Date
June 3, 2025, 7:38 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 21.365133] ================================================================== [ 21.365186] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 21.365384] Read of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.365468] [ 21.365561] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.365651] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.365680] Hardware name: linux,dummy-virt (DT) [ 21.365769] Call trace: [ 21.365808] show_stack+0x20/0x38 (C) [ 21.365862] dump_stack_lvl+0x8c/0xd0 [ 21.365965] print_report+0x118/0x608 [ 21.366040] kasan_report+0xdc/0x128 [ 21.366108] __asan_report_load8_noabort+0x20/0x30 [ 21.366160] kasan_atomics_helper+0x3df4/0x4858 [ 21.366210] kasan_atomics+0x198/0x2e0 [ 21.366258] kunit_try_run_case+0x170/0x3f0 [ 21.366307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.366476] kthread+0x328/0x630 [ 21.366538] ret_from_fork+0x10/0x20 [ 21.366598] [ 21.366627] Allocated by task 265: [ 21.366660] kasan_save_stack+0x3c/0x68 [ 21.366700] kasan_save_track+0x20/0x40 [ 21.366756] kasan_save_alloc_info+0x40/0x58 [ 21.366795] __kasan_kmalloc+0xd4/0xd8 [ 21.366835] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.366882] kasan_atomics+0xb8/0x2e0 [ 21.366920] kunit_try_run_case+0x170/0x3f0 [ 21.366960] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.367016] kthread+0x328/0x630 [ 21.367060] ret_from_fork+0x10/0x20 [ 21.367110] [ 21.367132] The buggy address belongs to the object at fff00000c58c1080 [ 21.367132] which belongs to the cache kmalloc-64 of size 64 [ 21.367199] The buggy address is located 0 bytes to the right of [ 21.367199] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.367264] [ 21.367287] The buggy address belongs to the physical page: [ 21.367320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.367604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.367662] page_type: f5(slab) [ 21.367702] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.367762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.367805] page dumped because: kasan: bad access detected [ 21.367840] [ 21.367860] Memory state around the buggy address: [ 21.368066] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.368127] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.368172] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.368212] ^ [ 21.368248] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.368352] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.368437] ================================================================== [ 21.378183] ================================================================== [ 21.378234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 21.378298] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.378360] [ 21.378393] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.378493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.379121] Hardware name: linux,dummy-virt (DT) [ 21.379200] Call trace: [ 21.379228] show_stack+0x20/0x38 (C) [ 21.379296] dump_stack_lvl+0x8c/0xd0 [ 21.379676] print_report+0x118/0x608 [ 21.379782] kasan_report+0xdc/0x128 [ 21.379870] kasan_check_range+0x100/0x1a8 [ 21.380106] __kasan_check_write+0x20/0x30 [ 21.380315] kasan_atomics_helper+0x175c/0x4858 [ 21.380451] kasan_atomics+0x198/0x2e0 [ 21.380537] kunit_try_run_case+0x170/0x3f0 [ 21.380670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.380755] kthread+0x328/0x630 [ 21.380798] ret_from_fork+0x10/0x20 [ 21.380981] [ 21.381002] Allocated by task 265: [ 21.381032] kasan_save_stack+0x3c/0x68 [ 21.381084] kasan_save_track+0x20/0x40 [ 21.381145] kasan_save_alloc_info+0x40/0x58 [ 21.381251] __kasan_kmalloc+0xd4/0xd8 [ 21.381329] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.381463] kasan_atomics+0xb8/0x2e0 [ 21.381551] kunit_try_run_case+0x170/0x3f0 [ 21.381767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.382031] kthread+0x328/0x630 [ 21.382115] ret_from_fork+0x10/0x20 [ 21.382224] [ 21.382272] The buggy address belongs to the object at fff00000c58c1080 [ 21.382272] which belongs to the cache kmalloc-64 of size 64 [ 21.382551] The buggy address is located 0 bytes to the right of [ 21.382551] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.382702] [ 21.382770] The buggy address belongs to the physical page: [ 21.382839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.382897] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.382949] page_type: f5(slab) [ 21.383174] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.383304] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.383359] page dumped because: kasan: bad access detected [ 21.383588] [ 21.383731] Memory state around the buggy address: [ 21.383800] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.383906] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.383993] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.384076] ^ [ 21.384114] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.384261] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.384383] ================================================================== [ 21.054656] ================================================================== [ 21.054944] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 21.055060] Write of size 4 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.055135] [ 21.055170] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.055551] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.055607] Hardware name: linux,dummy-virt (DT) [ 21.055646] Call trace: [ 21.055670] show_stack+0x20/0x38 (C) [ 21.055725] dump_stack_lvl+0x8c/0xd0 [ 21.055776] print_report+0x118/0x608 [ 21.055826] kasan_report+0xdc/0x128 [ 21.055874] kasan_check_range+0x100/0x1a8 [ 21.055924] __kasan_check_write+0x20/0x30 [ 21.055971] kasan_atomics_helper+0xa04/0x4858 [ 21.056022] kasan_atomics+0x198/0x2e0 [ 21.056067] kunit_try_run_case+0x170/0x3f0 [ 21.056117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.056449] __kasan_kmalloc+0xd4/0xd8 [ 21.056704] kunit_try_run_case+0x170/0x3f0 [ 21.057281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.057334] kthread+0x328/0x630 [ 21.057369] ret_from_fork+0x10/0x20 [ 21.057410] [ 21.057446] The buggy address belongs to the object at fff00000c58c1080 [ 21.057446] which belongs to the cache kmalloc-64 of size 64 [ 21.057504] The buggy address is located 0 bytes to the right of [ 21.057504] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.057569] [ 21.059073] The buggy address belongs to the physical page: [ 21.059641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.059910] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.060263] page_type: f5(slab) [ 21.060303] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.060779] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.061174] page dumped because: kasan: bad access detected [ 21.061490] [ 21.061515] Memory state around the buggy address: [ 21.061897] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.062671] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.062725] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.063230] ^ [ 21.063530] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.063897] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.063940] ================================================================== [ 21.085344] ================================================================== [ 21.085409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 21.085482] Write of size 4 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.085535] [ 21.085570] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.087732] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.088279] Hardware name: linux,dummy-virt (DT) [ 21.088325] Call trace: [ 21.088357] show_stack+0x20/0x38 (C) [ 21.088413] dump_stack_lvl+0x8c/0xd0 [ 21.088952] print_report+0x118/0x608 [ 21.089078] kasan_report+0xdc/0x128 [ 21.089595] kasan_check_range+0x100/0x1a8 [ 21.090249] __kasan_check_write+0x20/0x30 [ 21.090631] kasan_atomics_helper+0xad4/0x4858 [ 21.090693] kasan_atomics+0x198/0x2e0 [ 21.090743] kunit_try_run_case+0x170/0x3f0 [ 21.090804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.091590] kthread+0x328/0x630 [ 21.092150] ret_from_fork+0x10/0x20 [ 21.092625] [ 21.092654] Allocated by task 265: [ 21.092691] kasan_save_stack+0x3c/0x68 [ 21.095746] [ 21.096114] The buggy address belongs to the object at fff00000c58c1080 [ 21.096114] which belongs to the cache kmalloc-64 of size 64 [ 21.096656] The buggy address is located 0 bytes to the right of [ 21.096656] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.097150] [ 21.097238] The buggy address belongs to the physical page: [ 21.097531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.098011] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.099065] page_type: f5(slab) [ 21.099174] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.099629] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.099820] page dumped because: kasan: bad access detected [ 21.099857] [ 21.100164] Memory state around the buggy address: [ 21.100556] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.100679] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.100741] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.100783] ^ [ 21.102251] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.102668] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.106224] ================================================================== [ 21.067298] ================================================================== [ 21.067649] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 21.068157] Write of size 4 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.068565] [ 21.068605] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.068699] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.068729] Hardware name: linux,dummy-virt (DT) [ 21.068763] Call trace: [ 21.069796] show_stack+0x20/0x38 (C) [ 21.070171] dump_stack_lvl+0x8c/0xd0 [ 21.070259] print_report+0x118/0x608 [ 21.070310] kasan_report+0xdc/0x128 [ 21.071153] kasan_check_range+0x100/0x1a8 [ 21.071307] __kasan_check_write+0x20/0x30 [ 21.071361] kasan_atomics_helper+0xa6c/0x4858 [ 21.071412] kasan_atomics+0x198/0x2e0 [ 21.072051] kunit_try_run_case+0x170/0x3f0 [ 21.072117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.072218] kthread+0x328/0x630 [ 21.072262] ret_from_fork+0x10/0x20 [ 21.072866] [ 21.072942] Allocated by task 265: [ 21.072976] kasan_save_stack+0x3c/0x68 [ 21.073418] kasan_save_track+0x20/0x40 [ 21.073828] kasan_save_alloc_info+0x40/0x58 [ 21.074407] __kasan_kmalloc+0xd4/0xd8 [ 21.074770] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.074876] kasan_atomics+0xb8/0x2e0 [ 21.074972] kunit_try_run_case+0x170/0x3f0 [ 21.075015] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.075061] kthread+0x328/0x630 [ 21.075095] ret_from_fork+0x10/0x20 [ 21.075919] [ 21.076053] The buggy address belongs to the object at fff00000c58c1080 [ 21.076053] which belongs to the cache kmalloc-64 of size 64 [ 21.076403] The buggy address is located 0 bytes to the right of [ 21.076403] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.076488] [ 21.076514] The buggy address belongs to the physical page: [ 21.076547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.076604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.078157] page_type: f5(slab) [ 21.078296] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.079012] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.079861] page dumped because: kasan: bad access detected [ 21.080054] [ 21.080076] Memory state around the buggy address: [ 21.080156] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.080220] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.080265] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.080305] ^ [ 21.081373] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.081579] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.081880] ================================================================== [ 21.227320] ================================================================== [ 21.227418] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 21.227785] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.228419] [ 21.228781] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.228955] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.229067] Hardware name: linux,dummy-virt (DT) [ 21.229218] Call trace: [ 21.229310] show_stack+0x20/0x38 (C) [ 21.229643] dump_stack_lvl+0x8c/0xd0 [ 21.229991] print_report+0x118/0x608 [ 21.230165] kasan_report+0xdc/0x128 [ 21.230251] kasan_check_range+0x100/0x1a8 [ 21.230440] __kasan_check_write+0x20/0x30 [ 21.230740] kasan_atomics_helper+0xeb8/0x4858 [ 21.230968] kasan_atomics+0x198/0x2e0 [ 21.231217] kunit_try_run_case+0x170/0x3f0 [ 21.231525] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.231722] kthread+0x328/0x630 [ 21.231830] ret_from_fork+0x10/0x20 [ 21.232150] [ 21.232269] Allocated by task 265: [ 21.232345] kasan_save_stack+0x3c/0x68 [ 21.232768] kasan_save_track+0x20/0x40 [ 21.233028] kasan_save_alloc_info+0x40/0x58 [ 21.233401] __kasan_kmalloc+0xd4/0xd8 [ 21.233613] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.233945] kasan_atomics+0xb8/0x2e0 [ 21.234073] kunit_try_run_case+0x170/0x3f0 [ 21.234214] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.234269] kthread+0x328/0x630 [ 21.234306] ret_from_fork+0x10/0x20 [ 21.234349] [ 21.234377] The buggy address belongs to the object at fff00000c58c1080 [ 21.234377] which belongs to the cache kmalloc-64 of size 64 [ 21.234450] The buggy address is located 0 bytes to the right of [ 21.234450] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.234541] [ 21.234563] The buggy address belongs to the physical page: [ 21.234606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.234659] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.234710] page_type: f5(slab) [ 21.234751] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.234803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.234846] page dumped because: kasan: bad access detected [ 21.234878] [ 21.234898] Memory state around the buggy address: [ 21.234946] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.235006] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.235059] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.235106] ^ [ 21.235139] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.235199] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.235240] ================================================================== [ 21.207150] ================================================================== [ 21.207377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 21.207868] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.208036] [ 21.208106] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.208221] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.208250] Hardware name: linux,dummy-virt (DT) [ 21.208665] Call trace: [ 21.208804] show_stack+0x20/0x38 (C) [ 21.209129] dump_stack_lvl+0x8c/0xd0 [ 21.209247] print_report+0x118/0x608 [ 21.209335] kasan_report+0xdc/0x128 [ 21.209475] kasan_check_range+0x100/0x1a8 [ 21.209525] __kasan_check_write+0x20/0x30 [ 21.209908] kasan_atomics_helper+0xe44/0x4858 [ 21.210350] kasan_atomics+0x198/0x2e0 [ 21.210498] kunit_try_run_case+0x170/0x3f0 [ 21.210607] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.210687] kthread+0x328/0x630 [ 21.210922] ret_from_fork+0x10/0x20 [ 21.211167] [ 21.211365] Allocated by task 265: [ 21.211464] kasan_save_stack+0x3c/0x68 [ 21.211618] kasan_save_track+0x20/0x40 [ 21.211969] kasan_save_alloc_info+0x40/0x58 [ 21.212207] __kasan_kmalloc+0xd4/0xd8 [ 21.212436] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.212681] kasan_atomics+0xb8/0x2e0 [ 21.212844] kunit_try_run_case+0x170/0x3f0 [ 21.213037] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.213633] kthread+0x328/0x630 [ 21.213821] ret_from_fork+0x10/0x20 [ 21.214002] [ 21.214060] The buggy address belongs to the object at fff00000c58c1080 [ 21.214060] which belongs to the cache kmalloc-64 of size 64 [ 21.214266] The buggy address is located 0 bytes to the right of [ 21.214266] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.214348] [ 21.214388] The buggy address belongs to the physical page: [ 21.214421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.214483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.214578] page_type: f5(slab) [ 21.214621] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.214673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.214730] page dumped because: kasan: bad access detected [ 21.214783] [ 21.214805] Memory state around the buggy address: [ 21.214839] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.214885] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.214937] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.214993] ^ [ 21.215043] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.215096] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.215137] ================================================================== [ 21.236878] ================================================================== [ 21.237328] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 21.237398] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.237632] [ 21.237677] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.238068] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.238270] Hardware name: linux,dummy-virt (DT) [ 21.238311] Call trace: [ 21.238571] show_stack+0x20/0x38 (C) [ 21.238641] dump_stack_lvl+0x8c/0xd0 [ 21.238853] print_report+0x118/0x608 [ 21.239035] kasan_report+0xdc/0x128 [ 21.239272] kasan_check_range+0x100/0x1a8 [ 21.239347] __kasan_check_write+0x20/0x30 [ 21.239547] kasan_atomics_helper+0xf20/0x4858 [ 21.239597] kasan_atomics+0x198/0x2e0 [ 21.239646] kunit_try_run_case+0x170/0x3f0 [ 21.240191] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.240523] kthread+0x328/0x630 [ 21.240715] ret_from_fork+0x10/0x20 [ 21.240821] [ 21.240955] Allocated by task 265: [ 21.241060] kasan_save_stack+0x3c/0x68 [ 21.241260] kasan_save_track+0x20/0x40 [ 21.241331] kasan_save_alloc_info+0x40/0x58 [ 21.241448] __kasan_kmalloc+0xd4/0xd8 [ 21.241502] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.241546] kasan_atomics+0xb8/0x2e0 [ 21.241935] kunit_try_run_case+0x170/0x3f0 [ 21.242282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.242439] kthread+0x328/0x630 [ 21.242686] ret_from_fork+0x10/0x20 [ 21.242853] [ 21.243040] The buggy address belongs to the object at fff00000c58c1080 [ 21.243040] which belongs to the cache kmalloc-64 of size 64 [ 21.243239] The buggy address is located 0 bytes to the right of [ 21.243239] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.243311] [ 21.243334] The buggy address belongs to the physical page: [ 21.243615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.243796] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.244025] page_type: f5(slab) [ 21.244241] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.244301] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.244555] page dumped because: kasan: bad access detected [ 21.244751] [ 21.244828] Memory state around the buggy address: [ 21.244890] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.245095] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.245533] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.245954] ^ [ 21.246085] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.246215] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.246382] ================================================================== [ 21.216773] ================================================================== [ 21.216832] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 21.217281] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.217365] [ 21.217400] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.217590] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.217662] Hardware name: linux,dummy-virt (DT) [ 21.217696] Call trace: [ 21.217721] show_stack+0x20/0x38 (C) [ 21.217773] dump_stack_lvl+0x8c/0xd0 [ 21.218336] print_report+0x118/0x608 [ 21.218495] kasan_report+0xdc/0x128 [ 21.218558] __asan_report_store8_noabort+0x20/0x30 [ 21.218726] kasan_atomics_helper+0x3e5c/0x4858 [ 21.218787] kasan_atomics+0x198/0x2e0 [ 21.218834] kunit_try_run_case+0x170/0x3f0 [ 21.218901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.218956] kthread+0x328/0x630 [ 21.219395] ret_from_fork+0x10/0x20 [ 21.219479] [ 21.219925] Allocated by task 265: [ 21.220118] kasan_save_stack+0x3c/0x68 [ 21.220363] kasan_save_track+0x20/0x40 [ 21.220436] kasan_save_alloc_info+0x40/0x58 [ 21.220477] __kasan_kmalloc+0xd4/0xd8 [ 21.220538] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.220905] kasan_atomics+0xb8/0x2e0 [ 21.221157] kunit_try_run_case+0x170/0x3f0 [ 21.221323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.221450] kthread+0x328/0x630 [ 21.221700] ret_from_fork+0x10/0x20 [ 21.221951] [ 21.222172] The buggy address belongs to the object at fff00000c58c1080 [ 21.222172] which belongs to the cache kmalloc-64 of size 64 [ 21.222561] The buggy address is located 0 bytes to the right of [ 21.222561] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.222929] [ 21.222958] The buggy address belongs to the physical page: [ 21.223077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.223339] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.223793] page_type: f5(slab) [ 21.223856] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.224054] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.224234] page dumped because: kasan: bad access detected [ 21.224359] [ 21.224621] Memory state around the buggy address: [ 21.224846] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.224917] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.225123] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.225454] ^ [ 21.225542] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.225643] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.225825] ================================================================== [ 21.249245] ================================================================== [ 21.249358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 21.249450] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.249796] [ 21.249941] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.250236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.250440] Hardware name: linux,dummy-virt (DT) [ 21.250498] Call trace: [ 21.250601] show_stack+0x20/0x38 (C) [ 21.250666] dump_stack_lvl+0x8c/0xd0 [ 21.250718] print_report+0x118/0x608 [ 21.250774] kasan_report+0xdc/0x128 [ 21.250821] kasan_check_range+0x100/0x1a8 [ 21.251055] __kasan_check_write+0x20/0x30 [ 21.251119] kasan_atomics_helper+0xf88/0x4858 [ 21.251172] kasan_atomics+0x198/0x2e0 [ 21.251219] kunit_try_run_case+0x170/0x3f0 [ 21.251658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.251739] kthread+0x328/0x630 [ 21.251786] ret_from_fork+0x10/0x20 [ 21.251943] [ 21.252229] Allocated by task 265: [ 21.252268] kasan_save_stack+0x3c/0x68 [ 21.252314] kasan_save_track+0x20/0x40 [ 21.252354] kasan_save_alloc_info+0x40/0x58 [ 21.252394] __kasan_kmalloc+0xd4/0xd8 [ 21.252444] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.252486] kasan_atomics+0xb8/0x2e0 [ 21.252535] kunit_try_run_case+0x170/0x3f0 [ 21.252586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.252632] kthread+0x328/0x630 [ 21.252665] ret_from_fork+0x10/0x20 [ 21.252704] [ 21.252725] The buggy address belongs to the object at fff00000c58c1080 [ 21.252725] which belongs to the cache kmalloc-64 of size 64 [ 21.252785] The buggy address is located 0 bytes to the right of [ 21.252785] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.252869] [ 21.252911] The buggy address belongs to the physical page: [ 21.252953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.253006] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.253067] page_type: f5(slab) [ 21.253108] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.253167] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.253211] page dumped because: kasan: bad access detected [ 21.253243] [ 21.253279] Memory state around the buggy address: [ 21.253313] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.253368] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.253414] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.253464] ^ [ 21.253499] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.253552] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.253592] ================================================================== [ 21.033271] ================================================================== [ 21.033322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 21.033374] Read of size 4 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.033461] [ 21.033497] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.033582] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.033611] Hardware name: linux,dummy-virt (DT) [ 21.033644] Call trace: [ 21.033668] show_stack+0x20/0x38 (C) [ 21.033717] dump_stack_lvl+0x8c/0xd0 [ 21.033768] print_report+0x118/0x608 [ 21.033815] kasan_report+0xdc/0x128 [ 21.033863] __asan_report_load4_noabort+0x20/0x30 [ 21.033913] kasan_atomics_helper+0x42d8/0x4858 [ 21.033962] kasan_atomics+0x198/0x2e0 [ 21.034009] kunit_try_run_case+0x170/0x3f0 [ 21.034059] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.034113] kthread+0x328/0x630 [ 21.034155] ret_from_fork+0x10/0x20 [ 21.034203] [ 21.034223] Allocated by task 265: [ 21.034253] kasan_save_stack+0x3c/0x68 [ 21.034371] __kasan_kmalloc+0xd4/0xd8 [ 21.038304] The buggy address belongs to the object at fff00000c58c1080 [ 21.038304] which belongs to the cache kmalloc-64 of size 64 [ 21.038470] The buggy address is located 0 bytes to the right of [ 21.038470] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.039861] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.040166] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.042398] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.043286] __kasan_check_write+0x20/0x30 [ 21.043511] kunit_try_run_case+0x170/0x3f0 [ 21.043602] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.043723] kthread+0x328/0x630 [ 21.043769] ret_from_fork+0x10/0x20 [ 21.044064] [ 21.044179] Allocated by task 265: [ 21.044237] kasan_save_stack+0x3c/0x68 [ 21.044343] kasan_save_track+0x20/0x40 [ 21.044386] kasan_save_alloc_info+0x40/0x58 [ 21.044435] __kasan_kmalloc+0xd4/0xd8 [ 21.044491] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.044533] kasan_atomics+0xb8/0x2e0 [ 21.044570] kunit_try_run_case+0x170/0x3f0 [ 21.044611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.044670] kthread+0x328/0x630 [ 21.044705] ret_from_fork+0x10/0x20 [ 21.044743] [ 21.044775] The buggy address belongs to the object at fff00000c58c1080 [ 21.044775] which belongs to the cache kmalloc-64 of size 64 [ 21.044854] The buggy address is located 0 bytes to the right of [ 21.044854] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.044918] [ 21.044946] The buggy address belongs to the physical page: [ 21.044995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.045059] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.045110] page_type: f5(slab) [ 21.045178] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.045247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.045289] page dumped because: kasan: bad access detected [ 21.045322] [ 21.045343] Memory state around the buggy address: [ 21.045384] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.045453] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.045499] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.045540] ^ [ 21.045591] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.045644] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.045693] ================================================================== [ 21.369077] ================================================================== [ 21.369169] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 21.369224] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.369278] [ 21.369375] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.369480] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.369524] Hardware name: linux,dummy-virt (DT) [ 21.369785] Call trace: [ 21.369842] show_stack+0x20/0x38 (C) [ 21.369913] dump_stack_lvl+0x8c/0xd0 [ 21.369980] print_report+0x118/0x608 [ 21.370046] kasan_report+0xdc/0x128 [ 21.370269] kasan_check_range+0x100/0x1a8 [ 21.370339] __kasan_check_write+0x20/0x30 [ 21.370461] kasan_atomics_helper+0x16d0/0x4858 [ 21.370515] kasan_atomics+0x198/0x2e0 [ 21.370569] kunit_try_run_case+0x170/0x3f0 [ 21.370672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.370749] kthread+0x328/0x630 [ 21.370794] ret_from_fork+0x10/0x20 [ 21.370889] [ 21.370919] Allocated by task 265: [ 21.370951] kasan_save_stack+0x3c/0x68 [ 21.371000] kasan_save_track+0x20/0x40 [ 21.371234] kasan_save_alloc_info+0x40/0x58 [ 21.371339] __kasan_kmalloc+0xd4/0xd8 [ 21.371442] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.371543] kasan_atomics+0xb8/0x2e0 [ 21.371633] kunit_try_run_case+0x170/0x3f0 [ 21.371906] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.371998] kthread+0x328/0x630 [ 21.372125] ret_from_fork+0x10/0x20 [ 21.372192] [ 21.372304] The buggy address belongs to the object at fff00000c58c1080 [ 21.372304] which belongs to the cache kmalloc-64 of size 64 [ 21.372373] The buggy address is located 0 bytes to the right of [ 21.372373] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.372452] [ 21.372476] The buggy address belongs to the physical page: [ 21.372509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.372648] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.372729] page_type: f5(slab) [ 21.372859] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.373130] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.373241] page dumped because: kasan: bad access detected [ 21.373322] [ 21.373441] Memory state around the buggy address: [ 21.373515] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.373565] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.373794] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.373912] ^ [ 21.373969] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.374083] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.374172] ================================================================== [ 21.344405] ================================================================== [ 21.344486] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 21.344541] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.344609] [ 21.344805] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.344906] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.345131] Hardware name: linux,dummy-virt (DT) [ 21.345170] Call trace: [ 21.345321] show_stack+0x20/0x38 (C) [ 21.345391] dump_stack_lvl+0x8c/0xd0 [ 21.345465] print_report+0x118/0x608 [ 21.345793] kasan_report+0xdc/0x128 [ 21.345875] kasan_check_range+0x100/0x1a8 [ 21.345927] __kasan_check_write+0x20/0x30 [ 21.346076] kasan_atomics_helper+0x15b4/0x4858 [ 21.346128] kasan_atomics+0x198/0x2e0 [ 21.346178] kunit_try_run_case+0x170/0x3f0 [ 21.346225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.346281] kthread+0x328/0x630 [ 21.346324] ret_from_fork+0x10/0x20 [ 21.346589] [ 21.346866] Allocated by task 265: [ 21.346908] kasan_save_stack+0x3c/0x68 [ 21.346963] kasan_save_track+0x20/0x40 [ 21.347013] kasan_save_alloc_info+0x40/0x58 [ 21.347061] __kasan_kmalloc+0xd4/0xd8 [ 21.347199] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.347243] kasan_atomics+0xb8/0x2e0 [ 21.347322] kunit_try_run_case+0x170/0x3f0 [ 21.347372] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.347562] kthread+0x328/0x630 [ 21.347651] ret_from_fork+0x10/0x20 [ 21.347701] [ 21.347729] The buggy address belongs to the object at fff00000c58c1080 [ 21.347729] which belongs to the cache kmalloc-64 of size 64 [ 21.347789] The buggy address is located 0 bytes to the right of [ 21.347789] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.347855] [ 21.347876] The buggy address belongs to the physical page: [ 21.347908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.347961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.348010] page_type: f5(slab) [ 21.348050] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.348515] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.348600] page dumped because: kasan: bad access detected [ 21.348891] [ 21.349033] Memory state around the buggy address: [ 21.349118] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.349171] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.349399] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.349620] ^ [ 21.349693] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.349889] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.349936] ================================================================== [ 21.177274] ================================================================== [ 21.177329] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 21.177380] Write of size 4 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.177660] [ 21.177751] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.177857] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.177940] Hardware name: linux,dummy-virt (DT) [ 21.177974] Call trace: [ 21.178014] show_stack+0x20/0x38 (C) [ 21.178075] dump_stack_lvl+0x8c/0xd0 [ 21.178123] print_report+0x118/0x608 [ 21.178335] kasan_report+0xdc/0x128 [ 21.178501] kasan_check_range+0x100/0x1a8 [ 21.178563] __kasan_check_write+0x20/0x30 [ 21.178612] kasan_atomics_helper+0xd3c/0x4858 [ 21.178679] kasan_atomics+0x198/0x2e0 [ 21.178793] kunit_try_run_case+0x170/0x3f0 [ 21.178872] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.178930] kthread+0x328/0x630 [ 21.179131] ret_from_fork+0x10/0x20 [ 21.179194] [ 21.179234] Allocated by task 265: [ 21.179274] kasan_save_stack+0x3c/0x68 [ 21.179319] kasan_save_track+0x20/0x40 [ 21.179371] kasan_save_alloc_info+0x40/0x58 [ 21.179497] __kasan_kmalloc+0xd4/0xd8 [ 21.179849] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.179952] kasan_atomics+0xb8/0x2e0 [ 21.180022] kunit_try_run_case+0x170/0x3f0 [ 21.180193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.180376] kthread+0x328/0x630 [ 21.180453] ret_from_fork+0x10/0x20 [ 21.180515] [ 21.180635] The buggy address belongs to the object at fff00000c58c1080 [ 21.180635] which belongs to the cache kmalloc-64 of size 64 [ 21.180740] The buggy address is located 0 bytes to the right of [ 21.180740] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.181124] [ 21.181176] The buggy address belongs to the physical page: [ 21.181252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.181307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.181528] page_type: f5(slab) [ 21.181631] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.181773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.181852] page dumped because: kasan: bad access detected [ 21.182084] [ 21.182196] Memory state around the buggy address: [ 21.182233] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.182515] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.182685] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.182782] ^ [ 21.183077] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.183217] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.183260] ================================================================== [ 21.360014] ================================================================== [ 21.360123] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 21.360199] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.360321] [ 21.360378] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.360481] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.360583] Hardware name: linux,dummy-virt (DT) [ 21.360643] Call trace: [ 21.360670] show_stack+0x20/0x38 (C) [ 21.360721] dump_stack_lvl+0x8c/0xd0 [ 21.360963] print_report+0x118/0x608 [ 21.361057] kasan_report+0xdc/0x128 [ 21.361117] kasan_check_range+0x100/0x1a8 [ 21.361182] __kasan_check_write+0x20/0x30 [ 21.361247] kasan_atomics_helper+0x1644/0x4858 [ 21.361299] kasan_atomics+0x198/0x2e0 [ 21.361552] kunit_try_run_case+0x170/0x3f0 [ 21.361642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.361745] kthread+0x328/0x630 [ 21.361791] ret_from_fork+0x10/0x20 [ 21.361847] [ 21.361929] Allocated by task 265: [ 21.361969] kasan_save_stack+0x3c/0x68 [ 21.362013] kasan_save_track+0x20/0x40 [ 21.362060] kasan_save_alloc_info+0x40/0x58 [ 21.362117] __kasan_kmalloc+0xd4/0xd8 [ 21.362159] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.362201] kasan_atomics+0xb8/0x2e0 [ 21.362240] kunit_try_run_case+0x170/0x3f0 [ 21.362407] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.362504] kthread+0x328/0x630 [ 21.362587] ret_from_fork+0x10/0x20 [ 21.362645] [ 21.362696] The buggy address belongs to the object at fff00000c58c1080 [ 21.362696] which belongs to the cache kmalloc-64 of size 64 [ 21.362899] The buggy address is located 0 bytes to the right of [ 21.362899] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.363013] [ 21.363141] The buggy address belongs to the physical page: [ 21.363197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.363279] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.363331] page_type: f5(slab) [ 21.363371] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.363434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.363643] page dumped because: kasan: bad access detected [ 21.363800] [ 21.363860] Memory state around the buggy address: [ 21.363906] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.364251] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.364340] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.364497] ^ [ 21.364538] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.364583] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.364624] ================================================================== [ 21.321295] ================================================================== [ 21.321347] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 21.321397] Read of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.321464] [ 21.321495] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.321580] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.321608] Hardware name: linux,dummy-virt (DT) [ 21.321640] Call trace: [ 21.321664] show_stack+0x20/0x38 (C) [ 21.321712] dump_stack_lvl+0x8c/0xd0 [ 21.321763] print_report+0x118/0x608 [ 21.321810] kasan_report+0xdc/0x128 [ 21.321858] __asan_report_load8_noabort+0x20/0x30 [ 21.321907] kasan_atomics_helper+0x3f04/0x4858 [ 21.321957] kasan_atomics+0x198/0x2e0 [ 21.322004] kunit_try_run_case+0x170/0x3f0 [ 21.322055] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.322120] kthread+0x328/0x630 [ 21.322168] ret_from_fork+0x10/0x20 [ 21.322218] [ 21.322239] Allocated by task 265: [ 21.322278] kasan_save_stack+0x3c/0x68 [ 21.322320] kasan_save_track+0x20/0x40 [ 21.322367] kasan_save_alloc_info+0x40/0x58 [ 21.322406] __kasan_kmalloc+0xd4/0xd8 [ 21.322455] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.322496] kasan_atomics+0xb8/0x2e0 [ 21.322533] kunit_try_run_case+0x170/0x3f0 [ 21.322573] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.322618] kthread+0x328/0x630 [ 21.322651] ret_from_fork+0x10/0x20 [ 21.322689] [ 21.322710] The buggy address belongs to the object at fff00000c58c1080 [ 21.322710] which belongs to the cache kmalloc-64 of size 64 [ 21.322768] The buggy address is located 0 bytes to the right of [ 21.322768] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.322834] [ 21.322855] The buggy address belongs to the physical page: [ 21.322887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.322939] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.322995] page_type: f5(slab) [ 21.323051] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.323104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.323210] page dumped because: kasan: bad access detected [ 21.323261] [ 21.323300] Memory state around the buggy address: [ 21.323437] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.323504] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.323547] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.323588] ^ [ 21.323622] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.323666] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.323707] ================================================================== [ 21.285214] ================================================================== [ 21.285269] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 21.285321] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.285841] [ 21.285894] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.285986] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.286014] Hardware name: linux,dummy-virt (DT) [ 21.286048] Call trace: [ 21.286124] show_stack+0x20/0x38 (C) [ 21.286178] dump_stack_lvl+0x8c/0xd0 [ 21.286514] print_report+0x118/0x608 [ 21.286611] kasan_report+0xdc/0x128 [ 21.286666] kasan_check_range+0x100/0x1a8 [ 21.287052] __kasan_check_write+0x20/0x30 [ 21.287858] kasan_atomics_helper+0x1128/0x4858 [ 21.289469] kasan_atomics+0x198/0x2e0 [ 21.289530] kunit_try_run_case+0x170/0x3f0 [ 21.289583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.289639] kthread+0x328/0x630 [ 21.289682] ret_from_fork+0x10/0x20 [ 21.289733] [ 21.289754] Allocated by task 265: [ 21.289783] kasan_save_stack+0x3c/0x68 [ 21.289828] kasan_save_track+0x20/0x40 [ 21.289866] kasan_save_alloc_info+0x40/0x58 [ 21.289903] __kasan_kmalloc+0xd4/0xd8 [ 21.289945] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.289988] kasan_atomics+0xb8/0x2e0 [ 21.290026] kunit_try_run_case+0x170/0x3f0 [ 21.290066] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.290112] kthread+0x328/0x630 [ 21.290147] ret_from_fork+0x10/0x20 [ 21.290185] [ 21.290206] The buggy address belongs to the object at fff00000c58c1080 [ 21.290206] which belongs to the cache kmalloc-64 of size 64 [ 21.290266] The buggy address is located 0 bytes to the right of [ 21.290266] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.290330] [ 21.290354] The buggy address belongs to the physical page: [ 21.290388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.290455] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.290506] page_type: f5(slab) [ 21.290548] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.290603] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.290645] page dumped because: kasan: bad access detected [ 21.290680] [ 21.290699] Memory state around the buggy address: [ 21.290734] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.290777] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.290822] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.290861] ^ [ 21.290895] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.290939] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.290979] ================================================================== [ 21.323904] ================================================================== [ 21.323949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 21.323998] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.324050] [ 21.324079] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.324195] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.324232] Hardware name: linux,dummy-virt (DT) [ 21.324281] Call trace: [ 21.324330] show_stack+0x20/0x38 (C) [ 21.324379] dump_stack_lvl+0x8c/0xd0 [ 21.324475] print_report+0x118/0x608 [ 21.324541] kasan_report+0xdc/0x128 [ 21.324605] kasan_check_range+0x100/0x1a8 [ 21.324656] __kasan_check_write+0x20/0x30 [ 21.324702] kasan_atomics_helper+0x1414/0x4858 [ 21.325007] kasan_atomics+0x198/0x2e0 [ 21.325072] kunit_try_run_case+0x170/0x3f0 [ 21.325139] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.325212] kthread+0x328/0x630 [ 21.325271] ret_from_fork+0x10/0x20 [ 21.325349] [ 21.325469] Allocated by task 265: [ 21.325507] kasan_save_stack+0x3c/0x68 [ 21.325565] kasan_save_track+0x20/0x40 [ 21.325608] kasan_save_alloc_info+0x40/0x58 [ 21.325685] __kasan_kmalloc+0xd4/0xd8 [ 21.325783] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.325859] kasan_atomics+0xb8/0x2e0 [ 21.325898] kunit_try_run_case+0x170/0x3f0 [ 21.325938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.326150] kthread+0x328/0x630 [ 21.326317] ret_from_fork+0x10/0x20 [ 21.326356] [ 21.326378] The buggy address belongs to the object at fff00000c58c1080 [ 21.326378] which belongs to the cache kmalloc-64 of size 64 [ 21.326469] The buggy address is located 0 bytes to the right of [ 21.326469] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.326554] [ 21.326594] The buggy address belongs to the physical page: [ 21.326798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.326882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.326963] page_type: f5(slab) [ 21.327037] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.327110] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.327154] page dumped because: kasan: bad access detected [ 21.327204] [ 21.327244] Memory state around the buggy address: [ 21.327277] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.327369] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.327460] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.327501] ^ [ 21.327533] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.327800] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.327841] ================================================================== [ 21.183571] ================================================================== [ 21.183622] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 21.183672] Read of size 4 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.183991] [ 21.184086] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.184374] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.184442] Hardware name: linux,dummy-virt (DT) [ 21.184486] Call trace: [ 21.184510] show_stack+0x20/0x38 (C) [ 21.184570] dump_stack_lvl+0x8c/0xd0 [ 21.184675] print_report+0x118/0x608 [ 21.184727] kasan_report+0xdc/0x128 [ 21.184776] __asan_report_load4_noabort+0x20/0x30 [ 21.184838] kasan_atomics_helper+0x3e04/0x4858 [ 21.184890] kasan_atomics+0x198/0x2e0 [ 21.184942] kunit_try_run_case+0x170/0x3f0 [ 21.184993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.185053] kthread+0x328/0x630 [ 21.185097] ret_from_fork+0x10/0x20 [ 21.185156] [ 21.185177] Allocated by task 265: [ 21.185208] kasan_save_stack+0x3c/0x68 [ 21.185251] kasan_save_track+0x20/0x40 [ 21.185300] kasan_save_alloc_info+0x40/0x58 [ 21.185339] __kasan_kmalloc+0xd4/0xd8 [ 21.185386] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.185561] kasan_atomics+0xb8/0x2e0 [ 21.185862] kunit_try_run_case+0x170/0x3f0 [ 21.185933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.185989] kthread+0x328/0x630 [ 21.186073] ret_from_fork+0x10/0x20 [ 21.186144] [ 21.186183] The buggy address belongs to the object at fff00000c58c1080 [ 21.186183] which belongs to the cache kmalloc-64 of size 64 [ 21.186530] The buggy address is located 0 bytes to the right of [ 21.186530] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.186611] [ 21.186632] The buggy address belongs to the physical page: [ 21.186664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.186717] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.186768] page_type: f5(slab) [ 21.186809] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.186861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.186903] page dumped because: kasan: bad access detected [ 21.186935] [ 21.186956] Memory state around the buggy address: [ 21.186988] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.187032] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.187076] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.187117] ^ [ 21.187150] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.187194] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.187235] ================================================================== [ 21.171686] ================================================================== [ 21.171827] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 21.171883] Read of size 4 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.171935] [ 21.171965] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.172307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.172357] Hardware name: linux,dummy-virt (DT) [ 21.172454] Call trace: [ 21.172501] show_stack+0x20/0x38 (C) [ 21.172587] dump_stack_lvl+0x8c/0xd0 [ 21.172857] print_report+0x118/0x608 [ 21.172974] kasan_report+0xdc/0x128 [ 21.173044] __asan_report_load4_noabort+0x20/0x30 [ 21.173097] kasan_atomics_helper+0x3dd8/0x4858 [ 21.173153] kasan_atomics+0x198/0x2e0 [ 21.173265] kunit_try_run_case+0x170/0x3f0 [ 21.173319] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.173535] kthread+0x328/0x630 [ 21.173597] ret_from_fork+0x10/0x20 [ 21.173768] [ 21.173796] Allocated by task 265: [ 21.173849] kasan_save_stack+0x3c/0x68 [ 21.173902] kasan_save_track+0x20/0x40 [ 21.174132] kasan_save_alloc_info+0x40/0x58 [ 21.174206] __kasan_kmalloc+0xd4/0xd8 [ 21.174301] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.174347] kasan_atomics+0xb8/0x2e0 [ 21.174383] kunit_try_run_case+0x170/0x3f0 [ 21.174437] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.174484] kthread+0x328/0x630 [ 21.174517] ret_from_fork+0x10/0x20 [ 21.174786] [ 21.174901] The buggy address belongs to the object at fff00000c58c1080 [ 21.174901] which belongs to the cache kmalloc-64 of size 64 [ 21.174984] The buggy address is located 0 bytes to the right of [ 21.174984] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.175269] [ 21.175304] The buggy address belongs to the physical page: [ 21.175337] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.175393] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.175604] page_type: f5(slab) [ 21.175738] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.175833] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.175913] page dumped because: kasan: bad access detected [ 21.176105] [ 21.176145] Memory state around the buggy address: [ 21.176181] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.176244] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.176308] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.176489] ^ [ 21.176531] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.176578] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.176628] ================================================================== [ 21.195040] ================================================================== [ 21.195096] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 21.195438] Read of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.195680] [ 21.195736] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.196440] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.196641] Hardware name: linux,dummy-virt (DT) [ 21.196701] Call trace: [ 21.196797] show_stack+0x20/0x38 (C) [ 21.196892] dump_stack_lvl+0x8c/0xd0 [ 21.196978] print_report+0x118/0x608 [ 21.198088] kasan_report+0xdc/0x128 [ 21.198212] __asan_report_load8_noabort+0x20/0x30 [ 21.198314] kasan_atomics_helper+0x3f58/0x4858 [ 21.198405] kasan_atomics+0x198/0x2e0 [ 21.198743] kunit_try_run_case+0x170/0x3f0 [ 21.199396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.199606] kthread+0x328/0x630 [ 21.199824] ret_from_fork+0x10/0x20 [ 21.200037] [ 21.200106] Allocated by task 265: [ 21.200215] kasan_save_stack+0x3c/0x68 [ 21.200265] kasan_save_track+0x20/0x40 [ 21.200471] kasan_save_alloc_info+0x40/0x58 [ 21.200706] __kasan_kmalloc+0xd4/0xd8 [ 21.200770] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.201082] kasan_atomics+0xb8/0x2e0 [ 21.201136] kunit_try_run_case+0x170/0x3f0 [ 21.201600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.201891] kthread+0x328/0x630 [ 21.201959] ret_from_fork+0x10/0x20 [ 21.202023] [ 21.202160] The buggy address belongs to the object at fff00000c58c1080 [ 21.202160] which belongs to the cache kmalloc-64 of size 64 [ 21.202639] The buggy address is located 0 bytes to the right of [ 21.202639] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.202816] [ 21.202977] The buggy address belongs to the physical page: [ 21.203351] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.203650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.203854] page_type: f5(slab) [ 21.203904] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.204019] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.204193] page dumped because: kasan: bad access detected [ 21.204590] [ 21.204646] Memory state around the buggy address: [ 21.204697] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.204855] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.205143] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.205371] ^ [ 21.205417] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.205677] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.205817] ================================================================== [ 21.309991] ================================================================== [ 21.310044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 21.310101] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.310602] [ 21.310634] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.310730] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.310779] Hardware name: linux,dummy-virt (DT) [ 21.310829] Call trace: [ 21.310854] show_stack+0x20/0x38 (C) [ 21.310939] dump_stack_lvl+0x8c/0xd0 [ 21.311005] print_report+0x118/0x608 [ 21.311072] kasan_report+0xdc/0x128 [ 21.311119] kasan_check_range+0x100/0x1a8 [ 21.311196] __kasan_check_write+0x20/0x30 [ 21.311262] kasan_atomics_helper+0x12d8/0x4858 [ 21.311608] kasan_atomics+0x198/0x2e0 [ 21.311694] kunit_try_run_case+0x170/0x3f0 [ 21.311827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.311915] kthread+0x328/0x630 [ 21.311989] ret_from_fork+0x10/0x20 [ 21.312158] [ 21.312229] Allocated by task 265: [ 21.312258] kasan_save_stack+0x3c/0x68 [ 21.312309] kasan_save_track+0x20/0x40 [ 21.312350] kasan_save_alloc_info+0x40/0x58 [ 21.312388] __kasan_kmalloc+0xd4/0xd8 [ 21.312437] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.312730] kasan_atomics+0xb8/0x2e0 [ 21.312768] kunit_try_run_case+0x170/0x3f0 [ 21.312809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.312945] kthread+0x328/0x630 [ 21.313021] ret_from_fork+0x10/0x20 [ 21.313060] [ 21.313082] The buggy address belongs to the object at fff00000c58c1080 [ 21.313082] which belongs to the cache kmalloc-64 of size 64 [ 21.313180] The buggy address is located 0 bytes to the right of [ 21.313180] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.313256] [ 21.313278] The buggy address belongs to the physical page: [ 21.313348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.313443] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.313662] page_type: f5(slab) [ 21.313840] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.313958] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.314035] page dumped because: kasan: bad access detected [ 21.314166] [ 21.314189] Memory state around the buggy address: [ 21.314220] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.314264] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.314365] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.314571] ^ [ 21.314772] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.314827] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.314867] ================================================================== [ 21.328274] ================================================================== [ 21.328402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 21.328474] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.328525] [ 21.328573] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.328780] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.328845] Hardware name: linux,dummy-virt (DT) [ 21.328885] Call trace: [ 21.328924] show_stack+0x20/0x38 (C) [ 21.329016] dump_stack_lvl+0x8c/0xd0 [ 21.329093] print_report+0x118/0x608 [ 21.329160] kasan_report+0xdc/0x128 [ 21.329216] kasan_check_range+0x100/0x1a8 [ 21.329344] __kasan_check_write+0x20/0x30 [ 21.329411] kasan_atomics_helper+0x147c/0x4858 [ 21.329471] kasan_atomics+0x198/0x2e0 [ 21.329518] kunit_try_run_case+0x170/0x3f0 [ 21.329720] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.329785] kthread+0x328/0x630 [ 21.329866] ret_from_fork+0x10/0x20 [ 21.329947] [ 21.329986] Allocated by task 265: [ 21.330022] kasan_save_stack+0x3c/0x68 [ 21.330082] kasan_save_track+0x20/0x40 [ 21.330130] kasan_save_alloc_info+0x40/0x58 [ 21.330169] __kasan_kmalloc+0xd4/0xd8 [ 21.330447] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.330489] kasan_atomics+0xb8/0x2e0 [ 21.330527] kunit_try_run_case+0x170/0x3f0 [ 21.330574] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.330647] kthread+0x328/0x630 [ 21.330698] ret_from_fork+0x10/0x20 [ 21.330827] [ 21.330876] The buggy address belongs to the object at fff00000c58c1080 [ 21.330876] which belongs to the cache kmalloc-64 of size 64 [ 21.330951] The buggy address is located 0 bytes to the right of [ 21.330951] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.331017] [ 21.331038] The buggy address belongs to the physical page: [ 21.331151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.331204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.331280] page_type: f5(slab) [ 21.331336] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.331481] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.331575] page dumped because: kasan: bad access detected [ 21.331610] [ 21.331630] Memory state around the buggy address: [ 21.331661] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.331705] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.331749] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.331789] ^ [ 21.331822] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.332337] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.332412] ================================================================== [ 21.350736] ================================================================== [ 21.350789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 21.350841] Read of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.351108] [ 21.351164] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.351445] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.351648] Hardware name: linux,dummy-virt (DT) [ 21.351727] Call trace: [ 21.351788] show_stack+0x20/0x38 (C) [ 21.352065] dump_stack_lvl+0x8c/0xd0 [ 21.352282] print_report+0x118/0x608 [ 21.352383] kasan_report+0xdc/0x128 [ 21.353015] __asan_report_load8_noabort+0x20/0x30 [ 21.353259] kasan_atomics_helper+0x3db0/0x4858 [ 21.353340] kasan_atomics+0x198/0x2e0 [ 21.353717] kunit_try_run_case+0x170/0x3f0 [ 21.353820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.353965] kthread+0x328/0x630 [ 21.354075] ret_from_fork+0x10/0x20 [ 21.354289] [ 21.354350] Allocated by task 265: [ 21.354406] kasan_save_stack+0x3c/0x68 [ 21.354749] kasan_save_track+0x20/0x40 [ 21.354837] kasan_save_alloc_info+0x40/0x58 [ 21.355343] __kasan_kmalloc+0xd4/0xd8 [ 21.355587] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.355694] kasan_atomics+0xb8/0x2e0 [ 21.355761] kunit_try_run_case+0x170/0x3f0 [ 21.356170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.356301] kthread+0x328/0x630 [ 21.356383] ret_from_fork+0x10/0x20 [ 21.356505] [ 21.356558] The buggy address belongs to the object at fff00000c58c1080 [ 21.356558] which belongs to the cache kmalloc-64 of size 64 [ 21.356859] The buggy address is located 0 bytes to the right of [ 21.356859] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.357027] [ 21.357097] The buggy address belongs to the physical page: [ 21.357132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.357391] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.357528] page_type: f5(slab) [ 21.357571] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.357624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.357695] page dumped because: kasan: bad access detected [ 21.357755] [ 21.357776] Memory state around the buggy address: [ 21.357823] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.357868] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.357913] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.357969] ^ [ 21.358006] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.358060] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.358109] ================================================================== [ 21.374753] ================================================================== [ 21.374831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 21.374926] Read of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.375005] [ 21.375042] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.375273] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.375331] Hardware name: linux,dummy-virt (DT) [ 21.375366] Call trace: [ 21.375412] show_stack+0x20/0x38 (C) [ 21.375546] dump_stack_lvl+0x8c/0xd0 [ 21.375643] print_report+0x118/0x608 [ 21.375781] kasan_report+0xdc/0x128 [ 21.375942] __asan_report_load8_noabort+0x20/0x30 [ 21.376001] kasan_atomics_helper+0x3e10/0x4858 [ 21.376053] kasan_atomics+0x198/0x2e0 [ 21.376108] kunit_try_run_case+0x170/0x3f0 [ 21.376158] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.376294] kthread+0x328/0x630 [ 21.376383] ret_from_fork+0x10/0x20 [ 21.376519] [ 21.376541] Allocated by task 265: [ 21.376581] kasan_save_stack+0x3c/0x68 [ 21.376665] kasan_save_track+0x20/0x40 [ 21.376713] kasan_save_alloc_info+0x40/0x58 [ 21.376750] __kasan_kmalloc+0xd4/0xd8 [ 21.376798] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.376847] kasan_atomics+0xb8/0x2e0 [ 21.376884] kunit_try_run_case+0x170/0x3f0 [ 21.376932] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.376982] kthread+0x328/0x630 [ 21.377018] ret_from_fork+0x10/0x20 [ 21.377064] [ 21.377085] The buggy address belongs to the object at fff00000c58c1080 [ 21.377085] which belongs to the cache kmalloc-64 of size 64 [ 21.377144] The buggy address is located 0 bytes to the right of [ 21.377144] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.377218] [ 21.377239] The buggy address belongs to the physical page: [ 21.377273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.377328] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.377379] page_type: f5(slab) [ 21.377444] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.377497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.377540] page dumped because: kasan: bad access detected [ 21.377590] [ 21.377610] Memory state around the buggy address: [ 21.377643] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.377698] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.377751] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.377790] ^ [ 21.377833] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.377878] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.377918] ================================================================== [ 21.187982] ================================================================== [ 21.188036] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 21.188086] Read of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.188138] [ 21.188752] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.189033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.189200] Hardware name: linux,dummy-virt (DT) [ 21.189268] Call trace: [ 21.189318] show_stack+0x20/0x38 (C) [ 21.189473] dump_stack_lvl+0x8c/0xd0 [ 21.190125] print_report+0x118/0x608 [ 21.190347] kasan_report+0xdc/0x128 [ 21.190503] kasan_check_range+0x100/0x1a8 [ 21.190633] __kasan_check_read+0x20/0x30 [ 21.190811] kasan_atomics_helper+0xdd4/0x4858 [ 21.190865] kasan_atomics+0x198/0x2e0 [ 21.191143] kunit_try_run_case+0x170/0x3f0 [ 21.191482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.191764] kthread+0x328/0x630 [ 21.191810] ret_from_fork+0x10/0x20 [ 21.191862] [ 21.191883] Allocated by task 265: [ 21.192282] kasan_save_stack+0x3c/0x68 [ 21.192355] kasan_save_track+0x20/0x40 [ 21.192396] kasan_save_alloc_info+0x40/0x58 [ 21.192443] __kasan_kmalloc+0xd4/0xd8 [ 21.192483] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.192524] kasan_atomics+0xb8/0x2e0 [ 21.192561] kunit_try_run_case+0x170/0x3f0 [ 21.192609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.192655] kthread+0x328/0x630 [ 21.192701] ret_from_fork+0x10/0x20 [ 21.192739] [ 21.192762] The buggy address belongs to the object at fff00000c58c1080 [ 21.192762] which belongs to the cache kmalloc-64 of size 64 [ 21.192829] The buggy address is located 0 bytes to the right of [ 21.192829] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.192909] [ 21.192932] The buggy address belongs to the physical page: [ 21.192964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.193025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.193076] page_type: f5(slab) [ 21.193116] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.193174] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.193216] page dumped because: kasan: bad access detected [ 21.193250] [ 21.193272] Memory state around the buggy address: [ 21.193306] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.193365] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.193410] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.193460] ^ [ 21.193504] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.193561] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.193611] ================================================================== [ 