_save_stack+0x3c/0x68 [ 29.335789] kasan_save_track+0x20/0x40 [ 29.335995] kasan_save_alloc_info+0x40/0x58 [ 29.336358] __kasan_kmalloc+0xd4/0xd8 [ 29.336776] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.336937] kasan_atomics+0xb8/0x2e0 [ 29.337264] kunit_try_run_case+0x170/0x3f0 [ 29.337614] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.337908] kthread+0x328/0x630 [ 29.338402] ret_from_fork+0x10/0x20 [ 29.338736] [ 29.338808] The buggy address belongs to the object at fff00000c7772d80 [ 29.338808] which belongs to the cache kmalloc-64 of size 64 [ 29.338971] The buggy address is located 0 bytes to the right of [ 29.338971] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.340840] [ 29.340874] The buggy address belongs to the physical page: [ 29.340915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.341005] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.341221] page_type: f5(slab) [ 29.341353] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.341483] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.341600] page dumped because: kasan: bad access detected [ 29.341743] [ 29.341796] Memory state around the buggy address: [ 29.341907] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.342010] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.342148] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.342246] ^ [ 29.342330] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.342440] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.342560] ================================================================== [ 29.343106] ================================================================== [ 29.343223] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 29.343361] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.343499] [ 29.343580] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.343812] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.343898] Hardware name: linux,dummy-virt (DT) [ 29.343986] Call trace: [ 29.344056] show_stack+0x20/0x38 (C) [ 29.344201] dump_stack_lvl+0x8c/0xd0 [ 29.344354] print_report+0x118/0x608 [ 29.344511] kasan_report+0xdc/0x128 [ 29.344665] kasan_check_range+0x100/0x1a8 [ 29.344825] __kasan_check_write+0x20/0x30 [ 29.344995] kasan_atomics_helper+0xf88/0x4858 [ 29.345133] kasan_atomics+0x198/0x2e0 [ 29.345275] kunit_try_run_case+0x170/0x3f0 [ 29.345571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.345777] kthread+0x328/0x630 [ 29.345901] ret_from_fork+0x10/0x20 [ 29.346016] [ 29.346074] Allocated by task 266: [ 29.346159] kasan_save_stack+0x3c/0x68 [ 29.346274] kasan_save_track+0x20/0x40 [ 29.346397] kasan_save_alloc_info+0x40/0x58 [ 29.346593] __kasan_kmalloc+0xd4/0xd8 [ 29.346747] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.346912] kasan_atomics+0xb8/0x2e0 [ 29.347065] kunit_try_run_case+0x170/0x3f0 [ 29.347366] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.347531] kthread+0x328/0x630 [ 29.347727] ret_from_fork+0x10/0x20 [ 29.348068] [ 29.348127] The buggy address belongs to the object at fff00000c7772d80 [ 29.348127] which belongs to the cache kmalloc-64 of size 64 [ 29.348268] The buggy address is located 0 bytes to the right of [ 29.348268] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.349477] [ 29.349633] The buggy address belongs to the physical page: [ 29.350414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.350553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.351395] page_type: f5(slab) [ 29.351534] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.351728] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.351871] page dumped because: kasan: bad access detected [ 29.351946] [ 29.351994] Memory state around the buggy address: [ 29.352072] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.352172] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.352288] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.352471] ^ [ 29.352559] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.352851] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.353128] ================================================================== [ 29.309353] ================================================================== [ 29.309469] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 29.309602] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.309761] [ 29.309860] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.310114] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.310237] Hardware name: linux,dummy-virt (DT) [ 29.310365] Call trace: [ 29.310433] show_stack+0x20/0x38 (C) [ 29.310562] dump_stack_lvl+0x8c/0xd0 [ 29.310776] print_report+0x118/0x608 [ 29.310929] kasan_report+0xdc/0x128 [ 29.311085] __asan_report_store8_noabort+0x20/0x30 [ 29.311248] kasan_atomics_helper+0x3e5c/0x4858 [ 29.311445] kasan_atomics+0x198/0x2e0 [ 29.311577] kunit_try_run_case+0x170/0x3f0 [ 29.311766] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.311965] kthread+0x328/0x630 [ 29.312112] ret_from_fork+0x10/0x20 [ 29.312239] [ 29.312290] Allocated by task 266: [ 29.312473] kasan_save_stack+0x3c/0x68 [ 29.312626] kasan_save_track+0x20/0x40 [ 29.312770] kasan_save_alloc_info+0x40/0x58 [ 29.312953] __kasan_kmalloc+0xd4/0xd8 [ 29.313127] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.313299] kasan_atomics+0xb8/0x2e0 [ 29.313475] kunit_try_run_case+0x170/0x3f0 [ 29.313591] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.313722] kthread+0x328/0x630 [ 29.313811] ret_from_fork+0x10/0x20 [ 29.313926] [ 29.313984] The buggy address belongs to the object at fff00000c7772d80 [ 29.313984] which belongs to the cache kmalloc-64 of size 64 [ 29.314125] The buggy address is located 0 bytes to the right of [ 29.314125] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.314283] [ 29.314349] The buggy address belongs to the physical page: [ 29.314424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.314567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.314706] page_type: f5(slab) [ 29.314825] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.315077] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.315225] page dumped because: kasan: bad access detected [ 29.315317] [ 29.315379] Memory state around the buggy address: [ 29.315466] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.315586] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.315769] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.315900] ^ [ 29.316114] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.316289] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.316746] ================================================================== [ 29.552928] ================================================================== [ 29.554291] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 29.554505] Read of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.554643] [ 29.555482] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.555973] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.556069] Hardware name: linux,dummy-virt (DT) [ 29.556161] Call trace: [ 29.556414] show_stack+0x20/0x38 (C) [ 29.556599] dump_stack_lvl+0x8c/0xd0 [ 29.556982] print_report+0x118/0x608 [ 29.557231] kasan_report+0xdc/0x128 [ 29.557376] __asan_report_load8_noabort+0x20/0x30 [ 29.557539] kasan_atomics_helper+0x3db0/0x4858 [ 29.557755] kasan_atomics+0x198/0x2e0 [ 29.557948] kunit_try_run_case+0x170/0x3f0 [ 29.558107] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.558264] kthread+0x328/0x630 [ 29.558445] ret_from_fork+0x10/0x20 [ 29.558577] [ 29.558703] Allocated by task 266: [ 29.558789] kasan_save_stack+0x3c/0x68 [ 29.559104] kasan_save_track+0x20/0x40 [ 29.559233] kasan_save_alloc_info+0x40/0x58 [ 29.559344] __kasan_kmalloc+0xd4/0xd8 [ 29.559617] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.559868] kasan_atomics+0xb8/0x2e0 [ 29.559973] kunit_try_run_case+0x170/0x3f0 [ 29.560074] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.560357] kthread+0x328/0x630 [ 29.560461] ret_from_fork+0x10/0x20 [ 29.560596] [ 29.560648] The buggy address belongs to the object at fff00000c7772d80 [ 29.560648] which belongs to the cache kmalloc-64 of size 64 [ 29.561033] The buggy address is located 0 bytes to the right of [ 29.561033] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.561466] [ 29.561577] The buggy address belongs to the physical page: [ 29.561655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.561804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.562053] page_type: f5(slab) [ 29.562224] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.562371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.562487] page dumped because: kasan: bad access detected [ 29.562575] [ 29.562666] Memory state around the buggy address: [ 29.562772] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.563007] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.563131] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.563239] ^ [ 29.563343] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.563468] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.563572] ================================================================== [ 29.633073] ================================================================== [ 29.633171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 29.633303] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.633431] [ 29.633505] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.634041] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.634116] Hardware name: linux,dummy-virt (DT) [ 29.634185] Call trace: [ 29.634236] show_stack+0x20/0x38 (C) [ 29.635393] dump_stack_lvl+0x8c/0xd0 [ 29.635550] print_report+0x118/0x608 [ 29.636514] kasan_report+0xdc/0x128 [ 29.636669] kasan_check_range+0x100/0x1a8 [ 29.636835] __kasan_check_write+0x20/0x30 [ 29.636968] kasan_atomics_helper+0x17ec/0x4858 [ 29.637109] kasan_atomics+0x198/0x2e0 [ 29.637261] kunit_try_run_case+0x170/0x3f0 [ 29.637669] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.637853] kthread+0x328/0x630 [ 29.637980] ret_from_fork+0x10/0x20 [ 29.638109] [ 29.638170] Allocated by task 266: [ 29.638255] kasan_save_stack+0x3c/0x68 [ 29.638375] kasan_save_track+0x20/0x40 [ 29.638490] kasan_save_alloc_info+0x40/0x58 [ 29.638600] __kasan_kmalloc+0xd4/0xd8 [ 29.638781] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.638895] kasan_atomics+0xb8/0x2e0 [ 29.638996] kunit_try_run_case+0x170/0x3f0 [ 29.639101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.639214] kthread+0x328/0x630 [ 29.639311] ret_from_fork+0x10/0x20 [ 29.639418] [ 29.639476] The buggy address belongs to the object at fff00000c7772d80 [ 29.639476] which belongs to the cache kmalloc-64 of size 64 [ 29.639624] The buggy address is located 0 bytes to the right of [ 29.639624] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.639808] [ 29.639895] The buggy address belongs to the physical page: [ 29.639977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.640129] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.640351] page_type: f5(slab) [ 29.642125] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.642323] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.642443] page dumped because: kasan: bad access detected [ 29.642537] [ 29.642594] Memory state around the buggy address: [ 29.644778] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.644913] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.645033] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.646392] ^ [ 29.646499] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.646725] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.646875] ================================================================== [ 29.606735] ================================================================== [ 29.607004] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 29.607124] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.607260] [ 29.607336] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.610012] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.610091] Hardware name: linux,dummy-virt (DT) [ 29.610188] Call trace: [ 29.610252] show_stack+0x20/0x38 (C) [ 29.610399] dump_stack_lvl+0x8c/0xd0 [ 29.610532] print_report+0x118/0x608 [ 29.610942] kasan_report+0xdc/0x128 [ 29.611071] kasan_check_range+0x100/0x1a8 [ 29.611197] __kasan_check_write+0x20/0x30 [ 29.611379] kasan_atomics_helper+0x175c/0x4858 [ 29.611519] kasan_atomics+0x198/0x2e0 [ 29.612143] kunit_try_run_case+0x170/0x3f0 [ 29.612307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.612443] kthread+0x328/0x630 [ 29.613646] ret_from_fork+0x10/0x20 [ 29.614129] [ 29.614239] Allocated by task 266: [ 29.614441] kasan_save_stack+0x3c/0x68 [ 29.614560] kasan_save_track+0x20/0x40 [ 29.615184] kasan_save_alloc_info+0x40/0x58 [ 29.615400] __kasan_kmalloc+0xd4/0xd8 [ 29.615510] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.615620] kasan_atomics+0xb8/0x2e0 [ 29.615741] kunit_try_run_case+0x170/0x3f0 [ 29.615847] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.616305] kthread+0x328/0x630 [ 29.616446] ret_from_fork+0x10/0x20 [ 29.616906] [ 29.616980] The buggy address belongs to the object at fff00000c7772d80 [ 29.616980] which belongs to the cache kmalloc-64 of size 64 [ 29.617583] The buggy address is located 0 bytes to the right of [ 29.617583] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.617764] [ 29.617823] The buggy address belongs to the physical page: [ 29.617907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.618317] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.619063] page_type: f5(slab) [ 29.619286] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.619425] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.619553] page dumped because: kasan: bad access detected [ 29.619638] [ 29.620316] Memory state around the buggy address: [ 29.620704] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.620846] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.621076] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.621193] ^ [ 29.621605] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.621878] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.622125] ================================================================== [ 29.252918] ================================================================== [ 29.253207] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 29.253342] Write of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.253463] [ 29.253532] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.253762] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.253846] Hardware name: linux,dummy-virt (DT) [ 29.254027] Call trace: [ 29.254098] show_stack+0x20/0x38 (C) [ 29.254272] dump_stack_lvl+0x8c/0xd0 [ 29.254422] print_report+0x118/0x608 [ 29.254566] kasan_report+0xdc/0x128 [ 29.254961] kasan_check_range+0x100/0x1a8 [ 29.255122] __kasan_check_write+0x20/0x30 [ 29.255317] kasan_atomics_helper+0xd3c/0x4858 [ 29.255460] kasan_atomics+0x198/0x2e0 [ 29.256199] kunit_try_run_case+0x170/0x3f0 [ 29.256433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.256988] kthread+0x328/0x630 [ 29.257148] ret_from_fork+0x10/0x20 [ 29.257417] [ 29.257511] Allocated by task 266: [ 29.257606] kasan_save_stack+0x3c/0x68 [ 29.257739] kasan_save_track+0x20/0x40 [ 29.257855] kasan_save_alloc_info+0x40/0x58 [ 29.257961] __kasan_kmalloc+0xd4/0xd8 [ 29.258397] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.258525] kasan_atomics+0xb8/0x2e0 [ 29.258636] kunit_try_run_case+0x170/0x3f0 [ 29.258813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.259153] kthread+0x328/0x630 [ 29.259591] ret_from_fork+0x10/0x20 [ 29.259786] [ 29.259847] The buggy address belongs to the object at fff00000c7772d80 [ 29.259847] which belongs to the cache kmalloc-64 of size 64 [ 29.259931] The buggy address is located 0 bytes to the right of [ 29.259931] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.260056] [ 29.260167] The buggy address belongs to the physical page: [ 29.260253] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.260664] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.261027] page_type: f5(slab) [ 29.261674] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.262095] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.262456] page dumped because: kasan: bad access detected [ 29.262705] [ 29.262776] Memory state around the buggy address: [ 29.262873] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.263201] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.263329] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.263739] ^ [ 29.263893] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.264082] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.264198] ================================================================== [ 29.526238] ================================================================== [ 29.526346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 29.526465] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.526584] [ 29.527098] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.527402] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.527996] Hardware name: linux,dummy-virt (DT) [ 29.528157] Call trace: [ 29.528225] show_stack+0x20/0x38 (C) [ 29.528352] dump_stack_lvl+0x8c/0xd0 [ 29.528494] print_report+0x118/0x608 [ 29.528673] kasan_report+0xdc/0x128 [ 29.529464] kasan_check_range+0x100/0x1a8 [ 29.529605] __kasan_check_write+0x20/0x30 [ 29.529762] kasan_atomics_helper+0x154c/0x4858 [ 29.530148] kasan_atomics+0x198/0x2e0 [ 29.530468] kunit_try_run_case+0x170/0x3f0 [ 29.530830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.531451] kthread+0x328/0x630 [ 29.532140] ret_from_fork+0x10/0x20 [ 29.532526] [ 29.533106] Allocated by task 266: [ 29.533345] kasan_save_stack+0x3c/0x68 [ 29.533516] kasan_save_track+0x20/0x40 [ 29.533621] kasan_save_alloc_info+0x40/0x58 [ 29.533745] __kasan_kmalloc+0xd4/0xd8 [ 29.534723] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.534862] kasan_atomics+0xb8/0x2e0 [ 29.535243] kunit_try_run_case+0x170/0x3f0 [ 29.535586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.535731] kthread+0x328/0x630 [ 29.536523] ret_from_fork+0x10/0x20 [ 29.536969] [ 29.537276] The buggy address belongs to the object at fff00000c7772d80 [ 29.537276] which belongs to the cache kmalloc-64 of size 64 [ 29.537436] The buggy address is located 0 bytes to the right of [ 29.537436] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.537594] [ 29.537650] The buggy address belongs to the physical page: [ 29.537745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.538206] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.538744] page_type: f5(slab) [ 29.539043] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.539176] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.539280] page dumped because: kasan: bad access detected [ 29.539361] [ 29.539411] Memory state around the buggy address: [ 29.539531] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.539647] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.539917] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.540018] ^ [ 29.540228] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.540339] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.540435] ================================================================== [ 29.441460] ================================================================== [ 29.441604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 29.442804] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.443416] [ 29.443500] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.443969] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.444149] Hardware name: linux,dummy-virt (DT) [ 29.444257] Call trace: [ 29.444405] show_stack+0x20/0x38 (C) [ 29.444636] dump_stack_lvl+0x8c/0xd0 [ 29.444781] print_report+0x118/0x608 [ 29.444904] kasan_report+0xdc/0x128 [ 29.445051] kasan_check_range+0x100/0x1a8 [ 29.445422] __kasan_check_write+0x20/0x30 [ 29.445615] kasan_atomics_helper+0x12d8/0x4858 [ 29.446258] kasan_atomics+0x198/0x2e0 [ 29.446804] kunit_try_run_case+0x170/0x3f0 [ 29.447362] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.447756] kthread+0x328/0x630 [ 29.447952] ret_from_fork+0x10/0x20 [ 29.448078] [ 29.448129] Allocated by task 266: [ 29.448215] kasan_save_stack+0x3c/0x68 [ 29.448321] kasan_save_track+0x20/0x40 [ 29.448501] kasan_save_alloc_info+0x40/0x58 [ 29.448622] __kasan_kmalloc+0xd4/0xd8 [ 29.448748] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.449453] kasan_atomics+0xb8/0x2e0 [ 29.449579] kunit_try_run_case+0x170/0x3f0 [ 29.449756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.449937] kthread+0x328/0x630 [ 29.451738] ret_from_fork+0x10/0x20 [ 29.451919] [ 29.452006] The buggy address belongs to the object at fff00000c7772d80 [ 29.452006] which belongs to the cache kmalloc-64 of size 64 [ 29.452172] The buggy address is located 0 bytes to the right of [ 29.452172] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.452367] [ 29.452592] The buggy address belongs to the physical page: [ 29.452786] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.452930] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.453111] page_type: f5(slab) [ 29.453256] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.453391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.453522] page dumped because: kasan: bad access detected [ 29.453640] [ 29.453708] Memory state around the buggy address: [ 29.453800] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.454115] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.454251] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.454424] ^ [ 29.454560] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.454775] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.454955] ================================================================== [ 29.179693] ================================================================== [ 29.179800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 29.179916] Read of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.180575] [ 29.180708] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.180928] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.181972] kasan_atomics_helper+0x3dcc/0x4858 [ 29.184093] kunit_try_run_case+0x170/0x3f0 [ 29.184539] kthread+0x328/0x630 [ 29.184642] ret_from_fork+0x10/0x20 [ 29.185717] The buggy address is located 0 bytes to the right of [ 29.185717] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.186365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.188915] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.192416] __kasan_check_write+0x20/0x30 [ 29.193965] ret_from_fork+0x10/0x20 [ 29.197920] kthread+0x328/0x630 [ 29.198829] The buggy address is located 0 bytes to the right of [ 29.198829] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.200034] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.200934] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.201363] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.202381] [ 29.203293] show_stack+0x20/0x38 (C) [ 29.204208] __asan_report_load4_noabort+0x20/0x30 [ 29.205489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.206549] Allocated by task 266: [ 29.206957] kasan_save_track+0x20/0x40 [ 29.213009] The buggy address belongs to the object at fff00000c7772d80 [ 29.213009] which belongs to the cache kmalloc-64 of size 64 [ 29.213453] The buggy address is located 0 bytes to the right of [ 29.213453] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.214259] [ 29.214368] The buggy address belongs to the physical page: [ 29.214470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.214605] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.214905] page_type: f5(slab) [ 29.215130] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.215265] page dumped because: kasan: bad access detected [ 29.215351] [ 29.215400] Memory state around the buggy address: [ 29.215490] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.215624] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.215765] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.215863] ^ [ 29.215969] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.217831] Write of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.220608] kunit_try_run_case+0x170/0x3f0 [ 29.223846] The buggy address is located 0 bytes to the right of [ 29.223846] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.224602] The buggy address belongs to the physical page: [ 29.225174] page_type: f5(slab) [ 29.225854] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.227756] [ 29.228761] dump_stack_lvl+0x8c/0xd0 [ 29.230229] kthread+0x328/0x630 [ 29.232229] kthread+0x328/0x630 [ 29.233424] [ 29.233573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.234813] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.236560] [ 29.236996] Call trace: [ 29.241909] [ 29.242053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.242189] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.242420] page_type: f5(slab) [ 29.242733] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.242894] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.242999] page dumped because: kasan: bad access detected [ 29.243085] [ 29.243139] Memory state around the buggy address: [ 29.243267] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.243446] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.243593] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.243711] ^ [ 29.243795] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.244086] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.244328] ================================================================== [ 29.277398] ================================================================== [ 29.277506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 29.277622] Read of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.277765] [ 29.277842] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.278043] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.278117] Hardware name: linux,dummy-virt (DT) [ 29.278192] Call trace: [ 29.278250] show_stack+0x20/0x38 (C) [ 29.278368] dump_stack_lvl+0x8c/0xd0 [ 29.278489] print_report+0x118/0x608 [ 29.278616] kasan_report+0xdc/0x128 [ 29.278825] kasan_check_range+0x100/0x1a8 [ 29.278978] __kasan_check_read+0x20/0x30 [ 29.279125] kasan_atomics_helper+0xdd4/0x4858 [ 29.279276] kasan_atomics+0x198/0x2e0 [ 29.279411] kunit_try_run_case+0x170/0x3f0 [ 29.279971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.280136] kthread+0x328/0x630 [ 29.280253] ret_from_fork+0x10/0x20 [ 29.280373] [ 29.280425] Allocated by task 266: [ 29.280553] kasan_save_stack+0x3c/0x68 [ 29.280697] kasan_save_track+0x20/0x40 [ 29.282052] kasan_save_alloc_info+0x40/0x58 [ 29.282179] __kasan_kmalloc+0xd4/0xd8 [ 29.282289] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.282469] kasan_atomics+0xb8/0x2e0 [ 29.282651] kunit_try_run_case+0x170/0x3f0 [ 29.282786] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.282919] kthread+0x328/0x630 [ 29.283025] ret_from_fork+0x10/0x20 [ 29.283187] [ 29.283488] The buggy address belongs to the object at fff00000c7772d80 [ 29.283488] which belongs to the cache kmalloc-64 of size 64 [ 29.283646] The buggy address is located 0 bytes to the right of [ 29.283646] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.283976] [ 29.284141] The buggy address belongs to the physical page: [ 29.284364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.284700] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.284827] page_type: f5(slab) [ 29.284918] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.285039] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.285211] page dumped because: kasan: bad access detected [ 29.285359] [ 29.285424] Memory state around the buggy address: [ 29.285548] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.285671] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.285813] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.285976] ^ [ 29.286458] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.286721] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.286831] ================================================================== [ 29.104432] ================================================================== [ 29.104534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 29.104652] Read of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.104816] [ 29.104904] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.105101] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.105175] Hardware name: linux,dummy-virt (DT) [ 29.105265] Call trace: [ 29.105329] show_stack+0x20/0x38 (C) [ 29.105463] dump_stack_lvl+0x8c/0xd0 [ 29.105600] print_report+0x118/0x608 [ 29.107810] kasan_report+0xdc/0x128 [ 29.107966] __asan_report_load4_noabort+0x20/0x30 [ 29.108094] kasan_atomics_helper+0x42d8/0x4858 [ 29.108215] kasan_atomics+0x198/0x2e0 [ 29.108332] kunit_try_run_case+0x170/0x3f0 [ 29.108468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.109478] kthread+0x328/0x630 [ 29.109607] ret_from_fork+0x10/0x20 [ 29.113045] The buggy address is located 0 bytes to the right of [ 29.113045] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.116237] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.118895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 29.122732] kunit_try_run_case+0x170/0x3f0 [ 29.122886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.123255] kthread+0x328/0x630 [ 29.123385] ret_from_fork+0x10/0x20 [ 29.123734] [ 29.123799] Allocated by task 266: [ 29.123895] kasan_save_stack+0x3c/0x68 [ 29.124002] kasan_save_track+0x20/0x40 [ 29.124115] kasan_save_alloc_info+0x40/0x58 [ 29.124233] __kasan_kmalloc+0xd4/0xd8 [ 29.124347] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.124472] kasan_atomics+0xb8/0x2e0 [ 29.124576] kunit_try_run_case+0x170/0x3f0 [ 29.124784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.125098] kthread+0x328/0x630 [ 29.125233] ret_from_fork+0x10/0x20 [ 29.125526] [ 29.125702] The buggy address belongs to the object at fff00000c7772d80 [ 29.125702] which belongs to the cache kmalloc-64 of size 64 [ 29.125862] The buggy address is located 0 bytes to the right of [ 29.125862] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.126038] [ 29.126102] The buggy address belongs to the physical page: [ 29.126205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.126442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.126589] page_type: f5(slab) [ 29.126765] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.126905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.127104] page dumped because: kasan: bad access detected [ 29.127222] [ 29.127377] Memory state around the buggy address: [ 29.127463] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.128108] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.128227] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.128327] ^ [ 29.128410] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.128516] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.129363] ================================================================== [ 29.165172] ================================================================== [ 29.165352] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 29.165515] Write of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.165641] [ 29.165734] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.165943] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.166014] Hardware name: linux,dummy-virt (DT) [ 29.166090] Call trace: [ 29.166147] show_stack+0x20/0x38 (C) [ 29.166265] dump_stack_lvl+0x8c/0xd0 [ 29.166409] print_report+0x118/0x608 [ 29.167000] kasan_report+0xdc/0x128 [ 29.167340] kasan_check_range+0x100/0x1a8 [ 29.167837] __kasan_check_write+0x20/0x30 [ 29.168453] kasan_atomics_helper+0xad4/0x4858 [ 29.168627] kasan_atomics+0x198/0x2e0 [ 29.169019] kunit_try_run_case+0x170/0x3f0 [ 29.169303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.169599] kthread+0x328/0x630 [ 29.169732] ret_from_fork+0x10/0x20 [ 29.169880] [ 29.169946] Allocated by task 266: [ 29.170036] kasan_save_stack+0x3c/0x68 [ 29.170147] kasan_save_track+0x20/0x40 [ 29.170244] kasan_save_alloc_info+0x40/0x58 [ 29.170348] __kasan_kmalloc+0xd4/0xd8 [ 29.170449] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.170556] kasan_atomics+0xb8/0x2e0 [ 29.170657] kunit_try_run_case+0x170/0x3f0 [ 29.170788] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.170901] kthread+0x328/0x630 [ 29.171661] ret_from_fork+0x10/0x20 [ 29.171950] [ 29.172867] The buggy address belongs to the object at fff00000c7772d80 [ 29.172867] which belongs to the cache kmalloc-64 of size 64 [ 29.173205] The buggy address is located 0 bytes to the right of [ 29.173205] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.174627] [ 29.174756] The buggy address belongs to the physical page: [ 29.174834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.174909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.174990] page_type: f5(slab) [ 29.175094] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.175285] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.176188] page dumped because: kasan: bad access detected [ 29.176334] [ 29.176390] Memory state around the buggy address: [ 29.176868] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.177066] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.177238] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.177447] ^ [ 29.177582] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.178307] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.178450] ================================================================== [ 29.622646] ================================================================== [ 29.622906] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 29.623204] Read of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.623342] [ 29.623535] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.623756] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.624163] Hardware name: linux,dummy-virt (DT) [ 29.624261] Call trace: [ 29.624329] show_stack+0x20/0x38 (C) [ 29.624447] dump_stack_lvl+0x8c/0xd0 [ 29.624579] print_report+0x118/0x608 [ 29.624952] kasan_report+0xdc/0x128 [ 29.625125] __asan_report_load8_noabort+0x20/0x30 [ 29.625740] kasan_atomics_helper+0x3e20/0x4858 [ 29.626171] kasan_atomics+0x198/0x2e0 [ 29.626374] kunit_try_run_case+0x170/0x3f0 [ 29.626529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.626743] kthread+0x328/0x630 [ 29.626873] ret_from_fork+0x10/0x20 [ 29.627166] [ 29.627255] Allocated by task 266: [ 29.627455] kasan_save_stack+0x3c/0x68 [ 29.627576] kasan_save_track+0x20/0x40 [ 29.627905] kasan_save_alloc_info+0x40/0x58 [ 29.628066] __kasan_kmalloc+0xd4/0xd8 [ 29.628337] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.628451] kasan_atomics+0xb8/0x2e0 [ 29.628594] kunit_try_run_case+0x170/0x3f0 [ 29.629240] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.629380] kthread+0x328/0x630 [ 29.629537] ret_from_fork+0x10/0x20 [ 29.629750] [ 29.629818] The buggy address belongs to the object at fff00000c7772d80 [ 29.629818] which belongs to the cache kmalloc-64 of size 64 [ 29.629981] The buggy address is located 0 bytes to the right of [ 29.629981] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.630225] [ 29.630302] The buggy address belongs to the physical page: [ 29.630381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.630513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.631295] page_type: f5(slab) [ 29.631402] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.631527] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.631631] page dumped because: kasan: bad access detected [ 29.631856] [ 29.631913] Memory state around the buggy address: [ 29.632002] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.632119] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.632229] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.632331] ^ [ 29.632424] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.632538] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.632625] ================================================================== [ 29.574438] ================================================================== [ 29.574722] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 29.574943] Read of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.575207] [ 29.575291] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.575639] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.575743] Hardware name: linux,dummy-virt (DT) [ 29.575838] Call trace: [ 29.575893] show_stack+0x20/0x38 (C) [ 29.576027] dump_stack_lvl+0x8c/0xd0 [ 29.576159] print_report+0x118/0x608 [ 29.576287] kasan_report+0xdc/0x128 [ 29.578179] __asan_report_load8_noabort+0x20/0x30 [ 29.578326] kasan_atomics_helper+0x3df4/0x4858 [ 29.578622] kasan_atomics+0x198/0x2e0 [ 29.578925] kunit_try_run_case+0x170/0x3f0 [ 29.579329] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.579478] kthread+0x328/0x630 [ 29.579598] ret_from_fork+0x10/0x20 [ 29.579788] [ 29.579855] Allocated by task 266: [ 29.579991] kasan_save_stack+0x3c/0x68 [ 29.580096] kasan_save_track+0x20/0x40 [ 29.580196] kasan_save_alloc_info+0x40/0x58 [ 29.580297] __kasan_kmalloc+0xd4/0xd8 [ 29.580468] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.580725] kasan_atomics+0xb8/0x2e0 [ 29.580992] kunit_try_run_case+0x170/0x3f0 [ 29.581102] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.581217] kthread+0x328/0x630 [ 29.581324] ret_from_fork+0x10/0x20 [ 29.581452] [ 29.581605] The buggy address belongs to the object at fff00000c7772d80 [ 29.581605] which belongs to the cache kmalloc-64 of size 64 [ 29.581773] The buggy address is located 0 bytes to the right of [ 29.581773] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.581952] [ 29.582016] The buggy address belongs to the physical page: [ 29.582107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.582240] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.582561] page_type: f5(slab) [ 29.582902] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.583096] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.583292] page dumped because: kasan: bad access detected [ 29.583439] [ 29.583529] Memory state around the buggy address: [ 29.583772] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.583880] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.583987] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.584087] ^ [ 29.584213] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.584310] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.584402] ================================================================== [ 29.244748] ================================================================== [ 29.244954] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 29.245110] Read of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.245232] [ 29.245326] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.245552] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.245718] Hardware name: linux,dummy-virt (DT) [ 29.245793] Call trace: [ 29.245898] show_stack+0x20/0x38 (C) [ 29.246037] dump_stack_lvl+0x8c/0xd0 [ 29.246383] print_report+0x118/0x608 [ 29.246738] kasan_report+0xdc/0x128 [ 29.246872] __asan_report_load4_noabort+0x20/0x30 [ 29.247104] kasan_atomics_helper+0x3dd8/0x4858 [ 29.247240] kasan_atomics+0x198/0x2e0 [ 29.247478] kunit_try_run_case+0x170/0x3f0 [ 29.247618] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.248055] kthread+0x328/0x630 [ 29.248204] ret_from_fork+0x10/0x20 [ 29.248362] [ 29.248415] Allocated by task 266: [ 29.248492] kasan_save_stack+0x3c/0x68 [ 29.248616] kasan_save_track+0x20/0x40 [ 29.248734] kasan_save_alloc_info+0x40/0x58 [ 29.248895] __kasan_kmalloc+0xd4/0xd8 [ 29.249001] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.249108] kasan_atomics+0xb8/0x2e0 [ 29.249235] kunit_try_run_case+0x170/0x3f0 [ 29.249358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.249591] kthread+0x328/0x630 [ 29.249703] ret_from_fork+0x10/0x20 [ 29.249827] [ 29.249931] The buggy address belongs to the object at fff00000c7772d80 [ 29.249931] which belongs to the cache kmalloc-64 of size 64 [ 29.250185] The buggy address is located 0 bytes to the right of [ 29.250185] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.250352] [ 29.250411] The buggy address belongs to the physical page: [ 29.250497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.250663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.250817] page_type: f5(slab) [ 29.250927] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.251070] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.251388] page dumped because: kasan: bad access detected [ 29.251495] [ 29.251557] Memory state around the buggy address: [ 29.251646] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.251793] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.251990] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.252149] ^ [ 29.252239] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.252348] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.252446] ================================================================== [ 29.430990] ================================================================== [ 29.431092] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 29.431213] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.431358] [ 29.431449] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.431989] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.432203] Hardware name: linux,dummy-virt (DT) [ 29.432288] Call trace: [ 29.432343] show_stack+0x20/0x38 (C) [ 29.432467] dump_stack_lvl+0x8c/0xd0 [ 29.432585] print_report+0x118/0x608 [ 29.432724] kasan_report+0xdc/0x128 [ 29.432851] kasan_check_range+0x100/0x1a8 [ 29.432975] __kasan_check_write+0x20/0x30 [ 29.433088] kasan_atomics_helper+0x126c/0x4858 [ 29.433212] kasan_atomics+0x198/0x2e0 [ 29.433346] kunit_try_run_case+0x170/0x3f0 [ 29.433467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.433601] kthread+0x328/0x630 [ 29.433729] ret_from_fork+0x10/0x20 [ 29.433854] [ 29.433902] Allocated by task 266: [ 29.433973] kasan_save_stack+0x3c/0x68 [ 29.434074] kasan_save_track+0x20/0x40 [ 29.434176] kasan_save_alloc_info+0x40/0x58 [ 29.434274] __kasan_kmalloc+0xd4/0xd8 [ 29.434373] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.434483] kasan_atomics+0xb8/0x2e0 [ 29.434582] kunit_try_run_case+0x170/0x3f0 [ 29.434725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.434903] kthread+0x328/0x630 [ 29.435076] ret_from_fork+0x10/0x20 [ 29.435868] [ 29.436063] The buggy address belongs to the object at fff00000c7772d80 [ 29.436063] which belongs to the cache kmalloc-64 of size 64 [ 29.436495] The buggy address is located 0 bytes to the right of [ 29.436495] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.436661] [ 29.436737] The buggy address belongs to the physical page: [ 29.437618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.437901] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.438553] page_type: f5(slab) [ 29.438670] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.438835] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.439649] page dumped because: kasan: bad access detected [ 29.439824] [ 29.439886] Memory state around the buggy address: [ 29.440320] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.440438] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.440614] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.440737] ^ [ 29.440826] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.440932] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.441031] ================================================================== [ 29.455874] ================================================================== [ 29.456360] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 29.456529] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.456656] [ 29.456757] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.457097] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.457435] Hardware name: linux,dummy-virt (DT) [ 29.457751] Call trace: [ 29.457817] show_stack+0x20/0x38 (C) [ 29.457946] dump_stack_lvl+0x8c/0xd0 [ 29.458073] print_report+0x118/0x608 [ 29.458199] kasan_report+0xdc/0x128 [ 29.458667] kasan_check_range+0x100/0x1a8 [ 29.460701] __kasan_check_write+0x20/0x30 [ 29.460853] kasan_atomics_helper+0x1384/0x4858 [ 29.461004] kasan_atomics+0x198/0x2e0 [ 29.461116] kunit_try_run_case+0x170/0x3f0 [ 29.461184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.461272] kthread+0x328/0x630 [ 29.461330] ret_from_fork+0x10/0x20 [ 29.461394] [ 29.461419] Allocated by task 266: [ 29.461459] kasan_save_stack+0x3c/0x68 [ 29.461513] kasan_save_track+0x20/0x40 [ 29.461565] kasan_save_alloc_info+0x40/0x58 [ 29.461614] __kasan_kmalloc+0xd4/0xd8 [ 29.461663] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.461748] kasan_atomics+0xb8/0x2e0 [ 29.461800] kunit_try_run_case+0x170/0x3f0 [ 29.461851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.461909] kthread+0x328/0x630 [ 29.461953] ret_from_fork+0x10/0x20 [ 29.461999] [ 29.462028] The buggy address belongs to the object at fff00000c7772d80 [ 29.462028] which belongs to the cache kmalloc-64 of size 64 [ 29.462105] The buggy address is located 0 bytes to the right of [ 29.462105] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.462189] [ 29.462217] The buggy address belongs to the physical page: [ 29.462257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.462320] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.462383] page_type: f5(slab) [ 29.462431] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.462493] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.462545] page dumped because: kasan: bad access detected [ 29.462587] [ 29.462610] Memory state around the buggy address: [ 29.462670] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.462843] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.462957] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.463048] ^ [ 29.463211] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.463356] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.463729] ================================================================== [ 29.486060] ================================================================== [ 29.486263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 29.486564] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.486713] [ 29.486810] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.487414] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.487499] Hardware name: linux,dummy-virt (DT) [ 29.487607] Call trace: [ 29.487672] show_stack+0x20/0x38 (C) [ 29.487830] dump_stack_lvl+0x8c/0xd0 [ 29.487963] print_report+0x118/0x608 [ 29.489585] kasan_report+0xdc/0x128 [ 29.489937] kasan_check_range+0x100/0x1a8 [ 29.490448] __kasan_check_write+0x20/0x30 [ 29.490710] kasan_atomics_helper+0x1414/0x4858 [ 29.490864] kasan_atomics+0x198/0x2e0 [ 29.491021] kunit_try_run_case+0x170/0x3f0 [ 29.491377] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.491519] kthread+0x328/0x630 [ 29.491650] ret_from_fork+0x10/0x20 [ 29.492610] [ 29.492677] Allocated by task 266: [ 29.492850] kasan_save_stack+0x3c/0x68 [ 29.492958] kasan_save_track+0x20/0x40 [ 29.493298] kasan_save_alloc_info+0x40/0x58 [ 29.493611] __kasan_kmalloc+0xd4/0xd8 [ 29.493794] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.493925] kasan_atomics+0xb8/0x2e0 [ 29.494394] kunit_try_run_case+0x170/0x3f0 [ 29.494543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.494936] kthread+0x328/0x630 [ 29.495070] ret_from_fork+0x10/0x20 [ 29.495414] [ 29.495535] The buggy address belongs to the object at fff00000c7772d80 [ 29.495535] which belongs to the cache kmalloc-64 of size 64 [ 29.495876] The buggy address is located 0 bytes to the right of [ 29.495876] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.496064] [ 29.496177] The buggy address belongs to the physical page: [ 29.496322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.496582] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.496840] page_type: f5(slab) [ 29.496943] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.497758] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.497870] page dumped because: kasan: bad access detected [ 29.498008] [ 29.498169] Memory state around the buggy address: [ 29.498288] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.498398] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.498584] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.498818] ^ [ 29.498920] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.499468] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.499841] ================================================================== [ 29.564072] ================================================================== [ 29.564171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 29.564478] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.564849] [ 29.565052] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.565588] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.565662] Hardware name: linux,dummy-virt (DT) [ 29.565768] Call trace: [ 29.565894] show_stack+0x20/0x38 (C) [ 29.566092] dump_stack_lvl+0x8c/0xd0 [ 29.566241] print_report+0x118/0x608 [ 29.566446] kasan_report+0xdc/0x128 [ 29.566581] kasan_check_range+0x100/0x1a8 [ 29.566936] __kasan_check_write+0x20/0x30 [ 29.567072] kasan_atomics_helper+0x1644/0x4858 [ 29.567294] kasan_atomics+0x198/0x2e0 [ 29.567445] kunit_try_run_case+0x170/0x3f0 [ 29.567695] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.567954] kthread+0x328/0x630 [ 29.568220] ret_from_fork+0x10/0x20 [ 29.568417] [ 29.568473] Allocated by task 266: [ 29.568594] kasan_save_stack+0x3c/0x68 [ 29.568720] kasan_save_track+0x20/0x40 [ 29.569012] kasan_save_alloc_info+0x40/0x58 [ 29.569301] __kasan_kmalloc+0xd4/0xd8 [ 29.569543] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.570007] kasan_atomics+0xb8/0x2e0 [ 29.570143] kunit_try_run_case+0x170/0x3f0 [ 29.570260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.570325] kthread+0x328/0x630 [ 29.570369] ret_from_fork+0x10/0x20 [ 29.570515] [ 29.570583] The buggy address belongs to the object at fff00000c7772d80 [ 29.570583] which belongs to the cache kmalloc-64 of size 64 [ 29.570804] The buggy address is located 0 bytes to the right of [ 29.570804] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.571015] [ 29.571177] The buggy address belongs to the physical page: [ 29.571362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.571490] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.571761] page_type: f5(slab) [ 29.571993] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.572161] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.572287] page dumped because: kasan: bad access detected [ 29.572378] [ 29.572425] Memory state around the buggy address: [ 29.572631] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.573161] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.573293] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.573407] ^ [ 29.573506] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.573632] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.573824] ================================================================== [ 29.130641] ================================================================== [ 29.130793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 29.130935] Write of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.131540] [ 29.131652] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.132527] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.132604] Hardware name: linux,dummy-virt (DT) [ 29.132701] Call trace: [ 29.133184] show_stack+0x20/0x38 (C) [ 29.133426] dump_stack_lvl+0x8c/0xd0 [ 29.134135] print_report+0x118/0x608 [ 29.134481] kasan_report+0xdc/0x128 [ 29.134631] kasan_check_range+0x100/0x1a8 [ 29.134795] __kasan_check_write+0x20/0x30 [ 29.135595] kasan_atomics_helper+0x99c/0x4858 [ 29.135891] kasan_atomics+0x198/0x2e0 [ 29.136077] kunit_try_run_case+0x170/0x3f0 [ 29.136596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.137002] kthread+0x328/0x630 [ 29.137130] ret_from_fork+0x10/0x20 [ 29.137259] [ 29.137316] Allocated by task 266: [ 29.137409] kasan_save_stack+0x3c/0x68 [ 29.137534] kasan_save_track+0x20/0x40 [ 29.137828] kasan_save_alloc_info+0x40/0x58 [ 29.137932] __kasan_kmalloc+0xd4/0xd8 [ 29.138035] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.138136] kasan_atomics+0xb8/0x2e0 [ 29.138234] kunit_try_run_case+0x170/0x3f0 [ 29.138345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.139480] kthread+0x328/0x630 [ 29.139711] ret_from_fork+0x10/0x20 [ 29.139824] [ 29.139938] The buggy address belongs to the object at fff00000c7772d80 [ 29.139938] which belongs to the cache kmalloc-64 of size 64 [ 29.140196] The buggy address is located 0 bytes to the right of [ 29.140196] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.140990] [ 29.141169] The buggy address belongs to the physical page: [ 29.141304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.141443] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.141572] page_type: f5(slab) [ 29.141781] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.142090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.142209] page dumped because: kasan: bad access detected [ 29.142302] [ 29.142429] Memory state around the buggy address: [ 29.142523] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.142770] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.142901] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.143016] ^ [ 29.143319] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.143440] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.143553] ================================================================== [ 29.365196] ================================================================== [ 29.365425] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 29.365556] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.365695] [ 29.365768] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.365970] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.366041] Hardware name: linux,dummy-virt (DT) [ 29.366118] Call trace: [ 29.366175] show_stack+0x20/0x38 (C) [ 29.366291] dump_stack_lvl+0x8c/0xd0 [ 29.366413] print_report+0x118/0x608 [ 29.366526] kasan_report+0xdc/0x128 [ 29.367215] kasan_check_range+0x100/0x1a8 [ 29.368559] __kasan_check_write+0x20/0x30 [ 29.368721] kasan_atomics_helper+0x1058/0x4858 [ 29.368866] kasan_atomics+0x198/0x2e0 [ 29.368994] kunit_try_run_case+0x170/0x3f0 [ 29.369136] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.369279] kthread+0x328/0x630 [ 29.369401] ret_from_fork+0x10/0x20 [ 29.369520] [ 29.369568] Allocated by task 266: [ 29.369639] kasan_save_stack+0x3c/0x68 [ 29.369770] kasan_save_track+0x20/0x40 [ 29.369874] kasan_save_alloc_info+0x40/0x58 [ 29.369983] __kasan_kmalloc+0xd4/0xd8 [ 29.370092] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.370208] kasan_atomics+0xb8/0x2e0 [ 29.370306] kunit_try_run_case+0x170/0x3f0 [ 29.370416] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.370526] kthread+0x328/0x630 [ 29.370613] ret_from_fork+0x10/0x20 [ 29.373340] [ 29.373403] The buggy address belongs to the object at fff00000c7772d80 [ 29.373403] which belongs to the cache kmalloc-64 of size 64 [ 29.374073] The buggy address is located 0 bytes to the right of [ 29.374073] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.374770] [ 29.374836] The buggy address belongs to the physical page: [ 29.374921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.375057] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.375187] page_type: f5(slab) [ 29.375286] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.375412] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.375517] page dumped because: kasan: bad access detected [ 29.375603] [ 29.375655] Memory state around the buggy address: [ 29.375760] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.375877] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.375995] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.376094] ^ [ 29.376185] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.376297] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.376395] ================================================================== [ 29.390223] ================================================================== [ 29.390391] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 29.390519] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.390662] [ 29.390752] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.390987] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.391080] Hardware name: linux,dummy-virt (DT) [ 29.391434] Call trace: [ 29.391652] show_stack+0x20/0x38 (C) [ 29.391903] dump_stack_lvl+0x8c/0xd0 [ 29.392137] print_report+0x118/0x608 [ 29.392312] kasan_report+0xdc/0x128 [ 29.392453] kasan_check_range+0x100/0x1a8 [ 29.392842] __kasan_check_write+0x20/0x30 [ 29.392919] kasan_atomics_helper+0x1128/0x4858 [ 29.392985] kasan_atomics+0x198/0x2e0 [ 29.393049] kunit_try_run_case+0x170/0x3f0 [ 29.393114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.393185] kthread+0x328/0x630 [ 29.393239] ret_from_fork+0x10/0x20 [ 29.393312] [ 29.393337] Allocated by task 266: [ 29.393378] kasan_save_stack+0x3c/0x68 [ 29.393437] kasan_save_track+0x20/0x40 [ 29.393488] kasan_save_alloc_info+0x40/0x58 [ 29.393536] __kasan_kmalloc+0xd4/0xd8 [ 29.393586] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.393643] kasan_atomics+0xb8/0x2e0 [ 29.393729] kunit_try_run_case+0x170/0x3f0 [ 29.393836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.394012] kthread+0x328/0x630 [ 29.394322] ret_from_fork+0x10/0x20 [ 29.394803] [ 29.394985] The buggy address belongs to the object at fff00000c7772d80 [ 29.394985] which belongs to the cache kmalloc-64 of size 64 [ 29.395387] The buggy address is located 0 bytes to the right of [ 29.395387] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.395558] [ 29.395651] The buggy address belongs to the physical page: [ 29.395761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.395906] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.396291] page_type: f5(slab) [ 29.396434] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.396697] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.396804] page dumped because: kasan: bad access detected [ 29.396954] [ 29.397070] Memory state around the buggy address: [ 29.397162] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.397289] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.397557] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.397817] ^ [ 29.398586] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.398803] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.398916] ================================================================== [ 29.145019] ================================================================== [ 29.145294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 29.145468] Write of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.145621] [ 29.145755] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.145973] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.146066] Hardware name: linux,dummy-virt (DT) [ 29.146164] Call trace: [ 29.146230] show_stack+0x20/0x38 (C) [ 29.146363] dump_stack_lvl+0x8c/0xd0 [ 29.146500] print_report+0x118/0x608 [ 29.146655] kasan_report+0xdc/0x128 [ 29.146835] kasan_check_range+0x100/0x1a8 [ 29.146974] __kasan_check_write+0x20/0x30 [ 29.147121] kasan_atomics_helper+0xa04/0x4858 [ 29.147324] kasan_atomics+0x198/0x2e0 [ 29.147487] kunit_try_run_case+0x170/0x3f0 [ 29.147702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.147928] kthread+0x328/0x630 [ 29.148119] ret_from_fork+0x10/0x20 [ 29.148341] [ 29.148425] Allocated by task 266: [ 29.148531] kasan_save_stack+0x3c/0x68 [ 29.148644] kasan_save_track+0x20/0x40 [ 29.148769] kasan_save_alloc_info+0x40/0x58 [ 29.148865] __kasan_kmalloc+0xd4/0xd8 [ 29.148965] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.149088] kasan_atomics+0xb8/0x2e0 [ 29.149189] kunit_try_run_case+0x170/0x3f0 [ 29.149302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.149418] kthread+0x328/0x630 [ 29.149518] ret_from_fork+0x10/0x20 [ 29.149634] [ 29.149726] The buggy address belongs to the object at fff00000c7772d80 [ 29.149726] which belongs to the cache kmalloc-64 of size 64 [ 29.149884] The buggy address is located 0 bytes to the right of [ 29.149884] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.150067] [ 29.150152] The buggy address belongs to the physical page: [ 29.150268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.150417] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.150594] page_type: f5(slab) [ 29.150764] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.150839] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.150890] page dumped because: kasan: bad access detected [ 29.150965] [ 29.151083] Memory state around the buggy address: [ 29.151178] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.151290] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.151404] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.151507] ^ [ 29.151671] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.152013] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.152117] ================================================================== [ 28.933773] ================================================================== [ 28.935641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 28.937892] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.938112] show_stack+0x20/0x38 (C) [ 28.939601] kasan_atomics_helper+0x32c/0x4858 [ 28.940972] kasan_save_stack+0x3c/0x68 [ 28.941655] kasan_atomics+0xb8/0x2e0 [ 28.942394] [ 28.942525] The buggy address is located 0 bytes to the right of [ 28.942525] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 28.943596] page dumped because: kasan: bad access detected [ 28.943708] [ 28.943824] Memory state around the buggy address: [ 28.943971] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.944603] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.944723] ================================================================== [ 29.300325] ================================================================== [ 29.300437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 29.300555] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.300675] [ 29.300766] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.300967] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.301037] Hardware name: linux,dummy-virt (DT) [ 29.301113] Call trace: [ 29.301166] show_stack+0x20/0x38 (C) [ 29.301295] dump_stack_lvl+0x8c/0xd0 [ 29.301420] print_report+0x118/0x608 [ 29.301536] kasan_report+0xdc/0x128 [ 29.303038] kasan_check_range+0x100/0x1a8 [ 29.303957] __kasan_check_write+0x20/0x30 [ 29.304246] kasan_atomics_helper+0xe44/0x4858 [ 29.304529] kasan_atomics+0x198/0x2e0 [ 29.304664] kunit_try_run_case+0x170/0x3f0 [ 29.305660] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.305850] kthread+0x328/0x630 [ 29.305986] ret_from_fork+0x10/0x20 [ 29.306071] [ 29.306099] Allocated by task 266: [ 29.306143] kasan_save_stack+0x3c/0x68 [ 29.306202] kasan_save_track+0x20/0x40 [ 29.306253] kasan_save_alloc_info+0x40/0x58 [ 29.306302] __kasan_kmalloc+0xd4/0xd8 [ 29.306351] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.306408] kasan_atomics+0xb8/0x2e0 [ 29.306458] kunit_try_run_case+0x170/0x3f0 [ 29.306510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.306567] kthread+0x328/0x630 [ 29.306611] ret_from_fork+0x10/0x20 [ 29.306820] [ 29.306882] The buggy address belongs to the object at fff00000c7772d80 [ 29.306882] which belongs to the cache kmalloc-64 of size 64 [ 29.307033] The buggy address is located 0 bytes to the right of [ 29.307033] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.307192] [ 29.307243] The buggy address belongs to the physical page: [ 29.307323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.307445] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.307564] page_type: f5(slab) [ 29.307660] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.307810] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.307909] page dumped because: kasan: bad access detected [ 29.307986] [ 29.308046] Memory state around the buggy address: [ 29.308128] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.308235] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.308343] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.308494] ^ [ 29.308591] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.308736] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.308848] ================================================================== [ 29.353748] ================================================================== [ 29.353867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 29.354006] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.354146] [ 29.354423] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.354756] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.355293] Hardware name: linux,dummy-virt (DT) [ 29.355749] Call trace: [ 29.356024] show_stack+0x20/0x38 (C) [ 29.356284] dump_stack_lvl+0x8c/0xd0 [ 29.356420] print_report+0x118/0x608 [ 29.356844] kasan_report+0xdc/0x128 [ 29.357066] kasan_check_range+0x100/0x1a8 [ 29.357206] __kasan_check_write+0x20/0x30 [ 29.357350] kasan_atomics_helper+0xff0/0x4858 [ 29.357487] kasan_atomics+0x198/0x2e0 [ 29.357694] kunit_try_run_case+0x170/0x3f0 [ 29.358536] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.358784] kthread+0x328/0x630 [ 29.358913] ret_from_fork+0x10/0x20 [ 29.359051] [ 29.359271] Allocated by task 266: [ 29.359360] kasan_save_stack+0x3c/0x68 [ 29.359486] kasan_save_track+0x20/0x40 [ 29.359645] kasan_save_alloc_info+0x40/0x58 [ 29.359814] __kasan_kmalloc+0xd4/0xd8 [ 29.359935] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.360061] kasan_atomics+0xb8/0x2e0 [ 29.360173] kunit_try_run_case+0x170/0x3f0 [ 29.360274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.360620] kthread+0x328/0x630 [ 29.360735] ret_from_fork+0x10/0x20 [ 29.360845] [ 29.360957] The buggy address belongs to the object at fff00000c7772d80 [ 29.360957] which belongs to the cache kmalloc-64 of size 64 [ 29.361128] The buggy address is located 0 bytes to the right of [ 29.361128] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.361393] [ 29.361472] The buggy address belongs to the physical page: [ 29.361579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.361725] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.361866] page_type: f5(slab) [ 29.361974] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.362119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.362580] page dumped because: kasan: bad access detected [ 29.362727] [ 29.362789] Memory state around the buggy address: [ 29.362868] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.362977] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.363086] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.363180] ^ [ 29.363268] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.363383] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.363478] ================================================================== [ 29.595615] ================================================================== [ 29.595854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 29.595973] Read of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.596099] [ 29.596167] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.596363] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.596433] Hardware name: linux,dummy-virt (DT) [ 29.596509] Call trace: [ 29.596568] show_stack+0x20/0x38 (C) [ 29.596763] dump_stack_lvl+0x8c/0xd0 [ 29.597113] print_report+0x118/0x608 [ 29.597270] kasan_report+0xdc/0x128 [ 29.597408] __asan_report_load8_noabort+0x20/0x30 [ 29.597585] kasan_atomics_helper+0x3e10/0x4858 [ 29.597841] kasan_atomics+0x198/0x2e0 [ 29.598046] kunit_try_run_case+0x170/0x3f0 [ 29.598279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.598424] kthread+0x328/0x630 [ 29.598558] ret_from_fork+0x10/0x20 [ 29.599367] [ 29.599452] Allocated by task 266: [ 29.599555] kasan_save_stack+0x3c/0x68 [ 29.599712] kasan_save_track+0x20/0x40 [ 29.599881] kasan_save_alloc_info+0x40/0x58 [ 29.599987] __kasan_kmalloc+0xd4/0xd8 [ 29.600127] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.600236] kasan_atomics+0xb8/0x2e0 [ 29.600340] kunit_try_run_case+0x170/0x3f0 [ 29.600441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.600563] kthread+0x328/0x630 [ 29.600847] ret_from_fork+0x10/0x20 [ 29.600951] [ 29.601004] The buggy address belongs to the object at fff00000c7772d80 [ 29.601004] which belongs to the cache kmalloc-64 of size 64 [ 29.601333] The buggy address is located 0 bytes to the right of [ 29.601333] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.602008] [ 29.602079] The buggy address belongs to the physical page: [ 29.602169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.602426] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.602569] page_type: f5(slab) [ 29.602786] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.603312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.603429] page dumped because: kasan: bad access detected [ 29.603527] [ 29.603588] Memory state around the buggy address: [ 29.603677] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.603809] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.603917] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.604801] ^ [ 29.605071] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.605375] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.605507] ================================================================== [ 29.381004] ================================================================== [ 29.381314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 29.381460] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.381589] [ 29.381666] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.381898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.381971] Hardware name: linux,dummy-virt (DT) [ 29.382049] Call trace: [ 29.382104] show_stack+0x20/0x38 (C) [ 29.382223] dump_stack_lvl+0x8c/0xd0 [ 29.383856] print_report+0x118/0x608 [ 29.384135] kasan_report+0xdc/0x128 [ 29.384277] kasan_check_range+0x100/0x1a8 [ 29.384432] __kasan_check_write+0x20/0x30 [ 29.384722] kasan_atomics_helper+0x10c0/0x4858 [ 29.384866] kasan_atomics+0x198/0x2e0 [ 29.384988] kunit_try_run_case+0x170/0x3f0 [ 29.385165] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.385556] kthread+0x328/0x630 [ 29.385718] ret_from_fork+0x10/0x20 [ 29.385867] [ 29.385963] Allocated by task 266: [ 29.386098] kasan_save_stack+0x3c/0x68 [ 29.386208] kasan_save_track+0x20/0x40 [ 29.386308] kasan_save_alloc_info+0x40/0x58 [ 29.386409] __kasan_kmalloc+0xd4/0xd8 [ 29.386546] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.386798] kasan_atomics+0xb8/0x2e0 [ 29.386961] kunit_try_run_case+0x170/0x3f0 [ 29.387575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.387970] kthread+0x328/0x630 [ 29.388095] ret_from_fork+0x10/0x20 [ 29.388301] [ 29.388362] The buggy address belongs to the object at fff00000c7772d80 [ 29.388362] which belongs to the cache kmalloc-64 of size 64 [ 29.388554] The buggy address is located 0 bytes to the right of [ 29.388554] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.388937] [ 29.389038] The buggy address belongs to the physical page: [ 29.389087] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.389157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.389221] page_type: f5(slab) [ 29.389288] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.389353] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.389403] page dumped because: kasan: bad access detected [ 29.389447] [ 29.389471] Memory state around the buggy address: [ 29.389510] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.389567] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.389621] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.389668] ^ [ 29.389744] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.389801] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.389851] ================================================================== [ 29.399397] ================================================================== [ 29.399503] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 29.399637] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.400175] [ 29.400493] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.400721] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.400795] Hardware name: linux,dummy-virt (DT) [ 29.400869] Call trace: [ 29.400926] show_stack+0x20/0x38 (C) [ 29.401048] dump_stack_lvl+0x8c/0xd0 [ 29.401169] print_report+0x118/0x608 [ 29.402631] kasan_report+0xdc/0x128 [ 29.402992] kasan_check_range+0x100/0x1a8 [ 29.403117] __kasan_check_write+0x20/0x30 [ 29.403234] kasan_atomics_helper+0x1190/0x4858 [ 29.403359] kasan_atomics+0x198/0x2e0 [ 29.403474] kunit_try_run_case+0x170/0x3f0 [ 29.403603] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.408939] kthread+0x328/0x630 [ 29.410739] ret_from_fork+0x10/0x20 [ 29.410937] [ 29.410995] Allocated by task 266: [ 29.411153] kasan_save_stack+0x3c/0x68 [ 29.411274] kasan_save_track+0x20/0x40 [ 29.411429] kasan_save_alloc_info+0x40/0x58 [ 29.411555] __kasan_kmalloc+0xd4/0xd8 [ 29.411671] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.411816] kasan_atomics+0xb8/0x2e0 [ 29.411958] kunit_try_run_case+0x170/0x3f0 [ 29.412207] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.412408] kthread+0x328/0x630 [ 29.412746] ret_from_fork+0x10/0x20 [ 29.412969] [ 29.413023] The buggy address belongs to the object at fff00000c7772d80 [ 29.413023] which belongs to the cache kmalloc-64 of size 64 [ 29.413164] The buggy address is located 0 bytes to the right of [ 29.413164] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.413476] [ 29.413540] The buggy address belongs to the physical page: [ 29.413654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.413806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.413929] page_type: f5(slab) [ 29.414025] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.414176] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.414284] page dumped because: kasan: bad access detected [ 29.414365] [ 29.414413] Memory state around the buggy address: [ 29.414487] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.414592] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.415457] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.415998] ^ [ 29.416916] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.417124] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.417444] ================================================================== [ 29.287729] ================================================================== [ 29.287848] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 29.288051] Read of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.288351] [ 29.288465] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.288669] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.288851] Hardware name: linux,dummy-virt (DT) [ 29.288951] Call trace: [ 29.289175] show_stack+0x20/0x38 (C) [ 29.289565] dump_stack_lvl+0x8c/0xd0 [ 29.289733] print_report+0x118/0x608 [ 29.289932] kasan_report+0xdc/0x128 [ 29.290239] __asan_report_load8_noabort+0x20/0x30 [ 29.290929] kasan_atomics_helper+0x3f58/0x4858 [ 29.291116] kasan_atomics+0x198/0x2e0 [ 29.291388] kunit_try_run_case+0x170/0x3f0 [ 29.291533] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.291716] kthread+0x328/0x630 [ 29.291841] ret_from_fork+0x10/0x20 [ 29.292010] [ 29.292067] Allocated by task 266: [ 29.292170] kasan_save_stack+0x3c/0x68 [ 29.292321] kasan_save_track+0x20/0x40 [ 29.292453] kasan_save_alloc_info+0x40/0x58 [ 29.292765] __kasan_kmalloc+0xd4/0xd8 [ 29.292904] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.293120] kasan_atomics+0xb8/0x2e0 [ 29.293217] kunit_try_run_case+0x170/0x3f0 [ 29.293441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.293557] kthread+0x328/0x630 [ 29.293654] ret_from_fork+0x10/0x20 [ 29.294483] [ 29.294566] The buggy address belongs to the object at fff00000c7772d80 [ 29.294566] which belongs to the cache kmalloc-64 of size 64 [ 29.294978] The buggy address is located 0 bytes to the right of [ 29.294978] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.295274] [ 29.295445] The buggy address belongs to the physical page: [ 29.295576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.295766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.295899] page_type: f5(slab) [ 29.296207] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.296403] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.296605] page dumped because: kasan: bad access detected [ 29.296739] [ 29.296795] Memory state around the buggy address: [ 29.296899] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.297099] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.297221] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.297609] ^ [ 29.298074] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.298339] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.299083] ================================================================== [ 29.540920] ================================================================== [ 29.541064] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 29.541203] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.541359] [ 29.541677] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.542126] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.542325] Hardware name: linux,dummy-virt (DT) [ 29.542549] Call trace: [ 29.542743] show_stack+0x20/0x38 (C) [ 29.543030] dump_stack_lvl+0x8c/0xd0 [ 29.543181] print_report+0x118/0x608 [ 29.543394] kasan_report+0xdc/0x128 [ 29.543663] kasan_check_range+0x100/0x1a8 [ 29.544145] __kasan_check_write+0x20/0x30 [ 29.544279] kasan_atomics_helper+0x15b4/0x4858 [ 29.544602] kasan_atomics+0x198/0x2e0 [ 29.544751] kunit_try_run_case+0x170/0x3f0 [ 29.545121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.545272] kthread+0x328/0x630 [ 29.545393] ret_from_fork+0x10/0x20 [ 29.545570] [ 29.545623] Allocated by task 266: [ 29.545717] kasan_save_stack+0x3c/0x68 [ 29.545845] kasan_save_track+0x20/0x40 [ 29.545971] kasan_save_alloc_info+0x40/0x58 [ 29.546126] __kasan_kmalloc+0xd4/0xd8 [ 29.546277] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.546430] kasan_atomics+0xb8/0x2e0 [ 29.546578] kunit_try_run_case+0x170/0x3f0 [ 29.546704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.546822] kthread+0x328/0x630 [ 29.547185] ret_from_fork+0x10/0x20 [ 29.548142] [ 29.548231] The buggy address belongs to the object at fff00000c7772d80 [ 29.548231] which belongs to the cache kmalloc-64 of size 64 [ 29.548395] The buggy address is located 0 bytes to the right of [ 29.548395] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.548563] [ 29.548630] The buggy address belongs to the physical page: [ 29.548771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.549054] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.549186] page_type: f5(slab) [ 29.549514] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.549645] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.549791] page dumped because: kasan: bad access detected [ 29.549875] [ 29.549924] Memory state around the buggy address: [ 29.550000] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.550118] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.550744] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.551034] ^ [ 29.551312] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.551997] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.552139] ================================================================== [ 29.500496] ================================================================== [ 29.500740] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 29.501013] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.501942] [ 29.502059] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.502266] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.502340] Hardware name: linux,dummy-virt (DT) [ 29.502418] Call trace: [ 29.502477] show_stack+0x20/0x38 (C) [ 29.503022] dump_stack_lvl+0x8c/0xd0 [ 29.503262] print_report+0x118/0x608 [ 29.503443] kasan_report+0xdc/0x128 [ 29.503677] kasan_check_range+0x100/0x1a8 [ 29.503981] __kasan_check_write+0x20/0x30 [ 29.504116] kasan_atomics_helper+0x147c/0x4858 [ 29.505180] kasan_atomics+0x198/0x2e0 [ 29.505384] kunit_try_run_case+0x170/0x3f0 [ 29.505717] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.506401] kthread+0x328/0x630 [ 29.506555] ret_from_fork+0x10/0x20 [ 29.507143] [ 29.507202] Allocated by task 266: [ 29.507288] kasan_save_stack+0x3c/0x68 [ 29.507869] kasan_save_track+0x20/0x40 [ 29.507984] kasan_save_alloc_info+0x40/0x58 [ 29.508095] __kasan_kmalloc+0xd4/0xd8 [ 29.508539] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.508660] kasan_atomics+0xb8/0x2e0 [ 29.508798] kunit_try_run_case+0x170/0x3f0 [ 29.508917] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.509035] kthread+0x328/0x630 [ 29.509126] ret_from_fork+0x10/0x20 [ 29.509219] [ 29.509355] The buggy address belongs to the object at fff00000c7772d80 [ 29.509355] which belongs to the cache kmalloc-64 of size 64 [ 29.509519] The buggy address is located 0 bytes to the right of [ 29.509519] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.509677] [ 29.509762] The buggy address belongs to the physical page: [ 29.509962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.510091] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.510213] page_type: f5(slab) [ 29.510312] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.510434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.510589] page dumped because: kasan: bad access detected [ 29.510725] [ 29.510789] Memory state around the buggy address: [ 29.510881] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.511007] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.511134] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.512005] ^ [ 29.512108] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.512430] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.512531] ================================================================== [ 29.465097] ================================================================== [ 29.465223] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 29.465355] Read of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.465475] [ 29.465543] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.465758] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.465830] Hardware name: linux,dummy-virt (DT) [ 29.465903] Call trace: [ 29.465961] show_stack+0x20/0x38 (C) [ 29.466081] dump_stack_lvl+0x8c/0xd0 [ 29.466207] print_report+0x118/0x608 [ 29.466328] kasan_report+0xdc/0x128 [ 29.466448] __asan_report_load8_noabort+0x20/0x30 [ 29.466569] kasan_atomics_helper+0x3f04/0x4858 [ 29.468059] kasan_atomics+0x198/0x2e0 [ 29.468301] kunit_try_run_case+0x170/0x3f0 [ 29.469537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.470522] kthread+0x328/0x630 [ 29.470693] ret_from_fork+0x10/0x20 [ 29.470837] [ 29.470892] Allocated by task 266: [ 29.470970] kasan_save_stack+0x3c/0x68 [ 29.472016] kasan_save_track+0x20/0x40 [ 29.472185] kasan_save_alloc_info+0x40/0x58 [ 29.472396] __kasan_kmalloc+0xd4/0xd8 [ 29.472500] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.473371] kasan_atomics+0xb8/0x2e0 [ 29.473526] kunit_try_run_case+0x170/0x3f0 [ 29.473780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.474011] kthread+0x328/0x630 [ 29.474107] ret_from_fork+0x10/0x20 [ 29.475108] [ 29.475175] The buggy address belongs to the object at fff00000c7772d80 [ 29.475175] which belongs to the cache kmalloc-64 of size 64 [ 29.475484] The buggy address is located 0 bytes to the right of [ 29.475484] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.475855] [ 29.476488] The buggy address belongs to the physical page: [ 29.476717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.477347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.477761] page_type: f5(slab) [ 29.478326] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.478552] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.479225] page dumped because: kasan: bad access detected [ 29.479348] [ 29.479402] Memory state around the buggy address: [ 29.480187] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.480709] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.481143] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.481268] ^ [ 29.481578] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.482066] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.482921] ================================================================== [ 29.153873] ================================================================== [ 29.154001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 29.154367] Write of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.154642] [ 29.155277] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.155497] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.155574] Hardware name: linux,dummy-virt (DT) [ 29.155668] Call trace: [ 29.155755] show_stack+0x20/0x38 (C) [ 29.155888] dump_stack_lvl+0x8c/0xd0 [ 29.156028] print_report+0x118/0x608 [ 29.156179] kasan_report+0xdc/0x128 [ 29.156740] kasan_check_range+0x100/0x1a8 [ 29.157223] __kasan_check_write+0x20/0x30 [ 29.157534] kasan_atomics_helper+0xa6c/0x4858 [ 29.157858] kasan_atomics+0x198/0x2e0 [ 29.158062] kunit_try_run_case+0x170/0x3f0 [ 29.158196] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.158367] kthread+0x328/0x630 [ 29.158670] ret_from_fork+0x10/0x20 [ 29.158838] [ 29.159131] Allocated by task 266: [ 29.159289] kasan_save_stack+0x3c/0x68 [ 29.159416] kasan_save_track+0x20/0x40 [ 29.159534] kasan_save_alloc_info+0x40/0x58 [ 29.159899] __kasan_kmalloc+0xd4/0xd8 [ 29.160099] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.160224] kasan_atomics+0xb8/0x2e0 [ 29.160413] kunit_try_run_case+0x170/0x3f0 [ 29.160944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.161087] kthread+0x328/0x630 [ 29.161203] ret_from_fork+0x10/0x20 [ 29.161350] [ 29.161489] The buggy address belongs to the object at fff00000c7772d80 [ 29.161489] which belongs to the cache kmalloc-64 of size 64 [ 29.161639] The buggy address is located 0 bytes to the right of [ 29.161639] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.161810] [ 29.161887] The buggy address belongs to the physical page: [ 29.162001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.162135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.162271] page_type: f5(slab) [ 29.162378] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.162513] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.162618] page dumped because: kasan: bad access detected [ 29.162728] [ 29.162790] Memory state around the buggy address: [ 29.162881] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.163005] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.163595] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.163713] ^ [ 29.163856] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.164049] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.164192] ================================================================== [ 29.267135] ================================================================== [ 29.267244] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 29.267362] Read of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.267485] [ 29.267559] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.267781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.267850] Hardware name: linux,dummy-virt (DT) [ 29.267928] Call trace: [ 29.267983] show_stack+0x20/0x38 (C) [ 29.268109] dump_stack_lvl+0x8c/0xd0 [ 29.268228] print_report+0x118/0x608 [ 29.269025] kasan_report+0xdc/0x128 [ 29.269252] __asan_report_load4_noabort+0x20/0x30 [ 29.269417] kasan_atomics_helper+0x3e04/0x4858 [ 29.269570] kasan_atomics+0x198/0x2e0 [ 29.269715] kunit_try_run_case+0x170/0x3f0 [ 29.270039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.270197] kthread+0x328/0x630 [ 29.271181] ret_from_fork+0x10/0x20 [ 29.271468] [ 29.271528] Allocated by task 266: [ 29.271612] kasan_save_stack+0x3c/0x68 [ 29.271748] kasan_save_track+0x20/0x40 [ 29.271893] kasan_save_alloc_info+0x40/0x58 [ 29.272159] __kasan_kmalloc+0xd4/0xd8 [ 29.272274] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.272438] kasan_atomics+0xb8/0x2e0 [ 29.272541] kunit_try_run_case+0x170/0x3f0 [ 29.272651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.272917] kthread+0x328/0x630 [ 29.273011] ret_from_fork+0x10/0x20 [ 29.273252] [ 29.273335] The buggy address belongs to the object at fff00000c7772d80 [ 29.273335] which belongs to the cache kmalloc-64 of size 64 [ 29.273653] The buggy address is located 0 bytes to the right of [ 29.273653] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.274251] [ 29.274334] The buggy address belongs to the physical page: [ 29.274457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.274608] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.274817] page_type: f5(slab) [ 29.274937] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.275068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.275172] page dumped because: kasan: bad access detected [ 29.275463] [ 29.275653] Memory state around the buggy address: [ 29.275791] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.275907] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.276019] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.276120] ^ [ 29.276249] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.276374] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.276491] ================================================================== [ 29.317499] ================================================================== [ 29.317654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 29.317912] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.318089] [ 29.318164] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.318376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.318449] Hardware name: linux,dummy-virt (DT) [ 29.318528] Call trace: [ 29.318583] show_stack+0x20/0x38 (C) [ 29.318817] dump_stack_lvl+0x8c/0xd0 [ 29.318926] print_report+0x118/0x608 [ 29.318988] kasan_report+0xdc/0x128 [ 29.319884] kasan_check_range+0x100/0x1a8 [ 29.320253] __kasan_check_write+0x20/0x30 [ 29.320608] kasan_atomics_helper+0xeb8/0x4858 [ 29.320818] kasan_atomics+0x198/0x2e0 [ 29.321273] kunit_try_run_case+0x170/0x3f0 [ 29.321408] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.321871] kthread+0x328/0x630 [ 29.322019] ret_from_fork+0x10/0x20 [ 29.322600] [ 29.322703] Allocated by task 266: [ 29.322937] kasan_save_stack+0x3c/0x68 [ 29.323099] kasan_save_track+0x20/0x40 [ 29.323272] kasan_save_alloc_info+0x40/0x58 [ 29.323578] __kasan_kmalloc+0xd4/0xd8 [ 29.323766] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.324042] kasan_atomics+0xb8/0x2e0 [ 29.324605] kunit_try_run_case+0x170/0x3f0 [ 29.324886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.325383] kthread+0x328/0x630 [ 29.325626] ret_from_fork+0x10/0x20 [ 29.325798] [ 29.325904] The buggy address belongs to the object at fff00000c7772d80 [ 29.325904] which belongs to the cache kmalloc-64 of size 64 [ 29.326076] The buggy address is located 0 bytes to the right of [ 29.326076] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.326778] [ 29.326847] The buggy address belongs to the physical page: [ 29.326931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.327751] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.327892] page_type: f5(slab) [ 29.328294] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.328545] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.328661] page dumped because: kasan: bad access detected [ 29.328771] [ 29.329027] Memory state around the buggy address: [ 29.329110] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.329272] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.329530] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.329643] ^ [ 29.329787] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.329910] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.330242] ================================================================== [ 29.418465] ================================================================== [ 29.418566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 29.418703] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.418830] [ 29.418900] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.419100] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.419169] Hardware name: linux,dummy-virt (DT) [ 29.419246] Call trace: [ 29.419301] show_stack+0x20/0x38 (C) [ 29.419433] dump_stack_lvl+0x8c/0xd0 [ 29.419731] print_report+0x118/0x608 [ 29.419916] kasan_report+0xdc/0x128 [ 29.420720] kasan_check_range+0x100/0x1a8 [ 29.420878] __kasan_check_write+0x20/0x30 [ 29.421272] kasan_atomics_helper+0x11f8/0x4858 [ 29.421466] kasan_atomics+0x198/0x2e0 [ 29.421600] kunit_try_run_case+0x170/0x3f0 [ 29.421752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.421913] kthread+0x328/0x630 [ 29.422528] ret_from_fork+0x10/0x20 [ 29.422718] [ 29.422803] Allocated by task 266: [ 29.423018] kasan_save_stack+0x3c/0x68 [ 29.423126] kasan_save_track+0x20/0x40 [ 29.423235] kasan_save_alloc_info+0x40/0x58 [ 29.423392] __kasan_kmalloc+0xd4/0xd8 [ 29.423757] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.423895] kasan_atomics+0xb8/0x2e0 [ 29.424015] kunit_try_run_case+0x170/0x3f0 [ 29.424141] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.424269] kthread+0x328/0x630 [ 29.425172] ret_from_fork+0x10/0x20 [ 29.425333] [ 29.425388] The buggy address belongs to the object at fff00000c7772d80 [ 29.425388] which belongs to the cache kmalloc-64 of size 64 [ 29.425741] The buggy address is located 0 bytes to the right of [ 29.425741] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.426548] [ 29.426962] The buggy address belongs to the physical page: [ 29.427133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.427427] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.427792] page_type: f5(slab) [ 29.427898] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.428027] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.428131] page dumped because: kasan: bad access detected [ 29.428213] [ 29.428260] Memory state around the buggy address: [ 29.428336] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.428464] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.428888] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.429011] ^ [ 29.429508] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.429778] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.429938] ================================================================== [ 29.585005] ================================================================== [ 29.586198] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 29.586554] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.586873] [ 29.586971] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.587200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.587283] Hardware name: linux,dummy-virt (DT) [ 29.587370] Call trace: [ 29.587430] show_stack+0x20/0x38 (C) [ 29.587579] dump_stack_lvl+0x8c/0xd0 [ 29.587742] print_report+0x118/0x608 [ 29.587887] kasan_report+0xdc/0x128 [ 29.588012] kasan_check_range+0x100/0x1a8 [ 29.588131] __kasan_check_write+0x20/0x30 [ 29.588283] kasan_atomics_helper+0x16d0/0x4858 [ 29.588634] kasan_atomics+0x198/0x2e0 [ 29.588777] kunit_try_run_case+0x170/0x3f0 [ 29.588942] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.589206] kthread+0x328/0x630 [ 29.589343] ret_from_fork+0x10/0x20 [ 29.589463] [ 29.589515] Allocated by task 266: [ 29.589590] kasan_save_stack+0x3c/0x68 [ 29.589713] kasan_save_track+0x20/0x40 [ 29.589827] kasan_save_alloc_info+0x40/0x58 [ 29.589948] __kasan_kmalloc+0xd4/0xd8 [ 29.590152] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.590409] kasan_atomics+0xb8/0x2e0 [ 29.590529] kunit_try_run_case+0x170/0x3f0 [ 29.590707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.590923] kthread+0x328/0x630 [ 29.591025] ret_from_fork+0x10/0x20 [ 29.591150] [ 29.591249] The buggy address belongs to the object at fff00000c7772d80 [ 29.591249] which belongs to the cache kmalloc-64 of size 64 [ 29.591397] The buggy address is located 0 bytes to the right of [ 29.591397] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.591559] [ 29.591619] The buggy address belongs to the physical page: [ 29.591771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.592032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.592168] page_type: f5(slab) [ 29.592265] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.592432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.592638] page dumped because: kasan: bad access detected [ 29.592784] [ 29.592841] Memory state around the buggy address: [ 29.592929] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.593034] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.593155] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.593288] ^ [ 29.593727] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.593897] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.594006] ================================================================== [ 29.513186] ================================================================== [ 29.513429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 29.514097] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266 [ 29.514223] [ 29.514306] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.514794] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.514885] Hardware name: linux,dummy-virt (DT) [ 29.514968] Call trace: [ 29.515250] show_stack+0x20/0x38 (C) [ 29.515605] dump_stack_lvl+0x8c/0xd0 [ 29.515767] print_report+0x118/0x608 [ 29.516114] kasan_report+0xdc/0x128 [ 29.516297] kasan_check_range+0x100/0x1a8 [ 29.516612] __kasan_check_write+0x20/0x30 [ 29.517096] kasan_atomics_helper+0x14e4/0x4858 [ 29.517261] kasan_atomics+0x198/0x2e0 [ 29.517404] kunit_try_run_case+0x170/0x3f0 [ 29.518725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.518981] kthread+0x328/0x630 [ 29.519117] ret_from_fork+0x10/0x20 [ 29.519344] [ 29.519402] Allocated by task 266: [ 29.519577] kasan_save_stack+0x3c/0x68 [ 29.519776] kasan_save_track+0x20/0x40 [ 29.519891] kasan_save_alloc_info+0x40/0x58 [ 29.520050] __kasan_kmalloc+0xd4/0xd8 [ 29.520283] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.520418] kasan_atomics+0xb8/0x2e0 [ 29.520615] kunit_try_run_case+0x170/0x3f0 [ 29.520813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.520941] kthread+0x328/0x630 [ 29.521295] ret_from_fork+0x10/0x20 [ 29.521451] [ 29.521509] The buggy address belongs to the object at fff00000c7772d80 [ 29.521509] which belongs to the cache kmalloc-64 of size 64 [ 29.521651] The buggy address is located 0 bytes to the right of [ 29.521651] allocated 48-byte region [fff00000c7772d80, fff00000c7772db0) [ 29.521846] [ 29.522175] The buggy address belongs to the physical page: [ 29.522294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772 [ 29.522435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.522563] page_type: f5(slab) [ 29.522664] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.522812] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.522941] page dumped because: kasan: bad access detected [ 29.523037] [ 29.523095] Memory state around the buggy address: [ 29.523388] fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.523667] fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.523805] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.523900] ^ [ 29.524356] fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.524924] fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.525038] ==================================================================
[ 23.402369] ================================================================== [ 23.403413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 23.404222] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 23.405268] [ 23.405713] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 23.405922] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.405968] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.406018] Call Trace: [ 23.406044] <TASK> [ 23.406063] dump_stack_lvl+0x73/0xb0 [ 23.406101] print_report+0xd1/0x650 [ 23.406135] ? __virt_addr_valid+0x1db/0x2d0 [ 23.406169] ? kasan_atomics_helper+0xde0/0x5450 [ 23.406203] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.406250] ? kasan_atomics_helper+0xde0/0x5450 [ 23.406284] kasan_report+0x141/0x180 [ 23.406317] ? kasan_atomics_helper+0xde0/0x5450 [ 23.406356] kasan_check_range+0x10c/0x1c0 [ 23.406392] __kasan_check_write+0x18/0x20 [ 23.406421] kasan_atomics_helper+0xde0/0x5450 [ 23.406454] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.406487] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.406517] ? kasan_atomics+0x152/0x310 [ 23.406549] kasan_atomics+0x1dc/0x310 [ 23.406577] ? __pfx_kasan_atomics+0x10/0x10 [ 23.406638] ? __pfx_read_tsc+0x10/0x10 [ 23.406686] ? ktime_get_ts64+0x86/0x230 [ 23.406723] kunit_try_run_case+0x1a5/0x480 [ 23.406755] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.406785] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.406823] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.406861] ? __kthread_parkme+0x82/0x180 [ 23.406916] ? preempt_count_sub+0x50/0x80 [ 23.406955] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.406987] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.407026] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.407065] kthread+0x337/0x6f0 [ 23.407094] ? trace_preempt_on+0x20/0xc0 [ 23.407127] ? __pfx_kthread+0x10/0x10 [ 23.407157] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.407193] ? calculate_sigpending+0x7b/0xa0 [ 23.407229] ? __pfx_kthread+0x10/0x10 [ 23.407260] ret_from_fork+0x116/0x1d0 [ 23.407287] ? __pfx_kthread+0x10/0x10 [ 23.407316] ret_from_fork_asm+0x1a/0x30 [ 23.407359] </TASK> [ 23.407375] [ 23.430649] Allocated by task 282: [ 23.431234] kasan_save_stack+0x45/0x70 [ 23.431525] kasan_save_track+0x18/0x40 [ 23.432288] kasan_save_alloc_info+0x3b/0x50 [ 23.432743] __kasan_kmalloc+0xb7/0xc0 [ 23.433151] __kmalloc_cache_noprof+0x189/0x420 [ 23.433661] kasan_atomics+0x95/0x310 [ 23.434063] kunit_try_run_case+0x1a5/0x480 [ 23.434532] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.435059] kthread+0x337/0x6f0 [ 23.435404] ret_from_fork+0x116/0x1d0 [ 23.436366] ret_from_fork_asm+0x1a/0x30 [ 23.436909] [ 23.437084] The buggy address belongs to the object at ffff888102b73d80 [ 23.437084] which belongs to the cache kmalloc-64 of size 64 [ 23.438784] The buggy address is located 0 bytes to the right of [ 23.438784] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 23.439803] [ 23.440243] The buggy address belongs to the physical page: [ 23.441169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 23.442026] flags: 0x200000000000000(node=0|zone=2) [ 23.442431] page_type: f5(slab) [ 23.442835] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.443479] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.444484] page dumped because: kasan: bad access detected [ 23.445122] [ 23.445371] Memory state around the buggy address: [ 23.446053] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.446751] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.447392] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.448429] ^ [ 23.448820] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.449582] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.450431] ================================================================== [ 23.801567] ================================================================== [ 23.802244] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 23.803059] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 23.803893] [ 23.804137] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 23.804306] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.804348] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.804411] Call Trace: [ 23.804462] <TASK> [ 23.804562] dump_stack_lvl+0x73/0xb0 [ 23.804771] print_report+0xd1/0x650 [ 23.804910] ? __virt_addr_valid+0x1db/0x2d0 [ 23.805056] ? kasan_atomics_helper+0x1217/0x5450 [ 23.805138] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.805271] ? kasan_atomics_helper+0x1217/0x5450 [ 23.805352] kasan_report+0x141/0x180 [ 23.805436] ? kasan_atomics_helper+0x1217/0x5450 [ 23.805640] kasan_check_range+0x10c/0x1c0 [ 23.805758] __kasan_check_write+0x18/0x20 [ 23.805844] kasan_atomics_helper+0x1217/0x5450 [ 23.805953] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.806039] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.806117] ? kasan_atomics+0x152/0x310 [ 23.806258] kasan_atomics+0x1dc/0x310 [ 23.806424] ? __pfx_kasan_atomics+0x10/0x10 [ 23.806505] ? __pfx_read_tsc+0x10/0x10 [ 23.806668] ? ktime_get_ts64+0x86/0x230 [ 23.806789] kunit_try_run_case+0x1a5/0x480 [ 23.806838] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.806889] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.806942] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.806984] ? __kthread_parkme+0x82/0x180 [ 23.807016] ? preempt_count_sub+0x50/0x80 [ 23.807052] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.807084] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.807122] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.807160] kthread+0x337/0x6f0 [ 23.807188] ? trace_preempt_on+0x20/0xc0 [ 23.807222] ? __pfx_kthread+0x10/0x10 [ 23.807255] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.807290] ? calculate_sigpending+0x7b/0xa0 [ 23.807326] ? __pfx_kthread+0x10/0x10 [ 23.807359] ret_from_fork+0x116/0x1d0 [ 23.807385] ? __pfx_kthread+0x10/0x10 [ 23.807416] ret_from_fork_asm+0x1a/0x30 [ 23.807458] </TASK> [ 23.807474] [ 23.824648] Allocated by task 282: [ 23.825115] kasan_save_stack+0x45/0x70 [ 23.825601] kasan_save_track+0x18/0x40 [ 23.826072] kasan_save_alloc_info+0x3b/0x50 [ 23.826646] __kasan_kmalloc+0xb7/0xc0 [ 23.827053] __kmalloc_cache_noprof+0x189/0x420 [ 23.827402] kasan_atomics+0x95/0x310 [ 23.827741] kunit_try_run_case+0x1a5/0x480 [ 23.828480] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.829199] kthread+0x337/0x6f0 [ 23.829612] ret_from_fork+0x116/0x1d0 [ 23.830163] ret_from_fork_asm+0x1a/0x30 [ 23.830696] [ 23.831015] The buggy address belongs to the object at ffff888102b73d80 [ 23.831015] which belongs to the cache kmalloc-64 of size 64 [ 23.832193] The buggy address is located 0 bytes to the right of [ 23.832193] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 23.833367] [ 23.833562] The buggy address belongs to the physical page: [ 23.833953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 23.835051] flags: 0x200000000000000(node=0|zone=2) [ 23.835830] page_type: f5(slab) [ 23.836233] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.837093] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.837566] page dumped because: kasan: bad access detected [ 23.838147] [ 23.838538] Memory state around the buggy address: [ 23.839208] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.840048] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.840729] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.841349] ^ [ 23.841726] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.842785] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.843371] ================================================================== [ 23.315459] ================================================================== [ 23.316511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 23.317230] Read of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 23.318002] [ 23.318353] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 23.318535] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.318588] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.318701] Call Trace: [ 23.318748] <TASK> [ 23.318855] dump_stack_lvl+0x73/0xb0 [ 23.318989] print_report+0xd1/0x650 [ 23.319074] ? __virt_addr_valid+0x1db/0x2d0 [ 23.319157] ? kasan_atomics_helper+0x4a84/0x5450 [ 23.319324] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.319414] ? kasan_atomics_helper+0x4a84/0x5450 [ 23.319551] kasan_report+0x141/0x180 [ 23.319686] ? kasan_atomics_helper+0x4a84/0x5450 [ 23.319771] __asan_report_load4_noabort+0x18/0x20 [ 23.319806] kasan_atomics_helper+0x4a84/0x5450 [ 23.319842] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.319878] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.319940] ? kasan_atomics+0x152/0x310 [ 23.319974] kasan_atomics+0x1dc/0x310 [ 23.320002] ? __pfx_kasan_atomics+0x10/0x10 [ 23.320032] ? __pfx_read_tsc+0x10/0x10 [ 23.320065] ? ktime_get_ts64+0x86/0x230 [ 23.320101] kunit_try_run_case+0x1a5/0x480 [ 23.320133] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.320163] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.320200] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.320238] ? __kthread_parkme+0x82/0x180 [ 23.320270] ? preempt_count_sub+0x50/0x80 [ 23.320304] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.320336] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.320374] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.320410] kthread+0x337/0x6f0 [ 23.320439] ? trace_preempt_on+0x20/0xc0 [ 23.320473] ? __pfx_kthread+0x10/0x10 [ 23.320505] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.320539] ? calculate_sigpending+0x7b/0xa0 [ 23.320576] ? __pfx_kthread+0x10/0x10 [ 23.320613] ret_from_fork+0x116/0x1d0 [ 23.320683] ? __pfx_kthread+0x10/0x10 [ 23.320715] ret_from_fork_asm+0x1a/0x30 [ 23.320762] </TASK> [ 23.320778] [ 23.336422] Allocated by task 282: [ 23.336744] kasan_save_stack+0x45/0x70 [ 23.337254] kasan_save_track+0x18/0x40 [ 23.337830] kasan_save_alloc_info+0x3b/0x50 [ 23.338311] __kasan_kmalloc+0xb7/0xc0 [ 23.338670] __kmalloc_cache_noprof+0x189/0x420 [ 23.339168] kasan_atomics+0x95/0x310 [ 23.339520] kunit_try_run_case+0x1a5/0x480 [ 23.340064] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.340665] kthread+0x337/0x6f0 [ 23.341111] ret_from_fork+0x116/0x1d0 [ 23.341501] ret_from_fork_asm+0x1a/0x30 [ 23.342180] [ 23.342410] The buggy address belongs to the object at ffff888102b73d80 [ 23.342410] which belongs to the cache kmalloc-64 of size 64 [ 23.343116] The buggy address is located 0 bytes to the right of [ 23.343116] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 23.344220] [ 23.344475] The buggy address belongs to the physical page: [ 23.345313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 23.346042] flags: 0x200000000000000(node=0|zone=2) [ 23.346561] page_type: f5(slab) [ 23.346990] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.347553] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.348235] page dumped because: kasan: bad access detected [ 23.348933] [ 23.349130] Memory state around the buggy address: [ 23.349478] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.350396] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.351156] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.351606] ^ [ 23.352089] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.352869] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.355152] ================================================================== [ 24.592479] ================================================================== [ 24.594369] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 24.595074] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 24.595682] [ 24.595948] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 24.596082] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.596118] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.596153] Call Trace: [ 24.596179] <TASK> [ 24.596201] dump_stack_lvl+0x73/0xb0 [ 24.596248] print_report+0xd1/0x650 [ 24.596320] ? __virt_addr_valid+0x1db/0x2d0 [ 24.596359] ? kasan_atomics_helper+0x1a7f/0x5450 [ 24.596393] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.596428] ? kasan_atomics_helper+0x1a7f/0x5450 [ 24.596461] kasan_report+0x141/0x180 [ 24.596495] ? kasan_atomics_helper+0x1a7f/0x5450 [ 24.596533] kasan_check_range+0x10c/0x1c0 [ 24.596569] __kasan_check_write+0x18/0x20 [ 24.596600] kasan_atomics_helper+0x1a7f/0x5450 [ 24.596634] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.596667] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.596698] ? kasan_atomics+0x152/0x310 [ 24.596730] kasan_atomics+0x1dc/0x310 [ 24.596758] ? __pfx_kasan_atomics+0x10/0x10 [ 24.596788] ? __pfx_read_tsc+0x10/0x10 [ 24.596821] ? ktime_get_ts64+0x86/0x230 [ 24.596896] kunit_try_run_case+0x1a5/0x480 [ 24.597031] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.597137] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.597252] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.597394] ? __kthread_parkme+0x82/0x180 [ 24.597500] ? preempt_count_sub+0x50/0x80 [ 24.597597] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.597641] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.597682] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.597720] kthread+0x337/0x6f0 [ 24.597749] ? trace_preempt_on+0x20/0xc0 [ 24.597782] ? __pfx_kthread+0x10/0x10 [ 24.597813] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.597847] ? calculate_sigpending+0x7b/0xa0 [ 24.597912] ? __pfx_kthread+0x10/0x10 [ 24.597946] ret_from_fork+0x116/0x1d0 [ 24.597972] ? __pfx_kthread+0x10/0x10 [ 24.598003] ret_from_fork_asm+0x1a/0x30 [ 24.598047] </TASK> [ 24.598063] [ 24.617972] Allocated by task 282: [ 24.618358] kasan_save_stack+0x45/0x70 [ 24.619389] kasan_save_track+0x18/0x40 [ 24.619751] kasan_save_alloc_info+0x3b/0x50 [ 24.620465] __kasan_kmalloc+0xb7/0xc0 [ 24.621247] __kmalloc_cache_noprof+0x189/0x420 [ 24.622128] kasan_atomics+0x95/0x310 [ 24.622747] kunit_try_run_case+0x1a5/0x480 [ 24.623141] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.623732] kthread+0x337/0x6f0 [ 24.624122] ret_from_fork+0x116/0x1d0 [ 24.624535] ret_from_fork_asm+0x1a/0x30 [ 24.625314] [ 24.625753] The buggy address belongs to the object at ffff888102b73d80 [ 24.625753] which belongs to the cache kmalloc-64 of size 64 [ 24.626678] The buggy address is located 0 bytes to the right of [ 24.626678] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 24.627686] [ 24.627902] The buggy address belongs to the physical page: [ 24.628558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 24.629413] flags: 0x200000000000000(node=0|zone=2) [ 24.630106] page_type: f5(slab) [ 24.630276] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.630530] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.630788] page dumped because: kasan: bad access detected [ 24.631461] [ 24.631931] Memory state around the buggy address: [ 24.632661] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.633703] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.634458] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.635354] ^ [ 24.635947] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.636483] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.637306] ================================================================== [ 24.174698] ================================================================== [ 24.176432] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 24.177541] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 24.178635] [ 24.178830] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 24.178949] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.178992] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.179142] Call Trace: [ 24.179205] <TASK> [ 24.179260] dump_stack_lvl+0x73/0xb0 [ 24.179409] print_report+0xd1/0x650 [ 24.179528] ? __virt_addr_valid+0x1db/0x2d0 [ 24.179619] ? kasan_atomics_helper+0x151d/0x5450 [ 24.179755] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.179885] ? kasan_atomics_helper+0x151d/0x5450 [ 24.179970] kasan_report+0x141/0x180 [ 24.180102] ? kasan_atomics_helper+0x151d/0x5450 [ 24.180229] kasan_check_range+0x10c/0x1c0 [ 24.180319] __kasan_check_write+0x18/0x20 [ 24.180456] kasan_atomics_helper+0x151d/0x5450 [ 24.180639] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.180725] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.180802] ? kasan_atomics+0x152/0x310 [ 24.180904] kasan_atomics+0x1dc/0x310 [ 24.181033] ? __pfx_kasan_atomics+0x10/0x10 [ 24.181140] ? __pfx_read_tsc+0x10/0x10 [ 24.181213] ? ktime_get_ts64+0x86/0x230 [ 24.181258] kunit_try_run_case+0x1a5/0x480 [ 24.181295] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.181327] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.181367] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.181406] ? __kthread_parkme+0x82/0x180 [ 24.181437] ? preempt_count_sub+0x50/0x80 [ 24.181472] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.181503] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.181541] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.181579] kthread+0x337/0x6f0 [ 24.181643] ? trace_preempt_on+0x20/0xc0 [ 24.181683] ? __pfx_kthread+0x10/0x10 [ 24.181715] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.181752] ? calculate_sigpending+0x7b/0xa0 [ 24.181789] ? __pfx_kthread+0x10/0x10 [ 24.181822] ret_from_fork+0x116/0x1d0 [ 24.181850] ? __pfx_kthread+0x10/0x10 [ 24.181918] ret_from_fork_asm+0x1a/0x30 [ 24.181969] </TASK> [ 24.181986] [ 24.198907] Allocated by task 282: [ 24.199922] kasan_save_stack+0x45/0x70 [ 24.200381] kasan_save_track+0x18/0x40 [ 24.201517] kasan_save_alloc_info+0x3b/0x50 [ 24.201880] __kasan_kmalloc+0xb7/0xc0 [ 24.202883] __kmalloc_cache_noprof+0x189/0x420 [ 24.203428] kasan_atomics+0x95/0x310 [ 24.204028] kunit_try_run_case+0x1a5/0x480 [ 24.204510] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.205062] kthread+0x337/0x6f0 [ 24.205423] ret_from_fork+0x116/0x1d0 [ 24.205967] ret_from_fork_asm+0x1a/0x30 [ 24.206314] [ 24.206521] The buggy address belongs to the object at ffff888102b73d80 [ 24.206521] which belongs to the cache kmalloc-64 of size 64 [ 24.207560] The buggy address is located 0 bytes to the right of [ 24.207560] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 24.208496] [ 24.208836] The buggy address belongs to the physical page: [ 24.209379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 24.210004] flags: 0x200000000000000(node=0|zone=2) [ 24.210555] page_type: f5(slab) [ 24.210985] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.211606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.212281] page dumped because: kasan: bad access detected [ 24.212859] [ 24.213072] Memory state around the buggy address: [ 24.213434] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.214165] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.214744] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.215850] ^ [ 24.218160] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.219020] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.219571] ================================================================== [ 24.034557] ================================================================== [ 24.035309] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 24.035795] Read of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 24.038001] [ 24.038772] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 24.038848] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.038892] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.038931] Call Trace: [ 24.038961] <TASK> [ 24.039001] dump_stack_lvl+0x73/0xb0 [ 24.039042] print_report+0xd1/0x650 [ 24.039099] ? __virt_addr_valid+0x1db/0x2d0 [ 24.039138] ? kasan_atomics_helper+0x4eae/0x5450 [ 24.039213] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.039261] ? kasan_atomics_helper+0x4eae/0x5450 [ 24.039309] kasan_report+0x141/0x180 [ 24.039353] ? kasan_atomics_helper+0x4eae/0x5450 [ 24.039407] __asan_report_load8_noabort+0x18/0x20 [ 24.039452] kasan_atomics_helper+0x4eae/0x5450 [ 24.039495] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.039589] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.039668] ? kasan_atomics+0x152/0x310 [ 24.039703] kasan_atomics+0x1dc/0x310 [ 24.039733] ? __pfx_kasan_atomics+0x10/0x10 [ 24.039764] ? __pfx_read_tsc+0x10/0x10 [ 24.039797] ? ktime_get_ts64+0x86/0x230 [ 24.039833] kunit_try_run_case+0x1a5/0x480 [ 24.039885] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.039924] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.039967] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.040005] ? __kthread_parkme+0x82/0x180 [ 24.040036] ? preempt_count_sub+0x50/0x80 [ 24.040071] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.040101] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.040139] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.040177] kthread+0x337/0x6f0 [ 24.040206] ? trace_preempt_on+0x20/0xc0 [ 24.040241] ? __pfx_kthread+0x10/0x10 [ 24.040271] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.040303] ? calculate_sigpending+0x7b/0xa0 [ 24.040339] ? __pfx_kthread+0x10/0x10 [ 24.040371] ret_from_fork+0x116/0x1d0 [ 24.040397] ? __pfx_kthread+0x10/0x10 [ 24.040428] ret_from_fork_asm+0x1a/0x30 [ 24.040471] </TASK> [ 24.040488] [ 24.061000] Allocated by task 282: [ 24.061516] kasan_save_stack+0x45/0x70 [ 24.062317] kasan_save_track+0x18/0x40 [ 24.062627] kasan_save_alloc_info+0x3b/0x50 [ 24.063269] __kasan_kmalloc+0xb7/0xc0 [ 24.064067] __kmalloc_cache_noprof+0x189/0x420 [ 24.064434] kasan_atomics+0x95/0x310 [ 24.065036] kunit_try_run_case+0x1a5/0x480 [ 24.065377] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.066276] kthread+0x337/0x6f0 [ 24.066590] ret_from_fork+0x116/0x1d0 [ 24.067170] ret_from_fork_asm+0x1a/0x30 [ 24.067591] [ 24.068128] The buggy address belongs to the object at ffff888102b73d80 [ 24.068128] which belongs to the cache kmalloc-64 of size 64 [ 24.069398] The buggy address is located 0 bytes to the right of [ 24.069398] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 24.070802] [ 24.071078] The buggy address belongs to the physical page: [ 24.071856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 24.072533] flags: 0x200000000000000(node=0|zone=2) [ 24.073251] page_type: f5(slab) [ 24.073820] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.074458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.075280] page dumped because: kasan: bad access detected [ 24.076061] [ 24.076441] Memory state around the buggy address: [ 24.077003] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.077812] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.078425] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.079341] ^ [ 24.080032] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.080612] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.081324] ================================================================== [ 23.628143] ================================================================== [ 23.628961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 23.629616] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 23.630220] [ 23.630471] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 23.630604] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.630648] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.630713] Call Trace: [ 23.630771] <TASK> [ 23.630821] dump_stack_lvl+0x73/0xb0 [ 23.630932] print_report+0xd1/0x650 [ 23.631017] ? __virt_addr_valid+0x1db/0x2d0 [ 23.631098] ? kasan_atomics_helper+0x1079/0x5450 [ 23.631177] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.631258] ? kasan_atomics_helper+0x1079/0x5450 [ 23.631337] kasan_report+0x141/0x180 [ 23.631412] ? kasan_atomics_helper+0x1079/0x5450 [ 23.631491] kasan_check_range+0x10c/0x1c0 [ 23.631559] __kasan_check_write+0x18/0x20 [ 23.631616] kasan_atomics_helper+0x1079/0x5450 [ 23.631691] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.631762] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.631830] ? kasan_atomics+0x152/0x310 [ 23.631920] kasan_atomics+0x1dc/0x310 [ 23.631985] ? __pfx_kasan_atomics+0x10/0x10 [ 23.632040] ? __pfx_read_tsc+0x10/0x10 [ 23.632101] ? ktime_get_ts64+0x86/0x230 [ 23.632168] kunit_try_run_case+0x1a5/0x480 [ 23.632302] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.632384] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.632507] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.632599] ? __kthread_parkme+0x82/0x180 [ 23.632733] ? preempt_count_sub+0x50/0x80 [ 23.632825] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.632929] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.633020] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.633088] kthread+0x337/0x6f0 [ 23.633155] ? trace_preempt_on+0x20/0xc0 [ 23.633236] ? __pfx_kthread+0x10/0x10 [ 23.633310] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.633394] ? calculate_sigpending+0x7b/0xa0 [ 23.633479] ? __pfx_kthread+0x10/0x10 [ 23.633556] ret_from_fork+0x116/0x1d0 [ 23.633625] ? __pfx_kthread+0x10/0x10 [ 23.633708] ret_from_fork_asm+0x1a/0x30 [ 23.633808] </TASK> [ 23.633850] [ 23.649849] Allocated by task 282: [ 23.650280] kasan_save_stack+0x45/0x70 [ 23.650695] kasan_save_track+0x18/0x40 [ 23.651109] kasan_save_alloc_info+0x3b/0x50 [ 23.651549] __kasan_kmalloc+0xb7/0xc0 [ 23.652016] __kmalloc_cache_noprof+0x189/0x420 [ 23.652425] kasan_atomics+0x95/0x310 [ 23.652999] kunit_try_run_case+0x1a5/0x480 [ 23.653407] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.653932] kthread+0x337/0x6f0 [ 23.654333] ret_from_fork+0x116/0x1d0 [ 23.654780] ret_from_fork_asm+0x1a/0x30 [ 23.655182] [ 23.655420] The buggy address belongs to the object at ffff888102b73d80 [ 23.655420] which belongs to the cache kmalloc-64 of size 64 [ 23.656456] The buggy address is located 0 bytes to the right of [ 23.656456] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 23.658546] [ 23.658839] The buggy address belongs to the physical page: [ 23.659397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 23.661694] flags: 0x200000000000000(node=0|zone=2) [ 23.662328] page_type: f5(slab) [ 23.662623] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.663348] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.665108] page dumped because: kasan: bad access detected [ 23.665676] [ 23.665933] Memory state around the buggy address: [ 23.666326] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.667065] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.667672] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.668293] ^ [ 23.668682] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.669295] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.669860] ================================================================== [ 22.448591] ================================================================== [ 22.449178] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 22.449655] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 22.450190] [ 22.450454] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 22.450577] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.450616] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.450674] Call Trace: [ 22.450721] <TASK> [ 22.450762] dump_stack_lvl+0x73/0xb0 [ 22.450841] print_report+0xd1/0x650 [ 22.450937] ? __virt_addr_valid+0x1db/0x2d0 [ 22.451017] ? kasan_atomics_helper+0x4ba2/0x5450 [ 22.451092] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.451170] ? kasan_atomics_helper+0x4ba2/0x5450 [ 22.451318] kasan_report+0x141/0x180 [ 22.451430] ? kasan_atomics_helper+0x4ba2/0x5450 [ 22.451519] __asan_report_store4_noabort+0x1b/0x30 [ 22.451595] kasan_atomics_helper+0x4ba2/0x5450 [ 22.451676] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.451751] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.451828] ? kasan_atomics+0x152/0x310 [ 22.451905] kasan_atomics+0x1dc/0x310 [ 22.451997] ? __pfx_kasan_atomics+0x10/0x10 [ 22.452066] ? __pfx_read_tsc+0x10/0x10 [ 22.452137] ? ktime_get_ts64+0x86/0x230 [ 22.452222] kunit_try_run_case+0x1a5/0x480 [ 22.452292] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.452362] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.452443] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.452520] ? __kthread_parkme+0x82/0x180 [ 22.452610] ? preempt_count_sub+0x50/0x80 [ 22.452697] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.452834] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.453019] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.453138] kthread+0x337/0x6f0 [ 22.453210] ? trace_preempt_on+0x20/0xc0 [ 22.453268] ? __pfx_kthread+0x10/0x10 [ 22.453300] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.453334] ? calculate_sigpending+0x7b/0xa0 [ 22.453369] ? __pfx_kthread+0x10/0x10 [ 22.453400] ret_from_fork+0x116/0x1d0 [ 22.453427] ? __pfx_kthread+0x10/0x10 [ 22.453455] ret_from_fork_asm+0x1a/0x30 [ 22.453497] </TASK> [ 22.453511] [ 22.469666] Allocated by task 282: [ 22.470054] kasan_save_stack+0x45/0x70 [ 22.470460] kasan_save_track+0x18/0x40 [ 22.470856] kasan_save_alloc_info+0x3b/0x50 [ 22.471391] __kasan_kmalloc+0xb7/0xc0 [ 22.471710] __kmalloc_cache_noprof+0x189/0x420 [ 22.472289] kasan_atomics+0x95/0x310 [ 22.473044] kunit_try_run_case+0x1a5/0x480 [ 22.473555] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.474183] kthread+0x337/0x6f0 [ 22.474674] ret_from_fork+0x116/0x1d0 [ 22.475089] ret_from_fork_asm+0x1a/0x30 [ 22.475415] [ 22.475597] The buggy address belongs to the object at ffff888102b73d80 [ 22.475597] which belongs to the cache kmalloc-64 of size 64 [ 22.476297] The buggy address is located 0 bytes to the right of [ 22.476297] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 22.477080] [ 22.477439] The buggy address belongs to the physical page: [ 22.477946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 22.478626] flags: 0x200000000000000(node=0|zone=2) [ 22.479118] page_type: f5(slab) [ 22.479488] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.480644] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.481329] page dumped because: kasan: bad access detected [ 22.481892] [ 22.482092] Memory state around the buggy address: [ 22.482717] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.483372] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.484104] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.484874] ^ [ 22.485324] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.486134] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.486825] ================================================================== [ 