21.297340] ================================================================== [ 21.297512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 21.297578] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.297632] [ 21.297667] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.297755] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.297782] Hardware name: linux,dummy-virt (DT) [ 21.297816] Call trace: [ 21.297839] show_stack+0x20/0x38 (C) [ 21.297891] dump_stack_lvl+0x8c/0xd0 [ 21.297942] print_report+0x118/0x608 [ 21.297989] kasan_report+0xdc/0x128 [ 21.298094] kasan_check_range+0x100/0x1a8 [ 21.298153] __kasan_check_write+0x20/0x30 [ 21.298238] kasan_atomics_helper+0x1190/0x4858 [ 21.298288] kasan_atomics+0x198/0x2e0 [ 21.298335] kunit_try_run_case+0x170/0x3f0 [ 21.298384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.298462] kthread+0x328/0x630 [ 21.298507] ret_from_fork+0x10/0x20 [ 21.298556] [ 21.298576] Allocated by task 265: [ 21.298608] kasan_save_stack+0x3c/0x68 [ 21.298650] kasan_save_track+0x20/0x40 [ 21.298688] kasan_save_alloc_info+0x40/0x58 [ 21.298728] __kasan_kmalloc+0xd4/0xd8 [ 21.298767] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.298808] kasan_atomics+0xb8/0x2e0 [ 21.298846] kunit_try_run_case+0x170/0x3f0 [ 21.298896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.298943] kthread+0x328/0x630 [ 21.298978] ret_from_fork+0x10/0x20 [ 21.299015] [ 21.299038] The buggy address belongs to the object at fff00000c58c1080 [ 21.299038] which belongs to the cache kmalloc-64 of size 64 [ 21.299105] The buggy address is located 0 bytes to the right of [ 21.299105] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.299171] [ 21.299193] The buggy address belongs to the physical page: [ 21.299233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.299286] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.299347] page_type: f5(slab) [ 21.299396] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.299473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.299516] page dumped because: kasan: bad access detected [ 21.299552] [ 21.299574] Memory state around the buggy address: [ 21.299608] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.299653] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.299696] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.299736] ^ [ 21.299771] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.299815] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.299855] ================================================================== [ 21.047040] ================================================================== [ 21.047250] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 21.047353] Write of size 4 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.047673] [ 21.047732] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.047870] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.047912] Hardware name: linux,dummy-virt (DT) [ 21.047945] Call trace: [ 21.047971] show_stack+0x20/0x38 (C) [ 21.048031] dump_stack_lvl+0x8c/0xd0 [ 21.048324] print_report+0x118/0x608 [ 21.048478] kasan_report+0xdc/0x128 [ 21.048623] kasan_check_range+0x100/0x1a8 [ 21.048732] __kasan_check_write+0x20/0x30 [ 21.049017] kasan_atomics_helper+0x99c/0x4858 [ 21.049151] kasan_atomics+0x198/0x2e0 [ 21.049248] kunit_try_run_case+0x170/0x3f0 [ 21.049380] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.049490] kthread+0x328/0x630 [ 21.049666] ret_from_fork+0x10/0x20 [ 21.049724] [ 21.049777] Allocated by task 265: [ 21.049849] kasan_save_stack+0x3c/0x68 [ 21.050005] kasan_save_track+0x20/0x40 [ 21.050070] kasan_save_alloc_info+0x40/0x58 [ 21.050133] __kasan_kmalloc+0xd4/0xd8 [ 21.050401] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.050520] kasan_atomics+0xb8/0x2e0 [ 21.050634] kunit_try_run_case+0x170/0x3f0 [ 21.050758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.050805] kthread+0x328/0x630 [ 21.051066] ret_from_fork+0x10/0x20 [ 21.051188] [ 21.051237] The buggy address belongs to the object at fff00000c58c1080 [ 21.051237] which belongs to the cache kmalloc-64 of size 64 [ 21.051366] The buggy address is located 0 bytes to the right of [ 21.051366] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.051468] [ 21.051712] The buggy address belongs to the physical page: [ 21.051845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.051930] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.052048] page_type: f5(slab) [ 21.052133] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.052233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.052445] page dumped because: kasan: bad access detected [ 21.052615] [ 21.052664] Memory state around the buggy address: [ 21.052755] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.052875] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.052941] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.053176] ^ [ 21.053264] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.053442] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.053601] ================================================================== [ 21.254806] ================================================================== [ 21.254861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 21.254913] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.255227] [ 21.255273] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.255371] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.255574] Hardware name: linux,dummy-virt (DT) [ 21.255705] Call trace: [ 21.255739] show_stack+0x20/0x38 (C) [ 21.256131] dump_stack_lvl+0x8c/0xd0 [ 21.256310] print_report+0x118/0x608 [ 21.256631] kasan_report+0xdc/0x128 [ 21.256778] kasan_check_range+0x100/0x1a8 [ 21.257002] __kasan_check_write+0x20/0x30 [ 21.257054] kasan_atomics_helper+0xff0/0x4858 [ 21.257511] kasan_atomics+0x198/0x2e0 [ 21.258078] kunit_try_run_case+0x170/0x3f0 [ 21.258431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.258578] kthread+0x328/0x630 [ 21.258663] ret_from_fork+0x10/0x20 [ 21.259107] [ 21.259173] Allocated by task 265: [ 21.259721] kasan_save_stack+0x3c/0x68 [ 21.259906] kasan_save_track+0x20/0x40 [ 21.259955] kasan_save_alloc_info+0x40/0x58 [ 21.260150] __kasan_kmalloc+0xd4/0xd8 [ 21.260389] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.260849] kasan_atomics+0xb8/0x2e0 [ 21.260905] kunit_try_run_case+0x170/0x3f0 [ 21.260973] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.261320] kthread+0x328/0x630 [ 21.261391] ret_from_fork+0x10/0x20 [ 21.261588] [ 21.261700] The buggy address belongs to the object at fff00000c58c1080 [ 21.261700] which belongs to the cache kmalloc-64 of size 64 [ 21.261765] The buggy address is located 0 bytes to the right of [ 21.261765] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.262384] [ 21.262455] The buggy address belongs to the physical page: [ 21.262506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.262777] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.263129] page_type: f5(slab) [ 21.263204] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.263420] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.263483] page dumped because: kasan: bad access detected [ 21.263519] [ 21.263539] Memory state around the buggy address: [ 21.264083] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.264408] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.264574] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.264651] ^ [ 21.264884] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.265212] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.265309] ================================================================== [ 21.303376] ================================================================== [ 21.303568] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 21.303648] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.303753] [ 21.303886] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.304014] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.304334] Hardware name: linux,dummy-virt (DT) [ 21.304402] Call trace: [ 21.304490] show_stack+0x20/0x38 (C) [ 21.304590] dump_stack_lvl+0x8c/0xd0 [ 21.304726] print_report+0x118/0x608 [ 21.304838] kasan_report+0xdc/0x128 [ 21.304986] kasan_check_range+0x100/0x1a8 [ 21.305096] __kasan_check_write+0x20/0x30 [ 21.305180] kasan_atomics_helper+0x126c/0x4858 [ 21.305291] kasan_atomics+0x198/0x2e0 [ 21.305366] kunit_try_run_case+0x170/0x3f0 [ 21.305417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.305741] kthread+0x328/0x630 [ 21.305784] ret_from_fork+0x10/0x20 [ 21.305834] [ 21.305934] Allocated by task 265: [ 21.305997] kasan_save_stack+0x3c/0x68 [ 21.306159] kasan_save_track+0x20/0x40 [ 21.306229] kasan_save_alloc_info+0x40/0x58 [ 21.306343] __kasan_kmalloc+0xd4/0xd8 [ 21.306663] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.306740] kasan_atomics+0xb8/0x2e0 [ 21.306808] kunit_try_run_case+0x170/0x3f0 [ 21.306851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.307160] kthread+0x328/0x630 [ 21.307208] ret_from_fork+0x10/0x20 [ 21.307278] [ 21.307405] The buggy address belongs to the object at fff00000c58c1080 [ 21.307405] which belongs to the cache kmalloc-64 of size 64 [ 21.307496] The buggy address is located 0 bytes to the right of [ 21.307496] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.307599] [ 21.307866] The buggy address belongs to the physical page: [ 21.307960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.308073] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.308170] page_type: f5(slab) [ 21.308232] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.308332] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.308374] page dumped because: kasan: bad access detected [ 21.308409] [ 21.308752] Memory state around the buggy address: [ 21.308784] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.308833] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.308875] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.308915] ^ [ 21.308974] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.309054] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.309226] ================================================================== [ 21.338959] ================================================================== [ 21.339218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 21.339418] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.339530] [ 21.339600] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.339770] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.339798] Hardware name: linux,dummy-virt (DT) [ 21.339918] Call trace: [ 21.339958] show_stack+0x20/0x38 (C) [ 21.340159] dump_stack_lvl+0x8c/0xd0 [ 21.340240] print_report+0x118/0x608 [ 21.340411] kasan_report+0xdc/0x128 [ 21.340498] kasan_check_range+0x100/0x1a8 [ 21.340601] __kasan_check_write+0x20/0x30 [ 21.340840] kasan_atomics_helper+0x154c/0x4858 [ 21.341056] kasan_atomics+0x198/0x2e0 [ 21.341143] kunit_try_run_case+0x170/0x3f0 [ 21.341364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.341445] kthread+0x328/0x630 [ 21.341687] ret_from_fork+0x10/0x20 [ 21.341907] [ 21.341939] Allocated by task 265: [ 21.341978] kasan_save_stack+0x3c/0x68 [ 21.342023] kasan_save_track+0x20/0x40 [ 21.342064] kasan_save_alloc_info+0x40/0x58 [ 21.342105] __kasan_kmalloc+0xd4/0xd8 [ 21.342151] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.342192] kasan_atomics+0xb8/0x2e0 [ 21.342241] kunit_try_run_case+0x170/0x3f0 [ 21.342283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.342330] kthread+0x328/0x630 [ 21.342363] ret_from_fork+0x10/0x20 [ 21.342401] [ 21.342434] The buggy address belongs to the object at fff00000c58c1080 [ 21.342434] which belongs to the cache kmalloc-64 of size 64 [ 21.342494] The buggy address is located 0 bytes to the right of [ 21.342494] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.342570] [ 21.342596] The buggy address belongs to the physical page: [ 21.342642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.342694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.342752] page_type: f5(slab) [ 21.342800] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.342853] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.342895] page dumped because: kasan: bad access detected [ 21.342929] [ 21.342949] Memory state around the buggy address: [ 21.342981] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.343034] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.343078] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.343126] ^ [ 21.343159] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.343203] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.343249] ================================================================== [ 21.300051] ================================================================== [ 21.300098] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 21.300146] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.300249] [ 21.300291] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.300375] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.300404] Hardware name: linux,dummy-virt (DT) [ 21.300473] Call trace: [ 21.300499] show_stack+0x20/0x38 (C) [ 21.300548] dump_stack_lvl+0x8c/0xd0 [ 21.300596] print_report+0x118/0x608 [ 21.300644] kasan_report+0xdc/0x128 [ 21.300691] kasan_check_range+0x100/0x1a8 [ 21.300741] __kasan_check_write+0x20/0x30 [ 21.300786] kasan_atomics_helper+0x11f8/0x4858 [ 21.300842] kasan_atomics+0x198/0x2e0 [ 21.300887] kunit_try_run_case+0x170/0x3f0 [ 21.300936] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.300990] kthread+0x328/0x630 [ 21.301032] ret_from_fork+0x10/0x20 [ 21.301087] [ 21.301119] Allocated by task 265: [ 21.301168] kasan_save_stack+0x3c/0x68 [ 21.301215] kasan_save_track+0x20/0x40 [ 21.301291] kasan_save_alloc_info+0x40/0x58 [ 21.301348] __kasan_kmalloc+0xd4/0xd8 [ 21.301395] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.301447] kasan_atomics+0xb8/0x2e0 [ 21.301488] kunit_try_run_case+0x170/0x3f0 [ 21.301536] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.301601] kthread+0x328/0x630 [ 21.301645] ret_from_fork+0x10/0x20 [ 21.301903] [ 21.301932] The buggy address belongs to the object at fff00000c58c1080 [ 21.301932] which belongs to the cache kmalloc-64 of size 64 [ 21.301990] The buggy address is located 0 bytes to the right of [ 21.301990] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.302057] [ 21.302303] The buggy address belongs to the physical page: [ 21.302365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.302417] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.302477] page_type: f5(slab) [ 21.302531] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.302603] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.302662] page dumped because: kasan: bad access detected [ 21.302697] [ 21.302735] Memory state around the buggy address: [ 21.302767] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.302810] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.303079] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.303137] ^ [ 21.303172] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.303216] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.303256] ================================================================== [ 21.333082] ================================================================== [ 21.333189] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 21.333264] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.333505] [ 21.333541] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.333630] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.333658] Hardware name: linux,dummy-virt (DT) [ 21.333690] Call trace: [ 21.333715] show_stack+0x20/0x38 (C) [ 21.333779] dump_stack_lvl+0x8c/0xd0 [ 21.333831] print_report+0x118/0x608 [ 21.333878] kasan_report+0xdc/0x128 [ 21.333926] kasan_check_range+0x100/0x1a8 [ 21.333975] __kasan_check_write+0x20/0x30 [ 21.334022] kasan_atomics_helper+0x14e4/0x4858 [ 21.334071] kasan_atomics+0x198/0x2e0 [ 21.334118] kunit_try_run_case+0x170/0x3f0 [ 21.334165] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.334219] kthread+0x328/0x630 [ 21.334263] ret_from_fork+0x10/0x20 [ 21.334324] [ 21.334352] Allocated by task 265: [ 21.334381] kasan_save_stack+0x3c/0x68 [ 21.334435] kasan_save_track+0x20/0x40 [ 21.334862] kasan_save_alloc_info+0x40/0x58 [ 21.334909] __kasan_kmalloc+0xd4/0xd8 [ 21.334957] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.335015] kasan_atomics+0xb8/0x2e0 [ 21.335124] kunit_try_run_case+0x170/0x3f0 [ 21.335173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.335240] kthread+0x328/0x630 [ 21.335291] ret_from_fork+0x10/0x20 [ 21.335437] [ 21.335493] The buggy address belongs to the object at fff00000c58c1080 [ 21.335493] which belongs to the cache kmalloc-64 of size 64 [ 21.335586] The buggy address is located 0 bytes to the right of [ 21.335586] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.335655] [ 21.335676] The buggy address belongs to the physical page: [ 21.335709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.335762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.335810] page_type: f5(slab) [ 21.335850] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.335902] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.336384] page dumped because: kasan: bad access detected [ 21.336464] [ 21.336535] Memory state around the buggy address: [ 21.336855] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.337017] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.337064] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.337164] ^ [ 21.337590] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.337679] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.337761] ================================================================== [ 21.315126] ================================================================== [ 21.315176] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 21.315224] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.315275] [ 21.315306] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.315883] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.315996] Hardware name: linux,dummy-virt (DT) [ 21.316065] Call trace: [ 21.316101] show_stack+0x20/0x38 (C) [ 21.316170] dump_stack_lvl+0x8c/0xd0 [ 21.316257] print_report+0x118/0x608 [ 21.316307] kasan_report+0xdc/0x128 [ 21.316363] kasan_check_range+0x100/0x1a8 [ 21.316489] __kasan_check_write+0x20/0x30 [ 21.316575] kasan_atomics_helper+0x1384/0x4858 [ 21.316691] kasan_atomics+0x198/0x2e0 [ 21.316737] kunit_try_run_case+0x170/0x3f0 [ 21.316787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.316847] kthread+0x328/0x630 [ 21.317093] ret_from_fork+0x10/0x20 [ 21.317261] [ 21.317341] Allocated by task 265: [ 21.317445] kasan_save_stack+0x3c/0x68 [ 21.317594] kasan_save_track+0x20/0x40 [ 21.317699] kasan_save_alloc_info+0x40/0x58 [ 21.317991] __kasan_kmalloc+0xd4/0xd8 [ 21.318114] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.318155] kasan_atomics+0xb8/0x2e0 [ 21.318415] kunit_try_run_case+0x170/0x3f0 [ 21.318491] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.318588] kthread+0x328/0x630 [ 21.318646] ret_from_fork+0x10/0x20 [ 21.318814] [ 21.318883] The buggy address belongs to the object at fff00000c58c1080 [ 21.318883] which belongs to the cache kmalloc-64 of size 64 [ 21.318987] The buggy address is located 0 bytes to the right of [ 21.318987] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.319269] [ 21.319390] The buggy address belongs to the physical page: [ 21.319453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.319556] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.319640] page_type: f5(slab) [ 21.319750] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.319802] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.319844] page dumped because: kasan: bad access detected [ 21.319878] [ 21.319898] Memory state around the buggy address: [ 21.319929] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.320130] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.320320] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.320442] ^ [ 21.320533] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.320660] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.320750] ================================================================== [ 21.384869] ================================================================== [ 21.385083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 21.385254] Read of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.385319] [ 21.385376] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.385560] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.385609] Hardware name: linux,dummy-virt (DT) [ 21.385668] Call trace: [ 21.385836] show_stack+0x20/0x38 (C) [ 21.385904] dump_stack_lvl+0x8c/0xd0 [ 21.385993] print_report+0x118/0x608 [ 21.386075] kasan_report+0xdc/0x128 [ 21.386141] __asan_report_load8_noabort+0x20/0x30 [ 21.386339] kasan_atomics_helper+0x3e20/0x4858 [ 21.386405] kasan_atomics+0x198/0x2e0 [ 21.386543] kunit_try_run_case+0x170/0x3f0 [ 21.386596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.386726] kthread+0x328/0x630 [ 21.386804] ret_from_fork+0x10/0x20 [ 21.386871] [ 21.386909] Allocated by task 265: [ 21.387087] kasan_save_stack+0x3c/0x68 [ 21.387144] kasan_save_track+0x20/0x40 [ 21.387233] kasan_save_alloc_info+0x40/0x58 [ 21.387291] __kasan_kmalloc+0xd4/0xd8 [ 21.387338] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.387443] kasan_atomics+0xb8/0x2e0 [ 21.387534] kunit_try_run_case+0x170/0x3f0 [ 21.387753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.387816] kthread+0x328/0x630 [ 21.387851] ret_from_fork+0x10/0x20 [ 21.387889] [ 21.387917] The buggy address belongs to the object at fff00000c58c1080 [ 21.387917] which belongs to the cache kmalloc-64 of size 64 [ 21.387979] The buggy address is located 0 bytes to the right of [ 21.387979] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.388045] [ 21.388167] The buggy address belongs to the physical page: [ 21.388231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.388361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.388524] page_type: f5(slab) [ 21.388614] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.388886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.388992] page dumped because: kasan: bad access detected [ 21.389071] [ 21.389092] Memory state around the buggy address: [ 21.389127] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.389486] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.389583] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.389798] ^ [ 21.389903] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.389970] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.390107] ================================================================== [ 21.390822] ================================================================== [ 21.390875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 21.390973] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.391028] [ 21.391076] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.391227] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.391275] Hardware name: linux,dummy-virt (DT) [ 21.391310] Call trace: [ 21.391349] show_stack+0x20/0x38 (C) [ 21.391563] dump_stack_lvl+0x8c/0xd0 [ 21.391631] print_report+0x118/0x608 [ 21.391680] kasan_report+0xdc/0x128 [ 21.391728] kasan_check_range+0x100/0x1a8 [ 21.391777] __kasan_check_write+0x20/0x30 [ 21.391960] kasan_atomics_helper+0x17ec/0x4858 [ 21.392018] kasan_atomics+0x198/0x2e0 [ 21.392076] kunit_try_run_case+0x170/0x3f0 [ 21.392124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.392190] kthread+0x328/0x630 [ 21.392244] ret_from_fork+0x10/0x20 [ 21.392298] [ 21.392329] Allocated by task 265: [ 21.392368] kasan_save_stack+0x3c/0x68 [ 21.392410] kasan_save_track+0x20/0x40 [ 21.392611] kasan_save_alloc_info+0x40/0x58 [ 21.392651] __kasan_kmalloc+0xd4/0xd8 [ 21.392689] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.392738] kasan_atomics+0xb8/0x2e0 [ 21.392886] kunit_try_run_case+0x170/0x3f0 [ 21.392964] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.393147] kthread+0x328/0x630 [ 21.393234] ret_from_fork+0x10/0x20 [ 21.393410] [ 21.393445] The buggy address belongs to the object at fff00000c58c1080 [ 21.393445] which belongs to the cache kmalloc-64 of size 64 [ 21.393610] The buggy address is located 0 bytes to the right of [ 21.393610] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.393732] [ 21.393866] The buggy address belongs to the physical page: [ 21.393901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.393955] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.394255] page_type: f5(slab) [ 21.394330] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.394453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.394534] page dumped because: kasan: bad access detected [ 21.394813] [ 21.394880] Memory state around the buggy address: [ 21.394985] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.395046] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.395089] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.395371] ^ [ 21.395502] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.395589] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.395862] ================================================================== [ 21.276737] ================================================================== [ 21.277177] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 21.277249] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.277301] [ 21.277442] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.277877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.278119] Hardware name: linux,dummy-virt (DT) [ 21.278167] Call trace: [ 21.278211] show_stack+0x20/0x38 (C) [ 21.278405] dump_stack_lvl+0x8c/0xd0 [ 21.278495] print_report+0x118/0x608 [ 21.278912] kasan_report+0xdc/0x128 [ 21.279061] kasan_check_range+0x100/0x1a8 [ 21.279116] __kasan_check_write+0x20/0x30 [ 21.279193] kasan_atomics_helper+0x10c0/0x4858 [ 21.279316] kasan_atomics+0x198/0x2e0 [ 21.279520] kunit_try_run_case+0x170/0x3f0 [ 21.279719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.280054] kthread+0x328/0x630 [ 21.280219] ret_from_fork+0x10/0x20 [ 21.280474] [ 21.280542] Allocated by task 265: [ 21.280686] kasan_save_stack+0x3c/0x68 [ 21.280781] kasan_save_track+0x20/0x40 [ 21.280825] kasan_save_alloc_info+0x40/0x58 [ 21.280898] __kasan_kmalloc+0xd4/0xd8 [ 21.281274] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.281353] kasan_atomics+0xb8/0x2e0 [ 21.281581] kunit_try_run_case+0x170/0x3f0 [ 21.281634] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.281680] kthread+0x328/0x630 [ 21.281870] ret_from_fork+0x10/0x20 [ 21.281924] [ 21.281964] The buggy address belongs to the object at fff00000c58c1080 [ 21.281964] which belongs to the cache kmalloc-64 of size 64 [ 21.282031] The buggy address is located 0 bytes to the right of [ 21.282031] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.282098] [ 21.282123] The buggy address belongs to the physical page: [ 21.282157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.282230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.282281] page_type: f5(slab) [ 21.282322] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.282384] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.282436] page dumped because: kasan: bad access detected [ 21.282496] [ 21.282544] Memory state around the buggy address: [ 21.282844] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.283255] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.283322] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.283445] ^ [ 21.283625] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.284166] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.284334] ================================================================== [ 21.266858] ================================================================== [ 21.267120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 21.267214] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265 [ 21.267276] [ 21.267380] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 21.267493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.267869] Hardware name: linux,dummy-virt (DT) [ 21.268001] Call trace: [ 21.268195] show_stack+0x20/0x38 (C) [ 21.268300] dump_stack_lvl+0x8c/0xd0 [ 21.268400] print_report+0x118/0x608 [ 21.268568] kasan_report+0xdc/0x128 [ 21.268623] kasan_check_range+0x100/0x1a8 [ 21.268696] __kasan_check_write+0x20/0x30 [ 21.268744] kasan_atomics_helper+0x1058/0x4858 [ 21.268968] kasan_atomics+0x198/0x2e0 [ 21.269298] kunit_try_run_case+0x170/0x3f0 [ 21.269572] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.269714] kthread+0x328/0x630 [ 21.269811] ret_from_fork+0x10/0x20 [ 21.269964] [ 21.270080] Allocated by task 265: [ 21.270125] kasan_save_stack+0x3c/0x68 [ 21.270170] kasan_save_track+0x20/0x40 [ 21.270390] kasan_save_alloc_info+0x40/0x58 [ 21.270583] __kasan_kmalloc+0xd4/0xd8 [ 21.270911] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.271026] kasan_atomics+0xb8/0x2e0 [ 21.271087] kunit_try_run_case+0x170/0x3f0 [ 21.271174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.271463] kthread+0x328/0x630 [ 21.271632] ret_from_fork+0x10/0x20 [ 21.271819] [ 21.271889] The buggy address belongs to the object at fff00000c58c1080 [ 21.271889] which belongs to the cache kmalloc-64 of size 64 [ 21.272157] The buggy address is located 0 bytes to the right of [ 21.272157] allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0) [ 21.272379] [ 21.272504] The buggy address belongs to the physical page: [ 21.272776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1 [ 21.273135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.273482] page_type: f5(slab) [ 21.273759] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.273827] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.273872] page dumped because: kasan: bad access detected [ 21.273909] [ 21.273964] Memory state around the buggy address: [ 21.274009] fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.274065] fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.274110] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.274151] ^ [ 21.274185] fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.274238] fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.274288] ==================================================================
[ 18.629415] ================================================================== [ 18.629961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 18.630385] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.630622] [ 18.630760] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.630846] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.630871] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.630915] Call Trace: [ 18.630958] <TASK> [ 18.630995] dump_stack_lvl+0x73/0xb0 [ 18.631056] print_report+0xd1/0x650 [ 18.631107] ? __virt_addr_valid+0x1db/0x2d0 [ 18.631155] ? kasan_atomics_helper+0x4a02/0x5450 [ 18.631199] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.631247] ? kasan_atomics_helper+0x4a02/0x5450 [ 18.631295] kasan_report+0x141/0x180 [ 18.631350] ? kasan_atomics_helper+0x4a02/0x5450 [ 18.631407] __asan_report_load4_noabort+0x18/0x20 [ 18.631466] kasan_atomics_helper+0x4a02/0x5450 [ 18.631522] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.631570] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.631616] ? kasan_atomics+0x152/0x310 [ 18.631673] kasan_atomics+0x1dc/0x310 [ 18.631724] ? __pfx_kasan_atomics+0x10/0x10 [ 18.631778] ? __pfx_read_tsc+0x10/0x10 [ 18.631823] ? ktime_get_ts64+0x86/0x230 [ 18.631879] kunit_try_run_case+0x1a5/0x480 [ 18.631927] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.631973] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.632030] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.632085] ? __kthread_parkme+0x82/0x180 [ 18.632127] ? preempt_count_sub+0x50/0x80 [ 18.632175] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.632220] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.632274] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.632325] kthread+0x337/0x6f0 [ 18.632370] ? trace_preempt_on+0x20/0xc0 [ 18.632422] ? __pfx_kthread+0x10/0x10 [ 18.632516] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.632573] ? calculate_sigpending+0x7b/0xa0 [ 18.632629] ? __pfx_kthread+0x10/0x10 [ 18.632677] ret_from_fork+0x116/0x1d0 [ 18.632718] ? __pfx_kthread+0x10/0x10 [ 18.632766] ret_from_fork_asm+0x1a/0x30 [ 18.632838] </TASK> [ 18.632866] [ 18.643315] Allocated by task 282: [ 18.643722] kasan_save_stack+0x45/0x70 [ 18.644119] kasan_save_track+0x18/0x40 [ 18.644448] kasan_save_alloc_info+0x3b/0x50 [ 18.644707] __kasan_kmalloc+0xb7/0xc0 [ 18.645030] __kmalloc_cache_noprof+0x189/0x420 [ 18.645429] kasan_atomics+0x95/0x310 [ 18.645666] kunit_try_run_case+0x1a5/0x480 [ 18.646033] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.646333] kthread+0x337/0x6f0 [ 18.646594] ret_from_fork+0x116/0x1d0 [ 18.646903] ret_from_fork_asm+0x1a/0x30 [ 18.647286] [ 18.647480] The buggy address belongs to the object at ffff8881033ecb00 [ 18.647480] which belongs to the cache kmalloc-64 of size 64 [ 18.647939] The buggy address is located 0 bytes to the right of [ 18.647939] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.648430] [ 18.648635] The buggy address belongs to the physical page: [ 18.649082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.649722] flags: 0x200000000000000(node=0|zone=2) [ 18.650142] page_type: f5(slab) [ 18.650476] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.651045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.651391] page dumped because: kasan: bad access detected [ 18.653617] [ 18.653705] Memory state around the buggy address: [ 18.653828] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.653980] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.654123] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.654507] ^ [ 18.655026] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.655658] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.656250] ================================================================== [ 18.360905] ================================================================== [ 18.361403] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 18.361744] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.362388] [ 18.362849] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.362971] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.363003] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.363051] Call Trace: [ 18.363101] <TASK> [ 18.363147] dump_stack_lvl+0x73/0xb0 [ 18.363533] print_report+0xd1/0x650 [ 18.363612] ? __virt_addr_valid+0x1db/0x2d0 [ 18.363673] ? kasan_atomics_helper+0xde0/0x5450 [ 18.363728] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.363787] ? kasan_atomics_helper+0xde0/0x5450 [ 18.363840] kasan_report+0x141/0x180 [ 18.363897] ? kasan_atomics_helper+0xde0/0x5450 [ 18.363960] kasan_check_range+0x10c/0x1c0 [ 18.364010] __kasan_check_write+0x18/0x20 [ 18.364050] kasan_atomics_helper+0xde0/0x5450 [ 18.364093] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.364131] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.364175] ? kasan_atomics+0x152/0x310 [ 18.364246] kasan_atomics+0x1dc/0x310 [ 18.364304] ? __pfx_kasan_atomics+0x10/0x10 [ 18.364354] ? __pfx_read_tsc+0x10/0x10 [ 18.364422] ? ktime_get_ts64+0x86/0x230 [ 18.364493] kunit_try_run_case+0x1a5/0x480 [ 18.364545] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.364591] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.364642] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.364694] ? __kthread_parkme+0x82/0x180 [ 18.364741] ? preempt_count_sub+0x50/0x80 [ 18.364796] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.364841] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.364886] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.364931] kthread+0x337/0x6f0 [ 18.364974] ? trace_preempt_on+0x20/0xc0 [ 18.365025] ? __pfx_kthread+0x10/0x10 [ 18.365073] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.365119] ? calculate_sigpending+0x7b/0xa0 [ 18.365189] ? __pfx_kthread+0x10/0x10 [ 18.365276] ret_from_fork+0x116/0x1d0 [ 18.365324] ? __pfx_kthread+0x10/0x10 [ 18.365374] ret_from_fork_asm+0x1a/0x30 [ 18.365449] </TASK> [ 18.365490] [ 18.376424] Allocated by task 282: [ 18.376845] kasan_save_stack+0x45/0x70 [ 18.377160] kasan_save_track+0x18/0x40 [ 18.377534] kasan_save_alloc_info+0x3b/0x50 [ 18.377757] __kasan_kmalloc+0xb7/0xc0 [ 18.377952] __kmalloc_cache_noprof+0x189/0x420 [ 18.378176] kasan_atomics+0x95/0x310 [ 18.378566] kunit_try_run_case+0x1a5/0x480 [ 18.378947] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.379409] kthread+0x337/0x6f0 [ 18.379747] ret_from_fork+0x116/0x1d0 [ 18.380117] ret_from_fork_asm+0x1a/0x30 [ 18.380565] [ 18.380714] The buggy address belongs to the object at ffff8881033ecb00 [ 18.380714] which belongs to the cache kmalloc-64 of size 64 [ 18.381212] The buggy address is located 0 bytes to the right of [ 18.381212] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.381669] [ 18.381804] The buggy address belongs to the physical page: [ 18.382048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.382367] flags: 0x200000000000000(node=0|zone=2) [ 18.382874] page_type: f5(slab) [ 18.383284] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.383926] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.384609] page dumped because: kasan: bad access detected [ 18.385043] [ 18.385205] Memory state around the buggy address: [ 18.385499] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.385964] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.386269] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.386827] ^ [ 18.387299] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.387649] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.387934] ================================================================== [ 18.490344] ================================================================== [ 18.491037] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 18.491768] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.492418] [ 18.492682] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.492801] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.492832] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.492884] Call Trace: [ 18.492955] <TASK> [ 18.493003] dump_stack_lvl+0x73/0xb0 [ 18.493076] print_report+0xd1/0x650 [ 18.493126] ? __virt_addr_valid+0x1db/0x2d0 [ 18.493178] ? kasan_atomics_helper+0x4a36/0x5450 [ 18.493267] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.493346] ? kasan_atomics_helper+0x4a36/0x5450 [ 18.493396] kasan_report+0x141/0x180 [ 18.493451] ? kasan_atomics_helper+0x4a36/0x5450 [ 18.493525] __asan_report_load4_noabort+0x18/0x20 [ 18.493569] kasan_atomics_helper+0x4a36/0x5450 [ 18.493617] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.493669] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.493720] ? kasan_atomics+0x152/0x310 [ 18.493779] kasan_atomics+0x1dc/0x310 [ 18.493826] ? __pfx_kasan_atomics+0x10/0x10 [ 18.493901] ? __pfx_read_tsc+0x10/0x10 [ 18.493947] ? ktime_get_ts64+0x86/0x230 [ 18.494008] kunit_try_run_case+0x1a5/0x480 [ 18.494063] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.494110] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.494148] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.494176] ? __kthread_parkme+0x82/0x180 [ 18.494245] ? preempt_count_sub+0x50/0x80 [ 18.494279] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.494304] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.494333] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.494363] kthread+0x337/0x6f0 [ 18.494386] ? trace_preempt_on+0x20/0xc0 [ 18.494414] ? __pfx_kthread+0x10/0x10 [ 18.494438] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.494486] ? calculate_sigpending+0x7b/0xa0 [ 18.494517] ? __pfx_kthread+0x10/0x10 [ 18.494543] ret_from_fork+0x116/0x1d0 [ 18.494565] ? __pfx_kthread+0x10/0x10 [ 18.494590] ret_from_fork_asm+0x1a/0x30 [ 18.494626] </TASK> [ 18.494641] [ 18.510039] Allocated by task 282: [ 18.510578] kasan_save_stack+0x45/0x70 [ 18.511160] kasan_save_track+0x18/0x40 [ 18.511750] kasan_save_alloc_info+0x3b/0x50 [ 18.512033] __kasan_kmalloc+0xb7/0xc0 [ 18.512991] __kmalloc_cache_noprof+0x189/0x420 [ 18.513627] kasan_atomics+0x95/0x310 [ 18.513931] kunit_try_run_case+0x1a5/0x480 [ 18.514312] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.514782] kthread+0x337/0x6f0 [ 18.515015] ret_from_fork+0x116/0x1d0 [ 18.515385] ret_from_fork_asm+0x1a/0x30 [ 18.515794] [ 18.516004] The buggy address belongs to the object at ffff8881033ecb00 [ 18.516004] which belongs to the cache kmalloc-64 of size 64 [ 18.516611] The buggy address is located 0 bytes to the right of [ 18.516611] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.517597] [ 18.517741] The buggy address belongs to the physical page: [ 18.518349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.519035] flags: 0x200000000000000(node=0|zone=2) [ 18.519508] page_type: f5(slab) [ 18.519889] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.520243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.520880] page dumped because: kasan: bad access detected [ 18.521180] [ 18.521371] Memory state around the buggy address: [ 18.521714] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.522038] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.522470] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.523067] ^ [ 18.523536] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.524105] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.524634] ================================================================== [ 18.763625] ================================================================== [ 18.763894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 18.764161] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.766156] [ 18.766541] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.766660] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.766687] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.766725] Call Trace: [ 18.766757] <TASK> [ 18.766784] dump_stack_lvl+0x73/0xb0 [ 18.766850] print_report+0xd1/0x650 [ 18.766884] ? __virt_addr_valid+0x1db/0x2d0 [ 18.766914] ? kasan_atomics_helper+0x49ce/0x5450 [ 18.766941] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.766969] ? kasan_atomics_helper+0x49ce/0x5450 [ 18.766995] kasan_report+0x141/0x180 [ 18.767022] ? kasan_atomics_helper+0x49ce/0x5450 [ 18.767054] __asan_report_load4_noabort+0x18/0x20 [ 18.767079] kasan_atomics_helper+0x49ce/0x5450 [ 18.767106] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.767132] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.767158] ? kasan_atomics+0x152/0x310 [ 18.767191] kasan_atomics+0x1dc/0x310 [ 18.767271] ? __pfx_kasan_atomics+0x10/0x10 [ 18.767335] ? __pfx_read_tsc+0x10/0x10 [ 18.767409] ? ktime_get_ts64+0x86/0x230 [ 18.767483] kunit_try_run_case+0x1a5/0x480 [ 18.767532] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.767557] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.767589] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.767618] ? __kthread_parkme+0x82/0x180 [ 18.767643] ? preempt_count_sub+0x50/0x80 [ 18.767673] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.767698] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.767726] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.767754] kthread+0x337/0x6f0 [ 18.767778] ? trace_preempt_on+0x20/0xc0 [ 18.767805] ? __pfx_kthread+0x10/0x10 [ 18.767829] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.767855] ? calculate_sigpending+0x7b/0xa0 [ 18.767884] ? __pfx_kthread+0x10/0x10 [ 