22.913058] ================================================================== [ 22.914085] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 22.914817] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 22.915464] [ 22.915770] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 22.915926] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.915973] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.916072] Call Trace: [ 22.916132] <TASK> [ 22.916186] dump_stack_lvl+0x73/0xb0 [ 22.916314] print_report+0xd1/0x650 [ 22.916395] ? __virt_addr_valid+0x1db/0x2d0 [ 22.916514] ? kasan_atomics_helper+0x72f/0x5450 [ 22.916628] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.916737] ? kasan_atomics_helper+0x72f/0x5450 [ 22.916821] kasan_report+0x141/0x180 [ 22.916922] ? kasan_atomics_helper+0x72f/0x5450 [ 22.917017] kasan_check_range+0x10c/0x1c0 [ 22.917104] __kasan_check_write+0x18/0x20 [ 22.917178] kasan_atomics_helper+0x72f/0x5450 [ 22.917240] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.917277] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.917311] ? kasan_atomics+0x152/0x310 [ 22.917345] kasan_atomics+0x1dc/0x310 [ 22.917374] ? __pfx_kasan_atomics+0x10/0x10 [ 22.917404] ? __pfx_read_tsc+0x10/0x10 [ 22.917439] ? ktime_get_ts64+0x86/0x230 [ 22.917474] kunit_try_run_case+0x1a5/0x480 [ 22.917506] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.917536] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.917573] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.917614] ? __kthread_parkme+0x82/0x180 [ 22.917687] ? preempt_count_sub+0x50/0x80 [ 22.917725] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.917756] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.917794] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.917830] kthread+0x337/0x6f0 [ 22.917858] ? trace_preempt_on+0x20/0xc0 [ 22.917893] ? __pfx_kthread+0x10/0x10 [ 22.917952] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.917989] ? calculate_sigpending+0x7b/0xa0 [ 22.918024] ? __pfx_kthread+0x10/0x10 [ 22.918056] ret_from_fork+0x116/0x1d0 [ 22.918086] ? __pfx_kthread+0x10/0x10 [ 22.918117] ret_from_fork_asm+0x1a/0x30 [ 22.918162] </TASK> [ 22.918178] [ 22.933772] Allocated by task 282: [ 22.934199] kasan_save_stack+0x45/0x70 [ 22.934587] kasan_save_track+0x18/0x40 [ 22.934930] kasan_save_alloc_info+0x3b/0x50 [ 22.935273] __kasan_kmalloc+0xb7/0xc0 [ 22.935761] __kmalloc_cache_noprof+0x189/0x420 [ 22.936476] kasan_atomics+0x95/0x310 [ 22.937113] kunit_try_run_case+0x1a5/0x480 [ 22.937470] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.938273] kthread+0x337/0x6f0 [ 22.940646] ret_from_fork+0x116/0x1d0 [ 22.941017] ret_from_fork_asm+0x1a/0x30 [ 22.941933] [ 22.943149] The buggy address belongs to the object at ffff888102b73d80 [ 22.943149] which belongs to the cache kmalloc-64 of size 64 [ 22.944750] The buggy address is located 0 bytes to the right of [ 22.944750] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 22.945835] [ 22.946083] The buggy address belongs to the physical page: [ 22.946868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 22.947634] flags: 0x200000000000000(node=0|zone=2) [ 22.948243] page_type: f5(slab) [ 22.949005] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.949548] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.950516] page dumped because: kasan: bad access detected [ 22.951479] [ 22.951887] Memory state around the buggy address: [ 22.952277] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.952833] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.953697] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.954281] ^ [ 22.955010] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.955778] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.956522] ================================================================== [ 24.861772] ================================================================== [ 24.862498] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 24.863103] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 24.863892] [ 24.864189] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 24.864341] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.864415] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.864483] Call Trace: [ 24.864539] <TASK> [ 24.864638] dump_stack_lvl+0x73/0xb0 [ 24.864758] print_report+0xd1/0x650 [ 24.864860] ? __virt_addr_valid+0x1db/0x2d0 [ 24.864968] ? kasan_atomics_helper+0x1e12/0x5450 [ 24.865079] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.865160] ? kasan_atomics_helper+0x1e12/0x5450 [ 24.865218] kasan_report+0x141/0x180 [ 24.865296] ? kasan_atomics_helper+0x1e12/0x5450 [ 24.865405] kasan_check_range+0x10c/0x1c0 [ 24.865524] __kasan_check_write+0x18/0x20 [ 24.865650] kasan_atomics_helper+0x1e12/0x5450 [ 24.865738] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.865823] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.865921] ? kasan_atomics+0x152/0x310 [ 24.866005] kasan_atomics+0x1dc/0x310 [ 24.866083] ? __pfx_kasan_atomics+0x10/0x10 [ 24.866162] ? __pfx_read_tsc+0x10/0x10 [ 24.866302] ? ktime_get_ts64+0x86/0x230 [ 24.866397] kunit_try_run_case+0x1a5/0x480 [ 24.866479] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.866555] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.866688] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.866773] ? __kthread_parkme+0x82/0x180 [ 24.866815] ? preempt_count_sub+0x50/0x80 [ 24.866878] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.866916] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.866957] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.866998] kthread+0x337/0x6f0 [ 24.867030] ? trace_preempt_on+0x20/0xc0 [ 24.867063] ? __pfx_kthread+0x10/0x10 [ 24.867094] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.867129] ? calculate_sigpending+0x7b/0xa0 [ 24.867164] ? __pfx_kthread+0x10/0x10 [ 24.867196] ret_from_fork+0x116/0x1d0 [ 24.867223] ? __pfx_kthread+0x10/0x10 [ 24.867254] ret_from_fork_asm+0x1a/0x30 [ 24.867298] </TASK> [ 24.867314] [ 24.883093] Allocated by task 282: [ 24.883442] kasan_save_stack+0x45/0x70 [ 24.884121] kasan_save_track+0x18/0x40 [ 24.884519] kasan_save_alloc_info+0x3b/0x50 [ 24.884980] __kasan_kmalloc+0xb7/0xc0 [ 24.885489] __kmalloc_cache_noprof+0x189/0x420 [ 24.886035] kasan_atomics+0x95/0x310 [ 24.886495] kunit_try_run_case+0x1a5/0x480 [ 24.887008] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.887544] kthread+0x337/0x6f0 [ 24.887997] ret_from_fork+0x116/0x1d0 [ 24.888347] ret_from_fork_asm+0x1a/0x30 [ 24.888722] [ 24.889106] The buggy address belongs to the object at ffff888102b73d80 [ 24.889106] which belongs to the cache kmalloc-64 of size 64 [ 24.890080] The buggy address is located 0 bytes to the right of [ 24.890080] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 24.891410] [ 24.891678] The buggy address belongs to the physical page: [ 24.892226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 24.893124] flags: 0x200000000000000(node=0|zone=2) [ 24.893573] page_type: f5(slab) [ 24.894070] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.894784] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.895451] page dumped because: kasan: bad access detected [ 24.896138] [ 24.896371] Memory state around the buggy address: [ 24.896960] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.897423] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.898065] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.898784] ^ [ 24.899238] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.899713] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.900383] ================================================================== [ 23.988261] ================================================================== [ 23.989801] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 23.990564] Read of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 23.991163] [ 23.991426] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 23.991554] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.991579] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.992233] Call Trace: [ 23.992274] <TASK> [ 23.992301] dump_stack_lvl+0x73/0xb0 [ 23.992345] print_report+0xd1/0x650 [ 23.992380] ? __virt_addr_valid+0x1db/0x2d0 [ 23.992416] ? kasan_atomics_helper+0x13b5/0x5450 [ 23.992450] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.992484] ? kasan_atomics_helper+0x13b5/0x5450 [ 23.992520] kasan_report+0x141/0x180 [ 23.992553] ? kasan_atomics_helper+0x13b5/0x5450 [ 23.992604] kasan_check_range+0x10c/0x1c0 [ 23.992673] __kasan_check_read+0x15/0x20 [ 23.992706] kasan_atomics_helper+0x13b5/0x5450 [ 23.992741] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.992775] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.992806] ? kasan_atomics+0x152/0x310 [ 23.992838] kasan_atomics+0x1dc/0x310 [ 23.992886] ? __pfx_kasan_atomics+0x10/0x10 [ 23.992928] ? __pfx_read_tsc+0x10/0x10 [ 23.992964] ? ktime_get_ts64+0x86/0x230 [ 23.993001] kunit_try_run_case+0x1a5/0x480 [ 23.993033] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.993062] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.993102] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.993139] ? __kthread_parkme+0x82/0x180 [ 23.993171] ? preempt_count_sub+0x50/0x80 [ 23.993206] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.993236] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.993274] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.993311] kthread+0x337/0x6f0 [ 23.993341] ? trace_preempt_on+0x20/0xc0 [ 23.993373] ? __pfx_kthread+0x10/0x10 [ 23.993404] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.993438] ? calculate_sigpending+0x7b/0xa0 [ 23.993474] ? __pfx_kthread+0x10/0x10 [ 23.993505] ret_from_fork+0x116/0x1d0 [ 23.993532] ? __pfx_kthread+0x10/0x10 [ 23.993561] ret_from_fork_asm+0x1a/0x30 [ 23.993623] </TASK> [ 23.993649] [ 24.013911] Allocated by task 282: [ 24.014443] kasan_save_stack+0x45/0x70 [ 24.014837] kasan_save_track+0x18/0x40 [ 24.015258] kasan_save_alloc_info+0x3b/0x50 [ 24.015688] __kasan_kmalloc+0xb7/0xc0 [ 24.016578] __kmalloc_cache_noprof+0x189/0x420 [ 24.017168] kasan_atomics+0x95/0x310 [ 24.017679] kunit_try_run_case+0x1a5/0x480 [ 24.018213] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.018935] kthread+0x337/0x6f0 [ 24.019429] ret_from_fork+0x116/0x1d0 [ 24.019806] ret_from_fork_asm+0x1a/0x30 [ 24.020466] [ 24.020737] The buggy address belongs to the object at ffff888102b73d80 [ 24.020737] which belongs to the cache kmalloc-64 of size 64 [ 24.021601] The buggy address is located 0 bytes to the right of [ 24.021601] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 24.023101] [ 24.023643] The buggy address belongs to the physical page: [ 24.024249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 24.025164] flags: 0x200000000000000(node=0|zone=2) [ 24.025710] page_type: f5(slab) [ 24.026094] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.026679] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.027555] page dumped because: kasan: bad access detected [ 24.028226] [ 24.028560] Memory state around the buggy address: [ 24.028924] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.029897] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.030445] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.031183] ^ [ 24.031792] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.032360] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.033094] ================================================================== [ 22.958804] ================================================================== [ 22.960005] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 22.960731] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 22.961251] [ 22.961371] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 22.961441] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.961460] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.961493] Call Trace: [ 22.961518] <TASK> [ 22.961541] dump_stack_lvl+0x73/0xb0 [ 22.961582] print_report+0xd1/0x650 [ 22.961646] ? __virt_addr_valid+0x1db/0x2d0 [ 22.961700] ? kasan_atomics_helper+0x7c7/0x5450 [ 22.961734] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.961770] ? kasan_atomics_helper+0x7c7/0x5450 [ 22.961803] kasan_report+0x141/0x180 [ 22.961837] ? kasan_atomics_helper+0x7c7/0x5450 [ 22.961875] kasan_check_range+0x10c/0x1c0 [ 22.961957] __kasan_check_write+0x18/0x20 [ 22.962037] kasan_atomics_helper+0x7c7/0x5450 [ 22.962125] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.962192] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.962228] ? kasan_atomics+0x152/0x310 [ 22.962275] kasan_atomics+0x1dc/0x310 [ 22.962306] ? __pfx_kasan_atomics+0x10/0x10 [ 22.962377] ? __pfx_read_tsc+0x10/0x10 [ 22.962416] ? ktime_get_ts64+0x86/0x230 [ 22.962454] kunit_try_run_case+0x1a5/0x480 [ 22.962488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.962519] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.962558] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.962596] ? __kthread_parkme+0x82/0x180 [ 22.963084] ? preempt_count_sub+0x50/0x80 [ 22.963137] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.963172] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.963213] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.963252] kthread+0x337/0x6f0 [ 22.963282] ? trace_preempt_on+0x20/0xc0 [ 22.963317] ? __pfx_kthread+0x10/0x10 [ 22.963348] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.963384] ? calculate_sigpending+0x7b/0xa0 [ 22.963420] ? __pfx_kthread+0x10/0x10 [ 22.963451] ret_from_fork+0x116/0x1d0 [ 22.963477] ? __pfx_kthread+0x10/0x10 [ 22.963507] ret_from_fork_asm+0x1a/0x30 [ 22.963550] </TASK> [ 22.963566] [ 22.978085] Allocated by task 282: [ 22.978488] kasan_save_stack+0x45/0x70 [ 22.978920] kasan_save_track+0x18/0x40 [ 22.979353] kasan_save_alloc_info+0x3b/0x50 [ 22.979781] __kasan_kmalloc+0xb7/0xc0 [ 22.980217] __kmalloc_cache_noprof+0x189/0x420 [ 22.980701] kasan_atomics+0x95/0x310 [ 22.981110] kunit_try_run_case+0x1a5/0x480 [ 22.981552] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.982077] kthread+0x337/0x6f0 [ 22.982430] ret_from_fork+0x116/0x1d0 [ 22.982835] ret_from_fork_asm+0x1a/0x30 [ 22.983285] [ 22.983527] The buggy address belongs to the object at ffff888102b73d80 [ 22.983527] which belongs to the cache kmalloc-64 of size 64 [ 22.984420] The buggy address is located 0 bytes to the right of [ 22.984420] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 22.985465] [ 22.985747] The buggy address belongs to the physical page: [ 22.986183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 22.986954] flags: 0x200000000000000(node=0|zone=2) [ 22.987406] page_type: f5(slab) [ 22.987781] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.988348] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.989068] page dumped because: kasan: bad access detected [ 22.989456] [ 22.989693] Memory state around the buggy address: [ 22.990079] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.990548] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.991121] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.991838] ^ [ 22.992354] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.993114] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.993821] ================================================================== [ 23.546183] ================================================================== [ 23.546899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 23.547826] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 23.548839] [ 23.549353] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 23.549779] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.549803] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.549838] Call Trace: [ 23.549865] <TASK> [ 23.549913] dump_stack_lvl+0x73/0xb0 [ 23.549959] print_report+0xd1/0x650 [ 23.549995] ? __virt_addr_valid+0x1db/0x2d0 [ 23.550030] ? kasan_atomics_helper+0xfa9/0x5450 [ 23.550062] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.550096] ? kasan_atomics_helper+0xfa9/0x5450 [ 23.550129] kasan_report+0x141/0x180 [ 23.550162] ? kasan_atomics_helper+0xfa9/0x5450 [ 23.550201] kasan_check_range+0x10c/0x1c0 [ 23.550251] __kasan_check_write+0x18/0x20 [ 23.550280] kasan_atomics_helper+0xfa9/0x5450 [ 23.550314] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.550348] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.550378] ? kasan_atomics+0x152/0x310 [ 23.550410] kasan_atomics+0x1dc/0x310 [ 23.550439] ? __pfx_kasan_atomics+0x10/0x10 [ 23.550470] ? __pfx_read_tsc+0x10/0x10 [ 23.550503] ? ktime_get_ts64+0x86/0x230 [ 23.550539] kunit_try_run_case+0x1a5/0x480 [ 23.550571] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.550606] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.550679] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.550719] ? __kthread_parkme+0x82/0x180 [ 23.550751] ? preempt_count_sub+0x50/0x80 [ 23.550785] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.550817] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.550853] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.550916] kthread+0x337/0x6f0 [ 23.550949] ? trace_preempt_on+0x20/0xc0 [ 23.550985] ? __pfx_kthread+0x10/0x10 [ 23.551016] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.551053] ? calculate_sigpending+0x7b/0xa0 [ 23.551089] ? __pfx_kthread+0x10/0x10 [ 23.551122] ret_from_fork+0x116/0x1d0 [ 23.551149] ? __pfx_kthread+0x10/0x10 [ 23.551181] ret_from_fork_asm+0x1a/0x30 [ 23.551224] </TASK> [ 23.551240] [ 23.569844] Allocated by task 282: [ 23.570272] kasan_save_stack+0x45/0x70 [ 23.570755] kasan_save_track+0x18/0x40 [ 23.571152] kasan_save_alloc_info+0x3b/0x50 [ 23.571519] __kasan_kmalloc+0xb7/0xc0 [ 23.572045] __kmalloc_cache_noprof+0x189/0x420 [ 23.572779] kasan_atomics+0x95/0x310 [ 23.573110] kunit_try_run_case+0x1a5/0x480 [ 23.573449] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.574288] kthread+0x337/0x6f0 [ 23.574702] ret_from_fork+0x116/0x1d0 [ 23.575194] ret_from_fork_asm+0x1a/0x30 [ 23.575658] [ 23.575944] The buggy address belongs to the object at ffff888102b73d80 [ 23.575944] which belongs to the cache kmalloc-64 of size 64 [ 23.576970] The buggy address is located 0 bytes to the right of [ 23.576970] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 23.578045] [ 23.578279] The buggy address belongs to the physical page: [ 23.578821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 23.579566] flags: 0x200000000000000(node=0|zone=2) [ 23.580011] page_type: f5(slab) [ 23.580306] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.581127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.581835] page dumped because: kasan: bad access detected [ 23.582310] [ 23.582590] Memory state around the buggy address: [ 23.583108] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.583708] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.584228] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.584830] ^ [ 23.585470] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.586078] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.586538] ================================================================== [ 23.093801] ================================================================== [ 23.095065] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 23.096011] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 23.096612] [ 23.097387] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 23.097489] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.097516] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.097551] Call Trace: [ 23.097577] <TASK> [ 23.097599] dump_stack_lvl+0x73/0xb0 [ 23.097667] print_report+0xd1/0x650 [ 23.097704] ? __virt_addr_valid+0x1db/0x2d0 [ 23.097740] ? kasan_atomics_helper+0x992/0x5450 [ 23.097772] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.097807] ? kasan_atomics_helper+0x992/0x5450 [ 23.097839] kasan_report+0x141/0x180 [ 23.097873] ? kasan_atomics_helper+0x992/0x5450 [ 23.097940] kasan_check_range+0x10c/0x1c0 [ 23.097981] __kasan_check_write+0x18/0x20 [ 23.098011] kasan_atomics_helper+0x992/0x5450 [ 23.098046] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.098080] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.098112] ? kasan_atomics+0x152/0x310 [ 23.098143] kasan_atomics+0x1dc/0x310 [ 23.098171] ? __pfx_kasan_atomics+0x10/0x10 [ 23.098201] ? __pfx_read_tsc+0x10/0x10 [ 23.098251] ? ktime_get_ts64+0x86/0x230 [ 23.098288] kunit_try_run_case+0x1a5/0x480 [ 23.098321] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.098351] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.098390] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.098872] ? __kthread_parkme+0x82/0x180 [ 23.098937] ? preempt_count_sub+0x50/0x80 [ 23.098976] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.099009] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.099047] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.099085] kthread+0x337/0x6f0 [ 23.099114] ? trace_preempt_on+0x20/0xc0 [ 23.099148] ? __pfx_kthread+0x10/0x10 [ 23.099205] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.099246] ? calculate_sigpending+0x7b/0xa0 [ 23.099286] ? __pfx_kthread+0x10/0x10 [ 23.099318] ret_from_fork+0x116/0x1d0 [ 23.099346] ? __pfx_kthread+0x10/0x10 [ 23.099377] ret_from_fork_asm+0x1a/0x30 [ 23.099421] </TASK> [ 23.099437] [ 23.120099] Allocated by task 282: [ 23.120375] kasan_save_stack+0x45/0x70 [ 23.121030] kasan_save_track+0x18/0x40 [ 23.121622] kasan_save_alloc_info+0x3b/0x50 [ 23.122315] __kasan_kmalloc+0xb7/0xc0 [ 23.122597] __kmalloc_cache_noprof+0x189/0x420 [ 23.123239] kasan_atomics+0x95/0x310 [ 23.123643] kunit_try_run_case+0x1a5/0x480 [ 23.124374] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.125083] kthread+0x337/0x6f0 [ 23.125377] ret_from_fork+0x116/0x1d0 [ 23.126026] ret_from_fork_asm+0x1a/0x30 [ 23.126835] [ 23.127026] The buggy address belongs to the object at ffff888102b73d80 [ 23.127026] which belongs to the cache kmalloc-64 of size 64 [ 23.128313] The buggy address is located 0 bytes to the right of [ 23.128313] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 23.129377] [ 23.130006] The buggy address belongs to the physical page: [ 23.130688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 23.131478] flags: 0x200000000000000(node=0|zone=2) [ 23.132155] page_type: f5(slab) [ 23.132683] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.133303] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.134333] page dumped because: kasan: bad access detected [ 23.134753] [ 23.135032] Memory state around the buggy address: [ 23.135930] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.136690] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.137447] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.138213] ^ [ 23.138826] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.139681] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.140322] ================================================================== [ 24.773484] ================================================================== [ 24.774292] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 24.775019] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 24.775782] [ 24.776600] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 24.776739] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.776778] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.776814] Call Trace: [ 24.776840] <TASK> [ 24.776904] dump_stack_lvl+0x73/0xb0 [ 24.776957] print_report+0xd1/0x650 [ 24.776994] ? __virt_addr_valid+0x1db/0x2d0 [ 24.777029] ? kasan_atomics_helper+0x1ce1/0x5450 [ 24.777062] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.777095] ? kasan_atomics_helper+0x1ce1/0x5450 [ 24.777128] kasan_report+0x141/0x180 [ 24.777160] ? kasan_atomics_helper+0x1ce1/0x5450 [ 24.777200] kasan_check_range+0x10c/0x1c0 [ 24.777236] __kasan_check_write+0x18/0x20 [ 24.777265] kasan_atomics_helper+0x1ce1/0x5450 [ 24.777299] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.777333] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.777364] ? kasan_atomics+0x152/0x310 [ 24.777396] kasan_atomics+0x1dc/0x310 [ 24.777424] ? __pfx_kasan_atomics+0x10/0x10 [ 24.777457] ? __pfx_read_tsc+0x10/0x10 [ 24.777490] ? ktime_get_ts64+0x86/0x230 [ 24.777527] kunit_try_run_case+0x1a5/0x480 [ 24.777558] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.777985] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.778036] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.778076] ? __kthread_parkme+0x82/0x180 [ 24.778109] ? preempt_count_sub+0x50/0x80 [ 24.778144] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.778177] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.778225] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.778265] kthread+0x337/0x6f0 [ 24.778294] ? trace_preempt_on+0x20/0xc0 [ 24.778328] ? __pfx_kthread+0x10/0x10 [ 24.778359] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.778393] ? calculate_sigpending+0x7b/0xa0 [ 24.778429] ? __pfx_kthread+0x10/0x10 [ 24.778463] ret_from_fork+0x116/0x1d0 [ 24.778490] ? __pfx_kthread+0x10/0x10 [ 24.778520] ret_from_fork_asm+0x1a/0x30 [ 24.778564] </TASK> [ 24.778593] [ 24.798834] Allocated by task 282: [ 24.799149] kasan_save_stack+0x45/0x70 [ 24.799974] kasan_save_track+0x18/0x40 [ 24.800314] kasan_save_alloc_info+0x3b/0x50 [ 24.801307] __kasan_kmalloc+0xb7/0xc0 [ 24.801648] __kmalloc_cache_noprof+0x189/0x420 [ 24.802329] kasan_atomics+0x95/0x310 [ 24.803023] kunit_try_run_case+0x1a5/0x480 [ 24.803380] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.804051] kthread+0x337/0x6f0 [ 24.804879] ret_from_fork+0x116/0x1d0 [ 24.805242] ret_from_fork_asm+0x1a/0x30 [ 24.805898] [ 24.806072] The buggy address belongs to the object at ffff888102b73d80 [ 24.806072] which belongs to the cache kmalloc-64 of size 64 [ 24.807618] The buggy address is located 0 bytes to the right of [ 24.807618] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 24.808609] [ 24.808864] The buggy address belongs to the physical page: [ 24.809332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 24.810323] flags: 0x200000000000000(node=0|zone=2) [ 24.810993] page_type: f5(slab) [ 24.811257] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.812581] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.813312] page dumped because: kasan: bad access detected [ 24.814262] [ 24.814639] Memory state around the buggy address: [ 24.815084] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.815671] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.816257] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.816881] ^ [ 24.817258] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.817880] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.819150] ================================================================== [ 24.946016] ================================================================== [ 24.946506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 24.947111] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 24.947992] [ 24.948279] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 24.948395] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.948417] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.948449] Call Trace: [ 24.948475] <TASK> [ 24.948498] dump_stack_lvl+0x73/0xb0 [ 24.948541] print_report+0xd1/0x650 [ 24.948597] ? __virt_addr_valid+0x1db/0x2d0 [ 24.948645] ? kasan_atomics_helper+0x1f43/0x5450 [ 24.948679] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.948712] ? kasan_atomics_helper+0x1f43/0x5450 [ 24.948745] kasan_report+0x141/0x180 [ 24.948778] ? kasan_atomics_helper+0x1f43/0x5450 [ 24.948817] kasan_check_range+0x10c/0x1c0 [ 24.948886] __kasan_check_write+0x18/0x20 [ 24.948968] kasan_atomics_helper+0x1f43/0x5450 [ 24.949095] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.949185] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.949268] ? kasan_atomics+0x152/0x310 [ 24.949353] kasan_atomics+0x1dc/0x310 [ 24.949473] ? __pfx_kasan_atomics+0x10/0x10 [ 24.949559] ? __pfx_read_tsc+0x10/0x10 [ 24.949829] ? ktime_get_ts64+0x86/0x230 [ 24.949945] kunit_try_run_case+0x1a5/0x480 [ 24.949997] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.950033] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.950074] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.950113] ? __kthread_parkme+0x82/0x180 [ 24.950145] ? preempt_count_sub+0x50/0x80 [ 24.950180] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.950227] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.950268] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.950306] kthread+0x337/0x6f0 [ 24.950335] ? trace_preempt_on+0x20/0xc0 [ 24.950369] ? __pfx_kthread+0x10/0x10 [ 24.950398] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.950432] ? calculate_sigpending+0x7b/0xa0 [ 24.950468] ? __pfx_kthread+0x10/0x10 [ 24.950498] ret_from_fork+0x116/0x1d0 [ 24.950524] ? __pfx_kthread+0x10/0x10 [ 24.950555] ret_from_fork_asm+0x1a/0x30 [ 24.950793] </TASK> [ 24.951230] [ 24.971978] Allocated by task 282: [ 24.972380] kasan_save_stack+0x45/0x70 [ 24.972840] kasan_save_track+0x18/0x40 [ 24.973310] kasan_save_alloc_info+0x3b/0x50 [ 24.973981] __kasan_kmalloc+0xb7/0xc0 [ 24.974301] __kmalloc_cache_noprof+0x189/0x420 [ 24.975620] kasan_atomics+0x95/0x310 [ 24.975955] kunit_try_run_case+0x1a5/0x480 [ 24.976501] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.977371] kthread+0x337/0x6f0 [ 24.978063] ret_from_fork+0x116/0x1d0 [ 24.978417] ret_from_fork_asm+0x1a/0x30 [ 24.979115] [ 24.979322] The buggy address belongs to the object at ffff888102b73d80 [ 24.979322] which belongs to the cache kmalloc-64 of size 64 [ 24.980672] The buggy address is located 0 bytes to the right of [ 24.980672] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 24.981614] [ 24.982252] The buggy address belongs to the physical page: [ 24.982865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 24.983741] flags: 0x200000000000000(node=0|zone=2) [ 24.984380] page_type: f5(slab) [ 24.984923] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.985683] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.986323] page dumped because: kasan: bad access detected [ 24.986943] [ 24.987331] Memory state around the buggy address: [ 24.987919] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.988560] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.988829] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.989584] ^ [ 24.990477] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.991273] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.991816] ================================================================== [ 24.363973] ================================================================== [ 24.364690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 24.365522] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 24.366311] [ 24.366623] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 24.366757] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.366801] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.366891] Call Trace: [ 24.366953] <TASK> [ 24.367052] dump_stack_lvl+0x73/0xb0 [ 24.367159] print_report+0xd1/0x650 [ 24.367329] ? __virt_addr_valid+0x1db/0x2d0 [ 24.367487] ? kasan_atomics_helper+0x177f/0x5450 [ 24.367572] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.367694] ? kasan_atomics_helper+0x177f/0x5450 [ 24.367776] kasan_report+0x141/0x180 [ 24.367878] ? kasan_atomics_helper+0x177f/0x5450 [ 24.368007] kasan_check_range+0x10c/0x1c0 [ 24.368103] __kasan_check_write+0x18/0x20 [ 24.368215] kasan_atomics_helper+0x177f/0x5450 [ 24.368303] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.368469] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.368550] ? kasan_atomics+0x152/0x310 [ 24.368755] kasan_atomics+0x1dc/0x310 [ 24.368832] ? __pfx_kasan_atomics+0x10/0x10 [ 24.368903] ? __pfx_read_tsc+0x10/0x10 [ 24.368945] ? ktime_get_ts64+0x86/0x230 [ 24.368983] kunit_try_run_case+0x1a5/0x480 [ 24.369015] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.369046] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.369086] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.369125] ? __kthread_parkme+0x82/0x180 [ 24.369155] ? preempt_count_sub+0x50/0x80 [ 24.369190] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.369221] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.369259] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.369296] kthread+0x337/0x6f0 [ 24.369325] ? trace_preempt_on+0x20/0xc0 [ 24.369360] ? __pfx_kthread+0x10/0x10 [ 24.369391] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.369424] ? calculate_sigpending+0x7b/0xa0 [ 24.369460] ? __pfx_kthread+0x10/0x10 [ 24.369492] ret_from_fork+0x116/0x1d0 [ 24.369519] ? __pfx_kthread+0x10/0x10 [ 24.369548] ret_from_fork_asm+0x1a/0x30 [ 24.369628] </TASK> [ 24.369652] [ 24.386703] Allocated by task 282: [ 24.387269] kasan_save_stack+0x45/0x70 [ 24.387739] kasan_save_track+0x18/0x40 [ 24.388277] kasan_save_alloc_info+0x3b/0x50 [ 24.388773] __kasan_kmalloc+0xb7/0xc0 [ 24.389339] __kmalloc_cache_noprof+0x189/0x420 [ 24.389693] kasan_atomics+0x95/0x310 [ 24.390378] kunit_try_run_case+0x1a5/0x480 [ 24.391031] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.391773] kthread+0x337/0x6f0 [ 24.392103] ret_from_fork+0x116/0x1d0 [ 24.392520] ret_from_fork_asm+0x1a/0x30 [ 24.393112] [ 24.393364] The buggy address belongs to the object at ffff888102b73d80 [ 24.393364] which belongs to the cache kmalloc-64 of size 64 [ 24.394606] The buggy address is located 0 bytes to the right of [ 24.394606] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 24.395760] [ 24.396025] The buggy address belongs to the physical page: [ 24.396614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 24.397459] flags: 0x200000000000000(node=0|zone=2) [ 24.398088] page_type: f5(slab) [ 24.398500] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.399309] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.400107] page dumped because: kasan: bad access detected [ 24.400610] [ 24.400943] Memory state around the buggy address: [ 24.401520] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.402325] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.403032] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.403743] ^ [ 24.404303] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.405003] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.405744] ================================================================== [ 25.361694] ================================================================== [ 25.362159] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 25.364304] Read of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 25.365053] [ 25.365361] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 25.365877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.365902] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.365936] Call Trace: [ 25.365962] <TASK> [ 25.365985] dump_stack_lvl+0x73/0xb0 [ 25.366025] print_report+0xd1/0x650 [ 25.366058] ? __virt_addr_valid+0x1db/0x2d0 [ 25.366093] ? kasan_atomics_helper+0x5115/0x5450 [ 25.366127] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.366162] ? kasan_atomics_helper+0x5115/0x5450 [ 25.366195] kasan_report+0x141/0x180 [ 25.366240] ? kasan_atomics_helper+0x5115/0x5450 [ 25.366279] __asan_report_load8_noabort+0x18/0x20 [ 25.366310] kasan_atomics_helper+0x5115/0x5450 [ 25.366344] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.366378] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.366408] ? kasan_atomics+0x152/0x310 [ 25.366440] kasan_atomics+0x1dc/0x310 [ 25.366467] ? __pfx_kasan_atomics+0x10/0x10 [ 25.366497] ? __pfx_read_tsc+0x10/0x10 [ 25.366530] ? ktime_get_ts64+0x86/0x230 [ 25.366610] kunit_try_run_case+0x1a5/0x480 [ 25.366648] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.366680] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.366718] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.366756] ? __kthread_parkme+0x82/0x180 [ 25.366787] ? preempt_count_sub+0x50/0x80 [ 25.366822] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.366879] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.366919] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.366958] kthread+0x337/0x6f0 [ 25.366988] ? trace_preempt_on+0x20/0xc0 [ 25.367023] ? __pfx_kthread+0x10/0x10 [ 25.367055] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.367090] ? calculate_sigpending+0x7b/0xa0 [ 25.367126] ? __pfx_kthread+0x10/0x10 [ 25.367158] ret_from_fork+0x116/0x1d0 [ 25.367186] ? __pfx_kthread+0x10/0x10 [ 25.367216] ret_from_fork_asm+0x1a/0x30 [ 25.367259] </TASK> [ 25.367274] [ 25.384376] Allocated by task 282: [ 25.384873] kasan_save_stack+0x45/0x70 [ 25.385282] kasan_save_track+0x18/0x40 [ 25.385663] kasan_save_alloc_info+0x3b/0x50 [ 25.386095] __kasan_kmalloc+0xb7/0xc0 [ 25.386706] __kmalloc_cache_noprof+0x189/0x420 [ 25.387256] kasan_atomics+0x95/0x310 [ 25.387759] kunit_try_run_case+0x1a5/0x480 [ 25.388232] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.388938] kthread+0x337/0x6f0 [ 25.389330] ret_from_fork+0x116/0x1d0 [ 25.389911] ret_from_fork_asm+0x1a/0x30 [ 25.390306] [ 25.390662] The buggy address belongs to the object at ffff888102b73d80 [ 25.390662] which belongs to the cache kmalloc-64 of size 64 [ 25.391787] The buggy address is located 0 bytes to the right of [ 25.391787] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 25.392806] [ 25.393058] The buggy address belongs to the physical page: [ 25.393783] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 25.394669] flags: 0x200000000000000(node=0|zone=2) [ 25.395140] page_type: f5(slab) [ 25.395696] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.396415] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.397176] page dumped because: kasan: bad access detected [ 25.397856] [ 25.398105] Memory state around the buggy address: [ 25.398704] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.399432] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.400156] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.400860] ^ [ 25.401357] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.402070] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.402795] ================================================================== [ 23.189871] ================================================================== [ 23.190694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 23.191201] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 23.191849] [ 23.192175] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 23.192308] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.192352] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.192416] Call Trace: [ 23.192472] <TASK> [ 23.192523] dump_stack_lvl+0x73/0xb0 [ 23.192597] print_report+0xd1/0x650 [ 23.192668] ? __virt_addr_valid+0x1db/0x2d0 [ 23.192732] ? kasan_atomics_helper+0xac7/0x5450 [ 23.192790] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.192856] ? kasan_atomics_helper+0xac7/0x5450 [ 23.192941] kasan_report+0x141/0x180 [ 23.193146] ? kasan_atomics_helper+0xac7/0x5450 [ 23.193287] kasan_check_range+0x10c/0x1c0 [ 23.193418] __kasan_check_write+0x18/0x20 [ 23.193520] kasan_atomics_helper+0xac7/0x5450 [ 23.193631] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.193719] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.193795] ? kasan_atomics+0x152/0x310 [ 23.193879] kasan_atomics+0x1dc/0x310 [ 23.193976] ? __pfx_kasan_atomics+0x10/0x10 [ 23.194059] ? __pfx_read_tsc+0x10/0x10 [ 23.194138] ? ktime_get_ts64+0x86/0x230 [ 23.194255] kunit_try_run_case+0x1a5/0x480 [ 23.194364] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.194441] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.194523] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.194607] ? __kthread_parkme+0x82/0x180 [ 23.194680] ? preempt_count_sub+0x50/0x80 [ 23.194719] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.194750] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.194788] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.194827] kthread+0x337/0x6f0 [ 23.194856] ? trace_preempt_on+0x20/0xc0 [ 23.194913] ? __pfx_kthread+0x10/0x10 [ 23.194950] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.194985] ? calculate_sigpending+0x7b/0xa0 [ 23.195021] ? __pfx_kthread+0x10/0x10 [ 23.195053] ret_from_fork+0x116/0x1d0 [ 23.195081] ? __pfx_kthread+0x10/0x10 [ 23.195112] ret_from_fork_asm+0x1a/0x30 [ 23.195156] </TASK> [ 23.195172] [ 23.210807] Allocated by task 282: [ 23.211227] kasan_save_stack+0x45/0x70 [ 23.211662] kasan_save_track+0x18/0x40 [ 23.212154] kasan_save_alloc_info+0x3b/0x50 [ 23.212589] __kasan_kmalloc+0xb7/0xc0 [ 23.213061] __kmalloc_cache_noprof+0x189/0x420 [ 23.213571] kasan_atomics+0x95/0x310 [ 23.214023] kunit_try_run_case+0x1a5/0x480 [ 23.214456] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.215138] kthread+0x337/0x6f0 [ 23.215512] ret_from_fork+0x116/0x1d0 [ 23.215954] ret_from_fork_asm+0x1a/0x30 [ 23.216290] [ 23.216483] The buggy address belongs to the object at ffff888102b73d80 [ 23.216483] which belongs to the cache kmalloc-64 of size 64 [ 23.217349] The buggy address is located 0 bytes to the right of [ 23.217349] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 23.218743] [ 23.218959] The buggy address belongs to the physical page: [ 23.219338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 23.219930] flags: 0x200000000000000(node=0|zone=2) [ 23.220417] page_type: f5(slab) [ 23.220696] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.221385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.222135] page dumped because: kasan: bad access detected [ 23.222663] [ 23.222944] Memory state around the buggy address: [ 23.223396] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.224051] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.224680] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.225371] ^ [ 23.225948] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.226565] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.227247] ================================================================== [ 22.815420] ================================================================== [ 22.817216] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 22.818059] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 22.819238] [ 22.819692] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 22.819994] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.820036] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.820073] Call Trace: [ 22.820099] <TASK> [ 22.820122] dump_stack_lvl+0x73/0xb0 [ 22.820163] print_report+0xd1/0x650 [ 22.820197] ? __virt_addr_valid+0x1db/0x2d0 [ 22.820231] ? kasan_atomics_helper+0x5fe/0x5450 [ 22.820263] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.820296] ? kasan_atomics_helper+0x5fe/0x5450 [ 22.820330] kasan_report+0x141/0x180 [ 22.820363] ? kasan_atomics_helper+0x5fe/0x5450 [ 22.820401] kasan_check_range+0x10c/0x1c0 [ 22.820437] __kasan_check_write+0x18/0x20 [ 22.820466] kasan_atomics_helper+0x5fe/0x5450 [ 22.820500] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.820534] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.820566] ? kasan_atomics+0x152/0x310 [ 22.820601] kasan_atomics+0x1dc/0x310 [ 22.820651] ? __pfx_kasan_atomics+0x10/0x10 [ 22.820696] ? __pfx_read_tsc+0x10/0x10 [ 22.820732] ? ktime_get_ts64+0x86/0x230 [ 22.820769] kunit_try_run_case+0x1a5/0x480 [ 22.820801] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.820830] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.820868] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.820930] ? __kthread_parkme+0x82/0x180 [ 22.820970] ? preempt_count_sub+0x50/0x80 [ 22.821005] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.821038] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.821076] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.821113] kthread+0x337/0x6f0 [ 22.821142] ? trace_preempt_on+0x20/0xc0 [ 22.821175] ? __pfx_kthread+0x10/0x10 [ 22.821205] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.821240] ? calculate_sigpending+0x7b/0xa0 [ 22.821275] ? __pfx_kthread+0x10/0x10 [ 22.821306] ret_from_fork+0x116/0x1d0 [ 22.821333] ? __pfx_kthread+0x10/0x10 [ 22.821363] ret_from_fork_asm+0x1a/0x30 [ 22.821407] </TASK> [ 22.821422] [ 22.838285] Allocated by task 282: [ 22.838710] kasan_save_stack+0x45/0x70 [ 22.839160] kasan_save_track+0x18/0x40 [ 22.839572] kasan_save_alloc_info+0x3b/0x50 [ 22.840111] __kasan_kmalloc+0xb7/0xc0 [ 22.840585] __kmalloc_cache_noprof+0x189/0x420 [ 22.841129] kasan_atomics+0x95/0x310 [ 22.841509] kunit_try_run_case+0x1a5/0x480 [ 22.842076] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.842503] kthread+0x337/0x6f0 [ 22.842876] ret_from_fork+0x116/0x1d0 [ 22.843452] ret_from_fork_asm+0x1a/0x30 [ 22.844006] [ 22.844223] The buggy address belongs to the object at ffff888102b73d80 [ 22.844223] which belongs to the cache kmalloc-64 of size 64 [ 22.845158] The buggy address is located 0 bytes to the right of [ 22.845158] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 22.846261] [ 22.846460] The buggy address belongs to the physical page: [ 22.846953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 22.847698] flags: 0x200000000000000(node=0|zone=2) [ 22.848525] page_type: f5(slab) [ 22.848876] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.849489] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.850475] page dumped because: kasan: bad access detected [ 22.851393] [ 22.851584] Memory state around the buggy address: [ 22.851943] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.853847] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.854843] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.855454] ^ [ 22.855854] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.856494] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.857304] ================================================================== [ 23.273814] ================================================================== [ 23.274933] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 23.275997] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 23.276538] [ 23.277052] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 23.277189] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.277253] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.277349] Call Trace: [ 23.277407] <TASK> [ 23.277458] dump_stack_lvl+0x73/0xb0 [ 23.277518] print_report+0xd1/0x650 [ 23.277554] ? __virt_addr_valid+0x1db/0x2d0 [ 23.277589] ? kasan_atomics_helper+0xc70/0x5450 [ 23.277671] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.277711] ? kasan_atomics_helper+0xc70/0x5450 [ 23.277745] kasan_report+0x141/0x180 [ 23.277783] ? kasan_atomics_helper+0xc70/0x5450 [ 23.277821] kasan_check_range+0x10c/0x1c0 [ 23.277857] __kasan_check_write+0x18/0x20 [ 23.277909] kasan_atomics_helper+0xc70/0x5450 [ 23.277951] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.277986] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.278018] ? kasan_atomics+0x152/0x310 [ 23.278050] kasan_atomics+0x1dc/0x310 [ 23.278078] ? __pfx_kasan_atomics+0x10/0x10 [ 23.278109] ? __pfx_read_tsc+0x10/0x10 [ 23.278143] ? ktime_get_ts64+0x86/0x230 [ 23.278178] kunit_try_run_case+0x1a5/0x480 [ 23.278209] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.278249] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.278288] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.278324] ? __kthread_parkme+0x82/0x180 [ 23.278355] ? preempt_count_sub+0x50/0x80 [ 23.278389] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.278419] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.278456] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.278493] kthread+0x337/0x6f0 [ 23.278521] ? trace_preempt_on+0x20/0xc0 [ 23.278554] ? __pfx_kthread+0x10/0x10 [ 23.278584] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.278639] ? calculate_sigpending+0x7b/0xa0 [ 23.278687] ? __pfx_kthread+0x10/0x10 [ 23.278720] ret_from_fork+0x116/0x1d0 [ 23.278748] ? __pfx_kthread+0x10/0x10 [ 23.278777] ret_from_fork_asm+0x1a/0x30 [ 23.278821] </TASK> [ 23.278838] [ 23.294463] Allocated by task 282: [ 23.294758] kasan_save_stack+0x45/0x70 [ 23.295254] kasan_save_track+0x18/0x40 [ 23.295689] kasan_save_alloc_info+0x3b/0x50 [ 23.296186] __kasan_kmalloc+0xb7/0xc0 [ 23.296854] __kmalloc_cache_noprof+0x189/0x420 [ 23.297339] kasan_atomics+0x95/0x310 [ 23.297661] kunit_try_run_case+0x1a5/0x480 [ 23.298107] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.298700] kthread+0x337/0x6f0 [ 23.299138] ret_from_fork+0x116/0x1d0 [ 23.299570] ret_from_fork_asm+0x1a/0x30 [ 23.300064] [ 23.300259] The buggy address belongs to the object at ffff888102b73d80 [ 23.300259] which belongs to the cache kmalloc-64 of size 64 [ 23.301159] The buggy address is located 0 bytes to the right of [ 23.301159] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 23.303250] [ 23.303450] The buggy address belongs to the physical page: [ 23.304016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 23.304758] flags: 0x200000000000000(node=0|zone=2) [ 23.305296] page_type: f5(slab) [ 23.305690] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.306240] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.306745] page dumped because: kasan: bad access detected [ 23.307971] [ 23.308221] Memory state around the buggy address: [ 23.308619] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.310640] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.311291] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.311869] ^ [ 23.312388] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.313176] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.313849] ================================================================== [ 23.754774] ================================================================== [ 23.756234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 23.757063] Read of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 23.758268] [ 23.758504] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 23.758636] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.758671] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.758706] Call Trace: [ 23.758730] <TASK> [ 23.758753] dump_stack_lvl+0x73/0xb0 [ 23.758820] print_report+0xd1/0x650 [ 23.758870] ? __virt_addr_valid+0x1db/0x2d0 [ 23.758969] ? kasan_atomics_helper+0x4a02/0x5450 [ 23.759049] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.759102] ? kasan_atomics_helper+0x4a02/0x5450 [ 23.759136] kasan_report+0x141/0x180 [ 23.759170] ? kasan_atomics_helper+0x4a02/0x5450 [ 23.759210] __asan_report_load4_noabort+0x18/0x20 [ 23.759241] kasan_atomics_helper+0x4a02/0x5450 [ 23.759274] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.759308] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.759339] ? kasan_atomics+0x152/0x310 [ 23.759370] kasan_atomics+0x1dc/0x310 [ 23.759398] ? __pfx_kasan_atomics+0x10/0x10 [ 23.759428] ? __pfx_read_tsc+0x10/0x10 [ 23.759460] ? ktime_get_ts64+0x86/0x230 [ 23.759498] kunit_try_run_case+0x1a5/0x480 [ 23.759528] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.759558] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.759605] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.759669] ? __kthread_parkme+0x82/0x180 [ 23.759701] ? preempt_count_sub+0x50/0x80 [ 23.759736] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.759768] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.759806] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.759845] kthread+0x337/0x6f0 [ 23.760049] ? trace_preempt_on+0x20/0xc0 [ 23.760100] ? __pfx_kthread+0x10/0x10 [ 23.760134] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.760170] ? calculate_sigpending+0x7b/0xa0 [ 23.760205] ? __pfx_kthread+0x10/0x10 [ 23.760239] ret_from_fork+0x116/0x1d0 [ 23.760267] ? __pfx_kthread+0x10/0x10 [ 23.760299] ret_from_fork_asm+0x1a/0x30 [ 23.760344] </TASK> [ 23.760360] [ 23.780863] Allocated by task 282: [ 23.781219] kasan_save_stack+0x45/0x70 [ 23.781665] kasan_save_track+0x18/0x40 [ 23.782484] kasan_save_alloc_info+0x3b/0x50 [ 23.783206] __kasan_kmalloc+0xb7/0xc0 [ 23.783588] __kmalloc_cache_noprof+0x189/0x420 [ 23.784315] kasan_atomics+0x95/0x310 [ 23.784933] kunit_try_run_case+0x1a5/0x480 [ 23.785493] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.786172] kthread+0x337/0x6f0 [ 23.786585] ret_from_fork+0x116/0x1d0 [ 23.787295] ret_from_fork_asm+0x1a/0x30 [ 23.787927] [ 23.788327] The buggy address belongs to the object at ffff888102b73d80 [ 23.788327] which belongs to the cache kmalloc-64 of size 64 [ 23.789518] The buggy address is located 0 bytes to the right of [ 23.789518] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 23.790581] [ 23.790792] The buggy address belongs to the physical page: [ 23.791440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 23.792205] flags: 0x200000000000000(node=0|zone=2) [ 23.792643] page_type: f5(slab) [ 23.793179] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.793919] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.794793] page dumped because: kasan: bad access detected [ 23.795373] [ 23.795650] Memory state around the buggy address: [ 23.796156] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.796939] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.797649] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.798292] ^ [ 23.798817] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.799498] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.800193] ================================================================== [ 24.128965] ================================================================== [ 24.129569] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 24.130347] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 24.130987] [ 24.131198] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 24.131368] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.131443] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.131514] Call Trace: [ 24.131574] <TASK> [ 24.131690] dump_stack_lvl+0x73/0xb0 [ 24.131814] print_report+0xd1/0x650 [ 24.131914] ? __virt_addr_valid+0x1db/0x2d0 [ 24.132024] ? kasan_atomics_helper+0x50d4/0x5450 [ 24.132133] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.132214] ? kasan_atomics_helper+0x50d4/0x5450 [ 24.132276] kasan_report+0x141/0x180 [ 24.132332] ? kasan_atomics_helper+0x50d4/0x5450 [ 24.132419] __asan_report_store8_noabort+0x1b/0x30 [ 24.132527] kasan_atomics_helper+0x50d4/0x5450 [ 24.132680] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.132765] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.132892] ? kasan_atomics+0x152/0x310 [ 24.132983] kasan_atomics+0x1dc/0x310 [ 24.133055] ? __pfx_kasan_atomics+0x10/0x10 [ 24.133090] ? __pfx_read_tsc+0x10/0x10 [ 24.133125] ? ktime_get_ts64+0x86/0x230 [ 24.133161] kunit_try_run_case+0x1a5/0x480 [ 24.133195] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.133225] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.133266] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.133304] ? __kthread_parkme+0x82/0x180 [ 24.133335] ? preempt_count_sub+0x50/0x80 [ 24.133370] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.133400] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.133437] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.133474] kthread+0x337/0x6f0 [ 24.133504] ? trace_preempt_on+0x20/0xc0 [ 24.133537] ? __pfx_kthread+0x10/0x10 [ 24.133568] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.133655] ? calculate_sigpending+0x7b/0xa0 [ 24.133696] ? __pfx_kthread+0x10/0x10 [ 24.133729] ret_from_fork+0x116/0x1d0 [ 24.133757] ? __pfx_kthread+0x10/0x10 [ 24.133788] ret_from_fork_asm+0x1a/0x30 [ 24.133833] </TASK> [ 24.133850] [ 24.155266] Allocated by task 282: [ 24.155637] kasan_save_stack+0x45/0x70 [ 24.155983] kasan_save_track+0x18/0x40 [ 24.156293] kasan_save_alloc_info+0x3b/0x50 [ 24.157197] __kasan_kmalloc+0xb7/0xc0 [ 24.157641] __kmalloc_cache_noprof+0x189/0x420 [ 24.158401] kasan_atomics+0x95/0x310 [ 24.158769] kunit_try_run_case+0x1a5/0x480 [ 24.159266] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.159878] kthread+0x337/0x6f0 [ 24.160216] ret_from_fork+0x116/0x1d0 [ 24.160610] ret_from_fork_asm+0x1a/0x30 [ 24.161254] [ 24.161493] The buggy address belongs to the object at ffff888102b73d80 [ 24.161493] which belongs to the cache kmalloc-64 of size 64 [ 24.162371] The buggy address is located 0 bytes to the right of [ 24.162371] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 24.163448] [ 24.163840] The buggy address belongs to the physical page: [ 24.164660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 24.165469] flags: 0x200000000000000(node=0|zone=2) [ 24.165967] page_type: f5(slab) [ 24.166469] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.167574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.168174] page dumped because: kasan: bad access detected [ 24.168631] [ 24.169380] Memory state around the buggy address: [ 24.169804] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.170533] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.171333] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.171919] ^ [ 24.172368] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.173058] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.173558] ================================================================== [ 24.639345] ================================================================== [ 24.639950] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 24.640493] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 24.641745] [ 24.642424] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 24.642593] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.642640] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.642674] Call Trace: [ 24.642693] <TASK> [ 24.642715] dump_stack_lvl+0x73/0xb0 [ 24.642752] print_report+0xd1/0x650 [ 24.642785] ? __virt_addr_valid+0x1db/0x2d0 [ 24.642820] ? kasan_atomics_helper+0x1b22/0x5450 [ 24.642880] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.642919] ? kasan_atomics_helper+0x1b22/0x5450 [ 24.642954] kasan_report+0x141/0x180 [ 24.642988] ? kasan_atomics_helper+0x1b22/0x5450 [ 24.643028] kasan_check_range+0x10c/0x1c0 [ 24.643064] __kasan_check_write+0x18/0x20 [ 24.643094] kasan_atomics_helper+0x1b22/0x5450 [ 24.643128] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.643163] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.643193] ? kasan_atomics+0x152/0x310 [ 24.643225] kasan_atomics+0x1dc/0x310 [ 24.643255] ? __pfx_kasan_atomics+0x10/0x10 [ 24.643284] ? __pfx_read_tsc+0x10/0x10 [ 24.643317] ? ktime_get_ts64+0x86/0x230 [ 24.643353] kunit_try_run_case+0x1a5/0x480 [ 24.643384] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.643413] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.643450] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.643487] ? __kthread_parkme+0x82/0x180 [ 24.643516] ? preempt_count_sub+0x50/0x80 [ 24.643550] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.643591] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.643650] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.643689] kthread+0x337/0x6f0 [ 24.643718] ? trace_preempt_on+0x20/0xc0 [ 24.643752] ? __pfx_kthread+0x10/0x10 [ 24.643783] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.643818] ? calculate_sigpending+0x7b/0xa0 [ 24.643875] ? __pfx_kthread+0x10/0x10 [ 24.643914] ret_from_fork+0x116/0x1d0 [ 24.643942] ? __pfx_kthread+0x10/0x10 [ 24.643974] ret_from_fork_asm+0x1a/0x30 [ 24.644018] </TASK> [ 24.644033] [ 24.663441] Allocated by task 282: [ 24.664315] kasan_save_stack+0x45/0x70 [ 24.664633] kasan_save_track+0x18/0x40 [ 24.665048] kasan_save_alloc_info+0x3b/0x50 [ 24.665437] __kasan_kmalloc+0xb7/0xc0 [ 24.666412] __kmalloc_cache_noprof+0x189/0x420 [ 24.666708] kasan_atomics+0x95/0x310 [ 24.667565] kunit_try_run_case+0x1a5/0x480 [ 24.668259] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.668469] kthread+0x337/0x6f0 [ 24.668777] ret_from_fork+0x116/0x1d0 [ 24.669505] ret_from_fork_asm+0x1a/0x30 [ 24.670181] [ 24.670475] The buggy address belongs to the object at ffff888102b73d80 [ 24.670475] which belongs to the cache kmalloc-64 of size 64 [ 24.671897] The buggy address is located 0 bytes to the right of [ 24.671897] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 24.673059] [ 24.673243] The buggy address belongs to the physical page: [ 24.673644] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 24.674228] flags: 0x200000000000000(node=0|zone=2) [ 24.674617] page_type: f5(slab) [ 24.674957] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.675453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.676220] page dumped because: kasan: bad access detected [ 24.676593] [ 24.676795] Memory state around the buggy address: [ 24.677177] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.677893] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.678488] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.679299] ^ [ 24.679887] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.680402] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.681128] ================================================================== [ 22.580797] ================================================================== [ 22.582384] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 22.582873] Read of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 22.583546] [ 22.583775] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 22.583903] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.584007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.584100] Call Trace: [ 22.584156] <TASK> [ 22.584206] dump_stack_lvl+0x73/0xb0 [ 22.584294] print_report+0xd1/0x650 [ 22.584396] ? __virt_addr_valid+0x1db/0x2d0 [ 22.584511] ? kasan_atomics_helper+0x3df/0x5450 [ 22.584593] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.584724] ? kasan_atomics_helper+0x3df/0x5450 [ 22.584804] kasan_report+0x141/0x180 [ 22.584887] ? kasan_atomics_helper+0x3df/0x5450 [ 22.584978] kasan_check_range+0x10c/0x1c0 [ 22.585017] __kasan_check_read+0x15/0x20 [ 22.585047] kasan_atomics_helper+0x3df/0x5450 [ 22.585081] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.585115] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.585147] ? kasan_atomics+0x152/0x310 [ 22.585178] kasan_atomics+0x1dc/0x310 [ 22.585206] ? __pfx_kasan_atomics+0x10/0x10 [ 22.585236] ? __pfx_read_tsc+0x10/0x10 [ 22.585270] ? ktime_get_ts64+0x86/0x230 [ 22.585305] kunit_try_run_case+0x1a5/0x480 [ 22.585337] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.585365] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.585403] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.585440] ? __kthread_parkme+0x82/0x180 [ 22.585470] ? preempt_count_sub+0x50/0x80 [ 22.585505] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.585535] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.585571] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.585609] kthread+0x337/0x6f0 [ 22.585688] ? trace_preempt_on+0x20/0xc0 [ 22.585726] ? __pfx_kthread+0x10/0x10 [ 22.585757] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.585792] ? calculate_sigpending+0x7b/0xa0 [ 22.585827] ? __pfx_kthread+0x10/0x10 [ 22.585859] ret_from_fork+0x116/0x1d0 [ 22.585886] ? __pfx_kthread+0x10/0x10 [ 22.585943] ret_from_fork_asm+0x1a/0x30 [ 22.585991] </TASK> [ 22.586007] [ 22.601348] Allocated by task 282: [ 22.601703] kasan_save_stack+0x45/0x70 [ 22.602204] kasan_save_track+0x18/0x40 [ 22.602575] kasan_save_alloc_info+0x3b/0x50 [ 22.603111] __kasan_kmalloc+0xb7/0xc0 [ 22.603495] __kmalloc_cache_noprof+0x189/0x420 [ 22.604196] kasan_atomics+0x95/0x310 [ 22.604507] kunit_try_run_case+0x1a5/0x480 [ 22.604843] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.605429] kthread+0x337/0x6f0 [ 22.605942] ret_from_fork+0x116/0x1d0 [ 22.606415] ret_from_fork_asm+0x1a/0x30 [ 22.606843] [ 22.607235] The buggy address belongs to the object at ffff888102b73d80 [ 22.607235] which belongs to the cache kmalloc-64 of size 64 [ 22.607966] The buggy address is located 0 bytes to the right of [ 22.607966] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 22.608693] [ 22.608961] The buggy address belongs to the physical page: [ 22.609803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 22.610572] flags: 0x200000000000000(node=0|zone=2) [ 22.611106] page_type: f5(slab) [ 22.611399] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.611882] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.612562] page dumped because: kasan: bad access detected [ 22.613161] [ 22.614680] Memory state around the buggy address: [ 22.615182] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.617346] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.617742] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.618153] ^ [ 22.618504] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.618904] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.621858] ================================================================== [ 23.356026] ================================================================== [ 23.356447] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 23.356725] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 23.357422] [ 23.357999] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 23.358135] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.358176] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.358250] Call Trace: [ 23.358304] <TASK> [ 23.358342] dump_stack_lvl+0x73/0xb0 [ 23.358385] print_report+0xd1/0x650 [ 23.358420] ? __virt_addr_valid+0x1db/0x2d0 [ 23.358455] ? kasan_atomics_helper+0xd47/0x5450 [ 23.358537] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.358601] ? kasan_atomics_helper+0xd47/0x5450 [ 23.358683] kasan_report+0x141/0x180 [ 23.358769] ? kasan_atomics_helper+0xd47/0x5450 [ 23.358863] kasan_check_range+0x10c/0x1c0 [ 23.359070] __kasan_check_write+0x18/0x20 [ 23.359151] kasan_atomics_helper+0xd47/0x5450 [ 23.359235] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.359316] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.359393] ? kasan_atomics+0x152/0x310 [ 23.359474] kasan_atomics+0x1dc/0x310 [ 23.359549] ? __pfx_kasan_atomics+0x10/0x10 [ 23.359665] ? __pfx_read_tsc+0x10/0x10 [ 23.359746] ? ktime_get_ts64+0x86/0x230 [ 23.359868] kunit_try_run_case+0x1a5/0x480 [ 23.359970] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.360084] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.360219] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.360372] ? __kthread_parkme+0x82/0x180 [ 23.360460] ? preempt_count_sub+0x50/0x80 [ 23.360693] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.360782] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.360873] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.360979] kthread+0x337/0x6f0 [ 23.361055] ? trace_preempt_on+0x20/0xc0 [ 23.361135] ? __pfx_kthread+0x10/0x10 [ 23.361212] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.361258] ? calculate_sigpending+0x7b/0xa0 [ 23.361296] ? __pfx_kthread+0x10/0x10 [ 23.361329] ret_from_fork+0x116/0x1d0 [ 23.361357] ? __pfx_kthread+0x10/0x10 [ 23.361388] ret_from_fork_asm+0x1a/0x30 [ 23.361434] </TASK> [ 23.361449] [ 23.379096] Allocated by task 282: [ 23.379469] kasan_save_stack+0x45/0x70 [ 23.379802] kasan_save_track+0x18/0x40 [ 23.380302] kasan_save_alloc_info+0x3b/0x50 [ 23.380863] __kasan_kmalloc+0xb7/0xc0 [ 23.381361] __kmalloc_cache_noprof+0x189/0x420 [ 23.381911] kasan_atomics+0x95/0x310 [ 23.382340] kunit_try_run_case+0x1a5/0x480 [ 23.382739] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.383354] kthread+0x337/0x6f0 [ 23.383786] ret_from_fork+0x116/0x1d0 [ 23.384178] ret_from_fork_asm+0x1a/0x30 [ 23.384576] [ 23.384945] The buggy address belongs to the object at ffff888102b73d80 [ 23.384945] which belongs to the cache kmalloc-64 of size 64 [ 23.386454] The buggy address is located 0 bytes to the right of [ 23.386454] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 23.389196] [ 23.389459] The buggy address belongs to the physical page: [ 23.390251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 23.391597] flags: 0x200000000000000(node=0|zone=2) [ 23.392086] page_type: f5(slab) [ 23.392419] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.393583] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.394412] page dumped because: kasan: bad access detected [ 23.395194] [ 23.395584] Memory state around the buggy address: [ 23.395971] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.396799] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.397575] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.398340] ^ [ 23.398731] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.399532] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.400311] ================================================================== [ 22.538899] ================================================================== [ 22.539529] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 22.540330] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 22.541074] [ 22.541431] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 22.541599] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.541646] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.541711] Call Trace: [ 22.541820] <TASK> [ 22.541902] dump_stack_lvl+0x73/0xb0 [ 22.542008] print_report+0xd1/0x650 [ 22.542146] ? __virt_addr_valid+0x1db/0x2d0 [ 22.542273] ? kasan_atomics_helper+0x4b6e/0x5450 [ 22.542345] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.542384] ? kasan_atomics_helper+0x4b6e/0x5450 [ 22.542421] kasan_report+0x141/0x180 [ 22.542456] ? kasan_atomics_helper+0x4b6e/0x5450 [ 22.542495] __asan_report_store4_noabort+0x1b/0x30 [ 22.542527] kasan_atomics_helper+0x4b6e/0x5450 [ 22.542562] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.542596] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.542633] ? kasan_atomics+0x152/0x310 [ 22.542708] kasan_atomics+0x1dc/0x310 [ 22.542738] ? __pfx_kasan_atomics+0x10/0x10 [ 22.542768] ? __pfx_read_tsc+0x10/0x10 [ 22.542802] ? ktime_get_ts64+0x86/0x230 [ 22.542837] kunit_try_run_case+0x1a5/0x480 [ 22.542869] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.542897] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.542965] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.543005] ? __kthread_parkme+0x82/0x180 [ 22.543037] ? preempt_count_sub+0x50/0x80 [ 22.543072] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.543103] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.543139] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.543177] kthread+0x337/0x6f0 [ 22.543206] ? trace_preempt_on+0x20/0xc0 [ 22.543239] ? __pfx_kthread+0x10/0x10 [ 22.543269] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.543304] ? calculate_sigpending+0x7b/0xa0 [ 22.543340] ? __pfx_kthread+0x10/0x10 [ 22.543372] ret_from_fork+0x116/0x1d0 [ 22.543398] ? __pfx_kthread+0x10/0x10 [ 22.543429] ret_from_fork_asm+0x1a/0x30 [ 22.543471] </TASK> [ 22.543487] [ 22.562175] Allocated by task 282: [ 22.562557] kasan_save_stack+0x45/0x70 [ 22.563100] kasan_save_track+0x18/0x40 [ 22.563580] kasan_save_alloc_info+0x3b/0x50 [ 22.564150] __kasan_kmalloc+0xb7/0xc0 [ 22.564581] __kmalloc_cache_noprof+0x189/0x420 [ 22.565152] kasan_atomics+0x95/0x310 [ 22.565567] kunit_try_run_case+0x1a5/0x480 [ 22.566061] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.566608] kthread+0x337/0x6f0 [ 22.567055] ret_from_fork+0x116/0x1d0 [ 22.567410] ret_from_fork_asm+0x1a/0x30 [ 22.567982] [ 22.568251] The buggy address belongs to the object at ffff888102b73d80 [ 22.568251] which belongs to the cache kmalloc-64 of size 64 [ 22.569249] The buggy address is located 0 bytes to the right of [ 22.569249] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 22.570326] [ 22.570587] The buggy address belongs to the physical page: [ 22.571149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 22.571882] flags: 0x200000000000000(node=0|zone=2) [ 22.572345] page_type: f5(slab) [ 22.572788] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.573525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.574249] page dumped because: kasan: bad access detected [ 22.574845] [ 22.575152] Memory state around the buggy address: [ 22.575564] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.576191] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.576803] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.577435] ^ [ 22.577987] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.578611] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.579288] ================================================================== [ 23.671174] ================================================================== [ 23.671629] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 23.673150] Read of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 23.673791] [ 23.674053] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 23.674186] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.674246] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.674312] Call Trace: [ 23.674368] <TASK> [ 23.674421] dump_stack_lvl+0x73/0xb0 [ 23.674507] print_report+0xd1/0x650 [ 23.674580] ? __virt_addr_valid+0x1db/0x2d0 [ 23.674652] ? kasan_atomics_helper+0x4a1c/0x5450 [ 23.674717] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.674785] ? kasan_atomics_helper+0x4a1c/0x5450 [ 23.674851] kasan_report+0x141/0x180 [ 23.674950] ? kasan_atomics_helper+0x4a1c/0x5450 [ 23.675027] __asan_report_load4_noabort+0x18/0x20 [ 23.675118] kasan_atomics_helper+0x4a1c/0x5450 [ 23.675208] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.675290] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.675374] ? kasan_atomics+0x152/0x310 [ 23.675461] kasan_atomics+0x1dc/0x310 [ 23.675541] ? __pfx_kasan_atomics+0x10/0x10 [ 23.675618] ? __pfx_read_tsc+0x10/0x10 [ 23.675699] ? ktime_get_ts64+0x86/0x230 [ 23.675790] kunit_try_run_case+0x1a5/0x480 [ 23.675890] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.675959] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.676035] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.676075] ? __kthread_parkme+0x82/0x180 [ 23.676108] ? preempt_count_sub+0x50/0x80 [ 23.676144] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.676176] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.676212] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.676249] kthread+0x337/0x6f0 [ 23.676279] ? trace_preempt_on+0x20/0xc0 [ 23.676311] ? __pfx_kthread+0x10/0x10 [ 23.676342] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.676377] ? calculate_sigpending+0x7b/0xa0 [ 23.676413] ? __pfx_kthread+0x10/0x10 [ 23.676444] ret_from_fork+0x116/0x1d0 [ 23.676471] ? __pfx_kthread+0x10/0x10 [ 23.676502] ret_from_fork_asm+0x1a/0x30 [ 23.676544] </TASK> [ 23.676561] [ 23.689200] Allocated by task 282: [ 23.689540] kasan_save_stack+0x45/0x70 [ 23.693230] kasan_save_track+0x18/0x40 [ 23.694680] kasan_save_alloc_info+0x3b/0x50 [ 23.696026] __kasan_kmalloc+0xb7/0xc0 [ 23.696386] __kmalloc_cache_noprof+0x189/0x420 [ 23.697730] kasan_atomics+0x95/0x310 [ 23.698502] kunit_try_run_case+0x1a5/0x480 [ 23.698976] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.699495] kthread+0x337/0x6f0 [ 23.700326] ret_from_fork+0x116/0x1d0 [ 23.701241] ret_from_fork_asm+0x1a/0x30 [ 23.701649] [ 23.701920] The buggy address belongs to the object at ffff888102b73d80 [ 23.701920] which belongs to the cache kmalloc-64 of size 64 [ 23.702857] The buggy address is located 0 bytes to the right of [ 23.702857] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 23.703862] [ 23.704125] The buggy address belongs to the physical page: [ 23.704545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 23.705262] flags: 0x200000000000000(node=0|zone=2) [ 23.705785] page_type: f5(slab) [ 23.706207] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.706853] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.707486] page dumped because: kasan: bad access detected [ 23.708069] [ 23.708282] Memory state around the buggy address: [ 23.708788] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.709431] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.710096] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.710706] ^ [ 23.711148] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.711818] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.712389] ================================================================== [ 24.548299] ================================================================== [ 24.548939] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 24.549790] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 24.550309] [ 24.550578] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 24.550746] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.550797] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.550875] Call Trace: [ 24.550932] <TASK> [ 24.550979] dump_stack_lvl+0x73/0xb0 [ 24.551054] print_report+0xd1/0x650 [ 24.551130] ? __virt_addr_valid+0x1db/0x2d0 [ 24.551204] ? kasan_atomics_helper+0x19e3/0x5450 [ 24.551272] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.551369] ? kasan_atomics_helper+0x19e3/0x5450 [ 24.551493] kasan_report+0x141/0x180 [ 24.551581] ? kasan_atomics_helper+0x19e3/0x5450 [ 24.551693] kasan_check_range+0x10c/0x1c0 [ 24.551778] __kasan_check_write+0x18/0x20 [ 24.551871] kasan_atomics_helper+0x19e3/0x5450 [ 24.551958] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.552043] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.552126] ? kasan_atomics+0x152/0x310 [ 24.552205] kasan_atomics+0x1dc/0x310 [ 24.552256] ? __pfx_kasan_atomics+0x10/0x10 [ 24.552327] ? __pfx_read_tsc+0x10/0x10 [ 24.552405] ? ktime_get_ts64+0x86/0x230 [ 24.552492] kunit_try_run_case+0x1a5/0x480 [ 24.552572] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.552651] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.552736] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.552817] ? __kthread_parkme+0x82/0x180 [ 24.552920] ? preempt_count_sub+0x50/0x80 [ 24.553006] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.553087] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.553180] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.553266] kthread+0x337/0x6f0 [ 24.553337] ? trace_preempt_on+0x20/0xc0 [ 24.553419] ? __pfx_kthread+0x10/0x10 [ 24.553491] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.553568] ? calculate_sigpending+0x7b/0xa0 [ 24.553674] ? __pfx_kthread+0x10/0x10 [ 24.553750] ret_from_fork+0x116/0x1d0 [ 24.553820] ? __pfx_kthread+0x10/0x10 [ 24.553914] ret_from_fork_asm+0x1a/0x30 [ 24.553971] </TASK> [ 24.553991] [ 24.570797] Allocated by task 282: [ 24.571137] kasan_save_stack+0x45/0x70 [ 24.571474] kasan_save_track+0x18/0x40 [ 24.571806] kasan_save_alloc_info+0x3b/0x50 [ 24.572143] __kasan_kmalloc+0xb7/0xc0 [ 24.572423] __kmalloc_cache_noprof+0x189/0x420 [ 24.572738] kasan_atomics+0x95/0x310 [ 24.574421] kunit_try_run_case+0x1a5/0x480 [ 24.575191] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.575772] kthread+0x337/0x6f0 [ 24.576174] ret_from_fork+0x116/0x1d0 [ 24.576339] ret_from_fork_asm+0x1a/0x30 [ 24.576505] [ 24.576685] The buggy address belongs to the object at ffff888102b73d80 [ 24.576685] which belongs to the cache kmalloc-64 of size 64 [ 24.578711] The buggy address is located 0 bytes to the right of [ 24.578711] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 24.579932] [ 24.580221] The buggy address belongs to the physical page: [ 24.580995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 24.581895] flags: 0x200000000000000(node=0|zone=2) [ 24.582335] page_type: f5(slab) [ 24.582975] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.584144] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.584845] page dumped because: kasan: bad access detected [ 24.585317] [ 24.585534] Memory state around the buggy address: [ 24.586287] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.587163] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.587987] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.588573] ^ [ 24.589429] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.590069] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.590881] ================================================================== [ 22.488153] ================================================================== [ 22.489159] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 22.489811] Read of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 22.490632] [ 22.490973] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 22.491089] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.491126] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.491179] Call Trace: [ 22.491226] <TASK> [ 22.491264] dump_stack_lvl+0x73/0xb0 [ 22.491336] print_report+0xd1/0x650 [ 22.491410] ? __virt_addr_valid+0x1db/0x2d0 [ 22.491491] ? kasan_atomics_helper+0x4b88/0x5450 [ 22.491567] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.491644] ? kasan_atomics_helper+0x4b88/0x5450 [ 22.491721] kasan_report+0x141/0x180 [ 22.491802] ? kasan_atomics_helper+0x4b88/0x5450 [ 22.491892] __asan_report_load4_noabort+0x18/0x20 [ 22.492067] kasan_atomics_helper+0x4b88/0x5450 [ 22.492158] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.492233] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.492305] ? kasan_atomics+0x152/0x310 [ 22.492381] kasan_atomics+0x1dc/0x310 [ 22.492456] ? __pfx_kasan_atomics+0x10/0x10 [ 22.492528] ? __pfx_read_tsc+0x10/0x10 [ 22.492599] ? ktime_get_ts64+0x86/0x230 [ 22.492685] kunit_try_run_case+0x1a5/0x480 [ 22.492764] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.492830] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.492929] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.493019] ? __kthread_parkme+0x82/0x180 [ 22.493097] ? preempt_count_sub+0x50/0x80 [ 22.493179] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.493255] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.493425] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.493516] kthread+0x337/0x6f0 [ 22.493644] ? trace_preempt_on+0x20/0xc0 [ 22.493751] ? __pfx_kthread+0x10/0x10 [ 22.493828] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.493904] ? calculate_sigpending+0x7b/0xa0 [ 22.494005] ? __pfx_kthread+0x10/0x10 [ 22.494081] ret_from_fork+0x116/0x1d0 [ 22.494146] ? __pfx_kthread+0x10/0x10 [ 22.494219] ret_from_fork_asm+0x1a/0x30 [ 22.494327] </TASK> [ 22.494424] [ 22.516521] Allocated by task 282: [ 22.517283] kasan_save_stack+0x45/0x70 [ 22.518174] kasan_save_track+0x18/0x40 [ 22.518542] kasan_save_alloc_info+0x3b/0x50 [ 22.519009] __kasan_kmalloc+0xb7/0xc0 [ 22.520033] __kmalloc_cache_noprof+0x189/0x420 [ 22.520401] kasan_atomics+0x95/0x310 [ 22.521062] kunit_try_run_case+0x1a5/0x480 [ 22.521409] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.522330] kthread+0x337/0x6f0 [ 22.522605] ret_from_fork+0x116/0x1d0 [ 22.523450] ret_from_fork_asm+0x1a/0x30 [ 22.524121] [ 22.524340] The buggy address belongs to the object at ffff888102b73d80 [ 22.524340] which belongs to the cache kmalloc-64 of size 64 [ 22.525467] The buggy address is located 0 bytes to the right of [ 22.525467] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 22.526701] [ 22.526870] The buggy address belongs to the physical page: [ 22.527213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 22.527887] flags: 0x200000000000000(node=0|zone=2) [ 22.528521] page_type: f5(slab) [ 22.528986] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.529717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.530259] page dumped because: kasan: bad access detected [ 22.530855] [ 22.531228] Memory state around the buggy address: [ 22.531803] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.532523] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.533081] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.533858] ^ [ 22.534370] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.535141] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.535818] ================================================================== [ 23.713902] ================================================================== [ 23.714482] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 23.716009] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 23.716758] [ 23.717047] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 23.717181] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.717226] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.717290] Call Trace: [ 23.717344] <TASK> [ 23.717392] dump_stack_lvl+0x73/0xb0 [ 23.717479] print_report+0xd1/0x650 [ 23.717566] ? __virt_addr_valid+0x1db/0x2d0 [ 23.717698] ? kasan_atomics_helper+0x1148/0x5450 [ 23.717779] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.717865] ? kasan_atomics_helper+0x1148/0x5450 [ 23.717969] kasan_report+0x141/0x180 [ 23.718055] ? kasan_atomics_helper+0x1148/0x5450 [ 23.718143] kasan_check_range+0x10c/0x1c0 [ 23.718233] __kasan_check_write+0x18/0x20 [ 23.718302] kasan_atomics_helper+0x1148/0x5450 [ 23.718343] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.718380] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.718412] ? kasan_atomics+0x152/0x310 [ 23.718445] kasan_atomics+0x1dc/0x310 [ 23.718473] ? __pfx_kasan_atomics+0x10/0x10 [ 23.718503] ? __pfx_read_tsc+0x10/0x10 [ 23.718536] ? ktime_get_ts64+0x86/0x230 [ 23.718572] kunit_try_run_case+0x1a5/0x480 [ 23.718648] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.718686] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.718725] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.718762] ? __kthread_parkme+0x82/0x180 [ 23.718793] ? preempt_count_sub+0x50/0x80 [ 23.718828] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.718857] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.718921] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.718960] kthread+0x337/0x6f0 [ 23.718990] ? trace_preempt_on+0x20/0xc0 [ 23.719022] ? __pfx_kthread+0x10/0x10 [ 23.719053] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.719087] ? calculate_sigpending+0x7b/0xa0 [ 23.719122] ? __pfx_kthread+0x10/0x10 [ 23.719153] ret_from_fork+0x116/0x1d0 [ 23.719179] ? __pfx_kthread+0x10/0x10 [ 23.719210] ret_from_fork_asm+0x1a/0x30 [ 23.719253] </TASK> [ 23.719268] [ 23.733814] Allocated by task 282: [ 23.734208] kasan_save_stack+0x45/0x70 [ 23.734640] kasan_save_track+0x18/0x40 [ 23.735091] kasan_save_alloc_info+0x3b/0x50 [ 23.735537] __kasan_kmalloc+0xb7/0xc0 [ 23.736009] __kmalloc_cache_noprof+0x189/0x420 [ 23.736419] kasan_atomics+0x95/0x310 [ 23.736871] kunit_try_run_case+0x1a5/0x480 [ 23.737228] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.737637] kthread+0x337/0x6f0 [ 23.738218] ret_from_fork+0x116/0x1d0 [ 23.738652] ret_from_fork_asm+0x1a/0x30 [ 23.739223] [ 23.739492] The buggy address belongs to the object at ffff888102b73d80 [ 23.739492] which belongs to the cache kmalloc-64 of size 64 [ 23.740674] The buggy address is located 0 bytes to the right of [ 23.740674] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 23.741616] [ 23.741810] The buggy address belongs to the physical page: [ 23.742196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 23.742940] flags: 0x200000000000000(node=0|zone=2) [ 23.743496] page_type: f5(slab) [ 23.743959] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.744629] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.746656] page dumped because: kasan: bad access detected [ 23.748041] [ 23.748266] Memory state around the buggy address: [ 23.748708] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.749562] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.750492] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.751258] ^ [ 23.751859] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.752623] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.753228] ================================================================== [ 24.407452] ================================================================== [ 24.408079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 24.408961] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 24.409455] [ 24.409764] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 24.409899] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.409939] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.409996] Call Trace: [ 24.410048] <TASK> [ 24.410098] dump_stack_lvl+0x73/0xb0 [ 24.410172] print_report+0xd1/0x650 [ 24.410263] ? __virt_addr_valid+0x1db/0x2d0 [ 24.410343] ? kasan_atomics_helper+0x1818/0x5450 [ 24.410490] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.410607] ? kasan_atomics_helper+0x1818/0x5450 [ 24.410735] kasan_report+0x141/0x180 [ 24.410839] ? kasan_atomics_helper+0x1818/0x5450 [ 24.410944] kasan_check_range+0x10c/0x1c0 [ 24.411063] __kasan_check_write+0x18/0x20 [ 24.411138] kasan_atomics_helper+0x1818/0x5450 [ 24.411224] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.411312] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.411391] ? kasan_atomics+0x152/0x310 [ 24.411472] kasan_atomics+0x1dc/0x310 [ 24.411546] ? __pfx_kasan_atomics+0x10/0x10 [ 24.411638] ? __pfx_read_tsc+0x10/0x10 [ 24.411716] ? ktime_get_ts64+0x86/0x230 [ 24.411803] kunit_try_run_case+0x1a5/0x480 [ 24.411902] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.411975] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.412040] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.412116] ? __kthread_parkme+0x82/0x180 [ 24.412192] ? preempt_count_sub+0x50/0x80 [ 24.412280] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.412362] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.412450] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.412538] kthread+0x337/0x6f0 [ 24.412639] ? trace_preempt_on+0x20/0xc0 [ 24.412804] ? __pfx_kthread+0x10/0x10 [ 24.412906] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.413040] ? calculate_sigpending+0x7b/0xa0 [ 24.413158] ? __pfx_kthread+0x10/0x10 [ 24.413239] ret_from_fork+0x116/0x1d0 [ 24.413370] ? __pfx_kthread+0x10/0x10 [ 24.413481] ret_from_fork_asm+0x1a/0x30 [ 24.413614] </TASK> [ 24.413679] [ 24.430945] Allocated by task 282: [ 24.431534] kasan_save_stack+0x45/0x70 [ 24.432005] kasan_save_track+0x18/0x40 [ 24.432514] kasan_save_alloc_info+0x3b/0x50 [ 24.433143] __kasan_kmalloc+0xb7/0xc0 [ 24.433598] __kmalloc_cache_noprof+0x189/0x420 [ 24.434036] kasan_atomics+0x95/0x310 [ 24.434560] kunit_try_run_case+0x1a5/0x480 [ 24.435066] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.435674] kthread+0x337/0x6f0 [ 24.436248] ret_from_fork+0x116/0x1d0 [ 24.436685] ret_from_fork_asm+0x1a/0x30 [ 24.437135] [ 24.437544] The buggy address belongs to the object at ffff888102b73d80 [ 24.437544] which belongs to the cache kmalloc-64 of size 64 [ 24.438566] The buggy address is located 0 bytes to the right of [ 24.438566] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 24.439842] [ 24.440227] The buggy address belongs to the physical page: [ 24.440926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 24.441427] flags: 0x200000000000000(node=0|zone=2) [ 24.441902] page_type: f5(slab) [ 24.442305] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.443209] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.444083] page dumped because: kasan: bad access detected [ 24.444711] [ 24.444958] Memory state around the buggy address: [ 24.445538] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.446105] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.446571] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.447264] ^ [ 24.448103] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.448923] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.449371] ================================================================== [ 23.142046] ================================================================== [ 23.143254] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 23.143518] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 23.143763] [ 23.143874] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 23.144003] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.144045] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.144106] Call Trace: [ 23.144163] <TASK> [ 23.144210] dump_stack_lvl+0x73/0xb0 [ 23.144300] print_report+0xd1/0x650 [ 23.144382] ? __virt_addr_valid+0x1db/0x2d0 [ 23.144464] ? kasan_atomics_helper+0xa2b/0x5450 [ 23.144630] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.144717] ? kasan_atomics_helper+0xa2b/0x5450 [ 23.144793] kasan_report+0x141/0x180 [ 23.144875] ? kasan_atomics_helper+0xa2b/0x5450 [ 23.144988] kasan_check_range+0x10c/0x1c0 [ 23.145070] __kasan_check_write+0x18/0x20 [ 23.145147] kasan_atomics_helper+0xa2b/0x5450 [ 23.145276] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.145429] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.145545] ? kasan_atomics+0x152/0x310 [ 23.145627] kasan_atomics+0x1dc/0x310 [ 23.145705] ? __pfx_kasan_atomics+0x10/0x10 [ 23.145771] ? __pfx_read_tsc+0x10/0x10 [ 23.145811] ? ktime_get_ts64+0x86/0x230 [ 23.145850] kunit_try_run_case+0x1a5/0x480 [ 23.145882] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.145957] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.146025] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.146099] ? __kthread_parkme+0x82/0x180 [ 23.146161] ? preempt_count_sub+0x50/0x80 [ 23.146241] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.146313] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.146386] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.146485] kthread+0x337/0x6f0 [ 23.146549] ? trace_preempt_on+0x20/0xc0 [ 23.146654] ? __pfx_kthread+0x10/0x10 [ 23.146727] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.146796] ? calculate_sigpending+0x7b/0xa0 [ 23.146860] ? __pfx_kthread+0x10/0x10 [ 23.146948] ret_from_fork+0x116/0x1d0 [ 23.147013] ? __pfx_kthread+0x10/0x10 [ 23.147081] ret_from_fork_asm+0x1a/0x30 [ 23.147175] </TASK> [ 23.147212] [ 23.169818] Allocated by task 282: [ 23.170195] kasan_save_stack+0x45/0x70 [ 23.170879] kasan_save_track+0x18/0x40 [ 23.171423] kasan_save_alloc_info+0x3b/0x50 [ 23.171916] __kasan_kmalloc+0xb7/0xc0 [ 23.172513] __kmalloc_cache_noprof+0x189/0x420 [ 23.172873] kasan_atomics+0x95/0x310 [ 23.173385] kunit_try_run_case+0x1a5/0x480 [ 23.173830] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.174530] kthread+0x337/0x6f0 [ 23.174917] ret_from_fork+0x116/0x1d0 [ 23.175383] ret_from_fork_asm+0x1a/0x30 [ 23.176015] [ 23.176212] The buggy address belongs to the object at ffff888102b73d80 [ 23.176212] which belongs to the cache kmalloc-64 of size 64 [ 23.177363] The buggy address is located 0 bytes to the right of [ 23.177363] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 23.178523] [ 23.178876] The buggy address belongs to the physical page: [ 23.179516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 23.180366] flags: 0x200000000000000(node=0|zone=2) [ 23.180746] page_type: f5(slab) [ 23.181149] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.182375] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.182993] page dumped because: kasan: bad access detected [ 23.183520] [ 23.183837] Memory state around the buggy address: [ 23.184304] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.185074] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.185786] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.186420] ^ [ 23.187038] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.187733] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.188319] ================================================================== [ 25.042527] ================================================================== [ 25.043817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 25.044728] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 25.045416] [ 25.045795] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 25.045961] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.046056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.046153] Call Trace: [ 25.046223] <TASK> [ 25.046276] dump_stack_lvl+0x73/0xb0 [ 25.046366] print_report+0xd1/0x650 [ 25.046448] ? __virt_addr_valid+0x1db/0x2d0 [ 25.046530] ? kasan_atomics_helper+0x2006/0x5450 [ 25.046628] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.046713] ? kasan_atomics_helper+0x2006/0x5450 [ 25.046902] kasan_report+0x141/0x180 [ 25.046980] ? kasan_atomics_helper+0x2006/0x5450 [ 25.047030] kasan_check_range+0x10c/0x1c0 [ 25.047069] __kasan_check_write+0x18/0x20 [ 25.047100] kasan_atomics_helper+0x2006/0x5450 [ 25.047134] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.047169] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.047201] ? kasan_atomics+0x152/0x310 [ 25.047235] kasan_atomics+0x1dc/0x310 [ 25.047263] ? __pfx_kasan_atomics+0x10/0x10 [ 25.047293] ? __pfx_read_tsc+0x10/0x10 [ 25.047326] ? ktime_get_ts64+0x86/0x230 [ 25.047362] kunit_try_run_case+0x1a5/0x480 [ 25.047393] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.047424] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.047461] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.047500] ? __kthread_parkme+0x82/0x180 [ 25.047531] ? preempt_count_sub+0x50/0x80 [ 25.047579] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.047636] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.047677] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.047714] kthread+0x337/0x6f0 [ 25.047743] ? trace_preempt_on+0x20/0xc0 [ 25.047778] ? __pfx_kthread+0x10/0x10 [ 25.047809] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.047870] ? calculate_sigpending+0x7b/0xa0 [ 25.047910] ? __pfx_kthread+0x10/0x10 [ 25.047941] ret_from_fork+0x116/0x1d0 [ 25.047968] ? __pfx_kthread+0x10/0x10 [ 25.047998] ret_from_fork_asm+0x1a/0x30 [ 25.048042] </TASK> [ 25.048059] [ 25.065599] Allocated by task 282: [ 25.066003] kasan_save_stack+0x45/0x70 [ 25.066428] kasan_save_track+0x18/0x40 [ 25.066937] kasan_save_alloc_info+0x3b/0x50 [ 25.067377] __kasan_kmalloc+0xb7/0xc0 [ 25.067886] __kmalloc_cache_noprof+0x189/0x420 [ 25.068325] kasan_atomics+0x95/0x310 [ 25.068798] kunit_try_run_case+0x1a5/0x480 [ 25.069292] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.069910] kthread+0x337/0x6f0 [ 25.070306] ret_from_fork+0x116/0x1d0 [ 25.070828] ret_from_fork_asm+0x1a/0x30 [ 25.071231] [ 25.071492] The buggy address belongs to the object at ffff888102b73d80 [ 25.071492] which belongs to the cache kmalloc-64 of size 64 [ 25.072498] The buggy address is located 0 bytes to the right of [ 25.072498] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 25.073615] [ 25.073812] The buggy address belongs to the physical page: [ 25.074378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 25.075100] flags: 0x200000000000000(node=0|zone=2) [ 25.075580] page_type: f5(slab) [ 25.075952] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.076736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.077379] page dumped because: kasan: bad access detected [ 25.077952] [ 25.078186] Memory state around the buggy address: [ 25.078725] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.080047] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.080918] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.081411] ^ [ 25.082298] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.083112] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.083960] ================================================================== [ 22.858616] ================================================================== [ 22.859173] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 22.859813] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 22.861368] [ 22.861653] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 22.861787] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.861833] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.861896] Call Trace: [ 22.861972] <TASK> [ 22.862022] dump_stack_lvl+0x73/0xb0 [ 22.862108] print_report+0xd1/0x650 [ 22.862188] ? __virt_addr_valid+0x1db/0x2d0 [ 22.862275] ? kasan_atomics_helper+0x697/0x5450 [ 22.862353] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.862436] ? kasan_atomics_helper+0x697/0x5450 [ 22.862558] kasan_report+0x141/0x180 [ 22.862647] ? kasan_atomics_helper+0x697/0x5450 [ 22.862776] kasan_check_range+0x10c/0x1c0 [ 22.862865] __kasan_check_write+0x18/0x20 [ 22.862960] kasan_atomics_helper+0x697/0x5450 [ 22.863081] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.863169] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.863254] ? kasan_atomics+0x152/0x310 [ 22.863338] kasan_atomics+0x1dc/0x310 [ 22.863415] ? __pfx_kasan_atomics+0x10/0x10 [ 22.863496] ? __pfx_read_tsc+0x10/0x10 [ 22.863615] ? ktime_get_ts64+0x86/0x230 [ 22.863742] kunit_try_run_case+0x1a5/0x480 [ 22.863829] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.863925] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.864059] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.864149] ? __kthread_parkme+0x82/0x180 [ 22.864233] ? preempt_count_sub+0x50/0x80 [ 22.864362] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.864450] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.864524] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.864565] kthread+0x337/0x6f0 [ 22.864595] ? trace_preempt_on+0x20/0xc0 [ 22.864650] ? __pfx_kthread+0x10/0x10 [ 22.864722] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.864761] ? calculate_sigpending+0x7b/0xa0 [ 22.864798] ? __pfx_kthread+0x10/0x10 [ 22.864830] ret_from_fork+0x116/0x1d0 [ 22.864857] ? __pfx_kthread+0x10/0x10 [ 22.864888] ret_from_fork_asm+0x1a/0x30 [ 22.864962] </TASK> [ 22.864978] [ 22.884741] Allocated by task 282: [ 22.886212] kasan_save_stack+0x45/0x70 [ 22.887858] kasan_save_track+0x18/0x40 [ 22.889763] kasan_save_alloc_info+0x3b/0x50 [ 22.891478] __kasan_kmalloc+0xb7/0xc0 [ 22.892429] __kmalloc_cache_noprof+0x189/0x420 [ 22.893590] kasan_atomics+0x95/0x310 [ 22.894887] kunit_try_run_case+0x1a5/0x480 [ 22.895953] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.896741] kthread+0x337/0x6f0 [ 22.897053] ret_from_fork+0x116/0x1d0 [ 22.897368] ret_from_fork_asm+0x1a/0x30 [ 22.898097] [ 22.898571] The buggy address belongs to the object at ffff888102b73d80 [ 22.898571] which belongs to the cache kmalloc-64 of size 64 [ 22.899960] The buggy address is located 0 bytes to the right of [ 22.899960] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 22.901477] [ 22.901676] The buggy address belongs to the physical page: [ 22.902223] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 22.903166] flags: 0x200000000000000(node=0|zone=2) [ 22.903557] page_type: f5(slab) [ 22.904655] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.905267] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.906137] page dumped because: kasan: bad access detected [ 22.906778] [ 22.907058] Memory state around the buggy address: [ 22.907500] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.908066] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.908682] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.909314] ^ [ 22.909816] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.910421] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.911072] ================================================================== [ 23.844529] ================================================================== [ 23.845253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 23.846171] Read of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 23.846647] [ 23.846893] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 23.847009] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.847043] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.847098] Call Trace: [ 23.847145] <TASK> [ 23.847215] dump_stack_lvl+0x73/0xb0 [ 23.847285] print_report+0xd1/0x650 [ 23.847355] ? __virt_addr_valid+0x1db/0x2d0 [ 23.847435] ? kasan_atomics_helper+0x49e8/0x5450 [ 23.847626] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.847762] ? kasan_atomics_helper+0x49e8/0x5450 [ 23.847928] kasan_report+0x141/0x180 [ 23.848017] ? kasan_atomics_helper+0x49e8/0x5450 [ 23.848116] __asan_report_load4_noabort+0x18/0x20 [ 23.848194] kasan_atomics_helper+0x49e8/0x5450 [ 23.848276] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.848360] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.848489] ? kasan_atomics+0x152/0x310 [ 23.848607] kasan_atomics+0x1dc/0x310 [ 23.848683] ? __pfx_kasan_atomics+0x10/0x10 [ 23.848765] ? __pfx_read_tsc+0x10/0x10 [ 23.848908] ? ktime_get_ts64+0x86/0x230 [ 23.849018] kunit_try_run_case+0x1a5/0x480 [ 23.849103] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.849230] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.849346] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.849429] ? __kthread_parkme+0x82/0x180 [ 23.849497] ? preempt_count_sub+0x50/0x80 [ 23.849576] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.849656] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.849782] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.849892] kthread+0x337/0x6f0 [ 23.849979] ? trace_preempt_on+0x20/0xc0 [ 23.850060] ? __pfx_kthread+0x10/0x10 [ 23.850195] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.850318] ? calculate_sigpending+0x7b/0xa0 [ 23.850401] ? __pfx_kthread+0x10/0x10 [ 23.850536] ret_from_fork+0x116/0x1d0 [ 23.850693] ? __pfx_kthread+0x10/0x10 [ 23.850858] ret_from_fork_asm+0x1a/0x30 [ 23.851122] </TASK> [ 23.851165] [ 23.869936] Allocated by task 282: [ 23.870346] kasan_save_stack+0x45/0x70 [ 23.871727] kasan_save_track+0x18/0x40 [ 23.872064] kasan_save_alloc_info+0x3b/0x50 [ 23.872613] __kasan_kmalloc+0xb7/0xc0 [ 23.873203] __kmalloc_cache_noprof+0x189/0x420 [ 23.873890] kasan_atomics+0x95/0x310 [ 23.874407] kunit_try_run_case+0x1a5/0x480 [ 23.875115] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.875542] kthread+0x337/0x6f0 [ 23.876347] ret_from_fork+0x116/0x1d0 [ 23.876926] ret_from_fork_asm+0x1a/0x30 [ 23.877639] [ 23.878155] The buggy address belongs to the object at ffff888102b73d80 [ 23.878155] which belongs to the cache kmalloc-64 of size 64 [ 23.879309] The buggy address is located 0 bytes to the right of [ 23.879309] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 23.880749] [ 23.881099] The buggy address belongs to the physical page: [ 23.881461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 23.882362] flags: 0x200000000000000(node=0|zone=2) [ 23.882990] page_type: f5(slab) [ 23.883406] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.884245] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.885056] page dumped because: kasan: bad access detected [ 23.885471] [ 23.885788] Memory state around the buggy address: [ 23.886698] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.887301] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.887922] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.888805] ^ [ 23.889385] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.890206] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.891037] ================================================================== [ 24.451151] ================================================================== [ 24.452296] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 24.453066] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 24.453654] [ 24.453997] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 24.454109] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.454155] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.454233] Call Trace: [ 24.454277] <TASK> [ 24.454329] dump_stack_lvl+0x73/0xb0 [ 24.454415] print_report+0xd1/0x650 [ 24.454496] ? __virt_addr_valid+0x1db/0x2d0 [ 24.454666] ? kasan_atomics_helper+0x18b1/0x5450 [ 24.454768] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.454905] ? kasan_atomics_helper+0x18b1/0x5450 [ 24.455036] kasan_report+0x141/0x180 [ 24.455128] ? kasan_atomics_helper+0x18b1/0x5450 [ 24.455301] kasan_check_range+0x10c/0x1c0 [ 24.455398] __kasan_check_write+0x18/0x20 [ 24.455526] kasan_atomics_helper+0x18b1/0x5450 [ 24.455641] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.455724] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.455800] ? kasan_atomics+0x152/0x310 [ 24.455956] kasan_atomics+0x1dc/0x310 [ 24.456063] ? __pfx_kasan_atomics+0x10/0x10 [ 24.456175] ? __pfx_read_tsc+0x10/0x10 [ 24.456300] ? ktime_get_ts64+0x86/0x230 [ 24.456419] kunit_try_run_case+0x1a5/0x480 [ 24.456584] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.456666] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.456753] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.456923] ? __kthread_parkme+0x82/0x180 [ 24.457032] ? preempt_count_sub+0x50/0x80 [ 24.457197] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.457362] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.457485] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.457601] kthread+0x337/0x6f0 [ 24.457659] ? trace_preempt_on+0x20/0xc0 [ 24.457697] ? __pfx_kthread+0x10/0x10 [ 24.457728] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.457764] ? calculate_sigpending+0x7b/0xa0 [ 24.457801] ? __pfx_kthread+0x10/0x10 [ 24.457833] ret_from_fork+0x116/0x1d0 [ 24.457884] ? __pfx_kthread+0x10/0x10 [ 24.457920] ret_from_fork_asm+0x1a/0x30 [ 24.457966] </TASK> [ 24.457981] [ 24.475102] Allocated by task 282: [ 24.475568] kasan_save_stack+0x45/0x70 [ 24.476161] kasan_save_track+0x18/0x40 [ 24.476594] kasan_save_alloc_info+0x3b/0x50 [ 24.477153] __kasan_kmalloc+0xb7/0xc0 [ 24.477723] __kmalloc_cache_noprof+0x189/0x420 [ 24.478258] kasan_atomics+0x95/0x310 [ 24.478700] kunit_try_run_case+0x1a5/0x480 [ 24.479256] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.479887] kthread+0x337/0x6f0 [ 24.480203] ret_from_fork+0x116/0x1d0 [ 24.480974] ret_from_fork_asm+0x1a/0x30 [ 24.484490] [ 24.484701] The buggy address belongs to the object at ffff888102b73d80 [ 24.484701] which belongs to the cache kmalloc-64 of size 64 [ 24.487667] The buggy address is located 0 bytes to the right of [ 24.487667] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 24.489510] [ 24.492106] The buggy address belongs to the physical page: [ 24.492363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 24.493169] flags: 0x200000000000000(node=0|zone=2) [ 24.493499] page_type: f5(slab) [ 24.493761] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.494189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.494761] page dumped because: kasan: bad access detected [ 24.495298] [ 24.495530] Memory state around the buggy address: [ 24.496009] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.496613] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.497370] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.498075] ^ [ 24.498416] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.498839] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.499321] ================================================================== [ 23.228609] ================================================================== [ 23.230133] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 23.230712] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 23.231424] [ 23.231655] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 23.231787] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.231852] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.231949] Call Trace: [ 23.232004] <TASK> [ 23.232048] dump_stack_lvl+0x73/0xb0 [ 23.232152] print_report+0xd1/0x650 [ 23.232264] ? __virt_addr_valid+0x1db/0x2d0 [ 23.232352] ? kasan_atomics_helper+0xb6a/0x5450 [ 23.232454] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.232571] ? kasan_atomics_helper+0xb6a/0x5450 [ 23.232656] kasan_report+0x141/0x180 [ 23.232739] ? kasan_atomics_helper+0xb6a/0x5450 [ 23.232884] kasan_check_range+0x10c/0x1c0 [ 23.232990] __kasan_check_write+0x18/0x20 [ 23.233071] kasan_atomics_helper+0xb6a/0x5450 [ 23.233206] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.233294] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.233376] ? kasan_atomics+0x152/0x310 [ 23.233458] kasan_atomics+0x1dc/0x310 [ 23.233536] ? __pfx_kasan_atomics+0x10/0x10 [ 23.233659] ? __pfx_read_tsc+0x10/0x10 [ 23.233740] ? ktime_get_ts64+0x86/0x230 [ 23.233827] kunit_try_run_case+0x1a5/0x480 [ 23.233922] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.234000] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.234087] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.234171] ? __kthread_parkme+0x82/0x180 [ 23.234257] ? preempt_count_sub+0x50/0x80 [ 23.234322] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.234398] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.234504] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.234626] kthread+0x337/0x6f0 [ 23.234708] ? trace_preempt_on+0x20/0xc0 [ 23.234794] ? __pfx_kthread+0x10/0x10 [ 23.234872] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.234977] ? calculate_sigpending+0x7b/0xa0 [ 23.235055] ? __pfx_kthread+0x10/0x10 [ 23.235137] ret_from_fork+0x116/0x1d0 [ 23.235211] ? __pfx_kthread+0x10/0x10 [ 23.235304] ret_from_fork_asm+0x1a/0x30 [ 23.235436] </TASK> [ 23.235479] [ 23.251482] Allocated by task 282: [ 23.252108] kasan_save_stack+0x45/0x70 [ 23.252570] kasan_save_track+0x18/0x40 [ 23.253177] kasan_save_alloc_info+0x3b/0x50 [ 23.255469] __kasan_kmalloc+0xb7/0xc0 [ 23.256537] __kmalloc_cache_noprof+0x189/0x420 [ 23.257542] kasan_atomics+0x95/0x310 [ 23.257959] kunit_try_run_case+0x1a5/0x480 [ 23.258519] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.259126] kthread+0x337/0x6f0 [ 23.259593] ret_from_fork+0x116/0x1d0 [ 23.260001] ret_from_fork_asm+0x1a/0x30 [ 23.260424] [ 23.260657] The buggy address belongs to the object at ffff888102b73d80 [ 23.260657] which belongs to the cache kmalloc-64 of size 64 [ 23.261533] The buggy address is located 0 bytes to the right of [ 23.261533] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 23.262483] [ 23.262683] The buggy address belongs to the physical page: [ 23.263134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 23.263928] flags: 0x200000000000000(node=0|zone=2) [ 23.264411] page_type: f5(slab) [ 23.264966] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.265647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.266249] page dumped because: kasan: bad access detected [ 23.266621] [ 23.266974] Memory state around the buggy address: [ 23.267436] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.268198] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.268834] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.269334] ^ [ 23.270086] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.270690] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.271491] ================================================================== [ 22.408758] ================================================================== [ 22.409850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 22.410680] Read of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 22.411777] [ 22.412016] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 22.412145] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.412185] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.412248] Call Trace: [ 22.412290] <TASK> [ 22.412358] dump_stack_lvl+0x73/0xb0 [ 22.412478] print_report+0xd1/0x650 [ 22.412604] ? __virt_addr_valid+0x1db/0x2d0 [ 22.412691] ? kasan_atomics_helper+0x4bbc/0x5450 [ 22.412763] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.412833] ? kasan_atomics_helper+0x4bbc/0x5450 [ 22.412905] kasan_report+0x141/0x180 [ 22.413002] ? kasan_atomics_helper+0x4bbc/0x5450 [ 22.413111] __asan_report_load4_noabort+0x18/0x20 [ 22.413150] kasan_atomics_helper+0x4bbc/0x5450 [ 22.413186] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.413238] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.413297] ? kasan_atomics+0x152/0x310 [ 22.413333] kasan_atomics+0x1dc/0x310 [ 22.413360] ? __pfx_kasan_atomics+0x10/0x10 [ 22.413392] ? __pfx_read_tsc+0x10/0x10 [ 22.413423] ? ktime_get_ts64+0x86/0x230 [ 22.413459] kunit_try_run_case+0x1a5/0x480 [ 22.413489] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.413516] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.413553] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.413589] ? __kthread_parkme+0x82/0x180 [ 22.413617] ? preempt_count_sub+0x50/0x80 [ 22.413692] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.413727] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.413766] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.413802] kthread+0x337/0x6f0 [ 22.413829] ? trace_preempt_on+0x20/0xc0 [ 22.413864] ? __pfx_kthread+0x10/0x10 [ 22.413893] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.413954] ? calculate_sigpending+0x7b/0xa0 [ 22.413993] ? __pfx_kthread+0x10/0x10 [ 22.414024] ret_from_fork+0x116/0x1d0 [ 22.414050] ? __pfx_kthread+0x10/0x10 [ 22.414078] ret_from_fork_asm+0x1a/0x30 [ 22.414122] </TASK> [ 22.414140] [ 22.429321] Allocated by task 282: [ 22.429774] kasan_save_stack+0x45/0x70 [ 22.430215] kasan_save_track+0x18/0x40 [ 22.430536] kasan_save_alloc_info+0x3b/0x50 [ 22.431229] __kasan_kmalloc+0xb7/0xc0 [ 22.431685] __kmalloc_cache_noprof+0x189/0x420 [ 22.432303] kasan_atomics+0x95/0x310 [ 22.432698] kunit_try_run_case+0x1a5/0x480 [ 22.433175] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.433728] kthread+0x337/0x6f0 [ 22.434103] ret_from_fork+0x116/0x1d0 [ 22.434431] ret_from_fork_asm+0x1a/0x30 [ 22.434840] [ 22.435100] The buggy address belongs to the object at ffff888102b73d80 [ 22.435100] which belongs to the cache kmalloc-64 of size 64 [ 22.436154] The buggy address is located 0 bytes to the right of [ 22.436154] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 22.437440] [ 22.437680] The buggy address belongs to the physical page: [ 22.438164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 22.438828] flags: 0x200000000000000(node=0|zone=2) [ 22.439332] page_type: f5(slab) [ 22.439626] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.440347] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.441355] page dumped because: kasan: bad access detected [ 22.441897] [ 22.442104] Memory state around the buggy address: [ 22.442453] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.443032] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.443647] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.444771] ^ [ 22.445434] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.446197] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.446902] ================================================================== [ 22.769148] ================================================================== [ 22.769852] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 22.771301] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 22.772082] [ 22.772372] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 22.772544] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.772620] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.772704] Call Trace: [ 22.772763] <TASK> [ 22.772823] dump_stack_lvl+0x73/0xb0 [ 22.772977] print_report+0xd1/0x650 [ 22.773064] ? __virt_addr_valid+0x1db/0x2d0 [ 22.773153] ? kasan_atomics_helper+0x565/0x5450 [ 22.773229] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.773313] ? kasan_atomics_helper+0x565/0x5450 [ 22.773394] kasan_report+0x141/0x180 [ 22.773477] ? kasan_atomics_helper+0x565/0x5450 [ 22.773607] kasan_check_range+0x10c/0x1c0 [ 22.773717] __kasan_check_write+0x18/0x20 [ 22.773836] kasan_atomics_helper+0x565/0x5450 [ 22.773942] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.774032] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.774112] ? kasan_atomics+0x152/0x310 [ 22.774182] kasan_atomics+0x1dc/0x310 [ 22.774215] ? __pfx_kasan_atomics+0x10/0x10 [ 22.774260] ? __pfx_read_tsc+0x10/0x10 [ 22.774295] ? ktime_get_ts64+0x86/0x230 [ 22.774333] kunit_try_run_case+0x1a5/0x480 [ 22.774368] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.774398] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.774439] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.774478] ? __kthread_parkme+0x82/0x180 [ 22.774510] ? preempt_count_sub+0x50/0x80 [ 22.774546] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.774578] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.774614] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.774687] kthread+0x337/0x6f0 [ 22.774718] ? trace_preempt_on+0x20/0xc0 [ 22.774752] ? __pfx_kthread+0x10/0x10 [ 22.774784] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.774818] ? calculate_sigpending+0x7b/0xa0 [ 22.774854] ? __pfx_kthread+0x10/0x10 [ 22.774885] ret_from_fork+0x116/0x1d0 [ 22.774942] ? __pfx_kthread+0x10/0x10 [ 22.774976] ret_from_fork_asm+0x1a/0x30 [ 22.775022] </TASK> [ 22.775038] [ 22.791123] Allocated by task 282: [ 22.791566] kasan_save_stack+0x45/0x70 [ 22.792462] kasan_save_track+0x18/0x40 [ 22.794374] kasan_save_alloc_info+0x3b/0x50 [ 22.795799] __kasan_kmalloc+0xb7/0xc0 [ 22.796142] __kmalloc_cache_noprof+0x189/0x420 [ 22.796455] kasan_atomics+0x95/0x310 [ 22.796611] kunit_try_run_case+0x1a5/0x480 [ 22.798029] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.798841] kthread+0x337/0x6f0 [ 22.799215] ret_from_fork+0x116/0x1d0 [ 22.799531] ret_from_fork_asm+0x1a/0x30 [ 22.800466] [ 22.801025] The buggy address belongs to the object at ffff888102b73d80 [ 22.801025] which belongs to the cache kmalloc-64 of size 64 [ 22.802115] The buggy address is located 0 bytes to the right of [ 22.802115] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 22.804137] [ 22.804376] The buggy address belongs to the physical page: [ 22.805154] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 22.806004] flags: 0x200000000000000(node=0|zone=2) [ 22.806599] page_type: f5(slab) [ 22.807254] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.807878] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.808723] page dumped because: kasan: bad access detected [ 22.809204] [ 22.809417] Memory state around the buggy address: [ 22.810298] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.810812] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.811531] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.812280] ^ [ 22.812927] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.813667] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.814212] ================================================================== [ 23.893827] ================================================================== [ 23.894566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 23.895375] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 23.896589] [ 23.897262] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 23.897394] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.897745] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.897782] Call Trace: [ 23.897806] <TASK> [ 23.897830] dump_stack_lvl+0x73/0xb0 [ 23.897898] print_report+0xd1/0x650 [ 23.897938] ? __virt_addr_valid+0x1db/0x2d0 [ 23.897974] ? kasan_atomics_helper+0x12e6/0x5450 [ 23.898008] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.898042] ? kasan_atomics_helper+0x12e6/0x5450 [ 23.898076] kasan_report+0x141/0x180 [ 23.898109] ? kasan_atomics_helper+0x12e6/0x5450 [ 23.898149] kasan_check_range+0x10c/0x1c0 [ 23.898211] __kasan_check_write+0x18/0x20 [ 23.898257] kasan_atomics_helper+0x12e6/0x5450 [ 23.898291] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.898324] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.898356] ? kasan_atomics+0x152/0x310 [ 23.898387] kasan_atomics+0x1dc/0x310 [ 23.898415] ? __pfx_kasan_atomics+0x10/0x10 [ 23.898444] ? __pfx_read_tsc+0x10/0x10 [ 23.898477] ? ktime_get_ts64+0x86/0x230 [ 23.898513] kunit_try_run_case+0x1a5/0x480 [ 23.898544] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.898573] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.898649] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.898689] ? __kthread_parkme+0x82/0x180 [ 23.898722] ? preempt_count_sub+0x50/0x80 [ 23.898756] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.898788] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.898824] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.898860] kthread+0x337/0x6f0 [ 23.898918] ? trace_preempt_on+0x20/0xc0 [ 23.898954] ? __pfx_kthread+0x10/0x10 [ 23.898984] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.899019] ? calculate_sigpending+0x7b/0xa0 [ 23.899055] ? __pfx_kthread+0x10/0x10 [ 23.899087] ret_from_fork+0x116/0x1d0 [ 23.899113] ? __pfx_kthread+0x10/0x10 [ 23.899144] ret_from_fork_asm+0x1a/0x30 [ 23.899189] </TASK> [ 23.899205] [ 23.916520] Allocated by task 282: [ 23.916901] kasan_save_stack+0x45/0x70 [ 23.917738] kasan_save_track+0x18/0x40 [ 23.918295] kasan_save_alloc_info+0x3b/0x50 [ 23.918765] __kasan_kmalloc+0xb7/0xc0 [ 23.919376] __kmalloc_cache_noprof+0x189/0x420 [ 23.919932] kasan_atomics+0x95/0x310 [ 23.920323] kunit_try_run_case+0x1a5/0x480 [ 23.921006] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.921826] kthread+0x337/0x6f0 [ 23.922217] ret_from_fork+0x116/0x1d0 [ 23.922646] ret_from_fork_asm+0x1a/0x30 [ 23.923275] [ 23.923525] The buggy address belongs to the object at ffff888102b73d80 [ 23.923525] which belongs to the cache kmalloc-64 of size 64 [ 23.924937] The buggy address is located 0 bytes to the right of [ 23.924937] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 23.926121] [ 23.926362] The buggy address belongs to the physical page: [ 23.927026] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 23.927838] flags: 0x200000000000000(node=0|zone=2) [ 23.928361] page_type: f5(slab) [ 23.928710] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.929289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.929837] page dumped because: kasan: bad access detected [ 23.930427] [ 23.930782] Memory state around the buggy address: [ 23.931151] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.931994] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.932773] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.933319] ^ [ 23.933987] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.934713] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.935434] ================================================================== [ 23.451773] ================================================================== [ 23.453430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 23.455094] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 23.455914] [ 23.456680] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 23.456753] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.456775] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.456809] Call Trace: [ 23.456835] <TASK> [ 23.456858] dump_stack_lvl+0x73/0xb0 [ 23.456925] print_report+0xd1/0x650 [ 23.456963] ? __virt_addr_valid+0x1db/0x2d0 [ 23.456996] ? kasan_atomics_helper+0xe78/0x5450 [ 23.457030] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.457063] ? kasan_atomics_helper+0xe78/0x5450 [ 23.457094] kasan_report+0x141/0x180 [ 23.457128] ? kasan_atomics_helper+0xe78/0x5450 [ 23.457166] kasan_check_range+0x10c/0x1c0 [ 23.457201] __kasan_check_write+0x18/0x20 [ 23.457231] kasan_atomics_helper+0xe78/0x5450 [ 23.457265] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.457300] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.457330] ? kasan_atomics+0x152/0x310 [ 23.457361] kasan_atomics+0x1dc/0x310 [ 23.457389] ? __pfx_kasan_atomics+0x10/0x10 [ 23.457419] ? __pfx_read_tsc+0x10/0x10 [ 23.457451] ? ktime_get_ts64+0x86/0x230 [ 23.457487] kunit_try_run_case+0x1a5/0x480 [ 23.457517] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.457546] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.457584] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.457648] ? __kthread_parkme+0x82/0x180 [ 23.457687] ? preempt_count_sub+0x50/0x80 [ 23.457723] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.457755] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.457793] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.457831] kthread+0x337/0x6f0 [ 23.457859] ? trace_preempt_on+0x20/0xc0 [ 23.457919] ? __pfx_kthread+0x10/0x10 [ 23.457954] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.457990] ? calculate_sigpending+0x7b/0xa0 [ 23.458026] ? __pfx_kthread+0x10/0x10 [ 23.458057] ret_from_fork+0x116/0x1d0 [ 23.458086] ? __pfx_kthread+0x10/0x10 [ 23.458117] ret_from_fork_asm+0x1a/0x30 [ 23.458161] </TASK> [ 23.458177] [ 23.477679] Allocated by task 282: [ 23.478278] kasan_save_stack+0x45/0x70 [ 23.478695] kasan_save_track+0x18/0x40 [ 23.479592] kasan_save_alloc_info+0x3b/0x50 [ 23.480189] __kasan_kmalloc+0xb7/0xc0 [ 23.480608] __kmalloc_cache_noprof+0x189/0x420 [ 23.481358] kasan_atomics+0x95/0x310 [ 23.481985] kunit_try_run_case+0x1a5/0x480 [ 23.482570] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.483021] kthread+0x337/0x6f0 [ 23.483401] ret_from_fork+0x116/0x1d0 [ 23.484188] ret_from_fork_asm+0x1a/0x30 [ 23.484492] [ 23.484722] The buggy address belongs to the object at ffff888102b73d80 [ 23.484722] which belongs to the cache kmalloc-64 of size 64 [ 23.486188] The buggy address is located 0 bytes to the right of [ 23.486188] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 23.487591] [ 23.487805] The buggy address belongs to the physical page: [ 23.488616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 23.489462] flags: 0x200000000000000(node=0|zone=2) [ 23.489985] page_type: f5(slab) [ 23.490256] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.491212] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.492026] page dumped because: kasan: bad access detected [ 23.492593] [ 23.492854] Memory state around the buggy address: [ 23.493469] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.494329] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.494907] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.495516] ^ [ 23.496258] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.496969] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.497807] ================================================================== [ 25.085165] ================================================================== [ 25.086871] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 25.087488] Read of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 25.088095] [ 25.088358] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 25.088462] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.088483] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.088515] Call Trace: [ 25.088538] <TASK> [ 25.088569] dump_stack_lvl+0x73/0xb0 [ 25.089393] print_report+0xd1/0x650 [ 25.089431] ? __virt_addr_valid+0x1db/0x2d0 [ 25.089470] ? kasan_atomics_helper+0x4f98/0x5450 [ 25.089504] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.089537] ? kasan_atomics_helper+0x4f98/0x5450 [ 25.089590] kasan_report+0x141/0x180 [ 25.089640] ? kasan_atomics_helper+0x4f98/0x5450 [ 25.089680] __asan_report_load8_noabort+0x18/0x20 [ 25.089711] kasan_atomics_helper+0x4f98/0x5450 [ 25.089744] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.089779] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.089811] ? kasan_atomics+0x152/0x310 [ 25.089867] kasan_atomics+0x1dc/0x310 [ 25.089901] ? __pfx_kasan_atomics+0x10/0x10 [ 25.089932] ? __pfx_read_tsc+0x10/0x10 [ 25.089963] ? ktime_get_ts64+0x86/0x230 [ 25.090000] kunit_try_run_case+0x1a5/0x480 [ 25.090032] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.090061] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.090099] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.090136] ? __kthread_parkme+0x82/0x180 [ 25.090168] ? preempt_count_sub+0x50/0x80 [ 25.090201] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.090243] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.090281] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.090318] kthread+0x337/0x6f0 [ 25.090346] ? trace_preempt_on+0x20/0xc0 [ 25.090380] ? __pfx_kthread+0x10/0x10 [ 25.090410] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.090444] ? calculate_sigpending+0x7b/0xa0 [ 25.090480] ? __pfx_kthread+0x10/0x10 [ 25.090510] ret_from_fork+0x116/0x1d0 [ 25.090536] ? __pfx_kthread+0x10/0x10 [ 25.090584] ret_from_fork_asm+0x1a/0x30 [ 25.090641] </TASK> [ 25.090657] [ 25.107918] Allocated by task 282: [ 25.108280] kasan_save_stack+0x45/0x70 [ 25.108785] kasan_save_track+0x18/0x40 [ 25.109139] kasan_save_alloc_info+0x3b/0x50 [ 25.109647] __kasan_kmalloc+0xb7/0xc0 [ 25.111612] __kmalloc_cache_noprof+0x189/0x420 [ 25.111990] kasan_atomics+0x95/0x310 [ 25.112531] kunit_try_run_case+0x1a5/0x480 [ 25.113252] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.114040] kthread+0x337/0x6f0 [ 25.114572] ret_from_fork+0x116/0x1d0 [ 25.115167] ret_from_fork_asm+0x1a/0x30 [ 25.115599] [ 25.116094] The buggy address belongs to the object at ffff888102b73d80 [ 25.116094] which belongs to the cache kmalloc-64 of size 64 [ 25.117236] The buggy address is located 0 bytes to the right of [ 25.117236] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 25.118836] [ 25.119184] The buggy address belongs to the physical page: [ 25.119445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 25.120523] flags: 0x200000000000000(node=0|zone=2) [ 25.121255] page_type: f5(slab) [ 25.121604] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.122566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.123377] page dumped because: kasan: bad access detected [ 25.123859] [ 25.124419] Memory state around the buggy address: [ 25.124930] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.125519] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.126459] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.127235] ^ [ 25.127890] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.128695] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.129258] ================================================================== [ 23.044749] ================================================================== [ 23.045501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 23.046347] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 23.047922] [ 23.048117] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 23.048187] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.048207] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.048241] Call Trace: [ 23.048265] <TASK> [ 23.048288] dump_stack_lvl+0x73/0xb0 [ 23.048328] print_report+0xd1/0x650 [ 23.048363] ? __virt_addr_valid+0x1db/0x2d0 [ 23.048398] ? kasan_atomics_helper+0x8f9/0x5450 [ 23.048431] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.048465] ? kasan_atomics_helper+0x8f9/0x5450 [ 23.048498] kasan_report+0x141/0x180 [ 23.048531] ? kasan_atomics_helper+0x8f9/0x5450 [ 23.048569] kasan_check_range+0x10c/0x1c0 [ 23.048605] __kasan_check_write+0x18/0x20 [ 23.048666] kasan_atomics_helper+0x8f9/0x5450 [ 23.048706] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.048740] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.048772] ? kasan_atomics+0x152/0x310 [ 23.048806] kasan_atomics+0x1dc/0x310 [ 23.048834] ? __pfx_kasan_atomics+0x10/0x10 [ 23.048864] ? __pfx_read_tsc+0x10/0x10 [ 23.048919] ? ktime_get_ts64+0x86/0x230 [ 23.048960] kunit_try_run_case+0x1a5/0x480 [ 23.048994] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.049026] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.049064] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.049102] ? __kthread_parkme+0x82/0x180 [ 23.049133] ? preempt_count_sub+0x50/0x80 [ 23.049168] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.049199] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.049236] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.049274] kthread+0x337/0x6f0 [ 23.049303] ? trace_preempt_on+0x20/0xc0 [ 23.049337] ? __pfx_kthread+0x10/0x10 [ 23.049369] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.049404] ? calculate_sigpending+0x7b/0xa0 [ 23.049440] ? __pfx_kthread+0x10/0x10 [ 23.049472] ret_from_fork+0x116/0x1d0 [ 23.049499] ? __pfx_kthread+0x10/0x10 [ 23.049529] ret_from_fork_asm+0x1a/0x30 [ 23.049573] </TASK> [ 23.049590] [ 23.070192] Allocated by task 282: [ 23.070494] kasan_save_stack+0x45/0x70 [ 23.071742] kasan_save_track+0x18/0x40 [ 23.072332] kasan_save_alloc_info+0x3b/0x50 [ 23.073047] __kasan_kmalloc+0xb7/0xc0 [ 23.073885] __kmalloc_cache_noprof+0x189/0x420 [ 23.074359] kasan_atomics+0x95/0x310 [ 23.074817] kunit_try_run_case+0x1a5/0x480 [ 23.075272] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.076016] kthread+0x337/0x6f0 [ 23.076370] ret_from_fork+0x116/0x1d0 [ 23.077171] ret_from_fork_asm+0x1a/0x30 [ 23.078145] [ 23.078810] The buggy address belongs to the object at ffff888102b73d80 [ 23.078810] which belongs to the cache kmalloc-64 of size 64 [ 23.079831] The buggy address is located 0 bytes to the right of [ 23.079831] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 23.081058] [ 23.081309] The buggy address belongs to the physical page: [ 23.081867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 23.082864] flags: 0x200000000000000(node=0|zone=2) [ 23.083415] page_type: f5(slab) [ 23.084172] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.085330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.086280] page dumped because: kasan: bad access detected [ 23.086875] [ 23.087044] Memory state around the buggy address: [ 23.087512] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.088198] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.089212] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.089834] ^ [ 23.090293] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.090880] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.092008] ================================================================== [ 23.587816] ================================================================== [ 23.588863] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 23.589668] Read of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 23.590420] [ 23.590623] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 23.590734] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.590775] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.590839] Call Trace: [ 23.590909] <TASK> [ 23.590966] dump_stack_lvl+0x73/0xb0 [ 23.591049] print_report+0xd1/0x650 [ 23.591130] ? __virt_addr_valid+0x1db/0x2d0 [ 23.591207] ? kasan_atomics_helper+0x4a36/0x5450 [ 23.591280] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.591361] ? kasan_atomics_helper+0x4a36/0x5450 [ 23.591440] kasan_report+0x141/0x180 [ 23.591567] ? kasan_atomics_helper+0x4a36/0x5450 [ 23.591687] __asan_report_load4_noabort+0x18/0x20 [ 23.591771] kasan_atomics_helper+0x4a36/0x5450 [ 23.591856] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.592002] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.592082] ? kasan_atomics+0x152/0x310 [ 23.592165] kasan_atomics+0x1dc/0x310 [ 23.592281] ? __pfx_kasan_atomics+0x10/0x10 [ 23.592368] ? __pfx_read_tsc+0x10/0x10 [ 23.592445] ? ktime_get_ts64+0x86/0x230 [ 23.592531] kunit_try_run_case+0x1a5/0x480 [ 23.592657] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.592733] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.592816] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.592924] ? __kthread_parkme+0x82/0x180 [ 23.593049] ? preempt_count_sub+0x50/0x80 [ 23.593144] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.593225] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.593347] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.593443] kthread+0x337/0x6f0 [ 23.593518] ? trace_preempt_on+0x20/0xc0 [ 23.593603] ? __pfx_kthread+0x10/0x10 [ 23.593738] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.593827] ? calculate_sigpending+0x7b/0xa0 [ 23.593934] ? __pfx_kthread+0x10/0x10 [ 23.594054] ret_from_fork+0x116/0x1d0 [ 23.594135] ? __pfx_kthread+0x10/0x10 [ 23.594214] ret_from_fork_asm+0x1a/0x30 [ 23.594311] </TASK> [ 23.594331] [ 23.609505] Allocated by task 282: [ 23.609936] kasan_save_stack+0x45/0x70 [ 23.610287] kasan_save_track+0x18/0x40 [ 23.610659] kasan_save_alloc_info+0x3b/0x50 [ 23.611157] __kasan_kmalloc+0xb7/0xc0 [ 23.611584] __kmalloc_cache_noprof+0x189/0x420 [ 23.612362] kasan_atomics+0x95/0x310 [ 23.612871] kunit_try_run_case+0x1a5/0x480 [ 23.613354] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.613854] kthread+0x337/0x6f0 [ 23.614323] ret_from_fork+0x116/0x1d0 [ 23.614798] ret_from_fork_asm+0x1a/0x30 [ 23.615273] [ 23.615501] The buggy address belongs to the object at ffff888102b73d80 [ 23.615501] which belongs to the cache kmalloc-64 of size 64 [ 23.616460] The buggy address is located 0 bytes to the right of [ 23.616460] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 23.617315] [ 23.617512] The buggy address belongs to the physical page: [ 23.618432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 23.619200] flags: 0x200000000000000(node=0|zone=2) [ 23.619569] page_type: f5(slab) [ 23.619868] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.620612] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.621280] page dumped because: kasan: bad access detected [ 23.622070] [ 23.622358] Memory state around the buggy address: [ 23.622975] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.623460] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.624101] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.624907] ^ [ 23.625348] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.626105] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.626691] ================================================================== [ 25.177801] ================================================================== [ 25.178578] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 25.179329] Read of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 25.179988] [ 25.180281] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 25.180456] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.180525] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.180591] Call Trace: [ 25.180642] <TASK> [ 25.180692] dump_stack_lvl+0x73/0xb0 [ 25.180768] print_report+0xd1/0x650 [ 25.180825] ? __virt_addr_valid+0x1db/0x2d0 [ 25.180926] ? kasan_atomics_helper+0x4fb2/0x5450 [ 25.181007] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.181090] ? kasan_atomics_helper+0x4fb2/0x5450 [ 25.181170] kasan_report+0x141/0x180 [ 25.181255] ? kasan_atomics_helper+0x4fb2/0x5450 [ 25.181344] __asan_report_load8_noabort+0x18/0x20 [ 25.181423] kasan_atomics_helper+0x4fb2/0x5450 [ 25.181506] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.181605] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.181730] ? kasan_atomics+0x152/0x310 [ 25.181816] kasan_atomics+0x1dc/0x310 [ 25.181911] ? __pfx_kasan_atomics+0x10/0x10 [ 25.181990] ? __pfx_read_tsc+0x10/0x10 [ 25.182064] ? ktime_get_ts64+0x86/0x230 [ 25.182147] kunit_try_run_case+0x1a5/0x480 [ 25.182234] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.182311] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.182367] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.182408] ? __kthread_parkme+0x82/0x180 [ 25.182441] ? preempt_count_sub+0x50/0x80 [ 25.182475] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.182506] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.182545] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.182621] kthread+0x337/0x6f0 [ 25.182655] ? trace_preempt_on+0x20/0xc0 [ 25.182690] ? __pfx_kthread+0x10/0x10 [ 25.182721] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.182757] ? calculate_sigpending+0x7b/0xa0 [ 25.182793] ? __pfx_kthread+0x10/0x10 [ 25.182826] ret_from_fork+0x116/0x1d0 [ 25.182880] ? __pfx_kthread+0x10/0x10 [ 25.182912] ret_from_fork_asm+0x1a/0x30 [ 25.182957] </TASK> [ 25.182974] [ 25.197824] Allocated by task 282: [ 25.198263] kasan_save_stack+0x45/0x70 [ 25.198908] kasan_save_track+0x18/0x40 [ 25.199242] kasan_save_alloc_info+0x3b/0x50 [ 25.199582] __kasan_kmalloc+0xb7/0xc0 [ 25.200006] __kmalloc_cache_noprof+0x189/0x420 [ 25.200773] kasan_atomics+0x95/0x310 [ 25.201230] kunit_try_run_case+0x1a5/0x480 [ 25.201785] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.202369] kthread+0x337/0x6f0 [ 25.202874] ret_from_fork+0x116/0x1d0 [ 25.203334] ret_from_fork_asm+0x1a/0x30 [ 25.203674] [ 25.204913] The buggy address belongs to the object at ffff888102b73d80 [ 25.204913] which belongs to the cache kmalloc-64 of size 64 [ 25.206913] The buggy address is located 0 bytes to the right of [ 25.206913] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 25.207914] [ 25.208168] The buggy address belongs to the physical page: [ 25.208643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 25.209339] flags: 0x200000000000000(node=0|zone=2) [ 25.209867] page_type: f5(slab) [ 25.210265] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.210987] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.211720] page dumped because: kasan: bad access detected [ 25.212216] [ 25.212493] Memory state around the buggy address: [ 25.212953] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.213654] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.214293] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.214945] ^ [ 25.215439] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.216088] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.216794] ================================================================== [ 24.321036] ================================================================== [ 24.322073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 24.322936] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 24.323911] [ 24.324196] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 24.324289] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.324333] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.324399] Call Trace: [ 24.324453] <TASK> [ 24.324481] dump_stack_lvl+0x73/0xb0 [ 24.324525] print_report+0xd1/0x650 [ 24.324560] ? __virt_addr_valid+0x1db/0x2d0 [ 24.324890] ? kasan_atomics_helper+0x16e7/0x5450 [ 24.324939] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.324978] ? kasan_atomics_helper+0x16e7/0x5450 [ 24.325011] kasan_report+0x141/0x180 [ 24.325046] ? kasan_atomics_helper+0x16e7/0x5450 [ 24.325085] kasan_check_range+0x10c/0x1c0 [ 24.325123] __kasan_check_write+0x18/0x20 [ 24.325154] kasan_atomics_helper+0x16e7/0x5450 [ 24.325187] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.325221] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.325255] ? kasan_atomics+0x152/0x310 [ 24.325288] kasan_atomics+0x1dc/0x310 [ 24.325316] ? __pfx_kasan_atomics+0x10/0x10 [ 24.325345] ? __pfx_read_tsc+0x10/0x10 [ 24.325378] ? ktime_get_ts64+0x86/0x230 [ 24.325413] kunit_try_run_case+0x1a5/0x480 [ 24.325445] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.325474] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.325511] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.325548] ? __kthread_parkme+0x82/0x180 [ 24.325584] ? preempt_count_sub+0x50/0x80 [ 24.325658] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.325691] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.325730] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.325768] kthread+0x337/0x6f0 [ 24.325797] ? trace_preempt_on+0x20/0xc0 [ 24.325831] ? __pfx_kthread+0x10/0x10 [ 24.325885] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.325925] ? calculate_sigpending+0x7b/0xa0 [ 24.325962] ? __pfx_kthread+0x10/0x10 [ 24.325995] ret_from_fork+0x116/0x1d0 [ 24.326023] ? __pfx_kthread+0x10/0x10 [ 24.326055] ret_from_fork_asm+0x1a/0x30 [ 24.326099] </TASK> [ 24.326116] [ 24.344072] Allocated by task 282: [ 24.344447] kasan_save_stack+0x45/0x70 [ 24.344963] kasan_save_track+0x18/0x40 [ 24.345446] kasan_save_alloc_info+0x3b/0x50 [ 24.345964] __kasan_kmalloc+0xb7/0xc0 [ 24.346432] __kmalloc_cache_noprof+0x189/0x420 [ 24.347009] kasan_atomics+0x95/0x310 [ 24.347461] kunit_try_run_case+0x1a5/0x480 [ 24.348016] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.348410] kthread+0x337/0x6f0 [ 24.348752] ret_from_fork+0x116/0x1d0 [ 24.349157] ret_from_fork_asm+0x1a/0x30 [ 24.349771] [ 24.350144] The buggy address belongs to the object at ffff888102b73d80 [ 24.350144] which belongs to the cache kmalloc-64 of size 64 [ 24.351413] The buggy address is located 0 bytes to the right of [ 24.351413] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 24.352657] [ 24.352851] The buggy address belongs to the physical page: [ 24.353248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 24.354240] flags: 0x200000000000000(node=0|zone=2) [ 24.354886] page_type: f5(slab) [ 24.355275] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.356102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.356918] page dumped because: kasan: bad access detected [ 24.357490] [ 24.357770] Memory state around the buggy address: [ 24.358347] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.359089] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.359635] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.360403] ^ [ 24.360917] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.361655] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.362331] ================================================================== [ 23.938150] ================================================================== [ 23.938953] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 23.939585] Read of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 23.940282] [ 23.940667] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 23.940995] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.941044] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.941112] Call Trace: [ 23.941169] <TASK> [ 23.941224] dump_stack_lvl+0x73/0xb0 [ 23.941312] print_report+0xd1/0x650 [ 23.941393] ? __virt_addr_valid+0x1db/0x2d0 [ 23.941468] ? kasan_atomics_helper+0x49ce/0x5450 [ 23.941506] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.941544] ? kasan_atomics_helper+0x49ce/0x5450 [ 23.941580] kasan_report+0x141/0x180 [ 23.941655] ? kasan_atomics_helper+0x49ce/0x5450 [ 23.941702] __asan_report_load4_noabort+0x18/0x20 [ 23.941734] kasan_atomics_helper+0x49ce/0x5450 [ 23.941769] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.941806] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.941837] ? kasan_atomics+0x152/0x310 [ 23.941892] kasan_atomics+0x1dc/0x310 [ 23.941930] ? __pfx_kasan_atomics+0x10/0x10 [ 23.941962] ? __pfx_read_tsc+0x10/0x10 [ 23.941996] ? ktime_get_ts64+0x86/0x230 [ 23.942034] kunit_try_run_case+0x1a5/0x480 [ 23.942066] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.942095] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.942134] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.942173] ? __kthread_parkme+0x82/0x180 [ 23.942204] ? preempt_count_sub+0x50/0x80 [ 23.942253] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.942286] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.942324] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.942362] kthread+0x337/0x6f0 [ 23.942390] ? trace_preempt_on+0x20/0xc0 [ 23.942424] ? __pfx_kthread+0x10/0x10 [ 23.942454] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.942488] ? calculate_sigpending+0x7b/0xa0 [ 23.942524] ? __pfx_kthread+0x10/0x10 [ 23.942555] ret_from_fork+0x116/0x1d0 [ 23.942581] ? __pfx_kthread+0x10/0x10 [ 23.942645] ret_from_fork_asm+0x1a/0x30 [ 23.942695] </TASK> [ 23.942712] [ 23.966588] Allocated by task 282: [ 23.967718] kasan_save_stack+0x45/0x70 [ 23.968136] kasan_save_track+0x18/0x40 [ 23.968745] kasan_save_alloc_info+0x3b/0x50 [ 23.969176] __kasan_kmalloc+0xb7/0xc0 [ 23.969561] __kmalloc_cache_noprof+0x189/0x420 [ 23.970307] kasan_atomics+0x95/0x310 [ 23.970937] kunit_try_run_case+0x1a5/0x480 [ 23.971515] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.972003] kthread+0x337/0x6f0 [ 23.972348] ret_from_fork+0x116/0x1d0 [ 23.973110] ret_from_fork_asm+0x1a/0x30 [ 23.973601] [ 23.973865] The buggy address belongs to the object at ffff888102b73d80 [ 23.973865] which belongs to the cache kmalloc-64 of size 64 [ 23.974954] The buggy address is located 0 bytes to the right of [ 23.974954] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 23.976335] [ 23.976746] The buggy address belongs to the physical page: [ 23.977375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 23.978310] flags: 0x200000000000000(node=0|zone=2) [ 23.978926] page_type: f5(slab) [ 23.979288] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.980127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.980912] page dumped because: kasan: bad access detected [ 23.981557] [ 23.981811] Memory state around the buggy address: [ 23.982594] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.983226] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.983998] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.984499] ^ [ 23.985300] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.985888] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.986608] ================================================================== [ 24.083007] ================================================================== [ 24.083515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 24.085761] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 24.087022] [ 24.087828] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 24.088201] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.088257] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.088301] Call Trace: [ 24.088329] <TASK> [ 24.088354] dump_stack_lvl+0x73/0xb0 [ 24.088397] print_report+0xd1/0x650 [ 24.088431] ? __virt_addr_valid+0x1db/0x2d0 [ 24.088465] ? kasan_atomics_helper+0x1467/0x5450 [ 24.088497] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.088530] ? kasan_atomics_helper+0x1467/0x5450 [ 24.088563] kasan_report+0x141/0x180 [ 24.088655] ? kasan_atomics_helper+0x1467/0x5450 [ 24.088701] kasan_check_range+0x10c/0x1c0 [ 24.088738] __kasan_check_write+0x18/0x20 [ 24.088768] kasan_atomics_helper+0x1467/0x5450 [ 24.088802] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.088837] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.088891] ? kasan_atomics+0x152/0x310 [ 24.088930] kasan_atomics+0x1dc/0x310 [ 24.088958] ? __pfx_kasan_atomics+0x10/0x10 [ 24.088989] ? __pfx_read_tsc+0x10/0x10 [ 24.089022] ? ktime_get_ts64+0x86/0x230 [ 24.089061] kunit_try_run_case+0x1a5/0x480 [ 24.089092] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.089121] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.089159] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.089197] ? __kthread_parkme+0x82/0x180 [ 24.089227] ? preempt_count_sub+0x50/0x80 [ 24.089262] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.089293] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.089331] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.089368] kthread+0x337/0x6f0 [ 24.089397] ? trace_preempt_on+0x20/0xc0 [ 24.089431] ? __pfx_kthread+0x10/0x10 [ 24.089462] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.089497] ? calculate_sigpending+0x7b/0xa0 [ 24.089533] ? __pfx_kthread+0x10/0x10 [ 24.089565] ret_from_fork+0x116/0x1d0 [ 24.089601] ? __pfx_kthread+0x10/0x10 [ 24.089657] ret_from_fork_asm+0x1a/0x30 [ 24.089704] </TASK> [ 24.089721] [ 24.110066] Allocated by task 282: [ 24.110423] kasan_save_stack+0x45/0x70 [ 24.110933] kasan_save_track+0x18/0x40 [ 24.111551] kasan_save_alloc_info+0x3b/0x50 [ 24.112210] __kasan_kmalloc+0xb7/0xc0 [ 24.112534] __kmalloc_cache_noprof+0x189/0x420 [ 24.113093] kasan_atomics+0x95/0x310 [ 24.113613] kunit_try_run_case+0x1a5/0x480 [ 24.114160] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.114922] kthread+0x337/0x6f0 [ 24.115212] ret_from_fork+0x116/0x1d0 [ 24.115514] ret_from_fork_asm+0x1a/0x30 [ 24.116103] [ 24.116263] The buggy address belongs to the object at ffff888102b73d80 [ 24.116263] which belongs to the cache kmalloc-64 of size 64 [ 24.117310] The buggy address is located 0 bytes to the right of [ 24.117310] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 24.118320] [ 24.118575] The buggy address belongs to the physical page: [ 24.119124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 24.119702] flags: 0x200000000000000(node=0|zone=2) [ 24.120295] page_type: f5(slab) [ 24.120792] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.121519] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.122270] page dumped because: kasan: bad access detected [ 24.122797] [ 24.123054] Memory state around the buggy address: [ 24.123395] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.124125] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.124897] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.125520] ^ [ 24.126065] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.126819] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.127433] ================================================================== [ 24.501123] ================================================================== [ 24.502270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 24.503022] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 24.504224] [ 24.504487] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 24.504612] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.504732] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.504967] Call Trace: [ 24.505204] <TASK> [ 24.505415] dump_stack_lvl+0x73/0xb0 [ 24.505584] print_report+0xd1/0x650 [ 24.505671] ? __virt_addr_valid+0x1db/0x2d0 [ 24.505752] ? kasan_atomics_helper+0x194a/0x5450 [ 24.505828] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.505931] ? kasan_atomics_helper+0x194a/0x5450 [ 24.506011] kasan_report+0x141/0x180 [ 24.506091] ? kasan_atomics_helper+0x194a/0x5450 [ 24.506182] kasan_check_range+0x10c/0x1c0 [ 24.506279] __kasan_check_write+0x18/0x20 [ 24.506354] kasan_atomics_helper+0x194a/0x5450 [ 24.506436] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.506516] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.506590] ? kasan_atomics+0x152/0x310 [ 24.506669] kasan_atomics+0x1dc/0x310 [ 24.506738] ? __pfx_kasan_atomics+0x10/0x10 [ 24.506811] ? __pfx_read_tsc+0x10/0x10 [ 24.506958] ? ktime_get_ts64+0x86/0x230 [ 24.507047] kunit_try_run_case+0x1a5/0x480 [ 24.507130] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.507205] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.507294] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.507416] ? __kthread_parkme+0x82/0x180 [ 24.507498] ? preempt_count_sub+0x50/0x80 [ 24.507583] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.507847] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.507979] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.508068] kthread+0x337/0x6f0 [ 24.508142] ? trace_preempt_on+0x20/0xc0 [ 24.508212] ? __pfx_kthread+0x10/0x10 [ 24.508248] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.508284] ? calculate_sigpending+0x7b/0xa0 [ 24.508320] ? __pfx_kthread+0x10/0x10 [ 24.508353] ret_from_fork+0x116/0x1d0 [ 24.508380] ? __pfx_kthread+0x10/0x10 [ 24.508412] ret_from_fork_asm+0x1a/0x30 [ 24.508457] </TASK> [ 24.508475] [ 24.529431] Allocated by task 282: [ 24.529812] kasan_save_stack+0x45/0x70 [ 24.530472] kasan_save_track+0x18/0x40 [ 24.530905] kasan_save_alloc_info+0x3b/0x50 [ 24.531952] __kasan_kmalloc+0xb7/0xc0 [ 24.532295] __kmalloc_cache_noprof+0x189/0x420 [ 24.532714] kasan_atomics+0x95/0x310 [ 24.533374] kunit_try_run_case+0x1a5/0x480 [ 24.533944] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.534457] kthread+0x337/0x6f0 [ 24.535073] ret_from_fork+0x116/0x1d0 [ 24.535441] ret_from_fork_asm+0x1a/0x30 [ 24.535805] [ 24.536069] The buggy address belongs to the object at ffff888102b73d80 [ 24.536069] which belongs to the cache kmalloc-64 of size 64 [ 24.537041] The buggy address is located 0 bytes to the right of [ 24.537041] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 24.537985] [ 24.538226] The buggy address belongs to the physical page: [ 24.538663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 24.539377] flags: 0x200000000000000(node=0|zone=2) [ 24.539918] page_type: f5(slab) [ 24.540252] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.540773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.541434] page dumped because: kasan: bad access detected [ 24.542087] [ 24.542291] Memory state around the buggy address: [ 24.542640] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.543327] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.544300] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.545017] ^ [ 24.545366] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.546375] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.546971] ================================================================== [ 25.266144] ================================================================== [ 25.267117] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 25.267938] Read of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 25.268533] [ 25.268812] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 25.268961] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.269009] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.269071] Call Trace: [ 25.269126] <TASK> [ 25.269177] dump_stack_lvl+0x73/0xb0 [ 25.269232] print_report+0xd1/0x650 [ 25.269283] ? __virt_addr_valid+0x1db/0x2d0 [ 25.269324] ? kasan_atomics_helper+0x4fa5/0x5450 [ 25.269394] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.269434] ? kasan_atomics_helper+0x4fa5/0x5450 [ 25.269470] kasan_report+0x141/0x180 [ 25.269504] ? kasan_atomics_helper+0x4fa5/0x5450 [ 25.269543] __asan_report_load8_noabort+0x18/0x20 [ 25.269910] kasan_atomics_helper+0x4fa5/0x5450 [ 25.270000] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.270051] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.270086] ? kasan_atomics+0x152/0x310 [ 25.270119] kasan_atomics+0x1dc/0x310 [ 25.270146] ? __pfx_kasan_atomics+0x10/0x10 [ 25.270177] ? __pfx_read_tsc+0x10/0x10 [ 25.270225] ? ktime_get_ts64+0x86/0x230 [ 25.270264] kunit_try_run_case+0x1a5/0x480 [ 25.270296] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.270326] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.270364] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.270402] ? __kthread_parkme+0x82/0x180 [ 25.270432] ? preempt_count_sub+0x50/0x80 [ 25.270467] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.270498] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.270536] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.270620] kthread+0x337/0x6f0 [ 25.270656] ? trace_preempt_on+0x20/0xc0 [ 25.270691] ? __pfx_kthread+0x10/0x10 [ 25.270722] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.270757] ? calculate_sigpending+0x7b/0xa0 [ 25.270792] ? __pfx_kthread+0x10/0x10 [ 25.270825] ret_from_fork+0x116/0x1d0 [ 25.270880] ? __pfx_kthread+0x10/0x10 [ 25.270918] ret_from_fork_asm+0x1a/0x30 [ 25.270962] </TASK> [ 25.270980] [ 25.294226] Allocated by task 282: [ 25.295147] kasan_save_stack+0x45/0x70 [ 25.295593] kasan_save_track+0x18/0x40 [ 25.296027] kasan_save_alloc_info+0x3b/0x50 [ 25.296451] __kasan_kmalloc+0xb7/0xc0 [ 25.296831] __kmalloc_cache_noprof+0x189/0x420 [ 25.297866] kasan_atomics+0x95/0x310 [ 25.298198] kunit_try_run_case+0x1a5/0x480 [ 25.298546] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.299609] kthread+0x337/0x6f0 [ 25.300095] ret_from_fork+0x116/0x1d0 [ 25.300635] ret_from_fork_asm+0x1a/0x30 [ 25.300948] [ 25.301190] The buggy address belongs to the object at ffff888102b73d80 [ 25.301190] which belongs to the cache kmalloc-64 of size 64 [ 25.302699] The buggy address is located 0 bytes to the right of [ 25.302699] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 25.303900] [ 25.304143] The buggy address belongs to the physical page: [ 25.304596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 25.305251] flags: 0x200000000000000(node=0|zone=2) [ 25.305653] page_type: f5(slab) [ 25.306615] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.307467] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.308154] page dumped because: kasan: bad access detected [ 25.308716] [ 25.308957] Memory state around the buggy address: [ 25.309566] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.310178] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.310778] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.311330] ^ [ 25.311788] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.312788] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.313487] ================================================================== [ 24.721732] ================================================================== [ 24.722970] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 24.723681] Read of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 24.724284] [ 24.724516] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 24.724644] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.724687] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.724750] Call Trace: [ 24.724801] <TASK> [ 24.724863] dump_stack_lvl+0x73/0xb0 [ 24.724952] print_report+0xd1/0x650 [ 24.725033] ? __virt_addr_valid+0x1db/0x2d0 [ 24.725112] ? kasan_atomics_helper+0x4f30/0x5450 [ 24.725191] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.725272] ? kasan_atomics_helper+0x4f30/0x5450 [ 24.725354] kasan_report+0x141/0x180 [ 24.725437] ? kasan_atomics_helper+0x4f30/0x5450 [ 24.725526] __asan_report_load8_noabort+0x18/0x20 [ 24.725655] kasan_atomics_helper+0x4f30/0x5450 [ 24.725748] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.725834] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.726782] ? kasan_atomics+0x152/0x310 [ 24.726896] kasan_atomics+0x1dc/0x310 [ 24.726978] ? __pfx_kasan_atomics+0x10/0x10 [ 24.727061] ? __pfx_read_tsc+0x10/0x10 [ 24.727137] ? ktime_get_ts64+0x86/0x230 [ 24.727225] kunit_try_run_case+0x1a5/0x480 [ 24.727268] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.727300] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.727338] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.727377] ? __kthread_parkme+0x82/0x180 [ 24.727409] ? preempt_count_sub+0x50/0x80 [ 24.727444] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.727476] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.727512] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.727549] kthread+0x337/0x6f0 [ 24.728030] ? trace_preempt_on+0x20/0xc0 [ 24.728150] ? __pfx_kthread+0x10/0x10 [ 24.728220] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.728260] ? calculate_sigpending+0x7b/0xa0 [ 24.728298] ? __pfx_kthread+0x10/0x10 [ 24.728331] ret_from_fork+0x116/0x1d0 [ 24.728359] ? __pfx_kthread+0x10/0x10 [ 24.728391] ret_from_fork_asm+0x1a/0x30 [ 24.728436] </TASK> [ 24.728451] [ 24.748215] Allocated by task 282: [ 24.748485] kasan_save_stack+0x45/0x70 [ 24.748795] kasan_save_track+0x18/0x40 [ 24.749344] kasan_save_alloc_info+0x3b/0x50 [ 24.751394] __kasan_kmalloc+0xb7/0xc0 [ 24.752142] __kmalloc_cache_noprof+0x189/0x420 [ 24.753151] kasan_atomics+0x95/0x310 [ 24.754002] kunit_try_run_case+0x1a5/0x480 [ 24.754335] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.755925] kthread+0x337/0x6f0 [ 24.756758] ret_from_fork+0x116/0x1d0 [ 24.757813] ret_from_fork_asm+0x1a/0x30 [ 24.758749] [ 24.759324] The buggy address belongs to the object at ffff888102b73d80 [ 24.759324] which belongs to the cache kmalloc-64 of size 64 [ 24.761132] The buggy address is located 0 bytes to the right of [ 24.761132] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 24.762387] [ 24.762677] The buggy address belongs to the physical page: [ 24.763319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 24.764062] flags: 0x200000000000000(node=0|zone=2) [ 24.764642] page_type: f5(slab) [ 24.765094] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.765868] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.766601] page dumped because: kasan: bad access detected [ 24.767147] [ 24.767468] Memory state around the buggy address: [ 24.768070] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.768758] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.769418] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.770123] ^ [ 24.770517] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.771068] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.771575] ================================================================== [ 25.218640] ================================================================== [ 25.219201] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 25.220901] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 25.221502] [ 25.221981] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 25.222348] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.222397] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.222479] Call Trace: [ 25.222532] <TASK> [ 25.222584] dump_stack_lvl+0x73/0xb0 [ 25.222671] print_report+0xd1/0x650 [ 25.222752] ? __virt_addr_valid+0x1db/0x2d0 [ 25.222883] ? kasan_atomics_helper+0x218a/0x5450 [ 25.222922] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.222959] ? kasan_atomics_helper+0x218a/0x5450 [ 25.222994] kasan_report+0x141/0x180 [ 25.223028] ? kasan_atomics_helper+0x218a/0x5450 [ 25.223067] kasan_check_range+0x10c/0x1c0 [ 25.223104] __kasan_check_write+0x18/0x20 [ 25.223133] kasan_atomics_helper+0x218a/0x5450 [ 25.223168] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.223203] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.223235] ? kasan_atomics+0x152/0x310 [ 25.223267] kasan_atomics+0x1dc/0x310 [ 25.223293] ? __pfx_kasan_atomics+0x10/0x10 [ 25.223324] ? __pfx_read_tsc+0x10/0x10 [ 25.223356] ? ktime_get_ts64+0x86/0x230 [ 25.223392] kunit_try_run_case+0x1a5/0x480 [ 25.223423] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.223453] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.223491] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.223528] ? __kthread_parkme+0x82/0x180 [ 25.223565] ? preempt_count_sub+0x50/0x80 [ 25.223711] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.223746] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.223787] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.223825] kthread+0x337/0x6f0 [ 25.223888] ? trace_preempt_on+0x20/0xc0 [ 25.223925] ? __pfx_kthread+0x10/0x10 [ 25.223957] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.223993] ? calculate_sigpending+0x7b/0xa0 [ 25.224029] ? __pfx_kthread+0x10/0x10 [ 25.224061] ret_from_fork+0x116/0x1d0 [ 25.224088] ? __pfx_kthread+0x10/0x10 [ 25.224120] ret_from_fork_asm+0x1a/0x30 [ 25.224164] </TASK> [ 25.224180] [ 25.244281] Allocated by task 282: [ 25.244624] kasan_save_stack+0x45/0x70 [ 25.244966] kasan_save_track+0x18/0x40 [ 25.245284] kasan_save_alloc_info+0x3b/0x50 [ 25.245634] __kasan_kmalloc+0xb7/0xc0 [ 25.246732] __kmalloc_cache_noprof+0x189/0x420 [ 25.247441] kasan_atomics+0x95/0x310 [ 25.248269] kunit_try_run_case+0x1a5/0x480 [ 25.249008] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.249517] kthread+0x337/0x6f0 [ 25.250150] ret_from_fork+0x116/0x1d0 [ 25.250507] ret_from_fork_asm+0x1a/0x30 [ 25.250895] [ 25.251094] The buggy address belongs to the object at ffff888102b73d80 [ 25.251094] which belongs to the cache kmalloc-64 of size 64 [ 25.252122] The buggy address is located 0 bytes to the right of [ 25.252122] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 25.253200] [ 25.253412] The buggy address belongs to the physical page: [ 25.254999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 25.255597] flags: 0x200000000000000(node=0|zone=2) [ 25.255985] page_type: f5(slab) [ 25.256259] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.257777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.258424] page dumped because: kasan: bad access detected [ 25.259337] [ 25.259537] Memory state around the buggy address: [ 25.260314] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.261114] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.261997] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.262729] ^ [ 25.263302] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.263974] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.264533] ================================================================== [ 22.622745] ================================================================== [ 22.625708] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 22.626251] Read of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 22.628100] [ 22.628364] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 22.628483] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.628520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.628574] Call Trace: [ 22.628622] <TASK> [ 22.628671] dump_stack_lvl+0x73/0xb0 [ 22.628739] print_report+0xd1/0x650 [ 22.628801] ? __virt_addr_valid+0x1db/0x2d0 [ 22.628873] ? kasan_atomics_helper+0x4b54/0x5450 [ 22.628955] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.629014] ? kasan_atomics_helper+0x4b54/0x5450 [ 22.629066] kasan_report+0x141/0x180 [ 22.629122] ? kasan_atomics_helper+0x4b54/0x5450 [ 22.629185] __asan_report_load4_noabort+0x18/0x20 [ 22.629238] kasan_atomics_helper+0x4b54/0x5450 [ 22.629308] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.629367] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.629422] ? kasan_atomics+0x152/0x310 [ 22.629481] kasan_atomics+0x1dc/0x310 [ 22.629529] ? __pfx_kasan_atomics+0x10/0x10 [ 22.629583] ? __pfx_read_tsc+0x10/0x10 [ 22.629637] ? ktime_get_ts64+0x86/0x230 [ 22.629699] kunit_try_run_case+0x1a5/0x480 [ 22.629753] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.629803] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.629881] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.630694] ? __kthread_parkme+0x82/0x180 [ 22.630758] ? preempt_count_sub+0x50/0x80 [ 22.630851] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.630960] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.631043] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.631086] kthread+0x337/0x6f0 [ 22.631121] ? trace_preempt_on+0x20/0xc0 [ 22.631156] ? __pfx_kthread+0x10/0x10 [ 22.631187] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.631223] ? calculate_sigpending+0x7b/0xa0 [ 22.631260] ? __pfx_kthread+0x10/0x10 [ 22.631291] ret_from_fork+0x116/0x1d0 [ 22.631317] ? __pfx_kthread+0x10/0x10 [ 22.631349] ret_from_fork_asm+0x1a/0x30 [ 22.631406] </TASK> [ 22.631437] [ 22.651591] Allocated by task 282: [ 22.652009] kasan_save_stack+0x45/0x70 [ 22.652350] kasan_save_track+0x18/0x40 [ 22.652803] kasan_save_alloc_info+0x3b/0x50 [ 22.653305] __kasan_kmalloc+0xb7/0xc0 [ 22.653713] __kmalloc_cache_noprof+0x189/0x420 [ 22.654152] kasan_atomics+0x95/0x310 [ 22.654524] kunit_try_run_case+0x1a5/0x480 [ 22.655050] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.655591] kthread+0x337/0x6f0 [ 22.655894] ret_from_fork+0x116/0x1d0 [ 22.656343] ret_from_fork_asm+0x1a/0x30 [ 22.657146] [ 22.657626] The buggy address belongs to the object at ffff888102b73d80 [ 22.657626] which belongs to the cache kmalloc-64 of size 64 [ 22.659421] The buggy address is located 0 bytes to the right of [ 22.659421] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 22.660699] [ 22.661157] The buggy address belongs to the physical page: [ 22.661614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 22.662390] flags: 0x200000000000000(node=0|zone=2) [ 22.662989] page_type: f5(slab) [ 22.663481] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.664919] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.665685] page dumped because: kasan: bad access detected [ 22.666443] [ 22.666898] Memory state around the buggy address: [ 22.667366] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.667976] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.668592] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.669292] ^ [ 22.669690] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.670303] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.671058] ================================================================== [ 23.499914] ================================================================== [ 23.500443] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 23.501312] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 23.502202] [ 23.502448] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 23.502576] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.502623] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.502687] Call Trace: [ 23.503194] <TASK> [ 23.503225] dump_stack_lvl+0x73/0xb0 [ 23.503268] print_report+0xd1/0x650 [ 23.503305] ? __virt_addr_valid+0x1db/0x2d0 [ 23.503340] ? kasan_atomics_helper+0xf10/0x5450 [ 23.503372] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.503408] ? kasan_atomics_helper+0xf10/0x5450 [ 23.503442] kasan_report+0x141/0x180 [ 23.503476] ? kasan_atomics_helper+0xf10/0x5450 [ 23.503514] kasan_check_range+0x10c/0x1c0 [ 23.503550] __kasan_check_write+0x18/0x20 [ 23.503579] kasan_atomics_helper+0xf10/0x5450 [ 23.503628] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.503682] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.503714] ? kasan_atomics+0x152/0x310 [ 23.503747] kasan_atomics+0x1dc/0x310 [ 23.503777] ? __pfx_kasan_atomics+0x10/0x10 [ 23.503806] ? __pfx_read_tsc+0x10/0x10 [ 23.503839] ? ktime_get_ts64+0x86/0x230 [ 23.503876] kunit_try_run_case+0x1a5/0x480 [ 23.503937] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.503970] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.504010] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.504048] ? __kthread_parkme+0x82/0x180 [ 23.504078] ? preempt_count_sub+0x50/0x80 [ 23.504113] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.504144] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.504181] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.504218] kthread+0x337/0x6f0 [ 23.504247] ? trace_preempt_on+0x20/0xc0 [ 23.504281] ? __pfx_kthread+0x10/0x10 [ 23.504312] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.504346] ? calculate_sigpending+0x7b/0xa0 [ 23.504381] ? __pfx_kthread+0x10/0x10 [ 23.504412] ret_from_fork+0x116/0x1d0 [ 23.504441] ? __pfx_kthread+0x10/0x10 [ 23.504470] ret_from_fork_asm+0x1a/0x30 [ 23.504514] </TASK> [ 23.504530] [ 23.524505] Allocated by task 282: [ 23.524870] kasan_save_stack+0x45/0x70 [ 23.525311] kasan_save_track+0x18/0x40 [ 23.526104] kasan_save_alloc_info+0x3b/0x50 [ 23.526472] __kasan_kmalloc+0xb7/0xc0 [ 23.526904] __kmalloc_cache_noprof+0x189/0x420 [ 23.527583] kasan_atomics+0x95/0x310 [ 23.528106] kunit_try_run_case+0x1a5/0x480 [ 23.528533] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.529260] kthread+0x337/0x6f0 [ 23.529645] ret_from_fork+0x116/0x1d0 [ 23.530040] ret_from_fork_asm+0x1a/0x30 [ 23.530431] [ 23.530654] The buggy address belongs to the object at ffff888102b73d80 [ 23.530654] which belongs to the cache kmalloc-64 of size 64 [ 23.532076] The buggy address is located 0 bytes to the right of [ 23.532076] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 23.533297] [ 23.533819] The buggy address belongs to the physical page: [ 23.534316] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 23.535243] flags: 0x200000000000000(node=0|zone=2) [ 23.535898] page_type: f5(slab) [ 23.536223] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.537297] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.538147] page dumped because: kasan: bad access detected [ 23.538814] [ 23.539220] Memory state around the buggy address: [ 23.539821] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.540567] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.541356] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.542197] ^ [ 23.542615] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.543421] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.544181] ================================================================== [ 24.682625] ================================================================== [ 24.683114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 24.683917] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 24.684495] [ 24.684723] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 24.684893] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.684936] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.685194] Call Trace: [ 24.685246] <TASK> [ 24.685288] dump_stack_lvl+0x73/0xb0 [ 24.685367] print_report+0xd1/0x650 [ 24.685444] ? __virt_addr_valid+0x1db/0x2d0 [ 24.685514] ? kasan_atomics_helper+0x1c18/0x5450 [ 24.685592] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.685677] ? kasan_atomics_helper+0x1c18/0x5450 [ 24.685761] kasan_report+0x141/0x180 [ 24.685844] ? kasan_atomics_helper+0x1c18/0x5450 [ 24.686022] kasan_check_range+0x10c/0x1c0 [ 24.686116] __kasan_check_write+0x18/0x20 [ 24.686273] kasan_atomics_helper+0x1c18/0x5450 [ 24.686368] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.686451] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.686531] ? kasan_atomics+0x152/0x310 [ 24.686615] kasan_atomics+0x1dc/0x310 [ 24.686693] ? __pfx_kasan_atomics+0x10/0x10 [ 24.686771] ? __pfx_read_tsc+0x10/0x10 [ 24.686892] ? ktime_get_ts64+0x86/0x230 [ 24.687053] kunit_try_run_case+0x1a5/0x480 [ 24.687140] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.687196] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.687238] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.687278] ? __kthread_parkme+0x82/0x180 [ 24.687310] ? preempt_count_sub+0x50/0x80 [ 24.687345] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.687376] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.687415] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.687454] kthread+0x337/0x6f0 [ 24.687485] ? trace_preempt_on+0x20/0xc0 [ 24.687518] ? __pfx_kthread+0x10/0x10 [ 24.687549] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.687623] ? calculate_sigpending+0x7b/0xa0 [ 24.687665] ? __pfx_kthread+0x10/0x10 [ 24.687698] ret_from_fork+0x116/0x1d0 [ 24.687727] ? __pfx_kthread+0x10/0x10 [ 24.687757] ret_from_fork_asm+0x1a/0x30 [ 24.687801] </TASK> [ 24.687818] [ 24.703810] Allocated by task 282: [ 24.704205] kasan_save_stack+0x45/0x70 [ 24.704536] kasan_save_track+0x18/0x40 [ 24.704881] kasan_save_alloc_info+0x3b/0x50 [ 24.705566] __kasan_kmalloc+0xb7/0xc0 [ 24.706007] __kmalloc_cache_noprof+0x189/0x420 [ 24.706501] kasan_atomics+0x95/0x310 [ 24.706916] kunit_try_run_case+0x1a5/0x480 [ 24.707362] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.707998] kthread+0x337/0x6f0 [ 24.708426] ret_from_fork+0x116/0x1d0 [ 24.709037] ret_from_fork_asm+0x1a/0x30 [ 24.709381] [ 24.709579] The buggy address belongs to the object at ffff888102b73d80 [ 24.709579] which belongs to the cache kmalloc-64 of size 64 [ 24.710541] The buggy address is located 0 bytes to the right of [ 24.710541] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 24.711658] [ 24.711934] The buggy address belongs to the physical page: [ 24.712362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 24.713295] flags: 0x200000000000000(node=0|zone=2) [ 24.713730] page_type: f5(slab) [ 24.714170] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.715063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.715707] page dumped because: kasan: bad access detected [ 24.716126] [ 24.716318] Memory state around the buggy address: [ 24.716676] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.717402] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.718335] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.719043] ^ [ 24.719395] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.720009] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.720678] ================================================================== [ 24.821169] ================================================================== [ 24.821905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 24.822667] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 24.823720] [ 24.824047] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 24.824382] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.824407] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.824441] Call Trace: [ 24.824465] <TASK> [ 24.824487] dump_stack_lvl+0x73/0xb0 [ 24.824526] print_report+0xd1/0x650 [ 24.824565] ? __virt_addr_valid+0x1db/0x2d0 [ 24.824648] ? kasan_atomics_helper+0x1d7a/0x5450 [ 24.824684] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.824719] ? kasan_atomics_helper+0x1d7a/0x5450 [ 24.824753] kasan_report+0x141/0x180 [ 24.824788] ? kasan_atomics_helper+0x1d7a/0x5450 [ 24.824827] kasan_check_range+0x10c/0x1c0 [ 24.824891] __kasan_check_write+0x18/0x20 [ 24.824925] kasan_atomics_helper+0x1d7a/0x5450 [ 24.824960] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.824994] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.825026] ? kasan_atomics+0x152/0x310 [ 24.825059] kasan_atomics+0x1dc/0x310 [ 24.825086] ? __pfx_kasan_atomics+0x10/0x10 [ 24.825116] ? __pfx_read_tsc+0x10/0x10 [ 24.825150] ? ktime_get_ts64+0x86/0x230 [ 24.825186] kunit_try_run_case+0x1a5/0x480 [ 24.825217] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.825246] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.825284] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.825321] ? __kthread_parkme+0x82/0x180 [ 24.825351] ? preempt_count_sub+0x50/0x80 [ 24.825385] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.825416] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.825453] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.825491] kthread+0x337/0x6f0 [ 24.825519] ? trace_preempt_on+0x20/0xc0 [ 24.825552] ? __pfx_kthread+0x10/0x10 [ 24.825621] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.825658] ? calculate_sigpending+0x7b/0xa0 [ 24.825694] ? __pfx_kthread+0x10/0x10 [ 24.825727] ret_from_fork+0x116/0x1d0 [ 24.825753] ? __pfx_kthread+0x10/0x10 [ 24.825784] ret_from_fork_asm+0x1a/0x30 [ 24.825827] </TASK> [ 24.825844] [ 24.842707] Allocated by task 282: [ 24.843216] kasan_save_stack+0x45/0x70 [ 24.843558] kasan_save_track+0x18/0x40 [ 24.844306] kasan_save_alloc_info+0x3b/0x50 [ 24.844820] __kasan_kmalloc+0xb7/0xc0 [ 24.845271] __kmalloc_cache_noprof+0x189/0x420 [ 24.845808] kasan_atomics+0x95/0x310 [ 24.846405] kunit_try_run_case+0x1a5/0x480 [ 24.847291] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.847742] kthread+0x337/0x6f0 [ 24.848180] ret_from_fork+0x116/0x1d0 [ 24.848635] ret_from_fork_asm+0x1a/0x30 [ 24.849076] [ 24.849324] The buggy address belongs to the object at ffff888102b73d80 [ 24.849324] which belongs to the cache kmalloc-64 of size 64 [ 24.850408] The buggy address is located 0 bytes to the right of [ 24.850408] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 24.851466] [ 24.851678] The buggy address belongs to the physical page: [ 24.852168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 24.852913] flags: 0x200000000000000(node=0|zone=2) [ 24.853451] page_type: f5(slab) [ 24.853919] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.854825] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.855514] page dumped because: kasan: bad access detected [ 24.856037] [ 24.856304] Memory state around the buggy address: [ 24.856877] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.857495] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.858149] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.858673] ^ [ 24.859212] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.859958] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.860551] ================================================================== [ 22.995284] ================================================================== [ 22.995869] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 22.996466] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 22.999506] [ 23.000173] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 23.000308] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.000351] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.000415] Call Trace: [ 23.000469] <TASK> [ 23.000518] dump_stack_lvl+0x73/0xb0 [ 23.000602] print_report+0xd1/0x650 [ 23.000685] ? __virt_addr_valid+0x1db/0x2d0 [ 23.000767] ? kasan_atomics_helper+0x860/0x5450 [ 23.000842] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.000936] ? kasan_atomics_helper+0x860/0x5450 [ 23.001015] kasan_report+0x141/0x180 [ 23.001095] ? kasan_atomics_helper+0x860/0x5450 [ 23.001184] kasan_check_range+0x10c/0x1c0 [ 23.001240] __kasan_check_write+0x18/0x20 [ 23.001272] kasan_atomics_helper+0x860/0x5450 [ 23.001306] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.001340] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.001371] ? kasan_atomics+0x152/0x310 [ 23.001404] kasan_atomics+0x1dc/0x310 [ 23.001435] ? __pfx_kasan_atomics+0x10/0x10 [ 23.001471] ? __pfx_read_tsc+0x10/0x10 [ 23.001505] ? ktime_get_ts64+0x86/0x230 [ 23.001542] kunit_try_run_case+0x1a5/0x480 [ 23.001573] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.001602] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.001682] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.001723] ? __kthread_parkme+0x82/0x180 [ 23.001755] ? preempt_count_sub+0x50/0x80 [ 23.001791] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.001822] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.001861] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.001969] kthread+0x337/0x6f0 [ 23.002010] ? trace_preempt_on+0x20/0xc0 [ 23.002046] ? __pfx_kthread+0x10/0x10 [ 23.002077] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.002113] ? calculate_sigpending+0x7b/0xa0 [ 23.002149] ? __pfx_kthread+0x10/0x10 [ 23.002180] ret_from_fork+0x116/0x1d0 [ 23.002207] ? __pfx_kthread+0x10/0x10 [ 23.002251] ret_from_fork_asm+0x1a/0x30 [ 23.002297] </TASK> [ 23.002314] [ 23.022422] Allocated by task 282: [ 23.023040] kasan_save_stack+0x45/0x70 [ 23.023437] kasan_save_track+0x18/0x40 [ 23.024075] kasan_save_alloc_info+0x3b/0x50 [ 23.024542] __kasan_kmalloc+0xb7/0xc0 [ 23.025135] __kmalloc_cache_noprof+0x189/0x420 [ 23.025941] kasan_atomics+0x95/0x310 [ 23.026450] kunit_try_run_case+0x1a5/0x480 [ 23.027075] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.027559] kthread+0x337/0x6f0 [ 23.027908] ret_from_fork+0x116/0x1d0 [ 23.028323] ret_from_fork_asm+0x1a/0x30 [ 23.028874] [ 23.029407] The buggy address belongs to the object at ffff888102b73d80 [ 23.029407] which belongs to the cache kmalloc-64 of size 64 [ 23.030805] The buggy address is located 0 bytes to the right of [ 23.030805] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 23.031720] [ 23.031986] The buggy address belongs to the physical page: [ 23.032427] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 23.033196] flags: 0x200000000000000(node=0|zone=2) [ 23.033959] page_type: f5(slab) [ 23.034247] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.035992] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.036719] page dumped because: kasan: bad access detected [ 23.037350] [ 23.037798] Memory state around the buggy address: [ 23.038136] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.038770] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.039733] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.040481] ^ [ 23.040996] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.041694] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.042281] ================================================================== [ 24.220801] ================================================================== [ 24.222131] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 24.224038] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 24.226063] [ 24.226324] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 24.226435] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.226468] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.226519] Call Trace: [ 24.226564] <TASK> [ 24.226606] dump_stack_lvl+0x73/0xb0 [ 24.226677] print_report+0xd1/0x650 [ 24.226733] ? __virt_addr_valid+0x1db/0x2d0 [ 24.226791] ? kasan_atomics_helper+0x15b6/0x5450 [ 24.226847] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.226950] ? kasan_atomics_helper+0x15b6/0x5450 [ 24.227008] kasan_report+0x141/0x180 [ 24.227065] ? kasan_atomics_helper+0x15b6/0x5450 [ 24.227132] kasan_check_range+0x10c/0x1c0 [ 24.227190] __kasan_check_write+0x18/0x20 [ 24.227255] kasan_atomics_helper+0x15b6/0x5450 [ 24.227339] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.227425] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.227549] ? kasan_atomics+0x152/0x310 [ 24.227689] kasan_atomics+0x1dc/0x310 [ 24.227767] ? __pfx_kasan_atomics+0x10/0x10 [ 24.227845] ? __pfx_read_tsc+0x10/0x10 [ 24.227960] ? ktime_get_ts64+0x86/0x230 [ 24.228038] kunit_try_run_case+0x1a5/0x480 [ 24.228106] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.228174] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.228246] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.228319] ? __kthread_parkme+0x82/0x180 [ 24.228378] ? preempt_count_sub+0x50/0x80 [ 24.228442] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.228500] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.228978] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.229046] kthread+0x337/0x6f0 [ 24.229100] ? trace_preempt_on+0x20/0xc0 [ 24.229159] ? __pfx_kthread+0x10/0x10 [ 24.229213] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.229270] ? calculate_sigpending+0x7b/0xa0 [ 24.229333] ? __pfx_kthread+0x10/0x10 [ 24.229402] ret_from_fork+0x116/0x1d0 [ 24.229450] ? __pfx_kthread+0x10/0x10 [ 24.229500] ret_from_fork_asm+0x1a/0x30 [ 24.229571] </TASK> [ 24.229618] [ 24.250561] Allocated by task 282: [ 24.250920] kasan_save_stack+0x45/0x70 [ 24.251348] kasan_save_track+0x18/0x40 [ 24.251814] kasan_save_alloc_info+0x3b/0x50 [ 24.252402] __kasan_kmalloc+0xb7/0xc0 [ 24.252981] __kmalloc_cache_noprof+0x189/0x420 [ 24.253347] kasan_atomics+0x95/0x310 [ 24.253681] kunit_try_run_case+0x1a5/0x480 [ 24.254036] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.254454] kthread+0x337/0x6f0 [ 24.255475] ret_from_fork+0x116/0x1d0 [ 24.256065] ret_from_fork_asm+0x1a/0x30 [ 24.256397] [ 24.256618] The buggy address belongs to the object at ffff888102b73d80 [ 24.256618] which belongs to the cache kmalloc-64 of size 64 [ 24.258190] The buggy address is located 0 bytes to the right of [ 24.258190] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 24.259773] [ 24.259967] The buggy address belongs to the physical page: [ 24.260367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 24.261717] flags: 0x200000000000000(node=0|zone=2) [ 24.262256] page_type: f5(slab) [ 24.262617] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.263243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.264178] page dumped because: kasan: bad access detected [ 24.264916] [ 24.265253] Memory state around the buggy address: [ 24.265578] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.266556] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.267141] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.268075] ^ [ 24.268470] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.269348] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.270121] ================================================================== [ 24.992795] ================================================================== [ 24.994496] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 24.995263] Read of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 24.996196] [ 24.996318] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 24.996383] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.996402] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.996435] Call Trace: [ 24.996459] <TASK> [ 24.996483] dump_stack_lvl+0x73/0xb0 [ 24.996522] print_report+0xd1/0x650 [ 24.996554] ? __virt_addr_valid+0x1db/0x2d0 [ 24.997164] ? kasan_atomics_helper+0x4f71/0x5450 [ 24.997227] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.997267] ? kasan_atomics_helper+0x4f71/0x5450 [ 24.997303] kasan_report+0x141/0x180 [ 24.997338] ? kasan_atomics_helper+0x4f71/0x5450 [ 24.997378] __asan_report_load8_noabort+0x18/0x20 [ 24.997409] kasan_atomics_helper+0x4f71/0x5450 [ 24.997443] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.997477] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.997509] ? kasan_atomics+0x152/0x310 [ 24.997543] kasan_atomics+0x1dc/0x310 [ 24.997578] ? __pfx_kasan_atomics+0x10/0x10 [ 24.997652] ? __pfx_read_tsc+0x10/0x10 [ 24.997688] ? ktime_get_ts64+0x86/0x230 [ 24.997728] kunit_try_run_case+0x1a5/0x480 [ 24.997762] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.997793] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.997831] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.997921] ? __kthread_parkme+0x82/0x180 [ 24.997964] ? preempt_count_sub+0x50/0x80 [ 24.997999] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.998030] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.998067] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.998105] kthread+0x337/0x6f0 [ 24.998135] ? trace_preempt_on+0x20/0xc0 [ 24.998169] ? __pfx_kthread+0x10/0x10 [ 24.998200] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.998249] ? calculate_sigpending+0x7b/0xa0 [ 24.998286] ? __pfx_kthread+0x10/0x10 [ 24.998318] ret_from_fork+0x116/0x1d0 [ 24.998345] ? __pfx_kthread+0x10/0x10 [ 24.998376] ret_from_fork_asm+0x1a/0x30 [ 24.998420] </TASK> [ 24.998437] [ 25.023730] Allocated by task 282: [ 25.025067] kasan_save_stack+0x45/0x70 [ 25.025480] kasan_save_track+0x18/0x40 [ 25.026014] kasan_save_alloc_info+0x3b/0x50 [ 25.026194] __kasan_kmalloc+0xb7/0xc0 [ 25.026364] __kmalloc_cache_noprof+0x189/0x420 [ 25.026535] kasan_atomics+0x95/0x310 [ 25.026718] kunit_try_run_case+0x1a5/0x480 [ 25.027227] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.028889] kthread+0x337/0x6f0 [ 25.029500] ret_from_fork+0x116/0x1d0 [ 25.030128] ret_from_fork_asm+0x1a/0x30 [ 25.030509] [ 25.030756] The buggy address belongs to the object at ffff888102b73d80 [ 25.030756] which belongs to the cache kmalloc-64 of size 64 [ 25.031281] The buggy address is located 0 bytes to the right of [ 25.031281] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 25.031804] [ 25.032026] The buggy address belongs to the physical page: [ 25.032540] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 25.033326] flags: 0x200000000000000(node=0|zone=2) [ 25.033694] page_type: f5(slab) [ 25.034050] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.034858] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.035564] page dumped because: kasan: bad access detected [ 25.036134] [ 25.036324] Memory state around the buggy address: [ 25.036688] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.037578] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.038305] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.039047] ^ [ 25.039661] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.040238] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.040956] ================================================================== [ 25.131025] ================================================================== [ 25.132004] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 25.132784] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 25.133589] [ 25.134329] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 25.134642] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.134668] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.134701] Call Trace: [ 25.134726] <TASK> [ 25.134745] dump_stack_lvl+0x73/0xb0 [ 25.134786] print_report+0xd1/0x650 [ 25.134821] ? __virt_addr_valid+0x1db/0x2d0 [ 25.134886] ? kasan_atomics_helper+0x20c8/0x5450 [ 25.134921] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.134956] ? kasan_atomics_helper+0x20c8/0x5450 [ 25.134988] kasan_report+0x141/0x180 [ 25.135021] ? kasan_atomics_helper+0x20c8/0x5450 [ 25.135060] kasan_check_range+0x10c/0x1c0 [ 25.135098] __kasan_check_write+0x18/0x20 [ 25.135127] kasan_atomics_helper+0x20c8/0x5450 [ 25.135161] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.135194] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.135225] ? kasan_atomics+0x152/0x310 [ 25.135257] kasan_atomics+0x1dc/0x310 [ 25.135284] ? __pfx_kasan_atomics+0x10/0x10 [ 25.135314] ? __pfx_read_tsc+0x10/0x10 [ 25.135346] ? ktime_get_ts64+0x86/0x230 [ 25.135381] kunit_try_run_case+0x1a5/0x480 [ 25.135412] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.135441] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.135479] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.135517] ? __kthread_parkme+0x82/0x180 [ 25.135547] ? preempt_count_sub+0x50/0x80 [ 25.135620] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.135656] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.135694] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.135731] kthread+0x337/0x6f0 [ 25.135760] ? trace_preempt_on+0x20/0xc0 [ 25.135794] ? __pfx_kthread+0x10/0x10 [ 25.135824] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.135885] ? calculate_sigpending+0x7b/0xa0 [ 25.135924] ? __pfx_kthread+0x10/0x10 [ 25.135956] ret_from_fork+0x116/0x1d0 [ 25.135982] ? __pfx_kthread+0x10/0x10 [ 25.136012] ret_from_fork_asm+0x1a/0x30 [ 25.136056] </TASK> [ 25.136072] [ 25.158005] Allocated by task 282: [ 25.158157] kasan_save_stack+0x45/0x70 [ 25.158339] kasan_save_track+0x18/0x40 [ 25.158501] kasan_save_alloc_info+0x3b/0x50 [ 25.159195] __kasan_kmalloc+0xb7/0xc0 [ 25.160005] __kmalloc_cache_noprof+0x189/0x420 [ 25.160388] kasan_atomics+0x95/0x310 [ 25.160729] kunit_try_run_case+0x1a5/0x480 [ 25.161270] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.161978] kthread+0x337/0x6f0 [ 25.162257] ret_from_fork+0x116/0x1d0 [ 25.163359] ret_from_fork_asm+0x1a/0x30 [ 25.163808] [ 25.164366] The buggy address belongs to the object at ffff888102b73d80 [ 25.164366] which belongs to the cache kmalloc-64 of size 64 [ 25.165521] The buggy address is located 0 bytes to the right of [ 25.165521] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 25.166958] [ 25.167204] The buggy address belongs to the physical page: [ 25.167728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 25.168601] flags: 0x200000000000000(node=0|zone=2) [ 25.169262] page_type: f5(slab) [ 25.169795] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.170618] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.171406] page dumped because: kasan: bad access detected [ 25.172074] [ 25.172434] Memory state around the buggy address: [ 25.173066] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.173894] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.174491] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.175173] ^ [ 25.175634] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.176210] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.176771] ================================================================== [ 25.315055] ================================================================== [ 25.316107] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 25.317068] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 25.318258] [ 25.318447] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 25.318516] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.318535] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.319070] Call Trace: [ 25.319105] <TASK> [ 25.319131] dump_stack_lvl+0x73/0xb0 [ 25.319174] print_report+0xd1/0x650 [ 25.319209] ? __virt_addr_valid+0x1db/0x2d0 [ 25.319245] ? kasan_atomics_helper+0x224c/0x5450 [ 25.319278] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.319312] ? kasan_atomics_helper+0x224c/0x5450 [ 25.319344] kasan_report+0x141/0x180 [ 25.319378] ? kasan_atomics_helper+0x224c/0x5450 [ 25.319416] kasan_check_range+0x10c/0x1c0 [ 25.319452] __kasan_check_write+0x18/0x20 [ 25.319481] kasan_atomics_helper+0x224c/0x5450 [ 25.319515] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.319550] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.319630] ? kasan_atomics+0x152/0x310 [ 25.319665] kasan_atomics+0x1dc/0x310 [ 25.319694] ? __pfx_kasan_atomics+0x10/0x10 [ 25.319724] ? __pfx_read_tsc+0x10/0x10 [ 25.319759] ? ktime_get_ts64+0x86/0x230 [ 25.319795] kunit_try_run_case+0x1a5/0x480 [ 25.319826] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.319886] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.319927] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.319966] ? __kthread_parkme+0x82/0x180 [ 25.319999] ? preempt_count_sub+0x50/0x80 [ 25.320034] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.320066] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.320103] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.320141] kthread+0x337/0x6f0 [ 25.320170] ? trace_preempt_on+0x20/0xc0 [ 25.320203] ? __pfx_kthread+0x10/0x10 [ 25.320234] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.320268] ? calculate_sigpending+0x7b/0xa0 [ 25.320304] ? __pfx_kthread+0x10/0x10 [ 25.320335] ret_from_fork+0x116/0x1d0 [ 25.320363] ? __pfx_kthread+0x10/0x10 [ 25.320393] ret_from_fork_asm+0x1a/0x30 [ 25.320435] </TASK> [ 25.320451] [ 25.340148] Allocated by task 282: [ 25.340910] kasan_save_stack+0x45/0x70 [ 25.341411] kasan_save_track+0x18/0x40 [ 25.342385] kasan_save_alloc_info+0x3b/0x50 [ 25.342800] __kasan_kmalloc+0xb7/0xc0 [ 25.343402] __kmalloc_cache_noprof+0x189/0x420 [ 25.344068] kasan_atomics+0x95/0x310 [ 25.344370] kunit_try_run_case+0x1a5/0x480 [ 25.345217] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.345584] kthread+0x337/0x6f0 [ 25.346304] ret_from_fork+0x116/0x1d0 [ 25.346866] ret_from_fork_asm+0x1a/0x30 [ 25.347553] [ 25.348069] The buggy address belongs to the object at ffff888102b73d80 [ 25.348069] which belongs to the cache kmalloc-64 of size 64 [ 25.349062] The buggy address is located 0 bytes to the right of [ 25.349062] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 25.350498] [ 25.351033] The buggy address belongs to the physical page: [ 25.351443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 25.352542] flags: 0x200000000000000(node=0|zone=2) [ 25.353091] page_type: f5(slab) [ 25.353454] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.354250] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.354811] page dumped because: kasan: bad access detected [ 25.355345] [ 25.355653] Memory state around the buggy address: [ 25.356111] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.357062] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.358045] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.358565] ^ [ 25.359175] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.359710] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.360551] ================================================================== [ 22.720534] ================================================================== [ 22.721528] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 22.722669] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 22.723602] [ 22.724217] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 22.724342] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.724386] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.724449] Call Trace: [ 22.724501] <TASK> [ 22.724784] dump_stack_lvl+0x73/0xb0 [ 22.724857] print_report+0xd1/0x650 [ 22.724896] ? __virt_addr_valid+0x1db/0x2d0 [ 22.724962] ? kasan_atomics_helper+0x4b3a/0x5450 [ 22.724997] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.725032] ? kasan_atomics_helper+0x4b3a/0x5450 [ 22.725064] kasan_report+0x141/0x180 [ 22.725098] ? kasan_atomics_helper+0x4b3a/0x5450 [ 22.725138] __asan_report_store4_noabort+0x1b/0x30 [ 22.725439] kasan_atomics_helper+0x4b3a/0x5450 [ 22.725487] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.725523] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.725556] ? kasan_atomics+0x152/0x310 [ 22.725589] kasan_atomics+0x1dc/0x310 [ 22.725619] ? __pfx_kasan_atomics+0x10/0x10 [ 22.725684] ? __pfx_read_tsc+0x10/0x10 [ 22.725719] ? ktime_get_ts64+0x86/0x230 [ 22.725756] kunit_try_run_case+0x1a5/0x480 [ 22.725787] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.725816] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.725854] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.725891] ? __kthread_parkme+0x82/0x180 [ 22.725950] ? preempt_count_sub+0x50/0x80 [ 22.725989] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.726022] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.726059] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.726096] kthread+0x337/0x6f0 [ 22.726125] ? trace_preempt_on+0x20/0xc0 [ 22.726159] ? __pfx_kthread+0x10/0x10 [ 22.726191] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.726225] ? calculate_sigpending+0x7b/0xa0 [ 22.726273] ? __pfx_kthread+0x10/0x10 [ 22.726305] ret_from_fork+0x116/0x1d0 [ 22.726331] ? __pfx_kthread+0x10/0x10 [ 22.726363] ret_from_fork_asm+0x1a/0x30 [ 22.726405] </TASK> [ 22.726421] [ 22.748257] Allocated by task 282: [ 22.748522] kasan_save_stack+0x45/0x70 [ 22.749341] kasan_save_track+0x18/0x40 [ 22.749964] kasan_save_alloc_info+0x3b/0x50 [ 22.750310] __kasan_kmalloc+0xb7/0xc0 [ 22.750626] __kmalloc_cache_noprof+0x189/0x420 [ 22.751660] kasan_atomics+0x95/0x310 [ 22.752219] kunit_try_run_case+0x1a5/0x480 [ 22.752865] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.753477] kthread+0x337/0x6f0 [ 22.754052] ret_from_fork+0x116/0x1d0 [ 22.754437] ret_from_fork_asm+0x1a/0x30 [ 22.755046] [ 22.755289] The buggy address belongs to the object at ffff888102b73d80 [ 22.755289] which belongs to the cache kmalloc-64 of size 64 [ 22.756660] The buggy address is located 0 bytes to the right of [ 22.756660] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 22.757987] [ 22.758546] The buggy address belongs to the physical page: [ 22.759245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 22.759974] flags: 0x200000000000000(node=0|zone=2) [ 22.760352] page_type: f5(slab) [ 22.760621] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.761810] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.762484] page dumped because: kasan: bad access detected [ 22.763076] [ 22.763297] Memory state around the buggy address: [ 22.763793] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.764423] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.765182] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.765868] ^ [ 22.766377] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.767079] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.767773] ================================================================== [ 24.901905] ================================================================== [ 24.902384] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 24.903190] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 24.903742] [ 24.904155] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 24.904314] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.904359] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.904422] Call Trace: [ 24.904497] <TASK> [ 24.904576] dump_stack_lvl+0x73/0xb0 [ 24.904663] print_report+0xd1/0x650 [ 24.904746] ? __virt_addr_valid+0x1db/0x2d0 [ 24.904882] ? kasan_atomics_helper+0x1eaa/0x5450 [ 24.904967] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.905056] ? kasan_atomics_helper+0x1eaa/0x5450 [ 24.905159] kasan_report+0x141/0x180 [ 24.905271] ? kasan_atomics_helper+0x1eaa/0x5450 [ 24.905367] kasan_check_range+0x10c/0x1c0 [ 24.905476] __kasan_check_write+0x18/0x20 [ 24.905584] kasan_atomics_helper+0x1eaa/0x5450 [ 24.905698] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.905784] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.905917] ? kasan_atomics+0x152/0x310 [ 24.906002] kasan_atomics+0x1dc/0x310 [ 24.906069] ? __pfx_kasan_atomics+0x10/0x10 [ 24.906111] ? __pfx_read_tsc+0x10/0x10 [ 24.906147] ? ktime_get_ts64+0x86/0x230 [ 24.906226] kunit_try_run_case+0x1a5/0x480 [ 24.906288] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.906360] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.906448] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.906538] ? __kthread_parkme+0x82/0x180 [ 24.906649] ? preempt_count_sub+0x50/0x80 [ 24.906770] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.906869] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.906959] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.907073] kthread+0x337/0x6f0 [ 24.907181] ? trace_preempt_on+0x20/0xc0 [ 24.907264] ? __pfx_kthread+0x10/0x10 [ 24.907362] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.907476] ? calculate_sigpending+0x7b/0xa0 [ 24.907562] ? __pfx_kthread+0x10/0x10 [ 24.907687] ret_from_fork+0x116/0x1d0 [ 24.907792] ? __pfx_kthread+0x10/0x10 [ 24.907892] ret_from_fork_asm+0x1a/0x30 [ 24.908013] </TASK> [ 24.908058] [ 24.923369] Allocated by task 282: [ 24.923813] kasan_save_stack+0x45/0x70 [ 24.924729] kasan_save_track+0x18/0x40 [ 24.925282] kasan_save_alloc_info+0x3b/0x50 [ 24.925687] __kasan_kmalloc+0xb7/0xc0 [ 24.926954] __kmalloc_cache_noprof+0x189/0x420 [ 24.928191] kasan_atomics+0x95/0x310 [ 24.928509] kunit_try_run_case+0x1a5/0x480 [ 24.928879] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.929279] kthread+0x337/0x6f0 [ 24.929776] ret_from_fork+0x116/0x1d0 [ 24.930313] ret_from_fork_asm+0x1a/0x30 [ 24.930892] [ 24.931187] The buggy address belongs to the object at ffff888102b73d80 [ 24.931187] which belongs to the cache kmalloc-64 of size 64 [ 24.932526] The buggy address is located 0 bytes to the right of [ 24.932526] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 24.933873] [ 24.934139] The buggy address belongs to the physical page: [ 24.934773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 24.935485] flags: 0x200000000000000(node=0|zone=2) [ 24.936042] page_type: f5(slab) [ 24.936509] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.937329] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.938090] page dumped because: kasan: bad access detected [ 24.938763] [ 24.939043] Memory state around the buggy address: [ 24.939666] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.940369] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.941163] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.941896] ^ [ 24.942464] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.943303] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.944198] ================================================================== [ 22.672112] ================================================================== [ 22.672638] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 22.675049] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 22.675596] [ 22.676175] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 22.676265] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.676287] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.676324] Call Trace: [ 22.676346] <TASK> [ 22.676367] dump_stack_lvl+0x73/0xb0 [ 22.676406] print_report+0xd1/0x650 [ 22.676440] ? __virt_addr_valid+0x1db/0x2d0 [ 22.676474] ? kasan_atomics_helper+0x4a0/0x5450 [ 22.676506] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.676538] ? kasan_atomics_helper+0x4a0/0x5450 [ 22.676571] kasan_report+0x141/0x180 [ 22.676603] ? kasan_atomics_helper+0x4a0/0x5450 [ 22.676684] kasan_check_range+0x10c/0x1c0 [ 22.676731] __kasan_check_write+0x18/0x20 [ 22.676762] kasan_atomics_helper+0x4a0/0x5450 [ 22.676796] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.676829] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.676861] ? kasan_atomics+0x152/0x310 [ 22.676892] kasan_atomics+0x1dc/0x310 [ 22.676950] ? __pfx_kasan_atomics+0x10/0x10 [ 22.676983] ? __pfx_read_tsc+0x10/0x10 [ 22.677016] ? ktime_get_ts64+0x86/0x230 [ 22.677051] kunit_try_run_case+0x1a5/0x480 [ 22.677083] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.677113] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.677149] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.677187] ? __kthread_parkme+0x82/0x180 [ 22.677217] ? preempt_count_sub+0x50/0x80 [ 22.677250] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.677281] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.677317] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.677354] kthread+0x337/0x6f0 [ 22.677382] ? trace_preempt_on+0x20/0xc0 [ 22.677415] ? __pfx_kthread+0x10/0x10 [ 22.677445] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.677479] ? calculate_sigpending+0x7b/0xa0 [ 22.677514] ? __pfx_kthread+0x10/0x10 [ 22.677545] ret_from_fork+0x116/0x1d0 [ 22.677570] ? __pfx_kthread+0x10/0x10 [ 22.677601] ret_from_fork_asm+0x1a/0x30 [ 22.677667] </TASK> [ 22.677686] [ 22.697461] Allocated by task 282: [ 22.698052] kasan_save_stack+0x45/0x70 [ 22.698654] kasan_save_track+0x18/0x40 [ 22.699493] kasan_save_alloc_info+0x3b/0x50 [ 22.700264] __kasan_kmalloc+0xb7/0xc0 [ 22.700687] __kmalloc_cache_noprof+0x189/0x420 [ 22.701437] kasan_atomics+0x95/0x310 [ 22.701983] kunit_try_run_case+0x1a5/0x480 [ 22.702397] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.703137] kthread+0x337/0x6f0 [ 22.703666] ret_from_fork+0x116/0x1d0 [ 22.704245] ret_from_fork_asm+0x1a/0x30 [ 22.704837] [ 22.705033] The buggy address belongs to the object at ffff888102b73d80 [ 22.705033] which belongs to the cache kmalloc-64 of size 64 [ 22.706739] The buggy address is located 0 bytes to the right of [ 22.706739] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 22.707800] [ 22.708269] The buggy address belongs to the physical page: [ 22.708747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 22.709326] flags: 0x200000000000000(node=0|zone=2) [ 22.710129] page_type: f5(slab) [ 22.711191] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.711712] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.712327] page dumped because: kasan: bad access detected [ 22.713063] [ 22.713464] Memory state around the buggy address: [ 22.714098] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.714974] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.715495] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.716519] ^ [ 22.717085] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.717616] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.718523] ================================================================== [ 24.271782] ================================================================== [ 24.273412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 24.273985] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282 [ 24.274554] [ 24.274841] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 24.275935] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.275958] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.275990] Call Trace: [ 24.276017] <TASK> [ 24.276042] dump_stack_lvl+0x73/0xb0 [ 24.276083] print_report+0xd1/0x650 [ 24.276118] ? __virt_addr_valid+0x1db/0x2d0 [ 24.276152] ? kasan_atomics_helper+0x164f/0x5450 [ 24.276504] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.276550] ? kasan_atomics_helper+0x164f/0x5450 [ 24.276597] kasan_report+0x141/0x180 [ 24.276667] ? kasan_atomics_helper+0x164f/0x5450 [ 24.276710] kasan_check_range+0x10c/0x1c0 [ 24.276747] __kasan_check_write+0x18/0x20 [ 24.276778] kasan_atomics_helper+0x164f/0x5450 [ 24.276813] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.276846] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.276906] ? kasan_atomics+0x152/0x310 [ 24.276940] kasan_atomics+0x1dc/0x310 [ 24.276971] ? __pfx_kasan_atomics+0x10/0x10 [ 24.277002] ? __pfx_read_tsc+0x10/0x10 [ 24.277037] ? ktime_get_ts64+0x86/0x230 [ 24.277073] kunit_try_run_case+0x1a5/0x480 [ 24.277105] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.277136] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.277174] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.277211] ? __kthread_parkme+0x82/0x180 [ 24.277243] ? preempt_count_sub+0x50/0x80 [ 24.277277] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.277308] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.277346] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.277383] kthread+0x337/0x6f0 [ 24.277413] ? trace_preempt_on+0x20/0xc0 [ 24.277447] ? __pfx_kthread+0x10/0x10 [ 24.277478] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.277513] ? calculate_sigpending+0x7b/0xa0 [ 24.277549] ? __pfx_kthread+0x10/0x10 [ 24.277581] ret_from_fork+0x116/0x1d0 [ 24.277643] ? __pfx_kthread+0x10/0x10 [ 24.277679] ret_from_fork_asm+0x1a/0x30 [ 24.277724] </TASK> [ 24.277741] [ 24.297139] Allocated by task 282: [ 24.297949] kasan_save_stack+0x45/0x70 [ 24.298722] kasan_save_track+0x18/0x40 [ 24.299433] kasan_save_alloc_info+0x3b/0x50 [ 24.300310] __kasan_kmalloc+0xb7/0xc0 [ 24.301277] __kmalloc_cache_noprof+0x189/0x420 [ 24.302001] kasan_atomics+0x95/0x310 [ 24.302322] kunit_try_run_case+0x1a5/0x480 [ 24.302646] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.303385] kthread+0x337/0x6f0 [ 24.304027] ret_from_fork+0x116/0x1d0 [ 24.304815] ret_from_fork_asm+0x1a/0x30 [ 24.305544] [ 24.305934] The buggy address belongs to the object at ffff888102b73d80 [ 24.305934] which belongs to the cache kmalloc-64 of size 64 [ 24.307309] The buggy address is located 0 bytes to the right of [ 24.307309] allocated 48-byte region [ffff888102b73d80, ffff888102b73db0) [ 24.308427] [ 24.308833] The buggy address belongs to the physical page: [ 24.309465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73 [ 24.310401] flags: 0x200000000000000(node=0|zone=2) [ 24.311209] page_type: f5(slab) [ 24.311596] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.312247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.313377] page dumped because: kasan: bad access detected [ 24.313783] [ 24.314040] Memory state around the buggy address: [ 24.314697] ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.315454] ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.316159] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.316846] ^ [ 24.317298] ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.318188] ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.318888] ==================================================================
[ 72.234069] ================================================================== [ 72.249053] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5044/0x5ab0 [ 72.256500] Read of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 72.263153] [ 72.264678] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 72.264678] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 72.264709] Hardware name: Generic DRA74X (Flattened Device Tree) [ 72.264709] Call trace: [ 72.264709] unwind_backtrace from show_stack+0x18/0x1c [ 72.264739] show_stack from dump_stack_lvl+0x70/0x90 [ 72.264770] dump_stack_lvl from print_report+0x158/0x528 [ 72.264801] print_report from kasan_report+0xdc/0x118 [ 72.264831] kasan_report from kasan_atomics_helper+0x5044/0x5ab0 [ 72.264831] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 72.264862] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 72.264892] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 72.264923] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 72.264953] kthread from ret_from_fork+0x14/0x20 [ 72.264984] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 72.264984] 3fa0: 00000000 00000000 00000000 00000000 [ 72.265014] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 72.265014] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 72.265045] [ 72.376892] Allocated by task 317: [ 72.380310] kasan_save_track+0x30/0x5c [ 72.384185] __kasan_kmalloc+0x8c/0x94 [ 72.387969] kasan_atomics+0xc0/0x33c [ 72.391662] kunit_try_run_case+0x22c/0x5a8 [ 72.395874] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 72.401428] kthread+0x464/0x810 [ 72.404663] ret_from_fork+0x14/0x20 [ 72.408264] [ 72.409790] The buggy address belongs to the object at cc90f300 [ 72.409790] which belongs to the cache kmalloc-64 of size 64 [ 72.421508] The buggy address is located 0 bytes to the right of [ 72.421508] allocated 48-byte region [cc90f300, cc90f330) [ 72.433044] [ 72.434539] The buggy address belongs to the physical page: [ 72.440155] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 72.447448] flags: 0x0(zone=0) [ 72.450531] page_type: f5(slab) [ 72.453674] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 72.461822] raw: 00000000 [ 72.464477] page dumped because: kasan: bad access detected [ 72.470092] [ 72.471588] Memory state around the buggy address: [ 72.476409] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.482971] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.489562] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.496124] ^ [ 72.500244] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.506805] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.513397] ================================================================== [ 87.840515] ================================================================== [ 87.847808] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x22c4/0x5ab0 [ 87.855255] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 87.861999] [ 87.863494] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 87.863525] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 87.863525] Hardware name: Generic DRA74X (Flattened Device Tree) [ 87.863555] Call trace: [ 87.863555] unwind_backtrace from show_stack+0x18/0x1c [ 87.863586] show_stack from dump_stack_lvl+0x70/0x90 [ 87.863616] dump_stack_lvl from print_report+0x158/0x528 [ 87.863616] print_report from kasan_report+0xdc/0x118 [ 87.863647] kasan_report from kasan_check_range+0x14c/0x198 [ 87.863677] kasan_check_range from kasan_atomics_helper+0x22c4/0x5ab0 [ 87.863708] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 87.863739] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 87.863769] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 87.863769] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 87.863800] kthread from ret_from_fork+0x14/0x20 [ 87.863830] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 87.863830] 3fa0: 00000000 00000000 00000000 00000000 [ 87.863861] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 87.863891] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 87.863891] [ 87.981872] Allocated by task 317: [ 87.985290] kasan_save_track+0x30/0x5c [ 87.989166] __kasan_kmalloc+0x8c/0x94 [ 87.992950] kasan_atomics+0xc0/0x33c [ 87.996643] kunit_try_run_case+0x22c/0x5a8 [ 88.000854] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 88.006378] kthread+0x464/0x810 [ 88.009643] ret_from_fork+0x14/0x20 [ 88.013244] [ 88.014739] The buggy address belongs to the object at cc90f300 [ 88.014739] which belongs to the cache kmalloc-64 of size 64 [ 88.026458] The buggy address is located 0 bytes to the right of [ 88.026458] allocated 48-byte region [cc90f300, cc90f330) [ 88.038024] [ 88.039520] The buggy address belongs to the physical page: [ 88.045135] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 88.052398] flags: 0x0(zone=0) [ 88.055480] page_type: f5(slab) [ 88.058654] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 88.066772] raw: 00000000 [ 88.069427] page dumped because: kasan: bad access detected [ 88.075042] [ 88.076538] Memory state around the buggy address: [ 88.081359] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.087921] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.094512] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 88.101074] ^ [ 88.105194] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.111755] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.118316] ================================================================== [ 88.410766] ================================================================== [ 88.418029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9c/0x5ab0 [ 88.425476] Read of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 88.432159] [ 88.433654] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 88.433685] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 88.433685] Hardware name: Generic DRA74X (Flattened Device Tree) [ 88.433715] Call trace: [ 88.433715] unwind_backtrace from show_stack+0x18/0x1c [ 88.433746] show_stack from dump_stack_lvl+0x70/0x90 [ 88.433776] dump_stack_lvl from print_report+0x158/0x528 [ 88.433776] print_report from kasan_report+0xdc/0x118 [ 88.433807] kasan_report from kasan_atomics_helper+0x4f9c/0x5ab0 [ 88.433837] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 88.433868] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 88.433898] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 88.433929] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 88.433929] kthread from ret_from_fork+0x14/0x20 [ 88.433959] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 88.433990] 3fa0: 00000000 00000000 00000000 00000000 [ 88.433990] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 88.434020] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 88.434020] [ 88.545867] Allocated by task 317: [ 88.549316] kasan_save_track+0x30/0x5c [ 88.553161] __kasan_kmalloc+0x8c/0x94 [ 88.556945] kasan_atomics+0xc0/0x33c [ 88.560638] kunit_try_run_case+0x22c/0x5a8 [ 88.564880] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 88.570404] kthread+0x464/0x810 [ 88.573638] ret_from_fork+0x14/0x20 [ 88.577239] [ 88.578765] The buggy address belongs to the object at cc90f300 [ 88.578765] which belongs to the cache kmalloc-64 of size 64 [ 88.590484] The buggy address is located 0 bytes to the right of [ 88.590484] allocated 48-byte region [cc90f300, cc90f330) [ 88.602020] [ 88.603546] The buggy address belongs to the physical page: [ 88.609130] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 88.616424] flags: 0x0(zone=0) [ 88.619476] page_type: f5(slab) [ 88.622650] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 88.630798] raw: 00000000 [ 88.633453] page dumped because: kasan: bad access detected [ 88.639038] [ 88.640533] Memory state around the buggy address: [ 88.645385] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.651947] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.658508] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 88.665069] ^ [ 88.669219] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.675781] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.682342] ================================================================== [ 73.078826] ================================================================== [ 73.086090] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x550c/0x5ab0 [ 73.093566] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 73.100311] [ 73.101806] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 73.101837] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 73.101837] Hardware name: Generic DRA74X (Flattened Device Tree) [ 73.101867] Call trace: [ 73.101867] unwind_backtrace from show_stack+0x18/0x1c [ 73.101898] show_stack from dump_stack_lvl+0x70/0x90 [ 73.101898] dump_stack_lvl from print_report+0x158/0x528 [ 73.101928] print_report from kasan_report+0xdc/0x118 [ 73.101959] kasan_report from kasan_atomics_helper+0x550c/0x5ab0 [ 73.101989] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 73.102020] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 73.102050] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 73.102081] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 73.102081] kthread from ret_from_fork+0x14/0x20 [ 73.102111] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 73.102142] 3fa0: 00000000 00000000 00000000 00000000 [ 73.102142] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 73.102172] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 73.102172] [ 73.214019] Allocated by task 317: [ 73.217468] kasan_save_track+0x30/0x5c [ 73.221313] __kasan_kmalloc+0x8c/0x94 [ 73.225097] kasan_atomics+0xc0/0x33c [ 73.228790] kunit_try_run_case+0x22c/0x5a8 [ 73.233032] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 73.238555] kthread+0x464/0x810 [ 73.241790] ret_from_fork+0x14/0x20 [ 73.245422] [ 73.246917] The buggy address belongs to the object at cc90f300 [ 73.246917] which belongs to the cache kmalloc-64 of size 64 [ 73.258636] The buggy address is located 0 bytes to the right of [ 73.258636] allocated 48-byte region [cc90f300, cc90f330) [ 73.270202] [ 73.271697] The buggy address belongs to the physical page: [ 73.277313] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 73.284576] flags: 0x0(zone=0) [ 73.287658] page_type: f5(slab) [ 73.290832] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 73.298980] raw: 00000000 [ 73.301605] page dumped because: kasan: bad access detected [ 73.307220] [ 73.308715] Memory state around the buggy address: [ 73.313537] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.320098] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.326690] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.333251] ^ [ 73.337371] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.343933] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.350524] ================================================================== [ 72.799926] ================================================================== [ 72.807189] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5170/0x5ab0 [ 72.814636] Read of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 72.821289] [ 72.822814] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 72.822814] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 72.822845] Hardware name: Generic DRA74X (Flattened Device Tree) [ 72.822845] Call trace: [ 72.822845] unwind_backtrace from show_stack+0x18/0x1c [ 72.822875] show_stack from dump_stack_lvl+0x70/0x90 [ 72.822906] dump_stack_lvl from print_report+0x158/0x528 [ 72.822937] print_report from kasan_report+0xdc/0x118 [ 72.822967] kasan_report from kasan_atomics_helper+0x5170/0x5ab0 [ 72.822967] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 72.822998] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 72.823028] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 72.823059] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 72.823089] kthread from ret_from_fork+0x14/0x20 [ 72.823120] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 72.823120] 3fa0: 00000000 00000000 00000000 00000000 [ 72.823150] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 72.823150] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 72.823181] [ 72.935028] Allocated by task 317: [ 72.938446] kasan_save_track+0x30/0x5c [ 72.942321] __kasan_kmalloc+0x8c/0x94 [ 72.946105] kasan_atomics+0xc0/0x33c [ 72.949798] kunit_try_run_case+0x22c/0x5a8 [ 72.954010] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 72.959533] kthread+0x464/0x810 [ 72.962799] ret_from_fork+0x14/0x20 [ 72.966400] [ 72.967895] The buggy address belongs to the object at cc90f300 [ 72.967895] which belongs to the cache kmalloc-64 of size 64 [ 72.979644] The buggy address is located 0 bytes to the right of [ 72.979644] allocated 48-byte region [cc90f300, cc90f330) [ 72.991180] [ 72.992675] The buggy address belongs to the physical page: [ 72.998291] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 73.005554] flags: 0x0(zone=0) [ 73.008636] page_type: f5(slab) [ 73.011810] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 73.019958] raw: 00000000 [ 73.022613] page dumped because: kasan: bad access detected [ 73.028198] [ 73.029724] Memory state around the buggy address: [ 73.034545] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.041107] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.047668] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.054260] ^ [ 73.058380] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.064941] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.071502] ================================================================== [ 79.038940] ================================================================== [ 79.046203] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1034/0x5ab0 [ 79.053649] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 79.060394] [ 79.061920] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 79.061950] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 79.061950] Hardware name: Generic DRA74X (Flattened Device Tree) [ 79.061950] Call trace: [ 79.061981] unwind_backtrace from show_stack+0x18/0x1c [ 79.061981] show_stack from dump_stack_lvl+0x70/0x90 [ 79.062011] dump_stack_lvl from print_report+0x158/0x528 [ 79.062042] print_report from kasan_report+0xdc/0x118 [ 79.062072] kasan_report from kasan_check_range+0x14c/0x198 [ 79.062072] kasan_check_range from kasan_atomics_helper+0x1034/0x5ab0 [ 79.062103] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 79.062133] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 79.062164] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 79.062194] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 79.062225] kthread from ret_from_fork+0x14/0x20 [ 79.062225] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 79.062255] 3fa0: 00000000 00000000 00000000 00000000 [ 79.062286] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 79.062286] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 79.062286] [ 79.180267] Allocated by task 317: [ 79.183685] kasan_save_track+0x30/0x5c [ 79.187561] __kasan_kmalloc+0x8c/0x94 [ 79.191345] kasan_atomics+0xc0/0x33c [ 79.195037] kunit_try_run_case+0x22c/0x5a8 [ 79.199249] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 79.204803] kthread+0x464/0x810 [ 79.208038] ret_from_fork+0x14/0x20 [ 79.211639] [ 79.213165] The buggy address belongs to the object at cc90f300 [ 79.213165] which belongs to the cache kmalloc-64 of size 64 [ 79.224884] The buggy address is located 0 bytes to the right of [ 79.224884] allocated 48-byte region [cc90f300, cc90f330) [ 79.236419] [ 79.237915] The buggy address belongs to the physical page: [ 79.243530] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 79.250793] flags: 0x0(zone=0) [ 79.253875] page_type: f5(slab) [ 79.257049] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 79.265197] raw: 00000000 [ 79.267822] page dumped because: kasan: bad access detected [ 79.273437] [ 79.274932] Memory state around the buggy address: [ 79.279754] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.286346] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.292907] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 79.299468] ^ [ 79.303588] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.310180] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.316741] ================================================================== [ 73.921630] ================================================================== [ 73.928894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e0/0x5ab0 [ 73.936279] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 73.943023] [ 73.944519] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 73.944549] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 73.944549] Hardware name: Generic DRA74X (Flattened Device Tree) [ 73.944580] Call trace: [ 73.944580] unwind_backtrace from show_stack+0x18/0x1c [ 73.944610] show_stack from dump_stack_lvl+0x70/0x90 [ 73.944641] dump_stack_lvl from print_report+0x158/0x528 [ 73.944671] print_report from kasan_report+0xdc/0x118 [ 73.944671] kasan_report from kasan_check_range+0x14c/0x198 [ 73.944702] kasan_check_range from kasan_atomics_helper+0x4e0/0x5ab0 [ 73.944732] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 73.944763] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 73.944793] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 73.944824] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 73.944824] kthread from ret_from_fork+0x14/0x20 [ 73.944854] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 73.944885] 3fa0: 00000000 00000000 00000000 00000000 [ 73.944885] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 73.944915] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 73.944915] [ 74.062805] Allocated by task 317: [ 74.066223] kasan_save_track+0x30/0x5c [ 74.070098] __kasan_kmalloc+0x8c/0x94 [ 74.073883] kasan_atomics+0xc0/0x33c [ 74.077575] kunit_try_run_case+0x22c/0x5a8 [ 74.081787] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 74.087310] kthread+0x464/0x810 [ 74.090576] ret_from_fork+0x14/0x20 [ 74.094177] [ 74.095672] The buggy address belongs to the object at cc90f300 [ 74.095672] which belongs to the cache kmalloc-64 of size 64 [ 74.107421] The buggy address is located 0 bytes to the right of [ 74.107421] allocated 48-byte region [cc90f300, cc90f330) [ 74.118957] [ 74.120452] The buggy address belongs to the physical page: [ 74.126068] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 74.133331] flags: 0x0(zone=0) [ 74.136413] page_type: f5(slab) [ 74.139587] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 74.147735] raw: 00000000 [ 74.150360] page dumped because: kasan: bad access detected [ 74.155975] [ 74.157501] Memory state around the buggy address: [ 74.162322] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.168884] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.175445] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.182037] ^ [ 74.186157] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.192718] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.199279] ================================================================== [ 85.850891] ================================================================== [ 85.858154] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e5c/0x5ab0 [ 85.865631] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 85.872375] [ 85.873870] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 85.873901] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 85.873901] Hardware name: Generic DRA74X (Flattened Device Tree) [ 85.873931] Call trace: [ 85.873931] unwind_backtrace from show_stack+0x18/0x1c [ 85.873962] show_stack from dump_stack_lvl+0x70/0x90 [ 85.873992] dump_stack_lvl from print_report+0x158/0x528 [ 85.873992] print_report from kasan_report+0xdc/0x118 [ 85.874023] kasan_report from kasan_check_range+0x14c/0x198 [ 85.874053] kasan_check_range from kasan_atomics_helper+0x1e5c/0x5ab0 [ 85.874084] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 85.874114] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 85.874114] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 85.874145] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 85.874176] kthread from ret_from_fork+0x14/0x20 [ 85.874206] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 85.874206] 3fa0: 00000000 00000000 00000000 00000000 [ 85.874237] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 85.874237] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 85.874267] [ 85.992248] Allocated by task 317: [ 85.995666] kasan_save_track+0x30/0x5c [ 85.999542] __kasan_kmalloc+0x8c/0x94 [ 86.003326] kasan_atomics+0xc0/0x33c [ 86.007019] kunit_try_run_case+0x22c/0x5a8 [ 86.011230] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 86.016754] kthread+0x464/0x810 [ 86.020019] ret_from_fork+0x14/0x20 [ 86.023620] [ 86.025115] The buggy address belongs to the object at cc90f300 [ 86.025115] which belongs to the cache kmalloc-64 of size 64 [ 86.036834] The buggy address is located 0 bytes to the right of [ 86.036834] allocated 48-byte region [cc90f300, cc90f330) [ 86.048400] [ 86.049896] The buggy address belongs to the physical page: [ 86.055511] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 86.062774] flags: 0x0(zone=0) [ 86.065856] page_type: f5(slab) [ 86.069030] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 86.077178] raw: 00000000 [ 86.079803] page dumped because: kasan: bad access detected [ 86.085418] [ 86.086914] Memory state around the buggy address: [ 86.091735] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.098297] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.104888] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 86.111450] ^ [ 86.115570] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.122131] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.128723] ================================================================== [ 87.270294] ================================================================== [ 87.277557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2154/0x5ab0 [ 87.285034] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 87.291778] [ 87.293273] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 87.293304] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 87.293304] Hardware name: Generic DRA74X (Flattened Device Tree) [ 87.293334] Call trace: [ 87.293334] unwind_backtrace from show_stack+0x18/0x1c [ 87.293365] show_stack from dump_stack_lvl+0x70/0x90 [ 87.293365] dump_stack_lvl from print_report+0x158/0x528 [ 87.293395] print_report from kasan_report+0xdc/0x118 [ 87.293426] kasan_report from kasan_check_range+0x14c/0x198 [ 87.293457] kasan_check_range from kasan_atomics_helper+0x2154/0x5ab0 [ 87.293487] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 87.293487] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 87.293518] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 87.293548] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 87.293579] kthread from ret_from_fork+0x14/0x20 [ 87.293609] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 87.293609] 3fa0: 00000000 00000000 00000000 00000000 [ 87.293640] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 87.293640] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 87.293670] [ 87.411651] Allocated by task 317: [ 87.415069] kasan_save_track+0x30/0x5c [ 87.418914] __kasan_kmalloc+0x8c/0x94 [ 87.422698] kasan_atomics+0xc0/0x33c [ 87.426391] kunit_try_run_case+0x22c/0x5a8 [ 87.430633] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 87.436157] kthread+0x464/0x810 [ 87.439392] ret_from_fork+0x14/0x20 [ 87.442993] [ 87.444519] The buggy address belongs to the object at cc90f300 [ 87.444519] which belongs to the cache kmalloc-64 of size 64 [ 87.456237] The buggy address is located 0 bytes to the right of [ 87.456237] allocated 48-byte region [cc90f300, cc90f330) [ 87.467773] [ 87.469299] The buggy address belongs to the physical page: [ 87.474884] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 87.482177] flags: 0x0(zone=0) [ 87.485229] page_type: f5(slab) [ 87.488403] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 87.496551] raw: 00000000 [ 87.499206] page dumped because: kasan: bad access detected [ 87.504791] [ 87.506317] Memory state around the buggy address: [ 87.511108] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.517700] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.524261] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 87.530822] ^ [ 87.534973] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.541534] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.548095] ================================================================== [ 79.609191] ================================================================== [ 79.616455] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11a4/0x5ab0 [ 79.623901] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 79.630645] [ 79.632171] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 79.632202] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 79.632202] Hardware name: Generic DRA74X (Flattened Device Tree) [ 79.632202] Call trace: [ 79.632232] unwind_backtrace from show_stack+0x18/0x1c [ 79.632263] show_stack from dump_stack_lvl+0x70/0x90 [ 79.632263] dump_stack_lvl from print_report+0x158/0x528 [ 79.632293] print_report from kasan_report+0xdc/0x118 [ 79.632324] kasan_report from kasan_check_range+0x14c/0x198 [ 79.632354] kasan_check_range from kasan_atomics_helper+0x11a4/0x5ab0 [ 79.632354] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 79.632385] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 79.632415] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 79.632446] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 79.632476] kthread from ret_from_fork+0x14/0x20 [ 79.632507] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 79.632507] 3fa0: 00000000 00000000 00000000 00000000 [ 79.632537] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 79.632537] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 79.632568] [ 79.750518] Allocated by task 317: [ 79.753967] kasan_save_track+0x30/0x5c [ 79.757843] __kasan_kmalloc+0x8c/0x94 [ 79.761596] kasan_atomics+0xc0/0x33c [ 79.765289] kunit_try_run_case+0x22c/0x5a8 [ 79.769531] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 79.775054] kthread+0x464/0x810 [ 79.778320] ret_from_fork+0x14/0x20 [ 79.781921] [ 79.783416] The buggy address belongs to the object at cc90f300 [ 79.783416] which belongs to the cache kmalloc-64 of size 64 [ 79.795135] The buggy address is located 0 bytes to the right of [ 79.795135] allocated 48-byte region [cc90f300, cc90f330) [ 79.806701] [ 79.808197] The buggy address belongs to the physical page: [ 79.813812] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 79.821075] flags: 0x0(zone=0) [ 79.824157] page_type: f5(slab) [ 79.827331] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 79.835449] raw: 00000000 [ 79.838104] page dumped because: kasan: bad access detected [ 79.843719] [ 79.845214] Memory state around the buggy address: [ 79.850036] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.856597] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.863189] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 79.869750] ^ [ 79.873870] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.880432] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.886993] ================================================================== [ 75.340515] ================================================================== [ 75.347778] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x790/0x5ab0 [ 75.355133] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 75.361877] [ 75.363403] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 75.363403] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 75.363433] Hardware name: Generic DRA74X (Flattened Device Tree) [ 75.363433] Call trace: [ 75.363433] unwind_backtrace from show_stack+0x18/0x1c [ 75.363464] show_stack from dump_stack_lvl+0x70/0x90 [ 75.363494] dump_stack_lvl from print_report+0x158/0x528 [ 75.363525] print_report from kasan_report+0xdc/0x118 [ 75.363555] kasan_report from kasan_check_range+0x14c/0x198 [ 75.363555] kasan_check_range from kasan_atomics_helper+0x790/0x5ab0 [ 75.363586] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 75.363616] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 75.363647] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 75.363677] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 75.363708] kthread from ret_from_fork+0x14/0x20 [ 75.363708] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 75.363739] 3fa0: 00000000 00000000 00000000 00000000 [ 75.363739] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 75.363769] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 75.363769] [ 75.481658] Allocated by task 317: [ 75.485107] kasan_save_track+0x30/0x5c [ 75.488952] __kasan_kmalloc+0x8c/0x94 [ 75.492736] kasan_atomics+0xc0/0x33c [ 75.496429] kunit_try_run_case+0x22c/0x5a8 [ 75.500640] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 75.506195] kthread+0x464/0x810 [ 75.509429] ret_from_fork+0x14/0x20 [ 75.513061] [ 75.514556] The buggy address belongs to the object at cc90f300 [ 75.514556] which belongs to the cache kmalloc-64 of size 64 [ 75.526275] The buggy address is located 0 bytes to the right of [ 75.526275] allocated 48-byte region [cc90f300, cc90f330) [ 75.537811] [ 75.539337] The buggy address belongs to the physical page: [ 75.544921] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 75.552215] flags: 0x0(zone=0) [ 75.555297] page_type: f5(slab) [ 75.558471] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 75.566589] raw: 00000000 [ 75.569244] page dumped because: kasan: bad access detected [ 75.574859] [ 75.576354] Memory state around the buggy address: [ 75.581176] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.587738] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.594329] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.600891] ^ [ 75.605010] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.611602] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.618164] ================================================================== [ 75.625488] ================================================================== [ 75.632751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x834/0x5ab0 [ 75.640106] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 75.646850] [ 75.648376] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 75.648406] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 75.648406] Hardware name: Generic DRA74X (Flattened Device Tree) [ 75.648406] Call trace: [ 75.648437] unwind_backtrace from show_stack+0x18/0x1c [ 75.648437] show_stack from dump_stack_lvl+0x70/0x90 [ 75.648468] dump_stack_lvl from print_report+0x158/0x528 [ 75.648498] print_report from kasan_report+0xdc/0x118 [ 75.648529] kasan_report from kasan_check_range+0x14c/0x198 [ 75.648529] kasan_check_range from kasan_atomics_helper+0x834/0x5ab0 [ 75.648559] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 75.648590] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 75.648620] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 75.648651] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 75.648681] kthread from ret_from_fork+0x14/0x20 [ 75.648681] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 75.648712] 3fa0: 00000000 00000000 00000000 00000000 [ 75.648742] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 75.648742] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 75.648742] [ 75.766632] Allocated by task 317: [ 75.770080] kasan_save_track+0x30/0x5c [ 75.773925] __kasan_kmalloc+0x8c/0x94 [ 75.777709] kasan_atomics+0xc0/0x33c [ 75.781402] kunit_try_run_case+0x22c/0x5a8 [ 75.785644] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 75.791168] kthread+0x464/0x810 [ 75.794403] ret_from_fork+0x14/0x20 [ 75.798034] [ 75.799530] The buggy address belongs to the object at cc90f300 [ 75.799530] which belongs to the cache kmalloc-64 of size 64 [ 75.811248] The buggy address is located 0 bytes to the right of [ 75.811248] allocated 48-byte region [cc90f300, cc90f330) [ 75.822784] [ 75.824310] The buggy address belongs to the physical page: [ 75.829895] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 75.837188] flags: 0x0(zone=0) [ 75.840270] page_type: f5(slab) [ 75.843414] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 75.851562] raw: 00000000 [ 75.854217] page dumped because: kasan: bad access detected [ 75.859832] [ 75.861328] Memory state around the buggy address: [ 75.866149] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.872711] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.879302] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.885864] ^ [ 75.889984] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.896545] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.903137] ================================================================== [ 83.569885] ================================================================== [ 83.577148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18bc/0x5ab0 [ 83.584594] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 83.591339] [ 83.592864] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 83.592895] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 83.592895] Hardware name: Generic DRA74X (Flattened Device Tree) [ 83.592895] Call trace: [ 83.592926] unwind_backtrace from show_stack+0x18/0x1c [ 83.592926] show_stack from dump_stack_lvl+0x70/0x90 [ 83.592956] dump_stack_lvl from print_report+0x158/0x528 [ 83.592987] print_report from kasan_report+0xdc/0x118 [ 83.593017] kasan_report from kasan_check_range+0x14c/0x198 [ 83.593048] kasan_check_range from kasan_atomics_helper+0x18bc/0x5ab0 [ 83.593048] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 83.593078] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 83.593109] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 83.593139] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 83.593170] kthread from ret_from_fork+0x14/0x20 [ 83.593200] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 83.593200] 3fa0: 00000000 00000000 00000000 00000000 [ 83.593231] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 83.593231] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 83.593261] [ 83.711212] Allocated by task 317: [ 83.714660] kasan_save_track+0x30/0x5c [ 83.718505] __kasan_kmalloc+0x8c/0x94 [ 83.722290] kasan_atomics+0xc0/0x33c [ 83.725982] kunit_try_run_case+0x22c/0x5a8 [ 83.730224] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 83.735748] kthread+0x464/0x810 [ 83.739013] ret_from_fork+0x14/0x20 [ 83.742614] [ 83.744110] The buggy address belongs to the object at cc90f300 [ 83.744110] which belongs to the cache kmalloc-64 of size 64 [ 83.755828] The buggy address is located 0 bytes to the right of [ 83.755828] allocated 48-byte region [cc90f300, cc90f330) [ 83.767395] [ 83.768890] The buggy address belongs to the physical page: [ 83.774505] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 83.781768] flags: 0x0(zone=0) [ 83.784851] page_type: f5(slab) [ 83.787994] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 83.796142] raw: 00000000 [ 83.798797] page dumped because: kasan: bad access detected [ 83.804382] [ 83.805908] Memory state around the buggy address: [ 83.810729] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.817291] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.823852] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 83.830444] ^ [ 83.834564] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.841125] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.847686] ================================================================== [ 80.179443] ================================================================== [ 80.186737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5218/0x5ab0 [ 80.194183] Read of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 80.200836] [ 80.202331] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 80.202362] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 80.202362] Hardware name: Generic DRA74X (Flattened Device Tree) [ 80.202392] Call trace: [ 80.202392] unwind_backtrace from show_stack+0x18/0x1c [ 80.202423] show_stack from dump_stack_lvl+0x70/0x90 [ 80.202453] dump_stack_lvl from print_report+0x158/0x528 [ 80.202484] print_report from kasan_report+0xdc/0x118 [ 80.202484] kasan_report from kasan_atomics_helper+0x5218/0x5ab0 [ 80.202514] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 80.202545] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 80.202575] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 80.202606] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 80.202636] kthread from ret_from_fork+0x14/0x20 [ 80.202636] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 80.202667] 3fa0: 00000000 00000000 00000000 00000000 [ 80.202667] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 80.202697] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 80.202697] [ 80.314575] Allocated by task 317: [ 80.317993] kasan_save_track+0x30/0x5c [ 80.321868] __kasan_kmalloc+0x8c/0x94 [ 80.325653] kasan_atomics+0xc0/0x33c [ 80.329345] kunit_try_run_case+0x22c/0x5a8 [ 80.333557] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 80.339080] kthread+0x464/0x810 [ 80.342346] ret_from_fork+0x14/0x20 [ 80.345947] [ 80.347442] The buggy address belongs to the object at cc90f300 [ 80.347442] which belongs to the cache kmalloc-64 of size 64 [ 80.359161] The buggy address is located 0 bytes to the right of [ 80.359161] allocated 48-byte region [cc90f300, cc90f330) [ 80.370727] [ 80.372222] The buggy address belongs to the physical page: [ 80.377838] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 80.385101] flags: 0x0(zone=0) [ 80.388183] page_type: f5(slab) [ 80.391357] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 80.399505] raw: 00000000 [ 80.402130] page dumped because: kasan: bad access detected [ 80.407745] [ 80.409240] Memory state around the buggy address: [ 80.414062] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.420623] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.427215] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 80.433776] ^ [ 80.437896] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.444488] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.451049] ================================================================== [ 88.689666] ================================================================== [ 88.696929] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2480/0x5ab0 [ 88.704376] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 88.711120] [ 88.712646] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 88.712677] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 88.712677] Hardware name: Generic DRA74X (Flattened Device Tree) [ 88.712677] Call trace: [ 88.712677] unwind_backtrace from show_stack+0x18/0x1c [ 88.712707] show_stack from dump_stack_lvl+0x70/0x90 [ 88.712738] dump_stack_lvl from print_report+0x158/0x528 [ 88.712768] print_report from kasan_report+0xdc/0x118 [ 88.712799] kasan_report from kasan_check_range+0x14c/0x198 [ 88.712799] kasan_check_range from kasan_atomics_helper+0x2480/0x5ab0 [ 88.712829] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 88.712860] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 88.712890] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 88.712921] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 88.712951] kthread from ret_from_fork+0x14/0x20 [ 88.712951] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 88.712982] 3fa0: 00000000 00000000 00000000 00000000 [ 88.712982] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 88.713012] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 88.713012] [ 88.830993] Allocated by task 317: [ 88.834411] kasan_save_track+0x30/0x5c [ 88.838287] __kasan_kmalloc+0x8c/0x94 [ 88.842071] kasan_atomics+0xc0/0x33c [ 88.845764] kunit_try_run_case+0x22c/0x5a8 [ 88.849975] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 88.855499] kthread+0x464/0x810 [ 88.858764] ret_from_fork+0x14/0x20 [ 88.862365] [ 88.863861] The buggy address belongs to the object at cc90f300 [ 88.863861] which belongs to the cache kmalloc-64 of size 