18.767908] ret_from_fork+0x116/0x1d0 [ 18.767931] ? __pfx_kthread+0x10/0x10 [ 18.767954] ret_from_fork_asm+0x1a/0x30 [ 18.767991] </TASK> [ 18.768005] [ 18.783062] Allocated by task 282: [ 18.783362] kasan_save_stack+0x45/0x70 [ 18.783864] kasan_save_track+0x18/0x40 [ 18.784447] kasan_save_alloc_info+0x3b/0x50 [ 18.784690] __kasan_kmalloc+0xb7/0xc0 [ 18.785196] __kmalloc_cache_noprof+0x189/0x420 [ 18.785654] kasan_atomics+0x95/0x310 [ 18.785873] kunit_try_run_case+0x1a5/0x480 [ 18.786113] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.786639] kthread+0x337/0x6f0 [ 18.787006] ret_from_fork+0x116/0x1d0 [ 18.787255] ret_from_fork_asm+0x1a/0x30 [ 18.787485] [ 18.787610] The buggy address belongs to the object at ffff8881033ecb00 [ 18.787610] which belongs to the cache kmalloc-64 of size 64 [ 18.788506] The buggy address is located 0 bytes to the right of [ 18.788506] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.789260] [ 18.789426] The buggy address belongs to the physical page: [ 18.789939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.790441] flags: 0x200000000000000(node=0|zone=2) [ 18.790849] page_type: f5(slab) [ 18.791051] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.791373] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.792015] page dumped because: kasan: bad access detected [ 18.792486] [ 18.792708] Memory state around the buggy address: [ 18.793070] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.793768] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.794057] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.794612] ^ [ 18.795074] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.795588] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.795979] ================================================================== [ 18.111607] ================================================================== [ 18.112732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 18.113193] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.114235] [ 18.114606] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.114717] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.114737] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.114764] Call Trace: [ 18.114790] <TASK> [ 18.114815] dump_stack_lvl+0x73/0xb0 [ 18.114856] print_report+0xd1/0x650 [ 18.114885] ? __virt_addr_valid+0x1db/0x2d0 [ 18.114912] ? kasan_atomics_helper+0x8f9/0x5450 [ 18.114937] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.114963] ? kasan_atomics_helper+0x8f9/0x5450 [ 18.114988] kasan_report+0x141/0x180 [ 18.115013] ? kasan_atomics_helper+0x8f9/0x5450 [ 18.115043] kasan_check_range+0x10c/0x1c0 [ 18.115070] __kasan_check_write+0x18/0x20 [ 18.115094] kasan_atomics_helper+0x8f9/0x5450 [ 18.115120] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.115145] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.115171] ? kasan_atomics+0x152/0x310 [ 18.115211] kasan_atomics+0x1dc/0x310 [ 18.115272] ? __pfx_kasan_atomics+0x10/0x10 [ 18.115302] ? __pfx_read_tsc+0x10/0x10 [ 18.115328] ? ktime_get_ts64+0x86/0x230 [ 18.115373] kunit_try_run_case+0x1a5/0x480 [ 18.115401] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.115424] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.115473] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.115508] ? __kthread_parkme+0x82/0x180 [ 18.115535] ? preempt_count_sub+0x50/0x80 [ 18.115564] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.115589] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.115619] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.115648] kthread+0x337/0x6f0 [ 18.115672] ? trace_preempt_on+0x20/0xc0 [ 18.115700] ? __pfx_kthread+0x10/0x10 [ 18.115723] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.115749] ? calculate_sigpending+0x7b/0xa0 [ 18.115778] ? __pfx_kthread+0x10/0x10 [ 18.115803] ret_from_fork+0x116/0x1d0 [ 18.115825] ? __pfx_kthread+0x10/0x10 [ 18.115849] ret_from_fork_asm+0x1a/0x30 [ 18.115885] </TASK> [ 18.115899] [ 18.128229] Allocated by task 282: [ 18.128687] kasan_save_stack+0x45/0x70 [ 18.129157] kasan_save_track+0x18/0x40 [ 18.129590] kasan_save_alloc_info+0x3b/0x50 [ 18.129992] __kasan_kmalloc+0xb7/0xc0 [ 18.130409] __kmalloc_cache_noprof+0x189/0x420 [ 18.130785] kasan_atomics+0x95/0x310 [ 18.130954] kunit_try_run_case+0x1a5/0x480 [ 18.131332] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.131662] kthread+0x337/0x6f0 [ 18.131997] ret_from_fork+0x116/0x1d0 [ 18.132349] ret_from_fork_asm+0x1a/0x30 [ 18.132604] [ 18.132814] The buggy address belongs to the object at ffff8881033ecb00 [ 18.132814] which belongs to the cache kmalloc-64 of size 64 [ 18.133615] The buggy address is located 0 bytes to the right of [ 18.133615] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.134357] [ 18.134535] The buggy address belongs to the physical page: [ 18.134936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.135422] flags: 0x200000000000000(node=0|zone=2) [ 18.135810] page_type: f5(slab) [ 18.136136] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.136623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.137071] page dumped because: kasan: bad access detected [ 18.137521] [ 18.137643] Memory state around the buggy address: [ 18.138054] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.138513] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.138998] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.139494] ^ [ 18.139854] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.140357] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.140786] ================================================================== [ 18.028049] ================================================================== [ 18.028388] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 18.028662] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.030075] [ 18.030635] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.030770] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.030794] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.030824] Call Trace: [ 18.030851] <TASK> [ 18.030878] dump_stack_lvl+0x73/0xb0 [ 18.030924] print_report+0xd1/0x650 [ 18.030952] ? __virt_addr_valid+0x1db/0x2d0 [ 18.030981] ? kasan_atomics_helper+0x72f/0x5450 [ 18.031006] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.031032] ? kasan_atomics_helper+0x72f/0x5450 [ 18.031059] kasan_report+0x141/0x180 [ 18.031085] ? kasan_atomics_helper+0x72f/0x5450 [ 18.031114] kasan_check_range+0x10c/0x1c0 [ 18.031141] __kasan_check_write+0x18/0x20 [ 18.031164] kasan_atomics_helper+0x72f/0x5450 [ 18.031206] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.031268] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.031311] ? kasan_atomics+0x152/0x310 [ 18.031362] kasan_atomics+0x1dc/0x310 [ 18.031395] ? __pfx_kasan_atomics+0x10/0x10 [ 18.031425] ? __pfx_read_tsc+0x10/0x10 [ 18.031452] ? ktime_get_ts64+0x86/0x230 [ 18.031505] kunit_try_run_case+0x1a5/0x480 [ 18.031532] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.031556] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.031587] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.031615] ? __kthread_parkme+0x82/0x180 [ 18.031641] ? preempt_count_sub+0x50/0x80 [ 18.031670] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.031695] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.031723] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.031752] kthread+0x337/0x6f0 [ 18.031777] ? trace_preempt_on+0x20/0xc0 [ 18.031804] ? __pfx_kthread+0x10/0x10 [ 18.031829] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.031855] ? calculate_sigpending+0x7b/0xa0 [ 18.031884] ? __pfx_kthread+0x10/0x10 [ 18.031910] ret_from_fork+0x116/0x1d0 [ 18.031933] ? __pfx_kthread+0x10/0x10 [ 18.031958] ret_from_fork_asm+0x1a/0x30 [ 18.031994] </TASK> [ 18.032009] [ 18.040721] Allocated by task 282: [ 18.041046] kasan_save_stack+0x45/0x70 [ 18.041434] kasan_save_track+0x18/0x40 [ 18.041758] kasan_save_alloc_info+0x3b/0x50 [ 18.042088] __kasan_kmalloc+0xb7/0xc0 [ 18.042435] __kmalloc_cache_noprof+0x189/0x420 [ 18.042814] kasan_atomics+0x95/0x310 [ 18.043123] kunit_try_run_case+0x1a5/0x480 [ 18.043520] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.043946] kthread+0x337/0x6f0 [ 18.044291] ret_from_fork+0x116/0x1d0 [ 18.044641] ret_from_fork_asm+0x1a/0x30 [ 18.044957] [ 18.045137] The buggy address belongs to the object at ffff8881033ecb00 [ 18.045137] which belongs to the cache kmalloc-64 of size 64 [ 18.045874] The buggy address is located 0 bytes to the right of [ 18.045874] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.046560] [ 18.046755] The buggy address belongs to the physical page: [ 18.047072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.047552] flags: 0x200000000000000(node=0|zone=2) [ 18.047796] page_type: f5(slab) [ 18.047995] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.048341] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.048866] page dumped because: kasan: bad access detected [ 18.049362] [ 18.049552] Memory state around the buggy address: [ 18.049945] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.050495] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.051027] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.051579] ^ [ 18.051815] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.052339] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.052854] ================================================================== [ 19.083913] ================================================================== [ 19.085114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 19.085810] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.086497] [ 19.086751] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.086866] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.086900] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.086950] Call Trace: [ 19.086999] <TASK> [ 19.087058] dump_stack_lvl+0x73/0xb0 [ 19.087139] print_report+0xd1/0x650 [ 19.087195] ? __virt_addr_valid+0x1db/0x2d0 [ 19.087266] ? kasan_atomics_helper+0x1818/0x5450 [ 19.087362] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.087472] ? kasan_atomics_helper+0x1818/0x5450 [ 19.087526] kasan_report+0x141/0x180 [ 19.087586] ? kasan_atomics_helper+0x1818/0x5450 [ 19.087639] kasan_check_range+0x10c/0x1c0 [ 19.087694] __kasan_check_write+0x18/0x20 [ 19.087744] kasan_atomics_helper+0x1818/0x5450 [ 19.087800] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.087853] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.087903] ? kasan_atomics+0x152/0x310 [ 19.087963] kasan_atomics+0x1dc/0x310 [ 19.088015] ? __pfx_kasan_atomics+0x10/0x10 [ 19.088068] ? __pfx_read_tsc+0x10/0x10 [ 19.088099] ? ktime_get_ts64+0x86/0x230 [ 19.088131] kunit_try_run_case+0x1a5/0x480 [ 19.088157] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.088181] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.088424] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.088514] ? __kthread_parkme+0x82/0x180 [ 19.088558] ? preempt_count_sub+0x50/0x80 [ 19.088588] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.088613] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.088642] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.088669] kthread+0x337/0x6f0 [ 19.088692] ? trace_preempt_on+0x20/0xc0 [ 19.088718] ? __pfx_kthread+0x10/0x10 [ 19.088740] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.088765] ? calculate_sigpending+0x7b/0xa0 [ 19.088793] ? __pfx_kthread+0x10/0x10 [ 19.088815] ret_from_fork+0x116/0x1d0 [ 19.088839] ? __pfx_kthread+0x10/0x10 [ 19.088863] ret_from_fork_asm+0x1a/0x30 [ 19.088897] </TASK> [ 19.088912] [ 19.099798] Allocated by task 282: [ 19.100208] kasan_save_stack+0x45/0x70 [ 19.100660] kasan_save_track+0x18/0x40 [ 19.100909] kasan_save_alloc_info+0x3b/0x50 [ 19.101151] __kasan_kmalloc+0xb7/0xc0 [ 19.101530] __kmalloc_cache_noprof+0x189/0x420 [ 19.101949] kasan_atomics+0x95/0x310 [ 19.102185] kunit_try_run_case+0x1a5/0x480 [ 19.102527] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.102813] kthread+0x337/0x6f0 [ 19.103104] ret_from_fork+0x116/0x1d0 [ 19.103545] ret_from_fork_asm+0x1a/0x30 [ 19.103894] [ 19.104052] The buggy address belongs to the object at ffff8881033ecb00 [ 19.104052] which belongs to the cache kmalloc-64 of size 64 [ 19.104782] The buggy address is located 0 bytes to the right of [ 19.104782] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.105298] [ 19.105450] The buggy address belongs to the physical page: [ 19.105724] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.106098] flags: 0x200000000000000(node=0|zone=2) [ 19.106418] page_type: f5(slab) [ 19.106747] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.107380] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.108054] page dumped because: kasan: bad access detected [ 19.108498] [ 19.108744] Memory state around the buggy address: [ 19.109156] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.109722] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.110074] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.110838] ^ [ 19.111100] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.111729] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.112095] ================================================================== [ 19.234483] ================================================================== [ 19.235133] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 19.235898] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.236726] [ 19.237033] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.237146] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.237180] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.237282] Call Trace: [ 19.237342] <TASK> [ 19.237388] dump_stack_lvl+0x73/0xb0 [ 19.237506] print_report+0xd1/0x650 [ 19.237559] ? __virt_addr_valid+0x1db/0x2d0 [ 19.237594] ? kasan_atomics_helper+0x1b22/0x5450 [ 19.237620] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.237645] ? kasan_atomics_helper+0x1b22/0x5450 [ 19.237668] kasan_report+0x141/0x180 [ 19.237692] ? kasan_atomics_helper+0x1b22/0x5450 [ 19.237738] kasan_check_range+0x10c/0x1c0 [ 19.237776] __kasan_check_write+0x18/0x20 [ 19.237799] kasan_atomics_helper+0x1b22/0x5450 [ 19.237825] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.237852] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.237876] ? kasan_atomics+0x152/0x310 [ 19.237904] kasan_atomics+0x1dc/0x310 [ 19.237930] ? __pfx_kasan_atomics+0x10/0x10 [ 19.237955] ? __pfx_read_tsc+0x10/0x10 [ 19.237980] ? ktime_get_ts64+0x86/0x230 [ 19.238011] kunit_try_run_case+0x1a5/0x480 [ 19.238036] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.238058] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.238085] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.238111] ? __kthread_parkme+0x82/0x180 [ 19.238135] ? preempt_count_sub+0x50/0x80 [ 19.238163] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.238186] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.238261] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.238290] kthread+0x337/0x6f0 [ 19.238313] ? trace_preempt_on+0x20/0xc0 [ 19.238339] ? __pfx_kthread+0x10/0x10 [ 19.238362] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.238386] ? calculate_sigpending+0x7b/0xa0 [ 19.238413] ? __pfx_kthread+0x10/0x10 [ 19.238436] ret_from_fork+0x116/0x1d0 [ 19.238475] ? __pfx_kthread+0x10/0x10 [ 19.238501] ret_from_fork_asm+0x1a/0x30 [ 19.238537] </TASK> [ 19.238550] [ 19.251874] Allocated by task 282: [ 19.252423] kasan_save_stack+0x45/0x70 [ 19.252881] kasan_save_track+0x18/0x40 [ 19.253160] kasan_save_alloc_info+0x3b/0x50 [ 19.254274] __kasan_kmalloc+0xb7/0xc0 [ 19.254708] __kmalloc_cache_noprof+0x189/0x420 [ 19.255071] kasan_atomics+0x95/0x310 [ 19.256555] kunit_try_run_case+0x1a5/0x480 [ 19.256784] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.257252] kthread+0x337/0x6f0 [ 19.257443] ret_from_fork+0x116/0x1d0 [ 19.257836] ret_from_fork_asm+0x1a/0x30 [ 19.258023] [ 19.258169] The buggy address belongs to the object at ffff8881033ecb00 [ 19.258169] which belongs to the cache kmalloc-64 of size 64 [ 19.258667] The buggy address is located 0 bytes to the right of [ 19.258667] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.259212] [ 19.259396] The buggy address belongs to the physical page: [ 19.259817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.260407] flags: 0x200000000000000(node=0|zone=2) [ 19.260772] page_type: f5(slab) [ 19.261093] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.262646] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.263060] page dumped because: kasan: bad access detected [ 19.263402] [ 19.263581] Memory state around the buggy address: [ 19.263836] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.264502] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.265070] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.265703] ^ [ 19.266144] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.266780] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.267120] ================================================================== [ 17.873113] ================================================================== [ 17.874007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 17.874385] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 17.875044] [ 17.875476] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.875606] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.875642] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.875698] Call Trace: [ 17.875742] <TASK> [ 17.875782] dump_stack_lvl+0x73/0xb0 [ 17.875852] print_report+0xd1/0x650 [ 17.876263] ? __virt_addr_valid+0x1db/0x2d0 [ 17.876321] ? kasan_atomics_helper+0x4b3a/0x5450 [ 17.876365] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.876406] ? kasan_atomics_helper+0x4b3a/0x5450 [ 17.876439] kasan_report+0x141/0x180 [ 17.876491] ? kasan_atomics_helper+0x4b3a/0x5450 [ 17.876533] __asan_report_store4_noabort+0x1b/0x30 [ 17.876567] kasan_atomics_helper+0x4b3a/0x5450 [ 17.876604] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.876638] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.876671] ? kasan_atomics+0x152/0x310 [ 17.876737] kasan_atomics+0x1dc/0x310 [ 17.876776] ? __pfx_kasan_atomics+0x10/0x10 [ 17.876817] ? __pfx_read_tsc+0x10/0x10 [ 17.876856] ? ktime_get_ts64+0x86/0x230 [ 17.876903] kunit_try_run_case+0x1a5/0x480 [ 17.876944] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.876973] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.877004] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.877033] ? __kthread_parkme+0x82/0x180 [ 17.877057] ? preempt_count_sub+0x50/0x80 [ 17.877086] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.877109] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.877139] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.877168] kthread+0x337/0x6f0 [ 17.877192] ? trace_preempt_on+0x20/0xc0 [ 17.877259] ? __pfx_kthread+0x10/0x10 [ 17.877287] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.877313] ? calculate_sigpending+0x7b/0xa0 [ 17.877342] ? __pfx_kthread+0x10/0x10 [ 17.877368] ret_from_fork+0x116/0x1d0 [ 17.877391] ? __pfx_kthread+0x10/0x10 [ 17.877415] ret_from_fork_asm+0x1a/0x30 [ 17.877467] </TASK> [ 17.877487] [ 17.893421] Allocated by task 282: [ 17.893915] kasan_save_stack+0x45/0x70 [ 17.895070] kasan_save_track+0x18/0x40 [ 17.895364] kasan_save_alloc_info+0x3b/0x50 [ 17.895800] __kasan_kmalloc+0xb7/0xc0 [ 17.896108] __kmalloc_cache_noprof+0x189/0x420 [ 17.896909] kasan_atomics+0x95/0x310 [ 17.897219] kunit_try_run_case+0x1a5/0x480 [ 17.897439] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.898032] kthread+0x337/0x6f0 [ 17.898769] ret_from_fork+0x116/0x1d0 [ 17.899148] ret_from_fork_asm+0x1a/0x30 [ 17.899825] [ 17.900034] The buggy address belongs to the object at ffff8881033ecb00 [ 17.900034] which belongs to the cache kmalloc-64 of size 64 [ 17.900808] The buggy address is located 0 bytes to the right of [ 17.900808] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 17.901818] [ 17.901963] The buggy address belongs to the physical page: [ 17.902709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 17.903766] flags: 0x200000000000000(node=0|zone=2) [ 17.904053] page_type: f5(slab) [ 17.904257] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.904908] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.906530] page dumped because: kasan: bad access detected [ 17.907088] [ 17.907504] Memory state around the buggy address: [ 17.908508] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.909136] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.909627] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.910671] ^ [ 17.911328] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.911632] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.912552] ================================================================== [ 18.458935] ================================================================== [ 18.459887] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 18.460231] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.460525] [ 18.460702] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.460822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.460863] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.460915] Call Trace: [ 18.461321] <TASK> [ 18.461387] dump_stack_lvl+0x73/0xb0 [ 18.461468] print_report+0xd1/0x650 [ 18.461513] ? __virt_addr_valid+0x1db/0x2d0 [ 18.461608] ? kasan_atomics_helper+0xfa9/0x5450 [ 18.461653] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.461696] ? kasan_atomics_helper+0xfa9/0x5450 [ 18.461742] kasan_report+0x141/0x180 [ 18.461793] ? kasan_atomics_helper+0xfa9/0x5450 [ 18.461850] kasan_check_range+0x10c/0x1c0 [ 18.461907] __kasan_check_write+0x18/0x20 [ 18.461953] kasan_atomics_helper+0xfa9/0x5450 [ 18.462007] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.462060] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.462109] ? kasan_atomics+0x152/0x310 [ 18.462166] kasan_atomics+0x1dc/0x310 [ 18.462218] ? __pfx_kasan_atomics+0x10/0x10 [ 18.462273] ? __pfx_read_tsc+0x10/0x10 [ 18.462321] ? ktime_get_ts64+0x86/0x230 [ 18.462373] kunit_try_run_case+0x1a5/0x480 [ 18.462418] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.462472] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.462526] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.462575] ? __kthread_parkme+0x82/0x180 [ 18.462618] ? preempt_count_sub+0x50/0x80 [ 18.462666] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.462709] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.462755] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.462802] kthread+0x337/0x6f0 [ 18.462845] ? trace_preempt_on+0x20/0xc0 [ 18.462894] ? __pfx_kthread+0x10/0x10 [ 18.462937] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.462984] ? calculate_sigpending+0x7b/0xa0 [ 18.463034] ? __pfx_kthread+0x10/0x10 [ 18.463080] ret_from_fork+0x116/0x1d0 [ 18.463120] ? __pfx_kthread+0x10/0x10 [ 18.463160] ret_from_fork_asm+0x1a/0x30 [ 18.463226] </TASK> [ 18.463252] [ 18.475950] Allocated by task 282: [ 18.476308] kasan_save_stack+0x45/0x70 [ 18.476660] kasan_save_track+0x18/0x40 [ 18.476983] kasan_save_alloc_info+0x3b/0x50 [ 18.477258] __kasan_kmalloc+0xb7/0xc0 [ 18.477670] __kmalloc_cache_noprof+0x189/0x420 [ 18.477919] kasan_atomics+0x95/0x310 [ 18.478132] kunit_try_run_case+0x1a5/0x480 [ 18.478395] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.478656] kthread+0x337/0x6f0 [ 18.478866] ret_from_fork+0x116/0x1d0 [ 18.479080] ret_from_fork_asm+0x1a/0x30 [ 18.479333] [ 18.479539] The buggy address belongs to the object at ffff8881033ecb00 [ 18.479539] which belongs to the cache kmalloc-64 of size 64 [ 18.480543] The buggy address is located 0 bytes to the right of [ 18.480543] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.481601] [ 18.481814] The buggy address belongs to the physical page: [ 18.482312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.482975] flags: 0x200000000000000(node=0|zone=2) [ 18.483494] page_type: f5(slab) [ 18.483827] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.484488] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.485111] page dumped because: kasan: bad access detected [ 18.485564] [ 18.485696] Memory state around the buggy address: [ 18.485936] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.486268] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.486656] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.487271] ^ [ 18.487727] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.488360] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.488885] ================================================================== [ 18.201635] ================================================================== [ 18.202339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 18.203213] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.203784] [ 18.203932] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.204022] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.204045] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.204083] Call Trace: [ 18.204148] <TASK> [ 18.204213] dump_stack_lvl+0x73/0xb0 [ 18.204341] print_report+0xd1/0x650 [ 18.204417] ? __virt_addr_valid+0x1db/0x2d0 [ 18.204497] ? kasan_atomics_helper+0xac7/0x5450 [ 18.204563] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.204629] ? kasan_atomics_helper+0xac7/0x5450 [ 18.204694] kasan_report+0x141/0x180 [ 18.204759] ? kasan_atomics_helper+0xac7/0x5450 [ 18.204821] kasan_check_range+0x10c/0x1c0 [ 18.204889] __kasan_check_write+0x18/0x20 [ 18.204948] kasan_atomics_helper+0xac7/0x5450 [ 18.205011] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.205074] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.205131] ? kasan_atomics+0x152/0x310 [ 18.205227] kasan_atomics+0x1dc/0x310 [ 18.205282] ? __pfx_kasan_atomics+0x10/0x10 [ 18.205340] ? __pfx_read_tsc+0x10/0x10 [ 18.205395] ? ktime_get_ts64+0x86/0x230 [ 18.205463] kunit_try_run_case+0x1a5/0x480 [ 18.205508] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.205552] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.205612] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.205670] ? __kthread_parkme+0x82/0x180 [ 18.205723] ? preempt_count_sub+0x50/0x80 [ 18.205781] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.205831] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.205890] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.205946] kthread+0x337/0x6f0 [ 18.205996] ? trace_preempt_on+0x20/0xc0 [ 18.206056] ? __pfx_kthread+0x10/0x10 [ 18.206108] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.206163] ? calculate_sigpending+0x7b/0xa0 [ 18.206250] ? __pfx_kthread+0x10/0x10 [ 18.206303] ret_from_fork+0x116/0x1d0 [ 18.206351] ? __pfx_kthread+0x10/0x10 [ 18.206402] ret_from_fork_asm+0x1a/0x30 [ 18.206482] </TASK> [ 18.206506] [ 18.218414] Allocated by task 282: [ 18.218665] kasan_save_stack+0x45/0x70 [ 18.218919] kasan_save_track+0x18/0x40 [ 18.219110] kasan_save_alloc_info+0x3b/0x50 [ 18.219316] __kasan_kmalloc+0xb7/0xc0 [ 18.219700] __kmalloc_cache_noprof+0x189/0x420 [ 18.220138] kasan_atomics+0x95/0x310 [ 18.220544] kunit_try_run_case+0x1a5/0x480 [ 18.220976] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.221645] kthread+0x337/0x6f0 [ 18.222039] ret_from_fork+0x116/0x1d0 [ 18.222425] ret_from_fork_asm+0x1a/0x30 [ 18.222847] [ 18.223054] The buggy address belongs to the object at ffff8881033ecb00 [ 18.223054] which belongs to the cache kmalloc-64 of size 64 [ 18.224090] The buggy address is located 0 bytes to the right of [ 18.224090] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.225266] [ 18.225529] The buggy address belongs to the physical page: [ 18.226030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.226787] flags: 0x200000000000000(node=0|zone=2) [ 18.227291] page_type: f5(slab) [ 18.227636] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.228430] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.229177] page dumped because: kasan: bad access detected [ 18.229720] [ 18.229845] Memory state around the buggy address: [ 18.230058] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.230793] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.231175] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.231686] ^ [ 18.232091] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.232866] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.233574] ================================================================== [ 18.987414] ================================================================== [ 18.988074] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 18.988724] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.989358] [ 18.989594] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.989697] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.989724] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.989774] Call Trace: [ 18.990288] <TASK> [ 18.990338] dump_stack_lvl+0x73/0xb0 [ 18.990409] print_report+0xd1/0x650 [ 18.990469] ? __virt_addr_valid+0x1db/0x2d0 [ 18.990522] ? kasan_atomics_helper+0x164f/0x5450 [ 18.990569] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.990615] ? kasan_atomics_helper+0x164f/0x5450 [ 18.990660] kasan_report+0x141/0x180 [ 18.990706] ? kasan_atomics_helper+0x164f/0x5450 [ 18.990762] kasan_check_range+0x10c/0x1c0 [ 18.990809] __kasan_check_write+0x18/0x20 [ 18.990849] kasan_atomics_helper+0x164f/0x5450 [ 18.990898] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.990945] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.990990] ? kasan_atomics+0x152/0x310 [ 18.991044] kasan_atomics+0x1dc/0x310 [ 18.991090] ? __pfx_kasan_atomics+0x10/0x10 [ 18.991138] ? __pfx_read_tsc+0x10/0x10 [ 18.991181] ? ktime_get_ts64+0x86/0x230 [ 18.991268] kunit_try_run_case+0x1a5/0x480 [ 18.991317] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.991370] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.991424] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.991493] ? __kthread_parkme+0x82/0x180 [ 18.991534] ? preempt_count_sub+0x50/0x80 [ 18.991579] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.991621] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.991669] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.991722] kthread+0x337/0x6f0 [ 18.991763] ? trace_preempt_on+0x20/0xc0 [ 18.991813] ? __pfx_kthread+0x10/0x10 [ 18.991862] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.991910] ? calculate_sigpending+0x7b/0xa0 [ 18.991954] ? __pfx_kthread+0x10/0x10 [ 18.991994] ret_from_fork+0x116/0x1d0 [ 18.992035] ? __pfx_kthread+0x10/0x10 [ 18.992072] ret_from_fork_asm+0x1a/0x30 [ 18.992131] </TASK> [ 18.992155] [ 19.005850] Allocated by task 282: [ 19.006249] kasan_save_stack+0x45/0x70 [ 19.006632] kasan_save_track+0x18/0x40 [ 19.006907] kasan_save_alloc_info+0x3b/0x50 [ 19.007335] __kasan_kmalloc+0xb7/0xc0 [ 19.007637] __kmalloc_cache_noprof+0x189/0x420 [ 19.008002] kasan_atomics+0x95/0x310 [ 19.008273] kunit_try_run_case+0x1a5/0x480 [ 19.008508] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.008972] kthread+0x337/0x6f0 [ 19.009339] ret_from_fork+0x116/0x1d0 [ 19.009696] ret_from_fork_asm+0x1a/0x30 [ 19.009969] [ 19.010159] The buggy address belongs to the object at ffff8881033ecb00 [ 19.010159] which belongs to the cache kmalloc-64 of size 64 [ 19.010733] The buggy address is located 0 bytes to the right of [ 19.010733] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.011718] [ 19.011944] The buggy address belongs to the physical page: [ 19.012376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.012813] flags: 0x200000000000000(node=0|zone=2) [ 19.013300] page_type: f5(slab) [ 19.013833] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.014789] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.015237] page dumped because: kasan: bad access detected [ 19.016118] [ 19.016271] Memory state around the buggy address: [ 19.016575] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.017142] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.017735] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.018249] ^ [ 19.018742] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.019137] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.019637] ================================================================== [ 18.143077] ================================================================== [ 18.144177] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 18.144708] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.145288] [ 18.145508] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.145621] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.145663] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.145733] Call Trace: [ 18.145786] <TASK> [ 18.145830] dump_stack_lvl+0x73/0xb0 [ 18.145912] print_report+0xd1/0x650 [ 18.145982] ? __virt_addr_valid+0x1db/0x2d0 [ 18.146041] ? kasan_atomics_helper+0x992/0x5450 [ 18.146084] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.146113] ? kasan_atomics_helper+0x992/0x5450 [ 18.146139] kasan_report+0x141/0x180 [ 18.146167] ? kasan_atomics_helper+0x992/0x5450 [ 18.146220] kasan_check_range+0x10c/0x1c0 [ 18.146289] __kasan_check_write+0x18/0x20 [ 18.146333] kasan_atomics_helper+0x992/0x5450 [ 18.146385] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.146437] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.146502] ? kasan_atomics+0x152/0x310 [ 18.146567] kasan_atomics+0x1dc/0x310 [ 18.146615] ? __pfx_kasan_atomics+0x10/0x10 [ 18.146668] ? __pfx_read_tsc+0x10/0x10 [ 18.146716] ? ktime_get_ts64+0x86/0x230 [ 18.146789] kunit_try_run_case+0x1a5/0x480 [ 18.146860] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.146903] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.146952] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.146990] ? __kthread_parkme+0x82/0x180 [ 18.147016] ? preempt_count_sub+0x50/0x80 [ 18.147046] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.147072] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.147103] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.147133] kthread+0x337/0x6f0 [ 18.147157] ? trace_preempt_on+0x20/0xc0 [ 18.147186] ? __pfx_kthread+0x10/0x10 [ 18.147247] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.147278] ? calculate_sigpending+0x7b/0xa0 [ 18.147308] ? __pfx_kthread+0x10/0x10 [ 18.147334] ret_from_fork+0x116/0x1d0 [ 18.147372] ? __pfx_kthread+0x10/0x10 [ 18.147400] ret_from_fork_asm+0x1a/0x30 [ 18.147439] </TASK> [ 18.147488] [ 18.158032] Allocated by task 282: [ 18.158465] kasan_save_stack+0x45/0x70 [ 18.158732] kasan_save_track+0x18/0x40 [ 18.158937] kasan_save_alloc_info+0x3b/0x50 [ 18.159151] __kasan_kmalloc+0xb7/0xc0 [ 18.159437] __kmalloc_cache_noprof+0x189/0x420 [ 18.159876] kasan_atomics+0x95/0x310 [ 18.160229] kunit_try_run_case+0x1a5/0x480 [ 18.160659] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.161112] kthread+0x337/0x6f0 [ 18.161405] ret_from_fork+0x116/0x1d0 [ 18.161894] ret_from_fork_asm+0x1a/0x30 [ 18.162203] [ 18.162404] The buggy address belongs to the object at ffff8881033ecb00 [ 18.162404] which belongs to the cache kmalloc-64 of size 64 [ 18.163106] The buggy address is located 0 bytes to the right of [ 18.163106] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.163820] [ 18.163967] The buggy address belongs to the physical page: [ 18.164210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.164870] flags: 0x200000000000000(node=0|zone=2) [ 18.165406] page_type: f5(slab) [ 18.165757] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.166304] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.166710] page dumped because: kasan: bad access detected [ 18.167108] [ 18.167321] Memory state around the buggy address: [ 18.167612] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.167913] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.168375] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.168935] ^ [ 18.169416] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.169917] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.170333] ================================================================== [ 19.473076] ================================================================== [ 19.473570] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 19.473903] Read of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.474417] [ 19.474692] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.474802] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.474836] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.474891] Call Trace: [ 19.474939] <TASK> [ 19.474987] dump_stack_lvl+0x73/0xb0 [ 19.475048] print_report+0xd1/0x650 [ 19.475100] ? __virt_addr_valid+0x1db/0x2d0 [ 19.475152] ? kasan_atomics_helper+0x4f71/0x5450 [ 19.475249] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.475329] ? kasan_atomics_helper+0x4f71/0x5450 [ 19.475409] kasan_report+0x141/0x180 [ 19.475483] ? kasan_atomics_helper+0x4f71/0x5450 [ 19.475544] __asan_report_load8_noabort+0x18/0x20 [ 19.475598] kasan_atomics_helper+0x4f71/0x5450 [ 19.475657] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.475718] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.475775] ? kasan_atomics+0x152/0x310 [ 19.475835] kasan_atomics+0x1dc/0x310 [ 19.475889] ? __pfx_kasan_atomics+0x10/0x10 [ 19.475954] ? __pfx_read_tsc+0x10/0x10 [ 19.476018] ? ktime_get_ts64+0x86/0x230 [ 19.476082] kunit_try_run_case+0x1a5/0x480 [ 19.476128] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.476169] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.476263] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.476331] ? __kthread_parkme+0x82/0x180 [ 19.476399] ? preempt_count_sub+0x50/0x80 [ 19.476462] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.476516] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.476581] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.476657] kthread+0x337/0x6f0 [ 19.476708] ? trace_preempt_on+0x20/0xc0 [ 19.476755] ? __pfx_kthread+0x10/0x10 [ 19.476794] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.476824] ? calculate_sigpending+0x7b/0xa0 [ 19.476854] ? __pfx_kthread+0x10/0x10 [ 19.476880] ret_from_fork+0x116/0x1d0 [ 19.476905] ? __pfx_kthread+0x10/0x10 [ 19.476929] ret_from_fork_asm+0x1a/0x30 [ 19.476967] </TASK> [ 19.476982] [ 19.487148] Allocated by task 282: [ 19.487595] kasan_save_stack+0x45/0x70 [ 19.488014] kasan_save_track+0x18/0x40 [ 19.488481] kasan_save_alloc_info+0x3b/0x50 [ 19.488866] __kasan_kmalloc+0xb7/0xc0 [ 19.489191] __kmalloc_cache_noprof+0x189/0x420 [ 19.489606] kasan_atomics+0x95/0x310 [ 19.489968] kunit_try_run_case+0x1a5/0x480 [ 19.490402] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.490715] kthread+0x337/0x6f0 [ 19.490947] ret_from_fork+0x116/0x1d0 [ 19.491141] ret_from_fork_asm+0x1a/0x30 [ 19.491535] [ 19.491687] The buggy address belongs to the object at ffff8881033ecb00 [ 19.491687] which belongs to the cache kmalloc-64 of size 64 [ 19.493145] The buggy address is located 0 bytes to the right of [ 19.493145] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.494106] [ 19.495447] The buggy address belongs to the physical page: [ 19.495919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.496716] flags: 0x200000000000000(node=0|zone=2) [ 19.497395] page_type: f5(slab) [ 19.497552] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.497735] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.497923] page dumped because: kasan: bad access detected [ 19.498067] [ 19.498138] Memory state around the buggy address: [ 19.498438] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.498928] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.499320] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.500047] ^ [ 19.500408] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.500764] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.501240] ================================================================== [ 17.603376] ================================================================== [ 17.604397] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 17.605029] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 17.605353] [ 17.605587] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.605692] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.605723] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.605770] Call Trace: [ 17.605801] <TASK> [ 17.605839] dump_stack_lvl+0x73/0xb0 [ 17.605901] print_report+0xd1/0x650 [ 17.605947] ? __virt_addr_valid+0x1db/0x2d0 [ 17.605994] ? kasan_atomics_helper+0x4bbc/0x5450 [ 17.606037] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.606089] ? kasan_atomics_helper+0x4bbc/0x5450 [ 17.606141] kasan_report+0x141/0x180 [ 17.606192] ? kasan_atomics_helper+0x4bbc/0x5450 [ 17.606256] __asan_report_load4_noabort+0x18/0x20 [ 17.606306] kasan_atomics_helper+0x4bbc/0x5450 [ 17.606350] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.606394] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.606439] ? kasan_atomics+0x152/0x310 [ 17.606565] kasan_atomics+0x1dc/0x310 [ 17.606642] ? __pfx_kasan_atomics+0x10/0x10 [ 17.606706] ? __pfx_read_tsc+0x10/0x10 [ 17.606751] ? ktime_get_ts64+0x86/0x230 [ 17.606795] kunit_try_run_case+0x1a5/0x480 [ 17.606846] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.606881] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.606928] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.606978] ? __kthread_parkme+0x82/0x180 [ 17.607032] ? preempt_count_sub+0x50/0x80 [ 17.607091] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.607136] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.607167] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.607217] kthread+0x337/0x6f0 [ 17.607253] ? trace_preempt_on+0x20/0xc0 [ 17.607281] ? __pfx_kthread+0x10/0x10 [ 17.607305] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.607331] ? calculate_sigpending+0x7b/0xa0 [ 17.607374] ? __pfx_kthread+0x10/0x10 [ 17.607399] ret_from_fork+0x116/0x1d0 [ 17.607422] ? __pfx_kthread+0x10/0x10 [ 17.607445] ret_from_fork_asm+0x1a/0x30 [ 17.607504] </TASK> [ 17.607519] [ 17.621796] Allocated by task 282: [ 17.622601] kasan_save_stack+0x45/0x70 [ 17.623037] kasan_save_track+0x18/0x40 [ 17.623596] kasan_save_alloc_info+0x3b/0x50 [ 17.624109] __kasan_kmalloc+0xb7/0xc0 [ 17.624316] __kmalloc_cache_noprof+0x189/0x420 [ 17.624619] kasan_atomics+0x95/0x310 [ 17.625188] kunit_try_run_case+0x1a5/0x480 [ 17.625604] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.626384] kthread+0x337/0x6f0 [ 17.626866] ret_from_fork+0x116/0x1d0 [ 17.627154] ret_from_fork_asm+0x1a/0x30 [ 17.627621] [ 17.628033] The buggy address belongs to the object at ffff8881033ecb00 [ 17.628033] which belongs to the cache kmalloc-64 of size 64 [ 17.628895] The buggy address is located 0 bytes to the right of [ 17.628895] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 17.630362] [ 17.630587] The buggy address belongs to the physical page: [ 17.631391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 17.632161] flags: 0x200000000000000(node=0|zone=2) [ 17.632489] page_type: f5(slab) [ 17.632932] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.633541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.634514] page dumped because: kasan: bad access detected [ 17.634814] [ 17.635123] Memory state around the buggy address: [ 17.635612] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.636132] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.636723] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.637243] ^ [ 17.637586] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.638547] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.639197] ================================================================== [ 19.113806] ================================================================== [ 19.114447] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 19.114855] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.115227] [ 