64 [ 88.875610] The buggy address is located 0 bytes to the right of [ 88.875610] allocated 48-byte region [cc90f300, cc90f330) [ 88.887145] [ 88.888641] The buggy address belongs to the physical page: [ 88.894256] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 88.901519] flags: 0x0(zone=0) [ 88.904602] page_type: f5(slab) [ 88.907775] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 88.915924] raw: 00000000 [ 88.918548] page dumped because: kasan: bad access detected [ 88.924163] [ 88.925659] Memory state around the buggy address: [ 88.930480] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.937042] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.943634] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 88.950195] ^ [ 88.954315] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.960906] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.967468] ================================================================== [ 72.520874] ================================================================== [ 72.528167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x514c/0x5ab0 [ 72.535614] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 72.542358] [ 72.543853] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 72.543884] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 72.543914] Hardware name: Generic DRA74X (Flattened Device Tree) [ 72.543914] Call trace: [ 72.543914] unwind_backtrace from show_stack+0x18/0x1c [ 72.543945] show_stack from dump_stack_lvl+0x70/0x90 [ 72.543975] dump_stack_lvl from print_report+0x158/0x528 [ 72.544006] print_report from kasan_report+0xdc/0x118 [ 72.544006] kasan_report from kasan_atomics_helper+0x514c/0x5ab0 [ 72.544036] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 72.544067] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 72.544097] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 72.544128] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 72.544158] kthread from ret_from_fork+0x14/0x20 [ 72.544158] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 72.544189] 3fa0: 00000000 00000000 00000000 00000000 [ 72.544189] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 72.544219] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 72.544219] [ 72.656097] Allocated by task 317: [ 72.659515] kasan_save_track+0x30/0x5c [ 72.663391] __kasan_kmalloc+0x8c/0x94 [ 72.667175] kasan_atomics+0xc0/0x33c [ 72.670867] kunit_try_run_case+0x22c/0x5a8 [ 72.675079] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 72.680603] kthread+0x464/0x810 [ 72.683868] ret_from_fork+0x14/0x20 [ 72.687469] [ 72.688964] The buggy address belongs to the object at cc90f300 [ 72.688964] which belongs to the cache kmalloc-64 of size 64 [ 72.700714] The buggy address is located 0 bytes to the right of [ 72.700714] allocated 48-byte region [cc90f300, cc90f330) [ 72.712249] [ 72.713775] The buggy address belongs to the physical page: [ 72.719360] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 72.726654] flags: 0x0(zone=0) [ 72.729705] page_type: f5(slab) [ 72.732879] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 72.741027] raw: 00000000 [ 72.743682] page dumped because: kasan: bad access detected [ 72.749267] [ 72.750793] Memory state around the buggy address: [ 72.755615] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.762176] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.768737] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.775329] ^ [ 72.779449] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.786010] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.792602] ================================================================== [ 83.855010] ================================================================== [ 83.862274] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1960/0x5ab0 [ 83.869720] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 83.876464] [ 83.877990] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 83.878021] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 83.878021] Hardware name: Generic DRA74X (Flattened Device Tree) [ 83.878021] Call trace: [ 83.878051] unwind_backtrace from show_stack+0x18/0x1c [ 83.878051] show_stack from dump_stack_lvl+0x70/0x90 [ 83.878082] dump_stack_lvl from print_report+0x158/0x528 [ 83.878112] print_report from kasan_report+0xdc/0x118 [ 83.878143] kasan_report from kasan_check_range+0x14c/0x198 [ 83.878173] kasan_check_range from kasan_atomics_helper+0x1960/0x5ab0 [ 83.878173] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 83.878204] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 83.878234] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 83.878265] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 83.878295] kthread from ret_from_fork+0x14/0x20 [ 83.878326] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 83.878326] 3fa0: 00000000 00000000 00000000 00000000 [ 83.878356] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 83.878356] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 83.878387] [ 83.996368] Allocated by task 317: [ 83.999786] kasan_save_track+0x30/0x5c [ 84.003662] __kasan_kmalloc+0x8c/0x94 [ 84.007415] kasan_atomics+0xc0/0x33c [ 84.011138] kunit_try_run_case+0x22c/0x5a8 [ 84.015350] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 84.020874] kthread+0x464/0x810 [ 84.024139] ret_from_fork+0x14/0x20 [ 84.027740] [ 84.029235] The buggy address belongs to the object at cc90f300 [ 84.029235] which belongs to the cache kmalloc-64 of size 64 [ 84.040954] The buggy address is located 0 bytes to the right of [ 84.040954] allocated 48-byte region [cc90f300, cc90f330) [ 84.052520] [ 84.054016] The buggy address belongs to the physical page: [ 84.059631] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 84.066894] flags: 0x0(zone=0) [ 84.069976] page_type: f5(slab) [ 84.073150] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 84.081298] raw: 00000000 [ 84.083923] page dumped because: kasan: bad access detected [ 84.089538] [ 84.091033] Memory state around the buggy address: [ 84.095855] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.102416] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.109008] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 84.115570] ^ [ 84.119689] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.126251] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.132843] ================================================================== [ 85.280670] ================================================================== [ 85.287933] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c9c/0x5ab0 [ 85.295379] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 85.302124] [ 85.303619] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 85.303649] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 85.303649] Hardware name: Generic DRA74X (Flattened Device Tree) [ 85.303680] Call trace: [ 85.303680] unwind_backtrace from show_stack+0x18/0x1c [ 85.303710] show_stack from dump_stack_lvl+0x70/0x90 [ 85.303741] dump_stack_lvl from print_report+0x158/0x528 [ 85.303771] print_report from kasan_report+0xdc/0x118 [ 85.303771] kasan_report from kasan_check_range+0x14c/0x198 [ 85.303802] kasan_check_range from kasan_atomics_helper+0x1c9c/0x5ab0 [ 85.303833] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 85.303863] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 85.303894] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 85.303924] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 85.303924] kthread from ret_from_fork+0x14/0x20 [ 85.303955] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 85.303955] 3fa0: 00000000 00000000 00000000 00000000 [ 85.303985] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 85.304016] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 85.304016] [ 85.421997] Allocated by task 317: [ 85.425415] kasan_save_track+0x30/0x5c [ 85.429290] __kasan_kmalloc+0x8c/0x94 [ 85.433074] kasan_atomics+0xc0/0x33c [ 85.436767] kunit_try_run_case+0x22c/0x5a8 [ 85.440979] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 85.446502] kthread+0x464/0x810 [ 85.449768] ret_from_fork+0x14/0x20 [ 85.453369] [ 85.454864] The buggy address belongs to the object at cc90f300 [ 85.454864] which belongs to the cache kmalloc-64 of size 64 [ 85.466583] The buggy address is located 0 bytes to the right of [ 85.466583] allocated 48-byte region [cc90f300, cc90f330) [ 85.478149] [ 85.479644] The buggy address belongs to the physical page: [ 85.485260] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 85.492523] flags: 0x0(zone=0) [ 85.495605] page_type: f5(slab) [ 85.498779] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 85.506896] raw: 00000000 [ 85.509552] page dumped because: kasan: bad access detected [ 85.515167] [ 85.516662] Memory state around the buggy address: [ 85.521484] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.528045] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.534637] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 85.541198] ^ [ 85.545318] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.551879] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.558471] ================================================================== [ 81.022399] ================================================================== [ 81.029663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1458/0x5ab0 [ 81.037109] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 81.043853] [ 81.045349] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 81.045379] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 81.045379] Hardware name: Generic DRA74X (Flattened Device Tree) [ 81.045410] Call trace: [ 81.045410] unwind_backtrace from show_stack+0x18/0x1c [ 81.045440] show_stack from dump_stack_lvl+0x70/0x90 [ 81.045471] dump_stack_lvl from print_report+0x158/0x528 [ 81.045501] print_report from kasan_report+0xdc/0x118 [ 81.045501] kasan_report from kasan_check_range+0x14c/0x198 [ 81.045532] kasan_check_range from kasan_atomics_helper+0x1458/0x5ab0 [ 81.045562] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 81.045593] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 81.045623] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 81.045654] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 81.045654] kthread from ret_from_fork+0x14/0x20 [ 81.045684] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 81.045715] 3fa0: 00000000 00000000 00000000 00000000 [ 81.045715] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 81.045745] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 81.045745] [ 81.163726] Allocated by task 317: [ 81.167144] kasan_save_track+0x30/0x5c [ 81.171020] __kasan_kmalloc+0x8c/0x94 [ 81.174804] kasan_atomics+0xc0/0x33c [ 81.178497] kunit_try_run_case+0x22c/0x5a8 [ 81.182708] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 81.188232] kthread+0x464/0x810 [ 81.191497] ret_from_fork+0x14/0x20 [ 81.195098] [ 81.196594] The buggy address belongs to the object at cc90f300 [ 81.196594] which belongs to the cache kmalloc-64 of size 64 [ 81.208312] The buggy address is located 0 bytes to the right of [ 81.208312] allocated 48-byte region [cc90f300, cc90f330) [ 81.219879] [ 81.221374] The buggy address belongs to the physical page: [ 81.226989] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 81.234252] flags: 0x0(zone=0) [ 81.237335] page_type: f5(slab) [ 81.240509] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 81.248626] raw: 00000000 [ 81.251281] page dumped because: kasan: bad access detected [ 81.256896] [ 81.258392] Memory state around the buggy address: [ 81.263214] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.269775] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.276367] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 81.282928] ^ [ 81.287048] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.293609] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.300201] ================================================================== [ 74.770568] ================================================================== [ 74.777832] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x648/0x5ab0 [ 74.785186] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 74.791961] [ 74.793457] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 74.793487] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 74.793487] Hardware name: Generic DRA74X (Flattened Device Tree) [ 74.793487] Call trace: [ 74.793518] unwind_backtrace from show_stack+0x18/0x1c [ 74.793548] show_stack from dump_stack_lvl+0x70/0x90 [ 74.793548] dump_stack_lvl from print_report+0x158/0x528 [ 74.793579] print_report from kasan_report+0xdc/0x118 [ 74.793609] kasan_report from kasan_check_range+0x14c/0x198 [ 74.793640] kasan_check_range from kasan_atomics_helper+0x648/0x5ab0 [ 74.793640] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 74.793670] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 74.793701] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 74.793731] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 74.793762] kthread from ret_from_fork+0x14/0x20 [ 74.793792] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 74.793792] 3fa0: 00000000 00000000 00000000 00000000 [ 74.793823] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 74.793823] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 74.793853] [ 74.911743] Allocated by task 317: [ 74.915161] kasan_save_track+0x30/0x5c [ 74.919036] __kasan_kmalloc+0x8c/0x94 [ 74.922790] kasan_atomics+0xc0/0x33c [ 74.926513] kunit_try_run_case+0x22c/0x5a8 [ 74.930725] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 74.936248] kthread+0x464/0x810 [ 74.939514] ret_from_fork+0x14/0x20 [ 74.943115] [ 74.944610] The buggy address belongs to the object at cc90f300 [ 74.944610] which belongs to the cache kmalloc-64 of size 64 [ 74.956329] The buggy address is located 0 bytes to the right of [ 74.956329] allocated 48-byte region [cc90f300, cc90f330) [ 74.967895] [ 74.969390] The buggy address belongs to the physical page: [ 74.975006] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 74.982269] flags: 0x0(zone=0) [ 74.985351] page_type: f5(slab) [ 74.988525] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 74.996673] raw: 00000000 [ 74.999298] page dumped because: kasan: bad access detected [ 75.004913] [ 75.006408] Memory state around the buggy address: [ 75.011230] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.017822] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.024383] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.030944] ^ [ 75.035064] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.041656] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.048217] ================================================================== [ 76.195404] ================================================================== [ 76.202667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x97c/0x5ab0 [ 76.210021] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 76.216796] [ 76.218292] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 76.218322] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 76.218322] Hardware name: Generic DRA74X (Flattened Device Tree) [ 76.218353] Call trace: [ 76.218353] unwind_backtrace from show_stack+0x18/0x1c [ 76.218383] show_stack from dump_stack_lvl+0x70/0x90 [ 76.218383] dump_stack_lvl from print_report+0x158/0x528 [ 76.218414] print_report from kasan_report+0xdc/0x118 [ 76.218444] kasan_report from kasan_check_range+0x14c/0x198 [ 76.218475] kasan_check_range from kasan_atomics_helper+0x97c/0x5ab0 [ 76.218505] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 76.218505] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 76.218536] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 76.218566] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 76.218597] kthread from ret_from_fork+0x14/0x20 [ 76.218627] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 76.218627] 3fa0: 00000000 00000000 00000000 00000000 [ 76.218658] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 76.218658] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 76.218688] [ 76.336578] Allocated by task 317: [ 76.339996] kasan_save_track+0x30/0x5c [ 76.343872] __kasan_kmalloc+0x8c/0x94 [ 76.347656] kasan_atomics+0xc0/0x33c [ 76.351348] kunit_try_run_case+0x22c/0x5a8 [ 76.355560] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 76.361083] kthread+0x464/0x810 [ 76.364349] ret_from_fork+0x14/0x20 [ 76.367950] [ 76.369445] The buggy address belongs to the object at cc90f300 [ 76.369445] which belongs to the cache kmalloc-64 of size 64 [ 76.381164] The buggy address is located 0 bytes to the right of [ 76.381164] allocated 48-byte region [cc90f300, cc90f330) [ 76.392730] [ 76.394226] The buggy address belongs to the physical page: [ 76.399841] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 76.407104] flags: 0x0(zone=0) [ 76.410186] page_type: f5(slab) [ 76.413360] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 76.421508] raw: 00000000 [ 76.424133] page dumped because: kasan: bad access detected [ 76.429748] [ 76.431243] Memory state around the buggy address: [ 76.436065] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.442657] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.449218] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 76.455780] ^ [ 76.459899] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.466491] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.473052] ================================================================== [ 83.284759] ================================================================== [ 83.292022] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5ab0 [ 83.299468] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 83.306213] [ 83.307739] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 83.307769] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 83.307769] Hardware name: Generic DRA74X (Flattened Device Tree) [ 83.307769] Call trace: [ 83.307769] unwind_backtrace from show_stack+0x18/0x1c [ 83.307800] show_stack from dump_stack_lvl+0x70/0x90 [ 83.307830] dump_stack_lvl from print_report+0x158/0x528 [ 83.307861] print_report from kasan_report+0xdc/0x118 [ 83.307891] kasan_report from kasan_check_range+0x14c/0x198 [ 83.307891] kasan_check_range from kasan_atomics_helper+0x1818/0x5ab0 [ 83.307922] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 83.307952] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 83.307983] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 83.308013] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 83.308044] kthread from ret_from_fork+0x14/0x20 [ 83.308044] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 83.308074] 3fa0: 00000000 00000000 00000000 00000000 [ 83.308105] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 83.308105] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 83.308105] [ 83.426086] Allocated by task 317: [ 83.429504] kasan_save_track+0x30/0x5c [ 83.433380] __kasan_kmalloc+0x8c/0x94 [ 83.437164] kasan_atomics+0xc0/0x33c [ 83.440856] kunit_try_run_case+0x22c/0x5a8 [ 83.445068] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 83.450622] kthread+0x464/0x810 [ 83.453857] ret_from_fork+0x14/0x20 [ 83.457458] [ 83.458984] The buggy address belongs to the object at cc90f300 [ 83.458984] which belongs to the cache kmalloc-64 of size 64 [ 83.470703] The buggy address is located 0 bytes to the right of [ 83.470703] allocated 48-byte region [cc90f300, cc90f330) [ 83.482238] [ 83.483764] The buggy address belongs to the physical page: [ 83.489349] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 83.496643] flags: 0x0(zone=0) [ 83.499694] page_type: f5(slab) [ 83.502868] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 83.511016] raw: 00000000 [ 83.513671] page dumped because: kasan: bad access detected [ 83.519256] [ 83.520782] Memory state around the buggy address: [ 83.525604] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.532165] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.538726] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 83.545318] ^ [ 83.549438] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.555999] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.562561] ================================================================== [ 82.150360] ================================================================== [ 82.157623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x160c/0x5ab0 [ 82.165069] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 82.171813] [ 82.173339] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 82.173370] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 82.173370] Hardware name: Generic DRA74X (Flattened Device Tree) [ 82.173370] Call trace: [ 82.173400] unwind_backtrace from show_stack+0x18/0x1c [ 82.173400] show_stack from dump_stack_lvl+0x70/0x90 [ 82.173431] dump_stack_lvl from print_report+0x158/0x528 [ 82.173461] print_report from kasan_report+0xdc/0x118 [ 82.173492] kasan_report from kasan_check_range+0x14c/0x198 [ 82.173492] kasan_check_range from kasan_atomics_helper+0x160c/0x5ab0 [ 82.173522] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 82.173553] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 82.173583] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 82.173614] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 82.173645] kthread from ret_from_fork+0x14/0x20 [ 82.173645] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 82.173675] 3fa0: 00000000 00000000 00000000 00000000 [ 82.173706] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 82.173706] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 82.173706] [ 82.291687] Allocated by task 317: [ 82.295135] kasan_save_track+0x30/0x5c [ 82.298980] __kasan_kmalloc+0x8c/0x94 [ 82.302764] kasan_atomics+0xc0/0x33c [ 82.306457] kunit_try_run_case+0x22c/0x5a8 [ 82.310668] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 82.316223] kthread+0x464/0x810 [ 82.319458] ret_from_fork+0x14/0x20 [ 82.323059] [ 82.324584] The buggy address belongs to the object at cc90f300 [ 82.324584] which belongs to the cache kmalloc-64 of size 64 [ 82.336303] The buggy address is located 0 bytes to the right of [ 82.336303] allocated 48-byte region [cc90f300, cc90f330) [ 82.347839] [ 82.349365] The buggy address belongs to the physical page: [ 82.354949] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 82.362243] flags: 0x0(zone=0) [ 82.365295] page_type: f5(slab) [ 82.368469] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 82.376617] raw: 00000000 [ 82.379272] page dumped because: kasan: bad access detected [ 82.384857] [ 82.386383] Memory state around the buggy address: [ 82.391204] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.397766] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.404327] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 82.410888] ^ [ 82.415039] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.421600] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.428161] ================================================================== [ 88.125640] ================================================================== [ 88.132904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2388/0x5ab0 [ 88.140350] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 88.147125] [ 88.148620] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 88.148651] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 88.148651] Hardware name: Generic DRA74X (Flattened Device Tree) [ 88.148681] Call trace: [ 88.148681] unwind_backtrace from show_stack+0x18/0x1c [ 88.148712] show_stack from dump_stack_lvl+0x70/0x90 [ 88.148712] dump_stack_lvl from print_report+0x158/0x528 [ 88.148742] print_report from kasan_report+0xdc/0x118 [ 88.148773] kasan_report from kasan_check_range+0x14c/0x198 [ 88.148803] kasan_check_range from kasan_atomics_helper+0x2388/0x5ab0 [ 88.148834] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 88.148834] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 88.148864] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 88.148895] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 88.148925] kthread from ret_from_fork+0x14/0x20 [ 88.148956] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 88.148956] 3fa0: 00000000 00000000 00000000 00000000 [ 88.148986] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 88.148986] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 88.149017] [ 88.266967] Allocated by task 317: [ 88.270416] kasan_save_track+0x30/0x5c [ 88.274261] __kasan_kmalloc+0x8c/0x94 [ 88.278045] kasan_atomics+0xc0/0x33c [ 88.281738] kunit_try_run_case+0x22c/0x5a8 [ 88.285980] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 88.291503] kthread+0x464/0x810 [ 88.294738] ret_from_fork+0x14/0x20 [ 88.298370] [ 88.299865] The buggy address belongs to the object at cc90f300 [ 88.299865] which belongs to the cache kmalloc-64 of size 64 [ 88.311584] The buggy address is located 0 bytes to the right of [ 88.311584] allocated 48-byte region [cc90f300, cc90f330) [ 88.323150] [ 88.324645] The buggy address belongs to the physical page: [ 88.330230] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 88.337524] flags: 0x0(zone=0) [ 88.340606] page_type: f5(slab) [ 88.343780] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 88.351898] raw: 00000000 [ 88.354553] page dumped because: kasan: bad access detected [ 88.360168] [ 88.361663] Memory state around the buggy address: [ 88.366485] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.373046] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.379608] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 88.386199] ^ [ 88.390319] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.396881] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 88.403442] ================================================================== [ 75.055541] ================================================================== [ 75.062805] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x5ab0 [ 75.070159] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 75.076904] [ 75.078430] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 75.078460] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 75.078460] Hardware name: Generic DRA74X (Flattened Device Tree) [ 75.078460] Call trace: [ 75.078491] unwind_backtrace from show_stack+0x18/0x1c [ 75.078491] show_stack from dump_stack_lvl+0x70/0x90 [ 75.078521] dump_stack_lvl from print_report+0x158/0x528 [ 75.078552] print_report from kasan_report+0xdc/0x118 [ 75.078582] kasan_report from kasan_check_range+0x14c/0x198 [ 75.078582] kasan_check_range from kasan_atomics_helper+0x6ec/0x5ab0 [ 75.078613] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 75.078643] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 75.078674] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 75.078704] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 75.078735] kthread from ret_from_fork+0x14/0x20 [ 75.078765] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 75.078765] 3fa0: 00000000 00000000 00000000 00000000 [ 75.078796] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 75.078796] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 75.078826] [ 75.196685] Allocated by task 317: [ 75.200134] kasan_save_track+0x30/0x5c [ 75.203979] __kasan_kmalloc+0x8c/0x94 [ 75.207763] kasan_atomics+0xc0/0x33c [ 75.211456] kunit_try_run_case+0x22c/0x5a8 [ 75.215698] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 75.221221] kthread+0x464/0x810 [ 75.224487] ret_from_fork+0x14/0x20 [ 75.228088] [ 75.229583] The buggy address belongs to the object at cc90f300 [ 75.229583] which belongs to the cache kmalloc-64 of size 64 [ 75.241302] The buggy address is located 0 bytes to the right of [ 75.241302] allocated 48-byte region [cc90f300, cc90f330) [ 75.252868] [ 75.254364] The buggy address belongs to the physical page: [ 75.259979] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 75.267242] flags: 0x0(zone=0) [ 75.270324] page_type: f5(slab) [ 75.273498] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 75.281616] raw: 00000000 [ 75.284271] page dumped because: kasan: bad access detected [ 75.289886] [ 75.291381] Memory state around the buggy address: [ 75.296203] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.302764] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.309356] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.315917] ^ [ 75.320037] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.326629] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.333190] ================================================================== [ 84.710418] ================================================================== [ 84.717681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b4c/0x5ab0 [ 84.725128] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 84.731872] [ 84.733367] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 84.733398] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 84.733428] Hardware name: Generic DRA74X (Flattened Device Tree) [ 84.733428] Call trace: [ 84.733428] unwind_backtrace from show_stack+0x18/0x1c [ 84.733459] show_stack from dump_stack_lvl+0x70/0x90 [ 84.733489] dump_stack_lvl from print_report+0x158/0x528 [ 84.733520] print_report from kasan_report+0xdc/0x118 [ 84.733520] kasan_report from kasan_check_range+0x14c/0x198 [ 84.733551] kasan_check_range from kasan_atomics_helper+0x1b4c/0x5ab0 [ 84.733581] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 84.733612] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 84.733642] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 84.733673] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 84.733703] kthread from ret_from_fork+0x14/0x20 [ 84.733703] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 84.733734] 3fa0: 00000000 00000000 00000000 00000000 [ 84.733734] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 84.733764] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 84.733764] [ 84.851745] Allocated by task 317: [ 84.855163] kasan_save_track+0x30/0x5c [ 84.859039] __kasan_kmalloc+0x8c/0x94 [ 84.862823] kasan_atomics+0xc0/0x33c [ 84.866516] kunit_try_run_case+0x22c/0x5a8 [ 84.870727] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 84.876251] kthread+0x464/0x810 [ 84.879516] ret_from_fork+0x14/0x20 [ 84.883117] [ 84.884613] The buggy address belongs to the object at cc90f300 [ 84.884613] which belongs to the cache kmalloc-64 of size 64 [ 84.896362] The buggy address is located 0 bytes to the right of [ 84.896362] allocated 48-byte region [cc90f300, cc90f330) [ 84.907897] [ 84.909393] The buggy address belongs to the physical page: [ 84.915008] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 84.922271] flags: 0x0(zone=0) [ 84.925354] page_type: f5(slab) [ 84.928527] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 84.936676] raw: 00000000 [ 84.939300] page dumped because: kasan: bad access detected [ 84.944915] [ 84.946411] Memory state around the buggy address: [ 84.951232] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.957824] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.964385] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 84.970947] ^ [ 84.975067] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.981658] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.988220] ================================================================== [ 86.414916] ================================================================== [ 86.422210] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f50/0x5ab0 [ 86.429656] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 86.436401] [ 86.437896] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 86.437927] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 86.437927] Hardware name: Generic DRA74X (Flattened Device Tree) [ 86.437957] Call trace: [ 86.437957] unwind_backtrace from show_stack+0x18/0x1c [ 86.437988] show_stack from dump_stack_lvl+0x70/0x90 [ 86.438018] dump_stack_lvl from print_report+0x158/0x528 [ 86.438049] print_report from kasan_report+0xdc/0x118 [ 86.438049] kasan_report from kasan_check_range+0x14c/0x198 [ 86.438079] kasan_check_range from kasan_atomics_helper+0x1f50/0x5ab0 [ 86.438110] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 86.438140] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 86.438171] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 86.438171] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 86.438201] kthread from ret_from_fork+0x14/0x20 [ 86.438232] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 86.438232] 3fa0: 00000000 00000000 00000000 00000000 [ 86.438262] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 86.438293] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 86.438293] [ 86.556274] Allocated by task 317: [ 86.559692] kasan_save_track+0x30/0x5c [ 86.563568] __kasan_kmalloc+0x8c/0x94 [ 86.567352] kasan_atomics+0xc0/0x33c [ 86.571044] kunit_try_run_case+0x22c/0x5a8 [ 86.575256] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 86.580780] kthread+0x464/0x810 [ 86.584045] ret_from_fork+0x14/0x20 [ 86.587646] [ 86.589141] The buggy address belongs to the object at cc90f300 [ 86.589141] which belongs to the cache kmalloc-64 of size 64 [ 86.600860] The buggy address is located 0 bytes to the right of [ 86.600860] allocated 48-byte region [cc90f300, cc90f330) [ 86.612426] [ 86.613922] The buggy address belongs to the physical page: [ 86.619537] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 86.626800] flags: 0x0(zone=0) [ 86.629882] page_type: f5(slab) [ 86.633056] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 86.641204] raw: 00000000 [ 86.643829] page dumped because: kasan: bad access detected [ 86.649444] [ 86.650939] Memory state around the buggy address: [ 86.655761] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.662322] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.668914] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 86.675476] ^ [ 86.679595] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.686157] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.692749] ================================================================== [ 89.253662] ================================================================== [ 89.260925] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2578/0x5ab0 [ 89.268371] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 89.275115] [ 89.276611] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 89.276641] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 89.276672] Hardware name: Generic DRA74X (Flattened Device Tree) [ 89.276672] Call trace: [ 89.276672] unwind_backtrace from show_stack+0x18/0x1c [ 89.276702] show_stack from dump_stack_lvl+0x70/0x90 [ 89.276733] dump_stack_lvl from print_report+0x158/0x528 [ 89.276763] print_report from kasan_report+0xdc/0x118 [ 89.276763] kasan_report from kasan_check_range+0x14c/0x198 [ 89.276794] kasan_check_range from kasan_atomics_helper+0x2578/0x5ab0 [ 89.276824] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 89.276855] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 89.276885] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 89.276916] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 89.276947] kthread from ret_from_fork+0x14/0x20 [ 89.276947] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 89.276977] 3fa0: 00000000 00000000 00000000 00000000 [ 89.276977] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 89.277008] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 89.277008] [ 89.394989] Allocated by task 317: [ 89.398406] kasan_save_track+0x30/0x5c [ 89.402282] __kasan_kmalloc+0x8c/0x94 [ 89.406066] kasan_atomics+0xc0/0x33c [ 89.409759] kunit_try_run_case+0x22c/0x5a8 [ 89.413970] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 89.419494] kthread+0x464/0x810 [ 89.422760] ret_from_fork+0x14/0x20 [ 89.426361] [ 89.427856] The buggy address belongs to the object at cc90f300 [ 89.427856] which belongs to the cache kmalloc-64 of size 64 [ 89.439575] The buggy address is located 0 bytes to the right of [ 89.439575] allocated 48-byte region [cc90f300, cc90f330) [ 89.451141] [ 89.452636] The buggy address belongs to the physical page: [ 89.458251] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 89.465515] flags: 0x0(zone=0) [ 89.468597] page_type: f5(slab) [ 89.471771] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 89.479888] raw: 00000000 [ 89.482543] page dumped because: kasan: bad access detected [ 89.488159] [ 89.489654] Memory state around the buggy address: [ 89.494476] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.501037] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.507629] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 89.514190] ^ [ 89.518310] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.524871] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.531433] ================================================================== [ 82.714477] ================================================================== [ 82.721740] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x5ab0 [ 82.729187] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 82.735931] [ 82.737457] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 82.737487] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 82.737487] Hardware name: Generic DRA74X (Flattened Device Tree) [ 82.737487] Call trace: [ 82.737518] unwind_backtrace from show_stack+0x18/0x1c [ 82.737518] show_stack from dump_stack_lvl+0x70/0x90 [ 82.737548] dump_stack_lvl from print_report+0x158/0x528 [ 82.737579] print_report from kasan_report+0xdc/0x118 [ 82.737609] kasan_report from kasan_check_range+0x14c/0x198 [ 82.737640] kasan_check_range from kasan_atomics_helper+0x16d0/0x5ab0 [ 82.737640] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 82.737670] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 82.737701] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 82.737731] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 82.737762] kthread from ret_from_fork+0x14/0x20 [ 82.737792] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 82.737792] 3fa0: 00000000 00000000 00000000 00000000 [ 82.737823] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 82.737823] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 82.737854] [ 82.855804] Allocated by task 317: [ 82.859252] kasan_save_track+0x30/0x5c [ 82.863098] __kasan_kmalloc+0x8c/0x94 [ 82.866882] kasan_atomics+0xc0/0x33c [ 82.870574] kunit_try_run_case+0x22c/0x5a8 [ 82.874816] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 82.880340] kthread+0x464/0x810 [ 82.883605] ret_from_fork+0x14/0x20 [ 82.887207] [ 82.888702] The buggy address belongs to the object at cc90f300 [ 82.888702] which belongs to the cache kmalloc-64 of size 64 [ 82.900421] The buggy address is located 0 bytes to the right of [ 82.900421] allocated 48-byte region [cc90f300, cc90f330) [ 82.911987] [ 82.913482] The buggy address belongs to the physical page: [ 82.919097] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 82.926361] flags: 0x0(zone=0) [ 82.929443] page_type: f5(slab) [ 82.932617] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 82.940734] raw: 00000000 [ 82.943389] page dumped because: kasan: bad access detected [ 82.949005] [ 82.950500] Memory state around the buggy address: [ 82.955322] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.961883] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.968475] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 82.975036] ^ [ 82.979156] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.985717] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.992309] ================================================================== [ 73.357849] ================================================================== [ 73.365112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x420/0x5ab0 [ 73.372467] Read of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 73.379119] [ 73.380645] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 73.380676] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 73.380676] Hardware name: Generic DRA74X (Flattened Device Tree) [ 73.380676] Call trace: [ 73.380706] unwind_backtrace from show_stack+0x18/0x1c [ 73.380737] show_stack from dump_stack_lvl+0x70/0x90 [ 73.380737] dump_stack_lvl from print_report+0x158/0x528 [ 73.380767] print_report from kasan_report+0xdc/0x118 [ 73.380798] kasan_report from kasan_check_range+0x14c/0x198 [ 73.380828] kasan_check_range from kasan_atomics_helper+0x420/0x5ab0 [ 73.380828] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 73.380859] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 73.380889] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 73.380920] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 73.380950] kthread from ret_from_fork+0x14/0x20 [ 73.380981] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 73.380981] 3fa0: 00000000 00000000 00000000 00000000 [ 73.381011] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 73.381011] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 73.381042] [ 73.498931] Allocated by task 317: [ 73.502349] kasan_save_track+0x30/0x5c [ 73.506225] __kasan_kmalloc+0x8c/0x94 [ 73.509979] kasan_atomics+0xc0/0x33c [ 73.513702] kunit_try_run_case+0x22c/0x5a8 [ 73.517913] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 73.523437] kthread+0x464/0x810 [ 73.526702] ret_from_fork+0x14/0x20 [ 73.530303] [ 73.531799] The buggy address belongs to the object at cc90f300 [ 73.531799] which belongs to the cache kmalloc-64 of size 64 [ 73.543518] The buggy address is located 0 bytes to the right of [ 73.543518] allocated 48-byte region [cc90f300, cc90f330) [ 73.555084] [ 73.556579] The buggy address belongs to the physical page: [ 73.562194] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 73.569458] flags: 0x0(zone=0) [ 73.572540] page_type: f5(slab) [ 73.575714] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 73.583862] raw: 00000000 [ 73.586486] page dumped because: kasan: bad access detected [ 73.592102] [ 73.593597] Memory state around the buggy address: [ 73.598419] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.605010] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.611572] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.618133] ^ [ 73.622253] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.628845] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.635406] ================================================================== [ 81.871459] ================================================================== [ 81.878723] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x52e4/0x5ab0 [ 81.886169] Read of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 81.892822] [ 81.894348] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 81.894378] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 81.894378] Hardware name: Generic DRA74X (Flattened Device Tree) [ 81.894378] Call trace: [ 81.894378] unwind_backtrace from show_stack+0x18/0x1c [ 81.894409] show_stack from dump_stack_lvl+0x70/0x90 [ 81.894439] dump_stack_lvl from print_report+0x158/0x528 [ 81.894470] print_report from kasan_report+0xdc/0x118 [ 81.894500] kasan_report from kasan_atomics_helper+0x52e4/0x5ab0 [ 81.894500] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 81.894531] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 81.894561] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 81.894592] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 81.894622] kthread from ret_from_fork+0x14/0x20 [ 81.894653] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 81.894653] 3fa0: 00000000 00000000 00000000 00000000 [ 81.894683] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 81.894683] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 81.894714] [ 82.006561] Allocated by task 317: [ 82.009979] kasan_save_track+0x30/0x5c [ 82.013854] __kasan_kmalloc+0x8c/0x94 [ 82.017639] kasan_atomics+0xc0/0x33c [ 82.021331] kunit_try_run_case+0x22c/0x5a8 [ 82.025543] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 82.031066] kthread+0x464/0x810 [ 82.034332] ret_from_fork+0x14/0x20 [ 82.037933] [ 82.039428] The buggy address belongs to the object at cc90f300 [ 82.039428] which belongs to the cache kmalloc-64 of size 64 [ 82.051177] The buggy address is located 0 bytes to the right of [ 82.051177] allocated 48-byte region [cc90f300, cc90f330) [ 82.062713] [ 82.064208] The buggy address belongs to the physical page: [ 82.069824] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 82.077087] flags: 0x0(zone=0) [ 82.080169] page_type: f5(slab) [ 82.083343] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 82.091491] raw: 00000000 [ 82.094116] page dumped because: kasan: bad access detected [ 82.099731] [ 82.101226] Memory state around the buggy address: [ 82.106048] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.112640] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.119201] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 82.125762] ^ [ 82.129882] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.136474] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.143035] ================================================================== [ 81.307525] ================================================================== [ 81.314788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x52d8/0x5ab0 [ 81.322235] Read of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 81.328887] [ 81.330413] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 81.330444] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 81.330444] Hardware name: Generic DRA74X (Flattened Device Tree) [ 81.330444] Call trace: [ 81.330444] unwind_backtrace from show_stack+0x18/0x1c [ 81.330474] show_stack from dump_stack_lvl+0x70/0x90 [ 81.330505] dump_stack_lvl from print_report+0x158/0x528 [ 81.330535] print_report from kasan_report+0xdc/0x118 [ 81.330566] kasan_report from kasan_atomics_helper+0x52d8/0x5ab0 [ 81.330596] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 81.330596] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 81.330627] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 81.330657] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 81.330688] kthread from ret_from_fork+0x14/0x20 [ 81.330718] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 81.330718] 3fa0: 00000000 00000000 00000000 00000000 [ 81.330749] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 81.330749] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 81.330780] [ 81.442626] Allocated by task 317: [ 81.446044] kasan_save_track+0x30/0x5c [ 81.449920] __kasan_kmalloc+0x8c/0x94 [ 81.453704] kasan_atomics+0xc0/0x33c [ 81.457397] kunit_try_run_case+0x22c/0x5a8 [ 81.461608] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 81.467132] kthread+0x464/0x810 [ 81.470397] ret_from_fork+0x14/0x20 [ 81.473999] [ 81.475494] The buggy address belongs to the object at cc90f300 [ 81.475494] which belongs to the cache kmalloc-64 of size 64 [ 81.487243] The buggy address is located 0 bytes to the right of [ 81.487243] allocated 48-byte region [cc90f300, cc90f330) [ 81.498779] [ 81.500274] The buggy address belongs to the physical page: [ 81.505889] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 81.513153] flags: 0x0(zone=0) [ 81.516235] page_type: f5(slab) [ 81.519409] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 81.527557] raw: 00000000 [ 81.530181] page dumped because: kasan: bad access detected [ 81.535797] [ 81.537292] Memory state around the buggy address: [ 81.542114] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.548706] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.555267] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 81.561828] ^ [ 81.565948] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.572540] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.579101] ================================================================== [ 86.700042] ================================================================== [ 86.707305] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ffc/0x5ab0 [ 86.714782] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 86.721527] [ 86.723022] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 86.723052] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 86.723052] Hardware name: Generic DRA74X (Flattened Device Tree) [ 86.723083] Call trace: [ 86.723083] unwind_backtrace from show_stack+0x18/0x1c [ 86.723114] show_stack from dump_stack_lvl+0x70/0x90 [ 86.723114] dump_stack_lvl from print_report+0x158/0x528 [ 86.723144] print_report from kasan_report+0xdc/0x118 [ 86.723175] kasan_report from kasan_check_range+0x14c/0x198 [ 86.723205] kasan_check_range from kasan_atomics_helper+0x1ffc/0x5ab0 [ 86.723236] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 86.723236] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 86.723266] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 86.723297] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 86.723327] kthread from ret_from_fork+0x14/0x20 [ 86.723358] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 86.723358] 3fa0: 00000000 00000000 00000000 00000000 [ 86.723388] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 86.723388] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 86.723419] [ 86.841400] Allocated by task 317: [ 86.844818] kasan_save_track+0x30/0x5c [ 86.848693] __kasan_kmalloc+0x8c/0x94 [ 86.852447] kasan_atomics+0xc0/0x33c [ 86.856140] kunit_try_run_case+0x22c/0x5a8 [ 86.860382] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 86.865905] kthread+0x464/0x810 [ 86.869171] ret_from_fork+0x14/0x20 [ 86.872772] [ 86.874267] The buggy address belongs to the object at cc90f300 [ 86.874267] which belongs to the cache kmalloc-64 of size 64 [ 86.885986] The buggy address is located 0 bytes to the right of [ 86.885986] allocated 48-byte region [cc90f300, cc90f330) [ 86.897552] [ 86.899047] The buggy address belongs to the physical page: [ 86.904663] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 86.911926] flags: 0x0(zone=0) [ 86.915008] page_type: f5(slab) [ 86.918182] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 86.926300] raw: 00000000 [ 86.928955] page dumped because: kasan: bad access detected [ 86.934570] [ 86.936065] Memory state around the buggy address: [ 86.940887] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.947448] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.954010] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 86.960601] ^ [ 86.964721] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.971282] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.977844] ================================================================== [ 78.469024] ================================================================== [ 78.476287] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xedc/0x5ab0 [ 78.483673] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 78.490417] [ 78.491912] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 78.491943] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 78.491943] Hardware name: Generic DRA74X (Flattened Device Tree) [ 78.491973] Call trace: [ 78.491973] unwind_backtrace from show_stack+0x18/0x1c [ 78.492004] show_stack from dump_stack_lvl+0x70/0x90 [ 78.492004] dump_stack_lvl from print_report+0x158/0x528 [ 78.492034] print_report from kasan_report+0xdc/0x118 [ 78.492065] kasan_report from kasan_check_range+0x14c/0x198 [ 78.492095] kasan_check_range from kasan_atomics_helper+0xedc/0x5ab0 [ 78.492126] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 78.492126] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 78.492156] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 78.492187] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 78.492218] kthread from ret_from_fork+0x14/0x20 [ 78.492248] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 78.492248] 3fa0: 00000000 00000000 00000000 00000000 [ 78.492279] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 78.492279] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 78.492309] [ 78.610198] Allocated by task 317: [ 78.613616] kasan_save_track+0x30/0x5c [ 78.617492] __kasan_kmalloc+0x8c/0x94 [ 78.621246] kasan_atomics+0xc0/0x33c [ 78.624938] kunit_try_run_case+0x22c/0x5a8 [ 78.629180] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 78.634704] kthread+0x464/0x810 [ 78.637969] ret_from_fork+0x14/0x20 [ 78.641571] [ 78.643066] The buggy address belongs to the object at cc90f300 [ 78.643066] which belongs to the cache kmalloc-64 of size 64 [ 78.654785] The buggy address is located 0 bytes to the right of [ 78.654785] allocated 48-byte region [cc90f300, cc90f330) [ 78.666351] [ 78.667846] The buggy address belongs to the physical page: [ 78.673461] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 78.680725] flags: 0x0(zone=0) [ 78.683807] page_type: f5(slab) [ 78.686981] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 78.695098] raw: 00000000 [ 78.697753] page dumped because: kasan: bad access detected [ 78.703369] [ 78.704864] Memory state around the buggy address: [ 78.709686] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.716247] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.722839] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 78.729400] ^ [ 78.733520] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.740081] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.746673] ================================================================== [ 78.753967] ================================================================== [ 78.761260] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x5ab0 [ 78.768615] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 78.775360] [ 78.776855] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 78.776885] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 78.776916] Hardware name: Generic DRA74X (Flattened Device Tree) [ 78.776916] Call trace: [ 78.776916] unwind_backtrace from show_stack+0x18/0x1c [ 78.776947] show_stack from dump_stack_lvl+0x70/0x90 [ 78.776977] dump_stack_lvl from print_report+0x158/0x528 [ 78.777008] print_report from kasan_report+0xdc/0x118 [ 78.777008] kasan_report from kasan_check_range+0x14c/0x198 [ 78.777038] kasan_check_range from kasan_atomics_helper+0xf88/0x5ab0 [ 78.777069] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 78.777099] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 78.777130] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 78.777160] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 78.777160] kthread from ret_from_fork+0x14/0x20 [ 78.777191] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 78.777221] 3fa0: 00000000 00000000 00000000 00000000 [ 78.777221] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 78.777252] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 78.777252] [ 78.895141] Allocated by task 317: [ 78.898559] kasan_save_track+0x30/0x5c [ 78.902435] __kasan_kmalloc+0x8c/0x94 [ 78.906219] kasan_atomics+0xc0/0x33c [ 78.909912] kunit_try_run_case+0x22c/0x5a8 [ 78.914123] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 78.919647] kthread+0x464/0x810 [ 78.922912] ret_from_fork+0x14/0x20 [ 78.926513] [ 78.928009] The buggy address belongs to the object at cc90f300 [ 78.928009] which belongs to the cache kmalloc-64 of size 64 [ 78.939758] The buggy address is located 0 bytes to the right of [ 78.939758] allocated 48-byte region [cc90f300, cc90f330) [ 78.951293] [ 78.952789] The buggy address belongs to the physical page: [ 78.958404] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 78.965667] flags: 0x0(zone=0) [ 78.968749] page_type: f5(slab) [ 78.971923] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 78.980072] raw: 00000000 [ 78.982696] page dumped because: kasan: bad access detected [ 78.988311] [ 78.989807] Memory state around the buggy address: [ 78.994628] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.001220] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.007781] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 79.014343] ^ [ 79.018493] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.025054] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.031616] ================================================================== [ 79.894317] ================================================================== [ 79.901580] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1268/0x5ab0 [ 79.909027] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 79.915802] [ 79.917297] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 79.917327] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 79.917327] Hardware name: Generic DRA74X (Flattened Device Tree) [ 79.917358] Call trace: [ 79.917358] unwind_backtrace from show_stack+0x18/0x1c [ 79.917388] show_stack from dump_stack_lvl+0x70/0x90 [ 79.917388] dump_stack_lvl from print_report+0x158/0x528 [ 79.917419] print_report from kasan_report+0xdc/0x118 [ 79.917449] kasan_report from kasan_check_range+0x14c/0x198 [ 79.917480] kasan_check_range from kasan_atomics_helper+0x1268/0x5ab0 [ 79.917480] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 79.917510] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 79.917541] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 79.917572] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 79.917602] kthread from ret_from_fork+0x14/0x20 [ 79.917633] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 79.917633] 3fa0: 00000000 00000000 00000000 00000000 [ 79.917663] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 79.917663] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 79.917694] [ 80.035675] Allocated by task 317: [ 80.039093] kasan_save_track+0x30/0x5c [ 80.042968] __kasan_kmalloc+0x8c/0x94 [ 80.046722] kasan_atomics+0xc0/0x33c [ 80.050445] kunit_try_run_case+0x22c/0x5a8 [ 80.054656] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 80.060180] kthread+0x464/0x810 [ 80.063446] ret_from_fork+0x14/0x20 [ 80.067047] [ 80.068542] The buggy address belongs to the object at cc90f300 [ 80.068542] which belongs to the cache kmalloc-64 of size 64 [ 80.080261] The buggy address is located 0 bytes to the right of [ 80.080261] allocated 48-byte region [cc90f300, cc90f330) [ 80.091827] [ 80.093322] The buggy address belongs to the physical page: [ 80.098937] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 80.106201] flags: 0x0(zone=0) [ 80.109283] page_type: f5(slab) [ 80.112457] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 80.120605] raw: 00000000 [ 80.123229] page dumped because: kasan: bad access detected [ 80.128845] [ 80.130340] Memory state around the buggy address: [ 80.135162] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.141723] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.148315] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 80.154876] ^ [ 80.158996] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.165557] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.172149] ================================================================== [ 85.565765] ================================================================== [ 85.573028] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d50/0x5ab0 [ 85.580474] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 85.587249] [ 85.588745] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 85.588775] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 85.588775] Hardware name: Generic DRA74X (Flattened Device Tree) [ 85.588775] Call trace: [ 85.588806] unwind_backtrace from show_stack+0x18/0x1c [ 85.588836] show_stack from dump_stack_lvl+0x70/0x90 [ 85.588836] dump_stack_lvl from print_report+0x158/0x528 [ 85.588867] print_report from kasan_report+0xdc/0x118 [ 85.588897] kasan_report from kasan_check_range+0x14c/0x198 [ 85.588928] kasan_check_range from kasan_atomics_helper+0x1d50/0x5ab0 [ 85.588928] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 85.588958] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 85.588989] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 85.589019] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 85.589050] kthread from ret_from_fork+0x14/0x20 [ 85.589080] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 85.589080] 3fa0: 00000000 00000000 00000000 00000000 [ 85.589111] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 85.589111] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 85.589141] [ 85.707122] Allocated by task 317: [ 85.710540] kasan_save_track+0x30/0x5c [ 85.714416] __kasan_kmalloc+0x8c/0x94 [ 85.718170] kasan_atomics+0xc0/0x33c [ 85.721862] kunit_try_run_case+0x22c/0x5a8 [ 85.726104] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 85.731628] kthread+0x464/0x810 [ 85.734893] ret_from_fork+0x14/0x20 [ 85.738494] [ 85.739990] The buggy address belongs to the object at cc90f300 [ 85.739990] which belongs to the cache kmalloc-64 of size 64 [ 85.751708] The buggy address is located 0 bytes to the right of [ 85.751708] allocated 48-byte region [cc90f300, cc90f330) [ 85.763275] [ 85.764770] The buggy address belongs to the physical page: [ 85.770385] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 85.777648] flags: 0x0(zone=0) [ 85.780731] page_type: f5(slab) [ 85.783905] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 85.792022] raw: 00000000 [ 85.794677] page dumped because: kasan: bad access detected [ 85.800292] [ 85.801788] Memory state around the buggy address: [ 85.806610] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.813171] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.819763] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 85.826324] ^ [ 85.830444] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.837005] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.843597] ================================================================== [ 87.555419] ================================================================== [ 87.562683] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2200/0x5ab0 [ 87.570129] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 87.576873] [ 87.578369] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 87.578399] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 87.578430] Hardware name: Generic DRA74X (Flattened Device Tree) [ 87.578430] Call trace: [ 87.578430] unwind_backtrace from show_stack+0x18/0x1c [ 87.578460] show_stack from dump_stack_lvl+0x70/0x90 [ 87.578491] dump_stack_lvl from print_report+0x158/0x528 [ 87.578521] print_report from kasan_report+0xdc/0x118 [ 87.578552] kasan_report from kasan_check_range+0x14c/0x198 [ 87.578552] kasan_check_range from kasan_atomics_helper+0x2200/0x5ab0 [ 87.578582] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 87.578613] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 87.578643] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 87.578674] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 87.578704] kthread from ret_from_fork+0x14/0x20 [ 87.578704] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 87.578735] 3fa0: 00000000 00000000 00000000 00000000 [ 87.578735] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 87.578765] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 87.578765] [ 87.696746] Allocated by task 317: [ 87.700164] kasan_save_track+0x30/0x5c [ 87.704040] __kasan_kmalloc+0x8c/0x94 [ 87.707824] kasan_atomics+0xc0/0x33c [ 87.711517] kunit_try_run_case+0x22c/0x5a8 [ 87.715728] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 87.721252] kthread+0x464/0x810 [ 87.724517] ret_from_fork+0x14/0x20 [ 87.728118] [ 87.729614] The buggy address belongs to the object at cc90f300 [ 87.729614] which belongs to the cache kmalloc-64 of size 64 [ 87.741333] The buggy address is located 0 bytes to the right of [ 87.741333] allocated 48-byte region [cc90f300, cc90f330) [ 87.752899] [ 87.754394] The buggy address belongs to the physical page: [ 87.760009] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 87.767272] flags: 0x0(zone=0) [ 87.770355] page_type: f5(slab) [ 87.773529] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 87.781677] raw: 00000000 [ 87.784301] page dumped because: kasan: bad access detected [ 87.789916] [ 87.791412] Memory state around the buggy address: [ 87.796234] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.802795] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.809387] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 87.815948] ^ [ 87.820068] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.826629] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.833221] ================================================================== [ 86.985168] ================================================================== [ 86.992431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20a8/0x5ab0 [ 86.999908] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 87.006652] [ 87.008148] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 87.008178] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 87.008178] Hardware name: Generic DRA74X (Flattened Device Tree) [ 87.008209] Call trace: [ 87.008209] unwind_backtrace from show_stack+0x18/0x1c [ 87.008239] show_stack from dump_stack_lvl+0x70/0x90 [ 87.008239] dump_stack_lvl from print_report+0x158/0x528 [ 87.008270] print_report from kasan_report+0xdc/0x118 [ 87.008300] kasan_report from kasan_check_range+0x14c/0x198 [ 87.008331] kasan_check_range from kasan_atomics_helper+0x20a8/0x5ab0 [ 87.008361] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 87.008361] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 87.008392] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 87.008422] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 87.008453] kthread from ret_from_fork+0x14/0x20 [ 87.008483] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 87.008483] 3fa0: 00000000 00000000 00000000 00000000 [ 87.008514] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 87.008514] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 87.008544] [ 87.126495] Allocated by task 317: [ 87.129943] kasan_save_track+0x30/0x5c [ 87.133789] __kasan_kmalloc+0x8c/0x94 [ 87.137573] kasan_atomics+0xc0/0x33c [ 87.141265] kunit_try_run_case+0x22c/0x5a8 [ 87.145507] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 87.151031] kthread+0x464/0x810 [ 87.154266] ret_from_fork+0x14/0x20 [ 87.157897] [ 87.159393] The buggy address belongs to the object at cc90f300 [ 87.159393] which belongs to the cache kmalloc-64 of size 64 [ 87.171112] The buggy address is located 0 bytes to the right of [ 87.171112] allocated 48-byte region [cc90f300, cc90f330) [ 87.182647] [ 87.184173] The buggy address belongs to the physical page: [ 87.189758] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 87.197052] flags: 0x0(zone=0) [ 87.200103] page_type: f5(slab) [ 87.203277] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 87.211425] raw: 00000000 [ 87.214080] page dumped because: kasan: bad access detected [ 87.219665] [ 87.221191] Memory state around the buggy address: [ 87.226013] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.232574] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.239135] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 87.245727] ^ [ 87.249847] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.256408] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 87.262969] ================================================================== [ 84.140136] ================================================================== [ 84.147430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a04/0x5ab0 [ 84.154876] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 84.161621] [ 84.163116] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 84.163146] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 84.163146] Hardware name: Generic DRA74X (Flattened Device Tree) [ 84.163177] Call trace: [ 84.163177] unwind_backtrace from show_stack+0x18/0x1c [ 84.163208] show_stack from dump_stack_lvl+0x70/0x90 [ 84.163238] dump_stack_lvl from print_report+0x158/0x528 [ 84.163269] print_report from kasan_report+0xdc/0x118 [ 84.163269] kasan_report from kasan_check_range+0x14c/0x198 [ 84.163299] kasan_check_range from kasan_atomics_helper+0x1a04/0x5ab0 [ 84.163330] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 84.163360] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 84.163391] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 84.163391] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 84.163421] kthread from ret_from_fork+0x14/0x20 [ 84.163452] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 84.163452] 3fa0: 00000000 00000000 00000000 00000000 [ 84.163482] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 84.163513] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 84.163513] [ 84.281494] Allocated by task 317: [ 84.284912] kasan_save_track+0x30/0x5c [ 84.288787] __kasan_kmalloc+0x8c/0x94 [ 84.292572] kasan_atomics+0xc0/0x33c [ 84.296264] kunit_try_run_case+0x22c/0x5a8 [ 84.300476] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 84.305999] kthread+0x464/0x810 [ 84.309265] ret_from_fork+0x14/0x20 [ 84.312866] [ 84.314361] The buggy address belongs to the object at cc90f300 [ 84.314361] which belongs to the cache kmalloc-64 of size 64 [ 84.326080] The buggy address is located 0 bytes to the right of [ 84.326080] allocated 48-byte region [cc90f300, cc90f330) [ 84.337646] [ 84.339141] The buggy address belongs to the physical page: [ 84.344757] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 84.352020] flags: 0x0(zone=0) [ 84.355102] page_type: f5(slab) [ 84.358276] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 84.366424] raw: 00000000 [ 84.369049] page dumped because: kasan: bad access detected [ 84.374664] [ 84.376159] Memory state around the buggy address: [ 84.380981] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.387542] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.394134] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 84.400695] ^ [ 84.404815] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.411407] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.417968] ================================================================== [ 86.136016] ================================================================== [ 86.143310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x544c/0x5ab0 [ 86.150756] Read of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 86.157409] [ 86.158905] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 86.158935] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 86.158966] Hardware name: Generic DRA74X (Flattened Device Tree) [ 86.158966] Call trace: [ 86.158966] unwind_backtrace from show_stack+0x18/0x1c [ 86.158996] show_stack from dump_stack_lvl+0x70/0x90 [ 86.159027] dump_stack_lvl from print_report+0x158/0x528 [ 86.159057] print_report from kasan_report+0xdc/0x118 [ 86.159057] kasan_report from kasan_atomics_helper+0x544c/0x5ab0 [ 86.159088] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 86.159118] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 86.159149] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 86.159179] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 86.159210] kthread from ret_from_fork+0x14/0x20 [ 86.159210] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 86.159240] 3fa0: 00000000 00000000 00000000 00000000 [ 86.159240] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 86.159271] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 86.159271] [ 86.271148] Allocated by task 317: [ 86.274566] kasan_save_track+0x30/0x5c [ 86.278442] __kasan_kmalloc+0x8c/0x94 [ 86.282226] kasan_atomics+0xc0/0x33c [ 86.285919] kunit_try_run_case+0x22c/0x5a8 [ 86.290130] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 86.295654] kthread+0x464/0x810 [ 86.298919] ret_from_fork+0x14/0x20 [ 86.302520] [ 86.304016] The buggy address belongs to the object at cc90f300 [ 86.304016] which belongs to the cache kmalloc-64 of size 64 [ 86.315734] The buggy address is located 0 bytes to the right of [ 86.315734] allocated 48-byte region [cc90f300, cc90f330) [ 86.327301] [ 86.328796] The buggy address belongs to the physical page: [ 86.334411] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 86.341674] flags: 0x0(zone=0) [ 86.344757] page_type: f5(slab) [ 86.347930] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 86.356079] raw: 00000000 [ 86.358703] page dumped because: kasan: bad access detected [ 86.364318] [ 86.365814] Memory state around the buggy address: [ 86.370635] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.377197] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.383789] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 86.390350] ^ [ 86.394470] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.401062] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 86.407623] ================================================================== [ 80.458343] ================================================================== [ 80.465637] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1360/0x5ab0 [ 80.473083] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 80.479827] [ 80.481323] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 80.481353] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 80.481353] Hardware name: Generic DRA74X (Flattened Device Tree) [ 80.481384] Call trace: [ 80.481384] unwind_backtrace from show_stack+0x18/0x1c [ 80.481414] show_stack from dump_stack_lvl+0x70/0x90 [ 80.481445] dump_stack_lvl from print_report+0x158/0x528 [ 80.481475] print_report from kasan_report+0xdc/0x118 [ 80.481475] kasan_report from kasan_check_range+0x14c/0x198 [ 80.481506] kasan_check_range from kasan_atomics_helper+0x1360/0x5ab0 [ 80.481536] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 80.481567] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 80.481597] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 80.481597] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 80.481628] kthread from ret_from_fork+0x14/0x20 [ 80.481658] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 80.481658] 3fa0: 00000000 00000000 00000000 00000000 [ 80.481689] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 80.481719] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 80.481719] [ 80.599700] Allocated by task 317: [ 80.603118] kasan_save_track+0x30/0x5c [ 80.606994] __kasan_kmalloc+0x8c/0x94 [ 80.610778] kasan_atomics+0xc0/0x33c [ 80.614471] kunit_try_run_case+0x22c/0x5a8 [ 80.618682] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 80.624206] kthread+0x464/0x810 [ 80.627471] ret_from_fork+0x14/0x20 [ 80.631072] [ 80.632568] The buggy address belongs to the object at cc90f300 [ 80.632568] which belongs to the cache kmalloc-64 of size 64 [ 80.644287] The buggy address is located 0 bytes to the right of [ 80.644287] allocated 48-byte region [cc90f300, cc90f330) [ 80.655853] [ 80.657348] The buggy address belongs to the physical page: [ 80.662963] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 80.670227] flags: 0x0(zone=0) [ 80.673309] page_type: f5(slab) [ 80.676483] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 80.684631] raw: 00000000 [ 80.687255] page dumped because: kasan: bad access detected [ 80.692871] [ 80.694366] Memory state around the buggy address: [ 80.699188] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.705749] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.712341] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 80.718902] ^ [ 80.723022] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.729583] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.736175] ================================================================== [ 81.586425] ================================================================== [ 81.593688] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x5ab0 [ 81.601135] Read of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 81.607788] [ 81.609283] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 81.609313] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 81.609344] Hardware name: Generic DRA74X (Flattened Device Tree) [ 81.609344] Call trace: [ 81.609344] unwind_backtrace from show_stack+0x18/0x1c [ 81.609374] show_stack from dump_stack_lvl+0x70/0x90 [ 81.609405] dump_stack_lvl from print_report+0x158/0x528 [ 81.609436] print_report from kasan_report+0xdc/0x118 [ 81.609466] kasan_report from kasan_check_range+0x14c/0x198 [ 81.609466] kasan_check_range from kasan_atomics_helper+0x154c/0x5ab0 [ 81.609497] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 81.609527] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 81.609558] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 81.609588] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 81.609619] kthread from ret_from_fork+0x14/0x20 [ 81.609619] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 81.609649] 3fa0: 00000000 00000000 00000000 00000000 [ 81.609649] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 81.609680] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 81.609680] [ 81.727661] Allocated by task 317: [ 81.731079] kasan_save_track+0x30/0x5c [ 81.734954] __kasan_kmalloc+0x8c/0x94 [ 81.738739] kasan_atomics+0xc0/0x33c [ 81.742431] kunit_try_run_case+0x22c/0x5a8 [ 81.746643] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 81.752166] kthread+0x464/0x810 [ 81.755432] ret_from_fork+0x14/0x20 [ 81.759033] [ 81.760528] The buggy address belongs to the object at cc90f300 [ 81.760528] which belongs to the cache kmalloc-64 of size 64 [ 81.772247] The buggy address is located 0 bytes to the right of [ 81.772247] allocated 48-byte region [cc90f300, cc90f330) [ 81.783813] [ 81.785308] The buggy address belongs to the physical page: [ 81.790924] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 81.798187] flags: 0x0(zone=0) [ 81.801269] page_type: f5(slab) [ 81.804443] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 81.812591] raw: 00000000 [ 81.815216] page dumped because: kasan: bad access detected [ 81.820831] [ 81.822326] Memory state around the buggy address: [ 81.827148] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.833740] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.840301] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 81.846862] ^ [ 81.850982] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.857574] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.864135] ================================================================== [ 88.974761] ================================================================== [ 88.982025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54f4/0x5ab0 [ 88.989501] Read of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 88.996154] [ 88.997650] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 88.997680] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 88.997680] Hardware name: Generic DRA74X (Flattened Device Tree) [ 88.997711] Call trace: [ 88.997711] unwind_backtrace from show_stack+0x18/0x1c [ 88.997741] show_stack from dump_stack_lvl+0x70/0x90 [ 88.997772] dump_stack_lvl from print_report+0x158/0x528 [ 88.997802] print_report from kasan_report+0xdc/0x118 [ 88.997802] kasan_report from kasan_atomics_helper+0x54f4/0x5ab0 [ 88.997833] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 88.997863] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 88.997894] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 88.997924] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 88.997955] kthread from ret_from_fork+0x14/0x20 [ 88.997955] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 88.997985] 3fa0: 00000000 00000000 00000000 00000000 [ 88.997985] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 88.998016] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 88.998016] [ 89.109893] Allocated by task 317: [ 89.113311] kasan_save_track+0x30/0x5c [ 89.117187] __kasan_kmalloc+0x8c/0x94 [ 89.120941] kasan_atomics+0xc0/0x33c [ 89.124664] kunit_try_run_case+0x22c/0x5a8 [ 89.128875] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 89.134399] kthread+0x464/0x810 [ 89.137664] ret_from_fork+0x14/0x20 [ 89.141265] [ 89.142761] The buggy address belongs to the object at cc90f300 [ 89.142761] which belongs to the cache kmalloc-64 of size 64 [ 89.154479] The buggy address is located 0 bytes to the right of [ 89.154479] allocated 48-byte region [cc90f300, cc90f330) [ 89.166046] [ 89.167541] The buggy address belongs to the physical page: [ 89.173126] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 89.180419] flags: 0x0(zone=0) [ 89.183471] page_type: f5(slab) [ 89.186645] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 89.194793] raw: 00000000 [ 89.197448] page dumped because: kasan: bad access detected [ 89.203033] [ 89.204528] Memory state around the buggy address: [ 89.209350] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.215942] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.222503] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 89.229064] ^ [ 89.233184] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.239776] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.246337] ================================================================== [ 77.050292] ================================================================== [ 77.057556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x5ab0 [ 77.064941] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 77.071685] [ 77.073181] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 77.073211] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 77.073211] Hardware name: Generic DRA74X (Flattened Device Tree) [ 77.073242] Call trace: [ 77.073242] unwind_backtrace from show_stack+0x18/0x1c [ 77.073272] show_stack from dump_stack_lvl+0x70/0x90 [ 77.073303] dump_stack_lvl from print_report+0x158/0x528 [ 77.073303] print_report from kasan_report+0xdc/0x118 [ 77.073333] kasan_report from kasan_check_range+0x14c/0x198 [ 77.073364] kasan_check_range from kasan_atomics_helper+0xb70/0x5ab0 [ 77.073394] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 77.073425] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 77.073425] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 77.073455] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 77.073486] kthread from ret_from_fork+0x14/0x20 [ 77.073516] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 77.073516] 3fa0: 00000000 00000000 00000000 00000000 [ 77.073547] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 77.073547] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 77.073577] [ 77.191467] Allocated by task 317: [ 77.194885] kasan_save_track+0x30/0x5c [ 77.198760] __kasan_kmalloc+0x8c/0x94 [ 77.202545] kasan_atomics+0xc0/0x33c [ 77.206237] kunit_try_run_case+0x22c/0x5a8 [ 77.210449] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 77.215972] kthread+0x464/0x810 [ 77.219238] ret_from_fork+0x14/0x20 [ 77.222839] [ 77.224334] The buggy address belongs to the object at cc90f300 [ 77.224334] which belongs to the cache kmalloc-64 of size 64 [ 77.236053] The buggy address is located 0 bytes to the right of [ 77.236053] allocated 48-byte region [cc90f300, cc90f330) [ 77.247619] [ 77.249114] The buggy address belongs to the physical page: [ 77.254730] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 77.261993] flags: 0x0(zone=0) [ 77.265075] page_type: f5(slab) [ 77.268249] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 77.276397] raw: 00000000 [ 77.279022] page dumped because: kasan: bad access detected [ 77.284637] [ 77.286132] Memory state around the buggy address: [ 77.290954] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.297515] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.304107] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.310668] ^ [ 77.314788] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.321380] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.327941] ================================================================== [ 77.905181] ================================================================== [ 77.912445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5404/0x5ab0 [ 77.919891] Read of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 77.926544] [ 77.928070] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 77.928100] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 77.928100] Hardware name: Generic DRA74X (Flattened Device Tree) [ 77.928100] Call trace: [ 77.928100] unwind_backtrace from show_stack+0x18/0x1c [ 77.928131] show_stack from dump_stack_lvl+0x70/0x90 [ 77.928161] dump_stack_lvl from print_report+0x158/0x528 [ 77.928192] print_report from kasan_report+0xdc/0x118 [ 77.928222] kasan_report from kasan_atomics_helper+0x5404/0x5ab0 [ 77.928253] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 77.928253] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 77.928283] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 77.928314] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 77.928344] kthread from ret_from_fork+0x14/0x20 [ 77.928375] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 77.928375] 3fa0: 00000000 00000000 00000000 00000000 [ 77.928405] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 77.928405] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 77.928436] [ 78.040283] Allocated by task 317: [ 78.043701] kasan_save_track+0x30/0x5c [ 78.047576] __kasan_kmalloc+0x8c/0x94 [ 78.051361] kasan_atomics+0xc0/0x33c [ 78.055053] kunit_try_run_case+0x22c/0x5a8 [ 78.059265] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 78.064788] kthread+0x464/0x810 [ 78.068054] ret_from_fork+0x14/0x20 [ 78.071655] [ 78.073150] The buggy address belongs to the object at cc90f300 [ 78.073150] which belongs to the cache kmalloc-64 of size 64 [ 78.084899] The buggy address is located 0 bytes to the right of [ 78.084899] allocated 48-byte region [cc90f300, cc90f330) [ 78.096435] [ 78.097930] The buggy address belongs to the physical page: [ 78.103546] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 78.110809] flags: 0x0(zone=0) [ 78.113891] page_type: f5(slab) [ 78.117065] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 78.125213] raw: 00000000 [ 78.127838] page dumped because: kasan: bad access detected [ 78.133453] [ 78.134948] Memory state around the buggy address: [ 78.139770] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.146362] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.152923] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 78.159484] ^ [ 78.163635] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.170196] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.176757] ================================================================== [ 84.425262] ================================================================== [ 84.432556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1aa8/0x5ab0 [ 84.440002] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 84.446746] [ 84.448242] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 84.448272] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 84.448303] Hardware name: Generic DRA74X (Flattened Device Tree) [ 84.448303] Call trace: [ 84.448303] unwind_backtrace from show_stack+0x18/0x1c [ 84.448333] show_stack from dump_stack_lvl+0x70/0x90 [ 84.448364] dump_stack_lvl from print_report+0x158/0x528 [ 84.448394] print_report from kasan_report+0xdc/0x118 [ 84.448394] kasan_report from kasan_check_range+0x14c/0x198 [ 84.448425] kasan_check_range from kasan_atomics_helper+0x1aa8/0x5ab0 [ 84.448455] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 84.448486] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 84.448516] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 84.448547] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 84.448577] kthread from ret_from_fork+0x14/0x20 [ 84.448577] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 84.448608] 3fa0: 00000000 00000000 00000000 00000000 [ 84.448608] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 84.448638] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 84.448638] [ 84.566619] Allocated by task 317: [ 84.570037] kasan_save_track+0x30/0x5c [ 84.573913] __kasan_kmalloc+0x8c/0x94 [ 84.577697] kasan_atomics+0xc0/0x33c [ 84.581390] kunit_try_run_case+0x22c/0x5a8 [ 84.585601] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 84.591125] kthread+0x464/0x810 [ 84.594390] ret_from_fork+0x14/0x20 [ 84.597991] [ 84.599487] The buggy address belongs to the object at cc90f300 [ 84.599487] which belongs to the cache kmalloc-64 of size 64 [ 84.611236] The buggy address is located 0 bytes to the right of [ 84.611236] allocated 48-byte region [cc90f300, cc90f330) [ 84.622772] [ 84.624267] The buggy address belongs to the physical page: [ 84.629882] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 84.637145] flags: 0x0(zone=0) [ 84.640228] page_type: f5(slab) [ 84.643402] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 84.651550] raw: 00000000 [ 84.654174] page dumped because: kasan: bad access detected [ 84.659790] [ 84.661285] Memory state around the buggy address: [ 84.666107] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.672698] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.679260] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 84.685821] ^ [ 84.689941] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.696533] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.703094] ================================================================== [ 78.184082] ================================================================== [ 78.191345] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe30/0x5ab0 [ 78.198699] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 78.205444] [ 78.206970] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 78.207000] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 78.207000] Hardware name: Generic DRA74X (Flattened Device Tree) [ 78.207000] Call trace: [ 78.207031] unwind_backtrace from show_stack+0x18/0x1c [ 78.207031] show_stack from dump_stack_lvl+0x70/0x90 [ 78.207061] dump_stack_lvl from print_report+0x158/0x528 [ 78.207092] print_report from kasan_report+0xdc/0x118 [ 78.207122] kasan_report from kasan_check_range+0x14c/0x198 [ 78.207122] kasan_check_range from kasan_atomics_helper+0xe30/0x5ab0 [ 78.207153] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 78.207183] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 78.207214] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 78.207244] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 78.207275] kthread from ret_from_fork+0x14/0x20 [ 78.207305] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 78.207305] 3fa0: 00000000 00000000 00000000 00000000 [ 78.207336] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 78.207336] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 78.207366] [ 78.325225] Allocated by task 317: [ 78.328674] kasan_save_track+0x30/0x5c [ 78.332519] __kasan_kmalloc+0x8c/0x94 [ 78.336303] kasan_atomics+0xc0/0x33c [ 78.339996] kunit_try_run_case+0x22c/0x5a8 [ 78.344207] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 78.349761] kthread+0x464/0x810 [ 78.352996] ret_from_fork+0x14/0x20 [ 78.356628] [ 78.358123] The buggy address belongs to the object at cc90f300 [ 78.358123] which belongs to the cache kmalloc-64 of size 64 [ 78.369842] The buggy address is located 0 bytes to the right of [ 78.369842] allocated 48-byte region [cc90f300, cc90f330) [ 78.381378] [ 78.382904] The buggy address belongs to the physical page: [ 78.388488] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 78.395782] flags: 0x0(zone=0) [ 78.398834] page_type: f5(slab) [ 78.402008] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 78.410156] raw: 00000000 [ 78.412780] page dumped because: kasan: bad access detected [ 78.418395] [ 78.419891] Memory state around the buggy address: [ 78.424713] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.431304] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.437866] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 78.444427] ^ [ 78.448577] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.455139] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.461700] ================================================================== [ 84.995544] ================================================================== [ 85.002807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1bf0/0x5ab0 [ 85.010253] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 85.016998] [ 85.018493] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 85.018524] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 85.018554] Hardware name: Generic DRA74X (Flattened Device Tree) [ 85.018554] Call trace: [ 85.018554] unwind_backtrace from show_stack+0x18/0x1c [ 85.018585] show_stack from dump_stack_lvl+0x70/0x90 [ 85.018615] dump_stack_lvl from print_report+0x158/0x528 [ 85.018646] print_report from kasan_report+0xdc/0x118 [ 85.018646] kasan_report from kasan_check_range+0x14c/0x198 [ 85.018676] kasan_check_range from kasan_atomics_helper+0x1bf0/0x5ab0 [ 85.018707] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 85.018737] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 85.018768] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 85.018798] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 85.018829] kthread from ret_from_fork+0x14/0x20 [ 85.018829] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 85.018859] 3fa0: 00000000 00000000 00000000 00000000 [ 85.018859] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 85.018890] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 85.018890] [ 85.136871] Allocated by task 317: [ 85.140289] kasan_save_track+0x30/0x5c [ 85.144165] __kasan_kmalloc+0x8c/0x94 [ 85.147949] kasan_atomics+0xc0/0x33c [ 85.151641] kunit_try_run_case+0x22c/0x5a8 [ 85.155853] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 85.161376] kthread+0x464/0x810 [ 85.164642] ret_from_fork+0x14/0x20 [ 85.168243] [ 85.169738] The buggy address belongs to the object at cc90f300 [ 85.169738] which belongs to the cache kmalloc-64 of size 64 [ 85.181457] The buggy address is located 0 bytes to the right of [ 85.181457] allocated 48-byte region [cc90f300, cc90f330) [ 85.193023] [ 85.194519] The buggy address belongs to the physical page: [ 85.200134] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 85.207397] flags: 0x0(zone=0) [ 85.210479] page_type: f5(slab) [ 85.213653] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 85.221801] raw: 00000000 [ 85.224426] page dumped because: kasan: bad access detected [ 85.230041] [ 85.231536] Memory state around the buggy address: [ 85.236358] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.242919] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.249511] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 85.256072] ^ [ 85.260192] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.266784] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 85.273345] ================================================================== [ 82.999603] ================================================================== [ 83.006866] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1774/0x5ab0 [ 83.014343] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 83.021087] [ 83.022583] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 83.022613] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 83.022613] Hardware name: Generic DRA74X (Flattened Device Tree) [ 83.022644] Call trace: [ 83.022644] unwind_backtrace from show_stack+0x18/0x1c [ 83.022674] show_stack from dump_stack_lvl+0x70/0x90 [ 83.022705] dump_stack_lvl from print_report+0x158/0x528 [ 83.022705] print_report from kasan_report+0xdc/0x118 [ 83.022735] kasan_report from kasan_check_range+0x14c/0x198 [ 83.022766] kasan_check_range from kasan_atomics_helper+0x1774/0x5ab0 [ 83.022796] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 83.022827] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 83.022857] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 83.022857] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 83.022888] kthread from ret_from_fork+0x14/0x20 [ 83.022918] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 83.022918] 3fa0: 00000000 00000000 00000000 00000000 [ 83.022949] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 83.022979] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 83.022979] [ 83.140960] Allocated by task 317: [ 83.144378] kasan_save_track+0x30/0x5c [ 83.148254] __kasan_kmalloc+0x8c/0x94 [ 83.152038] kasan_atomics+0xc0/0x33c [ 83.155731] kunit_try_run_case+0x22c/0x5a8 [ 83.159942] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 83.165466] kthread+0x464/0x810 [ 83.168731] ret_from_fork+0x14/0x20 [ 83.172332] [ 83.173828] The buggy address belongs to the object at cc90f300 [ 83.173828] which belongs to the cache kmalloc-64 of size 64 [ 83.185577] The buggy address is located 0 bytes to the right of [ 83.185577] allocated 48-byte region [cc90f300, cc90f330) [ 83.197113] [ 83.198608] The buggy address belongs to the physical page: [ 83.204223] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 83.211486] flags: 0x0(zone=0) [ 83.214569] page_type: f5(slab) [ 83.217742] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 83.225891] raw: 00000000 [ 83.228515] page dumped because: kasan: bad access detected [ 83.234130] [ 83.235626] Memory state around the buggy address: [ 83.240447] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.247039] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.253601] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 83.260162] ^ [ 83.264282] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.270874] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.277435] ================================================================== [ 89.538757] ================================================================== [ 89.546020] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5500/0x5ab0 [ 89.553497] Read of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 89.560150] [ 89.561645] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 89.561676] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 89.561676] Hardware name: Generic DRA74X (Flattened Device Tree) [ 89.561706] Call trace: [ 89.561706] unwind_backtrace from show_stack+0x18/0x1c [ 89.561737] show_stack from dump_stack_lvl+0x70/0x90 [ 89.561767] dump_stack_lvl from print_report+0x158/0x528 [ 89.561767] print_report from kasan_report+0xdc/0x118 [ 89.561798] kasan_report from kasan_atomics_helper+0x5500/0x5ab0 [ 89.561828] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 89.561859] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 89.561889] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 89.561920] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 89.561950] kthread from ret_from_fork+0x14/0x20 [ 89.561950] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 89.561981] 3fa0: 00000000 00000000 00000000 00000000 [ 89.561981] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 89.562011] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 89.562011] [ 89.673858] Allocated by task 317: [ 89.677307] kasan_save_track+0x30/0x5c [ 89.681152] __kasan_kmalloc+0x8c/0x94 [ 89.684936] kasan_atomics+0xc0/0x33c [ 89.688629] kunit_try_run_case+0x22c/0x5a8 [ 89.692840] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 89.698394] kthread+0x464/0x810 [ 89.701629] ret_from_fork+0x14/0x20 [ 89.705230] [ 89.706756] The buggy address belongs to the object at cc90f300 [ 89.706756] which belongs to the cache kmalloc-64 of size 64 [ 89.718475] The buggy address is located 0 bytes to the right of [ 89.718475] allocated 48-byte region [cc90f300, cc90f330) [ 89.730010] [ 89.731506] The buggy address belongs to the physical page: [ 89.737121] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 89.744384] flags: 0x0(zone=0) [ 89.747467] page_type: f5(slab) [ 89.750640] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 89.758789] raw: 00000000 [ 89.761413] page dumped because: kasan: bad access detected [ 89.767028] [ 89.768524] Memory state around the buggy address: [ 89.773345] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.779937] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.786499] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 89.793060] ^ [ 89.797180] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.803771] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.810333] ================================================================== [ 74.485595] ================================================================== [ 74.492889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5a4/0x5ab0 [ 74.500244] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 74.506988] [ 74.508483] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 74.508514] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 74.508514] Hardware name: Generic DRA74X (Flattened Device Tree) [ 74.508544] Call trace: [ 74.508544] unwind_backtrace from show_stack+0x18/0x1c [ 74.508575] show_stack from dump_stack_lvl+0x70/0x90 [ 74.508605] dump_stack_lvl from print_report+0x158/0x528 [ 74.508636] print_report from kasan_report+0xdc/0x118 [ 74.508636] kasan_report from kasan_check_range+0x14c/0x198 [ 74.508666] kasan_check_range from kasan_atomics_helper+0x5a4/0x5ab0 [ 74.508697] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 74.508728] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 74.508758] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 74.508789] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 74.508789] kthread from ret_from_fork+0x14/0x20 [ 74.508819] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 74.508850] 3fa0: 00000000 00000000 00000000 00000000 [ 74.508850] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 74.508880] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 74.508880] [ 74.626770] Allocated by task 317: [ 74.630187] kasan_save_track+0x30/0x5c [ 74.634063] __kasan_kmalloc+0x8c/0x94 [ 74.637847] kasan_atomics+0xc0/0x33c [ 74.641540] kunit_try_run_case+0x22c/0x5a8 [ 74.645751] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 74.651306] kthread+0x464/0x810 [ 74.654541] ret_from_fork+0x14/0x20 [ 74.658142] [ 74.659667] The buggy address belongs to the object at cc90f300 [ 74.659667] which belongs to the cache kmalloc-64 of size 64 [ 74.671386] The buggy address is located 0 bytes to the right of [ 74.671386] allocated 48-byte region [cc90f300, cc90f330) [ 74.682922] [ 74.684417] The buggy address belongs to the physical page: [ 74.690032] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 74.697296] flags: 0x0(zone=0) [ 74.700378] page_type: f5(slab) [ 74.703552] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 74.711700] raw: 00000000 [ 74.714355] page dumped because: kasan: bad access detected [ 74.719940] [ 74.721466] Memory state around the buggy address: [ 74.726287] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.732849] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.739410] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.745971] ^ [ 74.750122] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.756683] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.763244] ================================================================== [ 74.206604] ================================================================== [ 74.213867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50bc/0x5ab0 [ 74.221313] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 74.228088] [ 74.229583] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 74.229614] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 74.229614] Hardware name: Generic DRA74X (Flattened Device Tree) [ 74.229614] Call trace: [ 74.229644] unwind_backtrace from show_stack+0x18/0x1c [ 74.229675] show_stack from dump_stack_lvl+0x70/0x90 [ 74.229675] dump_stack_lvl from print_report+0x158/0x528 [ 74.229705] print_report from kasan_report+0xdc/0x118 [ 74.229736] kasan_report from kasan_atomics_helper+0x50bc/0x5ab0 [ 74.229766] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 74.229797] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 74.229827] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 74.229858] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 74.229858] kthread from ret_from_fork+0x14/0x20 [ 74.229888] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 74.229919] 3fa0: 00000000 00000000 00000000 00000000 [ 74.229919] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 74.229949] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 74.229949] [ 74.341796] Allocated by task 317: [ 74.345245] kasan_save_track+0x30/0x5c [ 74.349090] __kasan_kmalloc+0x8c/0x94 [ 74.352874] kasan_atomics+0xc0/0x33c [ 74.356567] kunit_try_run_case+0x22c/0x5a8 [ 74.360809] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 74.366333] kthread+0x464/0x810 [ 74.369567] ret_from_fork+0x14/0x20 [ 74.373199] [ 74.374694] The buggy address belongs to the object at cc90f300 [ 74.374694] which belongs to the cache kmalloc-64 of size 64 [ 74.386413] The buggy address is located 0 bytes to the right of [ 74.386413] allocated 48-byte region [cc90f300, cc90f330) [ 74.397949] [ 74.399475] The buggy address belongs to the physical page: [ 74.405059] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 74.412353] flags: 0x0(zone=0) [ 74.415435] page_type: f5(slab) [ 74.418609] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 74.426727] raw: 00000000 [ 74.429382] page dumped because: kasan: bad access detected [ 74.434997] [ 74.436492] Memory state around the buggy address: [ 74.441314] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.447875] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.454437] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.461029] ^ [ 74.465148] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.471710] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.478302] ================================================================== [ 76.765319] ================================================================== [ 76.772583] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac4/0x5ab0 [ 76.779968] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 76.786712] [ 76.788208] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 76.788238] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 76.788238] Hardware name: Generic DRA74X (Flattened Device Tree) [ 76.788269] Call trace: [ 76.788269] unwind_backtrace from show_stack+0x18/0x1c [ 76.788299] show_stack from dump_stack_lvl+0x70/0x90 [ 76.788330] dump_stack_lvl from print_report+0x158/0x528 [ 76.788360] print_report from kasan_report+0xdc/0x118 [ 76.788360] kasan_report from kasan_check_range+0x14c/0x198 [ 76.788391] kasan_check_range from kasan_atomics_helper+0xac4/0x5ab0 [ 76.788421] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 76.788452] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 76.788482] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 76.788513] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 76.788513] kthread from ret_from_fork+0x14/0x20 [ 76.788543] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 76.788574] 3fa0: 00000000 00000000 00000000 00000000 [ 76.788574] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 76.788604] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 76.788604] [ 76.906494] Allocated by task 317: [ 76.909912] kasan_save_track+0x30/0x5c [ 76.913787] __kasan_kmalloc+0x8c/0x94 [ 76.917572] kasan_atomics+0xc0/0x33c [ 76.921264] kunit_try_run_case+0x22c/0x5a8 [ 76.925476] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 76.930999] kthread+0x464/0x810 [ 76.934265] ret_from_fork+0x14/0x20 [ 76.937866] [ 76.939361] The buggy address belongs to the object at cc90f300 [ 76.939361] which belongs to the cache kmalloc-64 of size 64 [ 76.951110] The buggy address is located 0 bytes to the right of [ 76.951110] allocated 48-byte region [cc90f300, cc90f330) [ 76.962646] [ 76.964141] The buggy address belongs to the physical page: [ 76.969757] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 76.977020] flags: 0x0(zone=0) [ 76.980102] page_type: f5(slab) [ 76.983276] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 76.991424] raw: 00000000 [ 76.994049] page dumped because: kasan: bad access detected [ 76.999664] [ 77.001159] Memory state around the buggy address: [ 77.005981] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.012573] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.019134] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.025695] ^ [ 77.029846] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.036407] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.042968] ================================================================== [ 77.335266] ================================================================== [ 77.342529] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc24/0x5ab0 [ 77.349884] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 77.356628] [ 77.358154] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 77.358184] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 77.358184] Hardware name: Generic DRA74X (Flattened Device Tree) [ 77.358184] Call trace: [ 77.358184] unwind_backtrace from show_stack+0x18/0x1c [ 77.358215] show_stack from dump_stack_lvl+0x70/0x90 [ 77.358245] dump_stack_lvl from print_report+0x158/0x528 [ 77.358276] print_report from kasan_report+0xdc/0x118 [ 77.358306] kasan_report from kasan_check_range+0x14c/0x198 [ 77.358306] kasan_check_range from kasan_atomics_helper+0xc24/0x5ab0 [ 77.358337] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 77.358367] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 77.358398] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 77.358428] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 77.358459] kthread from ret_from_fork+0x14/0x20 [ 77.358459] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 77.358489] 3fa0: 00000000 00000000 00000000 00000000 [ 77.358520] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 77.358520] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 77.358520] [ 77.476409] Allocated by task 317: [ 77.479858] kasan_save_track+0x30/0x5c [ 77.483703] __kasan_kmalloc+0x8c/0x94 [ 77.487487] kasan_atomics+0xc0/0x33c [ 77.491180] kunit_try_run_case+0x22c/0x5a8 [ 77.495422] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 77.500946] kthread+0x464/0x810 [ 77.504180] ret_from_fork+0x14/0x20 [ 77.507812] [ 77.509307] The buggy address belongs to the object at cc90f300 [ 77.509307] which belongs to the cache kmalloc-64 of size 64 [ 77.521026] The buggy address is located 0 bytes to the right of [ 77.521026] allocated 48-byte region [cc90f300, cc90f330) [ 77.532592] [ 77.534088] The buggy address belongs to the physical page: [ 77.539672] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 77.546966] flags: 0x0(zone=0) [ 77.550048] page_type: f5(slab) [ 77.553222] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 77.561340] raw: 00000000 [ 77.563995] page dumped because: kasan: bad access detected [ 77.569610] [ 77.571105] Memory state around the buggy address: [ 77.575927] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.582489] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.589080] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.595642] ^ [ 77.599761] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.606323] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.612884] ================================================================== [ 77.620208] ================================================================== [ 77.627471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x5ab0 [ 77.634857] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 77.641601] [ 77.643096] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 77.643127] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 77.643127] Hardware name: Generic DRA74X (Flattened Device Tree) [ 77.643157] Call trace: [ 77.643157] unwind_backtrace from show_stack+0x18/0x1c [ 77.643188] show_stack from dump_stack_lvl+0x70/0x90 [ 77.643218] dump_stack_lvl from print_report+0x158/0x528 [ 77.643218] print_report from kasan_report+0xdc/0x118 [ 77.643249] kasan_report from kasan_check_range+0x14c/0x198 [ 77.643280] kasan_check_range from kasan_atomics_helper+0xd3c/0x5ab0 [ 77.643310] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 77.643341] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 77.643371] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 77.643371] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 77.643402] kthread from ret_from_fork+0x14/0x20 [ 77.643432] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 77.643432] 3fa0: 00000000 00000000 00000000 00000000 [ 77.643463] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 77.643493] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 77.643493] [ 77.761383] Allocated by task 317: [ 77.764801] kasan_save_track+0x30/0x5c [ 77.768676] __kasan_kmalloc+0x8c/0x94 [ 77.772460] kasan_atomics+0xc0/0x33c [ 77.776153] kunit_try_run_case+0x22c/0x5a8 [ 77.780364] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 77.785888] kthread+0x464/0x810 [ 77.789154] ret_from_fork+0x14/0x20 [ 77.792755] [ 77.794250] The buggy address belongs to the object at cc90f300 [ 77.794250] which belongs to the cache kmalloc-64 of size 64 [ 77.805969] The buggy address is located 0 bytes to the right of [ 77.805969] allocated 48-byte region [cc90f300, cc90f330) [ 77.817535] [ 77.819030] The buggy address belongs to the physical page: [ 77.824645] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 77.831909] flags: 0x0(zone=0) [ 77.834991] page_type: f5(slab) [ 77.838165] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 77.846313] raw: 00000000 [ 77.848937] page dumped because: kasan: bad access detected [ 77.854553] [ 77.856048] Memory state around the buggy address: [ 77.860870] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.867462] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.874023] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.880584] ^ [ 77.884704] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.891296] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.897857] ================================================================== [ 79.324066] ================================================================== [ 79.331329] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10e0/0x5ab0 [ 79.338775] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 79.345520] [ 79.347045] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 79.347076] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 79.347076] Hardware name: Generic DRA74X (Flattened Device Tree) [ 79.347076] Call trace: [ 79.347106] unwind_backtrace from show_stack+0x18/0x1c [ 79.347106] show_stack from dump_stack_lvl+0x70/0x90 [ 79.347137] dump_stack_lvl from print_report+0x158/0x528 [ 79.347167] print_report from kasan_report+0xdc/0x118 [ 79.347198] kasan_report from kasan_check_range+0x14c/0x198 [ 79.347198] kasan_check_range from kasan_atomics_helper+0x10e0/0x5ab0 [ 79.347229] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 79.347259] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 79.347290] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 79.347320] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 79.347351] kthread from ret_from_fork+0x14/0x20 [ 79.347381] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 79.347381] 3fa0: 00000000 00000000 00000000 00000000 [ 79.347412] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 79.347412] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 79.347442] [ 79.465393] Allocated by task 317: [ 79.468841] kasan_save_track+0x30/0x5c [ 79.472686] __kasan_kmalloc+0x8c/0x94 [ 79.476470] kasan_atomics+0xc0/0x33c [ 79.480163] kunit_try_run_case+0x22c/0x5a8 [ 79.484374] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 79.489929] kthread+0x464/0x810 [ 79.493164] ret_from_fork+0x14/0x20 [ 79.496765] [ 79.498291] The buggy address belongs to the object at cc90f300 [ 79.498291] which belongs to the cache kmalloc-64 of size 64 [ 79.510009] The buggy address is located 0 bytes to the right of [ 79.510009] allocated 48-byte region [cc90f300, cc90f330) [ 79.521545] [ 79.523071] The buggy address belongs to the physical page: [ 79.528656] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 79.535949] flags: 0x0(zone=0) [ 79.539001] page_type: f5(slab) [ 79.542175] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 79.550323] raw: 00000000 [ 79.552978] page dumped because: kasan: bad access detected [ 79.558563] [ 79.560089] Memory state around the buggy address: [ 79.564910] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.571472] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.578033] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 79.584625] ^ [ 79.588745] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.595306] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.601867] ================================================================== [ 76.480377] ================================================================== [ 76.487640] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa20/0x5ab0 [ 76.494995] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 76.501739] [ 76.503265] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 76.503265] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 76.503295] Hardware name: Generic DRA74X (Flattened Device Tree) [ 76.503295] Call trace: [ 76.503295] unwind_backtrace from show_stack+0x18/0x1c [ 76.503326] show_stack from dump_stack_lvl+0x70/0x90 [ 76.503356] dump_stack_lvl from print_report+0x158/0x528 [ 76.503387] print_report from kasan_report+0xdc/0x118 [ 76.503417] kasan_report from kasan_check_range+0x14c/0x198 [ 76.503417] kasan_check_range from kasan_atomics_helper+0xa20/0x5ab0 [ 76.503448] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 76.503479] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 76.503509] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 76.503540] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 76.503570] kthread from ret_from_fork+0x14/0x20 [ 76.503570] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 76.503601] 3fa0: 00000000 00000000 00000000 00000000 [ 76.503601] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 76.503631] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 76.503631] [ 76.621520] Allocated by task 317: [ 76.624969] kasan_save_track+0x30/0x5c [ 76.628814] __kasan_kmalloc+0x8c/0x94 [ 76.632598] kasan_atomics+0xc0/0x33c [ 76.636291] kunit_try_run_case+0x22c/0x5a8 [ 76.640502] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 76.646057] kthread+0x464/0x810 [ 76.649291] ret_from_fork+0x14/0x20 [ 76.652923] [ 76.654418] The buggy address belongs to the object at cc90f300 [ 76.654418] which belongs to the cache kmalloc-64 of size 64 [ 76.666137] The buggy address is located 0 bytes to the right of [ 76.666137] allocated 48-byte region [cc90f300, cc90f330) [ 76.677673] [ 76.679199] The buggy address belongs to the physical page: [ 76.684783] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 76.692077] flags: 0x0(zone=0) [ 76.695159] page_type: f5(slab) [ 76.698303] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 76.706451] raw: 00000000 [ 76.709106] page dumped because: kasan: bad access detected [ 76.714721] [ 76.716217] Memory state around the buggy address: [ 76.721038] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.727600] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.734161] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 76.740753] ^ [ 76.744873] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.751434] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.758026] ================================================================== [ 73.642730] ================================================================== [ 73.649993] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5200/0x5ab0 [ 73.657440] Read of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 73.664123] [ 73.665618] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 73.665649] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 73.665649] Hardware name: Generic DRA74X (Flattened Device Tree) [ 73.665679] Call trace: [ 73.665679] unwind_backtrace from show_stack+0x18/0x1c [ 73.665710] show_stack from dump_stack_lvl+0x70/0x90 [ 73.665710] dump_stack_lvl from print_report+0x158/0x528 [ 73.665740] print_report from kasan_report+0xdc/0x118 [ 73.665771] kasan_report from kasan_atomics_helper+0x5200/0x5ab0 [ 73.665802] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 73.665832] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 73.665863] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 73.665893] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 73.665893] kthread from ret_from_fork+0x14/0x20 [ 73.665924] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 73.665954] 3fa0: 00000000 00000000 00000000 00000000 [ 73.665954] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 73.665985] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 73.665985] [ 73.777832] Allocated by task 317: [ 73.781280] kasan_save_track+0x30/0x5c [ 73.785125] __kasan_kmalloc+0x8c/0x94 [ 73.788909] kasan_atomics+0xc0/0x33c [ 73.792602] kunit_try_run_case+0x22c/0x5a8 [ 73.796813] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 73.802368] kthread+0x464/0x810 [ 73.805603] ret_from_fork+0x14/0x20 [ 73.809234] [ 73.810729] The buggy address belongs to the object at cc90f300 [ 73.810729] which belongs to the cache kmalloc-64 of size 64 [ 73.822448] The buggy address is located 0 bytes to the right of [ 73.822448] allocated 48-byte region [cc90f300, cc90f330) [ 73.833984] [ 73.835510] The buggy address belongs to the physical page: [ 73.841094] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 73.848388] flags: 0x0(zone=0) [ 73.851470] page_type: f5(slab) [ 73.854614] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 73.862762] raw: 00000000 [ 73.865417] page dumped because: kasan: bad access detected [ 73.871002] [ 73.872528] Memory state around the buggy address: [ 73.877349] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.883911] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.890472] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.897064] ^ [ 73.901184] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.907745] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.914306] ================================================================== [ 82.435485] ================================================================== [ 82.442749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x52cc/0x5ab0 [ 82.450195] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 82.456939] [ 82.458465] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 82.458496] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 82.458496] Hardware name: Generic DRA74X (Flattened Device Tree) [ 82.458496] Call trace: [ 82.458526] unwind_backtrace from show_stack+0x18/0x1c [ 82.458526] show_stack from dump_stack_lvl+0x70/0x90 [ 82.458557] dump_stack_lvl from print_report+0x158/0x528 [ 82.458587] print_report from kasan_report+0xdc/0x118 [ 82.458618] kasan_report from kasan_atomics_helper+0x52cc/0x5ab0 [ 82.458648] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 82.458679] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 82.458679] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 82.458709] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 82.458740] kthread from ret_from_fork+0x14/0x20 [ 82.458770] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 82.458770] 3fa0: 00000000 00000000 00000000 00000000 [ 82.458801] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 82.458801] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 82.458831] [ 82.570678] Allocated by task 317: [ 82.574096] kasan_save_track+0x30/0x5c [ 82.577972] __kasan_kmalloc+0x8c/0x94 [ 82.581756] kasan_atomics+0xc0/0x33c [ 82.585449] kunit_try_run_case+0x22c/0x5a8 [ 82.589660] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 82.595214] kthread+0x464/0x810 [ 82.598449] ret_from_fork+0x14/0x20 [ 82.602050] [ 82.603576] The buggy address belongs to the object at cc90f300 [ 82.603576] which belongs to the cache kmalloc-64 of size 64 [ 82.615295] The buggy address is located 0 bytes to the right of [ 82.615295] allocated 48-byte region [cc90f300, cc90f330) [ 82.626831] [ 82.628326] The buggy address belongs to the physical page: [ 82.633941] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 82.641204] flags: 0x0(zone=0) [ 82.644287] page_type: f5(slab) [ 82.647460] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 82.655609] raw: 00000000 [ 82.658233] page dumped because: kasan: bad access detected [ 82.663848] [ 82.665344] Memory state around the buggy address: [ 82.670166] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.676757] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.683319] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 82.689880] ^ [ 82.694030] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.700592] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.707153] ================================================================== [ 80.743469] ================================================================== [ 80.750762] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x520c/0x5ab0 [ 80.758209] Read of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 80.764862] [ 80.766357] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 80.766387] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 80.766418] Hardware name: Generic DRA74X (Flattened Device Tree) [ 80.766418] Call trace: [ 80.766418] unwind_backtrace from show_stack+0x18/0x1c [ 80.766448] show_stack from dump_stack_lvl+0x70/0x90 [ 80.766479] dump_stack_lvl from print_report+0x158/0x528 [ 80.766510] print_report from kasan_report+0xdc/0x118 [ 80.766540] kasan_report from kasan_atomics_helper+0x520c/0x5ab0 [ 80.766540] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 80.766571] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 80.766601] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 80.766632] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 80.766662] kthread from ret_from_fork+0x14/0x20 [ 80.766693] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 80.766693] 3fa0: 00000000 00000000 00000000 00000000 [ 80.766723] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 80.766723] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 80.766754] [ 80.878601] Allocated by task 317: [ 80.882019] kasan_save_track+0x30/0x5c [ 80.885894] __kasan_kmalloc+0x8c/0x94 [ 80.889678] kasan_atomics+0xc0/0x33c [ 80.893371] kunit_try_run_case+0x22c/0x5a8 [ 80.897583] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 80.903106] kthread+0x464/0x810 [ 80.906372] ret_from_fork+0x14/0x20 [ 80.909973] [ 80.911468] The buggy address belongs to the object at cc90f300 [ 80.911468] which belongs to the cache kmalloc-64 of size 64 [ 80.923187] The buggy address is located 0 bytes to the right of [ 80.923187] allocated 48-byte region [cc90f300, cc90f330) [ 80.934753] [ 80.936248] The buggy address belongs to the physical page: [ 80.941864] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 80.949127] flags: 0x0(zone=0) [ 80.952209] page_type: f5(slab) [ 80.955383] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 80.963531] raw: 00000000 [ 80.966156] page dumped because: kasan: bad access detected [ 80.971771] [ 80.973266] Memory state around the buggy address: [ 80.978088] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.984680] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.991241] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 80.997802] ^ [ 81.001922] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.008514] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.015075] ================================================================== [ 75.910430] ================================================================== [ 75.917694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8d8/0x5ab0 [ 75.925079] Write of size 4 at addr cc90f330 by task kunit_try_catch/317 [ 75.931823] [ 75.933319] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 75.933349] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 75.933349] Hardware name: Generic DRA74X (Flattened Device Tree) [ 75.933380] Call trace: [ 75.933380] unwind_backtrace from show_stack+0x18/0x1c [ 75.933410] show_stack from dump_stack_lvl+0x70/0x90 [ 75.933441] dump_stack_lvl from print_report+0x158/0x528 [ 75.933471] print_report from kasan_report+0xdc/0x118 [ 75.933471] kasan_report from kasan_check_range+0x14c/0x198 [ 75.933502] kasan_check_range from kasan_atomics_helper+0x8d8/0x5ab0 [ 75.933532] kasan_atomics_helper from kasan_atomics+0x238/0x33c [ 75.933563] kasan_atomics from kunit_try_run_case+0x22c/0x5a8 [ 75.933593] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 75.933624] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 75.933624] kthread from ret_from_fork+0x14/0x20 [ 75.933654] Exception stack(0xf24e3fb0 to 0xf24e3ff8) [ 75.933685] 3fa0: 00000000 00000000 00000000 00000000 [ 75.933685] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 75.933715] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 75.933715] [ 76.051605] Allocated by task 317: [ 76.055023] kasan_save_track+0x30/0x5c [ 76.058898] __kasan_kmalloc+0x8c/0x94 [ 76.062683] kasan_atomics+0xc0/0x33c [ 76.066375] kunit_try_run_case+0x22c/0x5a8 [ 76.070587] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 76.076110] kthread+0x464/0x810 [ 76.079376] ret_from_fork+0x14/0x20 [ 76.082977] [ 76.084472] The buggy address belongs to the object at cc90f300 [ 76.084472] which belongs to the cache kmalloc-64 of size 64 [ 76.096221] The buggy address is located 0 bytes to the right of [ 76.096221] allocated 48-byte region [cc90f300, cc90f330) [ 76.107757] [ 76.109252] The buggy address belongs to the physical page: [ 76.114868] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f [ 76.122131] flags: 0x0(zone=0) [ 76.125213] page_type: f5(slab) [ 76.128387] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 76.136535] raw: 00000000 [ 76.139160] page dumped because: kasan: bad access detected [ 76.144775] [ 76.146270] Memory state around the buggy address: [ 76.151092] cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.157684] cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.164245] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 76.170806] ^ [ 76.174957] cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.181518] cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.188079] ==================================================================