19.115463] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.115550] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.115569] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.115596] Call Trace: [ 19.115622] <TASK> [ 19.115653] dump_stack_lvl+0x73/0xb0 [ 19.115713] print_report+0xd1/0x650 [ 19.115757] ? __virt_addr_valid+0x1db/0x2d0 [ 19.115802] ? kasan_atomics_helper+0x18b1/0x5450 [ 19.115851] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.115931] ? kasan_atomics_helper+0x18b1/0x5450 [ 19.115980] kasan_report+0x141/0x180 [ 19.116029] ? kasan_atomics_helper+0x18b1/0x5450 [ 19.116091] kasan_check_range+0x10c/0x1c0 [ 19.116149] __kasan_check_write+0x18/0x20 [ 19.116195] kasan_atomics_helper+0x18b1/0x5450 [ 19.116288] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.116343] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.116395] ? kasan_atomics+0x152/0x310 [ 19.116452] kasan_atomics+0x1dc/0x310 [ 19.116519] ? __pfx_kasan_atomics+0x10/0x10 [ 19.116592] ? __pfx_read_tsc+0x10/0x10 [ 19.116644] ? ktime_get_ts64+0x86/0x230 [ 19.116706] kunit_try_run_case+0x1a5/0x480 [ 19.116778] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.116839] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.116912] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.116980] ? __kthread_parkme+0x82/0x180 [ 19.117032] ? preempt_count_sub+0x50/0x80 [ 19.117103] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.117166] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.117252] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.117308] kthread+0x337/0x6f0 [ 19.117352] ? trace_preempt_on+0x20/0xc0 [ 19.117405] ? __pfx_kthread+0x10/0x10 [ 19.117465] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.117524] ? calculate_sigpending+0x7b/0xa0 [ 19.117586] ? __pfx_kthread+0x10/0x10 [ 19.117642] ret_from_fork+0x116/0x1d0 [ 19.117693] ? __pfx_kthread+0x10/0x10 [ 19.117745] ret_from_fork_asm+0x1a/0x30 [ 19.117823] </TASK> [ 19.117855] [ 19.128849] Allocated by task 282: [ 19.129142] kasan_save_stack+0x45/0x70 [ 19.129437] kasan_save_track+0x18/0x40 [ 19.129832] kasan_save_alloc_info+0x3b/0x50 [ 19.130194] __kasan_kmalloc+0xb7/0xc0 [ 19.130652] __kmalloc_cache_noprof+0x189/0x420 [ 19.131058] kasan_atomics+0x95/0x310 [ 19.131501] kunit_try_run_case+0x1a5/0x480 [ 19.131874] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.132399] kthread+0x337/0x6f0 [ 19.132751] ret_from_fork+0x116/0x1d0 [ 19.133108] ret_from_fork_asm+0x1a/0x30 [ 19.133583] [ 19.133774] The buggy address belongs to the object at ffff8881033ecb00 [ 19.133774] which belongs to the cache kmalloc-64 of size 64 [ 19.134631] The buggy address is located 0 bytes to the right of [ 19.134631] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.135086] [ 19.135215] The buggy address belongs to the physical page: [ 19.135711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.136528] flags: 0x200000000000000(node=0|zone=2) [ 19.137012] page_type: f5(slab) [ 19.137360] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.137731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.138014] page dumped because: kasan: bad access detected [ 19.138252] [ 19.138470] Memory state around the buggy address: [ 19.138968] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.139591] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.140169] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.140606] ^ [ 19.140844] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.141121] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.141658] ================================================================== [ 18.389290] ================================================================== [ 18.391160] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 18.391855] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.392551] [ 18.392800] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.392940] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.392974] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.393031] Call Trace: [ 18.393092] <TASK> [ 18.393139] dump_stack_lvl+0x73/0xb0 [ 18.393208] print_report+0xd1/0x650 [ 18.393258] ? __virt_addr_valid+0x1db/0x2d0 [ 18.393324] ? kasan_atomics_helper+0xe78/0x5450 [ 18.393390] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.393441] ? kasan_atomics_helper+0xe78/0x5450 [ 18.393500] kasan_report+0x141/0x180 [ 18.393530] ? kasan_atomics_helper+0xe78/0x5450 [ 18.393559] kasan_check_range+0x10c/0x1c0 [ 18.393597] __kasan_check_write+0x18/0x20 [ 18.393638] kasan_atomics_helper+0xe78/0x5450 [ 18.393681] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.393728] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.393776] ? kasan_atomics+0x152/0x310 [ 18.393833] kasan_atomics+0x1dc/0x310 [ 18.393894] ? __pfx_kasan_atomics+0x10/0x10 [ 18.393968] ? __pfx_read_tsc+0x10/0x10 [ 18.394020] ? ktime_get_ts64+0x86/0x230 [ 18.394080] kunit_try_run_case+0x1a5/0x480 [ 18.394130] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.394170] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.394228] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.394272] ? __kthread_parkme+0x82/0x180 [ 18.394314] ? preempt_count_sub+0x50/0x80 [ 18.394366] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.394421] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.394494] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.394554] kthread+0x337/0x6f0 [ 18.394605] ? trace_preempt_on+0x20/0xc0 [ 18.394664] ? __pfx_kthread+0x10/0x10 [ 18.394711] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.394760] ? calculate_sigpending+0x7b/0xa0 [ 18.394822] ? __pfx_kthread+0x10/0x10 [ 18.394873] ret_from_fork+0x116/0x1d0 [ 18.394941] ? __pfx_kthread+0x10/0x10 [ 18.394992] ret_from_fork_asm+0x1a/0x30 [ 18.395087] </TASK> [ 18.395120] [ 18.407274] Allocated by task 282: [ 18.407656] kasan_save_stack+0x45/0x70 [ 18.408102] kasan_save_track+0x18/0x40 [ 18.408539] kasan_save_alloc_info+0x3b/0x50 [ 18.408833] __kasan_kmalloc+0xb7/0xc0 [ 18.409049] __kmalloc_cache_noprof+0x189/0x420 [ 18.409265] kasan_atomics+0x95/0x310 [ 18.409502] kunit_try_run_case+0x1a5/0x480 [ 18.409894] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.410393] kthread+0x337/0x6f0 [ 18.410928] ret_from_fork+0x116/0x1d0 [ 18.411441] ret_from_fork_asm+0x1a/0x30 [ 18.411905] [ 18.412109] The buggy address belongs to the object at ffff8881033ecb00 [ 18.412109] which belongs to the cache kmalloc-64 of size 64 [ 18.412896] The buggy address is located 0 bytes to the right of [ 18.412896] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.413677] [ 18.413904] The buggy address belongs to the physical page: [ 18.414238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.414725] flags: 0x200000000000000(node=0|zone=2) [ 18.415129] page_type: f5(slab) [ 18.415569] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.416117] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.416650] page dumped because: kasan: bad access detected [ 18.417068] [ 18.417311] Memory state around the buggy address: [ 18.417694] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.418000] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.418293] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.418782] ^ [ 18.419331] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.420305] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.420914] ================================================================== [ 19.410285] ================================================================== [ 19.411008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 19.411581] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.412134] [ 19.412439] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.412598] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.412629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.412682] Call Trace: [ 19.412768] <TASK> [ 19.412816] dump_stack_lvl+0x73/0xb0 [ 19.412884] print_report+0xd1/0x650 [ 19.412934] ? __virt_addr_valid+0x1db/0x2d0 [ 19.412978] ? kasan_atomics_helper+0x1eaa/0x5450 [ 19.413021] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.413067] ? kasan_atomics_helper+0x1eaa/0x5450 [ 19.413118] kasan_report+0x141/0x180 [ 19.413249] ? kasan_atomics_helper+0x1eaa/0x5450 [ 19.413314] kasan_check_range+0x10c/0x1c0 [ 19.413367] __kasan_check_write+0x18/0x20 [ 19.413447] kasan_atomics_helper+0x1eaa/0x5450 [ 19.413515] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.413566] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.413652] ? kasan_atomics+0x152/0x310 [ 19.413717] kasan_atomics+0x1dc/0x310 [ 19.413772] ? __pfx_kasan_atomics+0x10/0x10 [ 19.413828] ? __pfx_read_tsc+0x10/0x10 [ 19.413897] ? ktime_get_ts64+0x86/0x230 [ 19.413954] kunit_try_run_case+0x1a5/0x480 [ 19.414028] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.414092] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.414144] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.414230] ? __kthread_parkme+0x82/0x180 [ 19.414285] ? preempt_count_sub+0x50/0x80 [ 19.414347] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.414399] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.414451] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.414508] kthread+0x337/0x6f0 [ 19.414533] ? trace_preempt_on+0x20/0xc0 [ 19.414561] ? __pfx_kthread+0x10/0x10 [ 19.414584] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.414611] ? calculate_sigpending+0x7b/0xa0 [ 19.414640] ? __pfx_kthread+0x10/0x10 [ 19.414664] ret_from_fork+0x116/0x1d0 [ 19.414687] ? __pfx_kthread+0x10/0x10 [ 19.414710] ret_from_fork_asm+0x1a/0x30 [ 19.414747] </TASK> [ 19.414761] [ 19.428019] Allocated by task 282: [ 19.428174] kasan_save_stack+0x45/0x70 [ 19.428593] kasan_save_track+0x18/0x40 [ 19.429235] kasan_save_alloc_info+0x3b/0x50 [ 19.429684] __kasan_kmalloc+0xb7/0xc0 [ 19.430033] __kmalloc_cache_noprof+0x189/0x420 [ 19.430442] kasan_atomics+0x95/0x310 [ 19.430880] kunit_try_run_case+0x1a5/0x480 [ 19.431366] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.431880] kthread+0x337/0x6f0 [ 19.432100] ret_from_fork+0x116/0x1d0 [ 19.432631] ret_from_fork_asm+0x1a/0x30 [ 19.433092] [ 19.433329] The buggy address belongs to the object at ffff8881033ecb00 [ 19.433329] which belongs to the cache kmalloc-64 of size 64 [ 19.434132] The buggy address is located 0 bytes to the right of [ 19.434132] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.435056] [ 19.435416] The buggy address belongs to the physical page: [ 19.435965] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.436590] flags: 0x200000000000000(node=0|zone=2) [ 19.437067] page_type: f5(slab) [ 19.437314] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.437843] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.438201] page dumped because: kasan: bad access detected [ 19.438673] [ 19.438851] Memory state around the buggy address: [ 19.439119] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.439611] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.439909] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.440431] ^ [ 19.440874] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.441384] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.441679] ================================================================== [ 18.331619] ================================================================== [ 18.332114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 18.332758] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.333238] [ 18.333404] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.333506] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.333534] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.333581] Call Trace: [ 18.333624] <TASK> [ 18.333692] dump_stack_lvl+0x73/0xb0 [ 18.333757] print_report+0xd1/0x650 [ 18.333808] ? __virt_addr_valid+0x1db/0x2d0 [ 18.333857] ? kasan_atomics_helper+0xd47/0x5450 [ 18.333901] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.333967] ? kasan_atomics_helper+0xd47/0x5450 [ 18.334015] kasan_report+0x141/0x180 [ 18.334065] ? kasan_atomics_helper+0xd47/0x5450 [ 18.334121] kasan_check_range+0x10c/0x1c0 [ 18.334189] __kasan_check_write+0x18/0x20 [ 18.334237] kasan_atomics_helper+0xd47/0x5450 [ 18.334299] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.334348] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.334383] ? kasan_atomics+0x152/0x310 [ 18.334415] kasan_atomics+0x1dc/0x310 [ 18.334440] ? __pfx_kasan_atomics+0x10/0x10 [ 18.334488] ? __pfx_read_tsc+0x10/0x10 [ 18.334524] ? ktime_get_ts64+0x86/0x230 [ 18.334567] kunit_try_run_case+0x1a5/0x480 [ 18.334615] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.334652] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.334725] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.334776] ? __kthread_parkme+0x82/0x180 [ 18.334820] ? preempt_count_sub+0x50/0x80 [ 18.334871] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.334934] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.334991] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.335039] kthread+0x337/0x6f0 [ 18.335082] ? trace_preempt_on+0x20/0xc0 [ 18.335131] ? __pfx_kthread+0x10/0x10 [ 18.335164] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.335196] ? calculate_sigpending+0x7b/0xa0 [ 18.335252] ? __pfx_kthread+0x10/0x10 [ 18.335280] ret_from_fork+0x116/0x1d0 [ 18.335305] ? __pfx_kthread+0x10/0x10 [ 18.335330] ret_from_fork_asm+0x1a/0x30 [ 18.335380] </TASK> [ 18.335396] [ 18.347325] Allocated by task 282: [ 18.347756] kasan_save_stack+0x45/0x70 [ 18.348262] kasan_save_track+0x18/0x40 [ 18.348614] kasan_save_alloc_info+0x3b/0x50 [ 18.348921] __kasan_kmalloc+0xb7/0xc0 [ 18.349155] __kmalloc_cache_noprof+0x189/0x420 [ 18.349677] kasan_atomics+0x95/0x310 [ 18.349939] kunit_try_run_case+0x1a5/0x480 [ 18.350350] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.350657] kthread+0x337/0x6f0 [ 18.350993] ret_from_fork+0x116/0x1d0 [ 18.351262] ret_from_fork_asm+0x1a/0x30 [ 18.351673] [ 18.351796] The buggy address belongs to the object at ffff8881033ecb00 [ 18.351796] which belongs to the cache kmalloc-64 of size 64 [ 18.352230] The buggy address is located 0 bytes to the right of [ 18.352230] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.353031] [ 18.353222] The buggy address belongs to the physical page: [ 18.353813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.354479] flags: 0x200000000000000(node=0|zone=2) [ 18.354718] page_type: f5(slab) [ 18.354923] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.355579] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.356007] page dumped because: kasan: bad access detected [ 18.356352] [ 18.356555] Memory state around the buggy address: [ 18.356910] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.357516] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.357901] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.358319] ^ [ 18.358724] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.359274] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.359760] ================================================================== [ 17.721990] ================================================================== [ 17.722378] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 17.722794] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 17.723508] [ 17.723749] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.723858] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.723886] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.723936] Call Trace: [ 17.723980] <TASK> [ 17.724020] dump_stack_lvl+0x73/0xb0 [ 17.724086] print_report+0xd1/0x650 [ 17.724138] ? __virt_addr_valid+0x1db/0x2d0 [ 17.724228] ? kasan_atomics_helper+0x4b6e/0x5450 [ 17.724284] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.724328] ? kasan_atomics_helper+0x4b6e/0x5450 [ 17.724366] kasan_report+0x141/0x180 [ 17.724428] ? kasan_atomics_helper+0x4b6e/0x5450 [ 17.724486] __asan_report_store4_noabort+0x1b/0x30 [ 17.724522] kasan_atomics_helper+0x4b6e/0x5450 [ 17.724560] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.724596] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.724629] ? kasan_atomics+0x152/0x310 [ 17.724674] kasan_atomics+0x1dc/0x310 [ 17.724722] ? __pfx_kasan_atomics+0x10/0x10 [ 17.724761] ? __pfx_read_tsc+0x10/0x10 [ 17.724843] ? ktime_get_ts64+0x86/0x230 [ 17.724897] kunit_try_run_case+0x1a5/0x480 [ 17.724942] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.724984] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.725043] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.725100] ? __kthread_parkme+0x82/0x180 [ 17.725151] ? preempt_count_sub+0x50/0x80 [ 17.725237] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.725291] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.725349] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.725406] kthread+0x337/0x6f0 [ 17.725463] ? trace_preempt_on+0x20/0xc0 [ 17.725521] ? __pfx_kthread+0x10/0x10 [ 17.725572] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.725625] ? calculate_sigpending+0x7b/0xa0 [ 17.725671] ? __pfx_kthread+0x10/0x10 [ 17.725711] ret_from_fork+0x116/0x1d0 [ 17.725750] ? __pfx_kthread+0x10/0x10 [ 17.725792] ret_from_fork_asm+0x1a/0x30 [ 17.725883] </TASK> [ 17.726105] [ 17.742928] Allocated by task 282: [ 17.743640] kasan_save_stack+0x45/0x70 [ 17.743889] kasan_save_track+0x18/0x40 [ 17.744246] kasan_save_alloc_info+0x3b/0x50 [ 17.744515] __kasan_kmalloc+0xb7/0xc0 [ 17.744824] __kmalloc_cache_noprof+0x189/0x420 [ 17.745085] kasan_atomics+0x95/0x310 [ 17.745407] kunit_try_run_case+0x1a5/0x480 [ 17.746562] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.747042] kthread+0x337/0x6f0 [ 17.747709] ret_from_fork+0x116/0x1d0 [ 17.747969] ret_from_fork_asm+0x1a/0x30 [ 17.748875] [ 17.749096] The buggy address belongs to the object at ffff8881033ecb00 [ 17.749096] which belongs to the cache kmalloc-64 of size 64 [ 17.750335] The buggy address is located 0 bytes to the right of [ 17.750335] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 17.751339] [ 17.751644] The buggy address belongs to the physical page: [ 17.752182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 17.753286] flags: 0x200000000000000(node=0|zone=2) [ 17.753921] page_type: f5(slab) [ 17.754122] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.754616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.755801] page dumped because: kasan: bad access detected [ 17.756104] [ 17.756286] Memory state around the buggy address: [ 17.756592] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.757144] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.757592] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.758590] ^ [ 17.759154] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.759523] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.760693] ================================================================== [ 19.326283] ================================================================== [ 19.327093] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 19.327755] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.328116] [ 19.328374] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.328485] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.328518] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.328567] Call Trace: [ 19.328613] <TASK> [ 19.328659] dump_stack_lvl+0x73/0xb0 [ 19.328730] print_report+0xd1/0x650 [ 19.328785] ? __virt_addr_valid+0x1db/0x2d0 [ 19.328836] ? kasan_atomics_helper+0x1ce1/0x5450 [ 19.328884] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.328937] ? kasan_atomics_helper+0x1ce1/0x5450 [ 19.328991] kasan_report+0x141/0x180 [ 19.329047] ? kasan_atomics_helper+0x1ce1/0x5450 [ 19.329105] kasan_check_range+0x10c/0x1c0 [ 19.329158] __kasan_check_write+0x18/0x20 [ 19.329242] kasan_atomics_helper+0x1ce1/0x5450 [ 19.329297] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.329342] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.329393] ? kasan_atomics+0x152/0x310 [ 19.329462] kasan_atomics+0x1dc/0x310 [ 19.329520] ? __pfx_kasan_atomics+0x10/0x10 [ 19.329579] ? __pfx_read_tsc+0x10/0x10 [ 19.329630] ? ktime_get_ts64+0x86/0x230 [ 19.329694] kunit_try_run_case+0x1a5/0x480 [ 19.329751] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.329799] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.329857] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.329915] ? __kthread_parkme+0x82/0x180 [ 19.329967] ? preempt_count_sub+0x50/0x80 [ 19.330021] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.330064] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.330117] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.330165] kthread+0x337/0x6f0 [ 19.330240] ? trace_preempt_on+0x20/0xc0 [ 19.330294] ? __pfx_kthread+0x10/0x10 [ 19.330339] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.330384] ? calculate_sigpending+0x7b/0xa0 [ 19.330432] ? __pfx_kthread+0x10/0x10 [ 19.330490] ret_from_fork+0x116/0x1d0 [ 19.330538] ? __pfx_kthread+0x10/0x10 [ 19.330589] ret_from_fork_asm+0x1a/0x30 [ 19.330656] </TASK> [ 19.330676] [ 19.340285] Allocated by task 282: [ 19.340668] kasan_save_stack+0x45/0x70 [ 19.341068] kasan_save_track+0x18/0x40 [ 19.341447] kasan_save_alloc_info+0x3b/0x50 [ 19.341825] __kasan_kmalloc+0xb7/0xc0 [ 19.342135] __kmalloc_cache_noprof+0x189/0x420 [ 19.342553] kasan_atomics+0x95/0x310 [ 19.342851] kunit_try_run_case+0x1a5/0x480 [ 19.343097] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.343514] kthread+0x337/0x6f0 [ 19.343716] ret_from_fork+0x116/0x1d0 [ 19.344042] ret_from_fork_asm+0x1a/0x30 [ 19.344417] [ 19.344616] The buggy address belongs to the object at ffff8881033ecb00 [ 19.344616] which belongs to the cache kmalloc-64 of size 64 [ 19.345291] The buggy address is located 0 bytes to the right of [ 19.345291] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.345939] [ 19.346117] The buggy address belongs to the physical page: [ 19.346429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.346929] flags: 0x200000000000000(node=0|zone=2) [ 19.347360] page_type: f5(slab) [ 19.347615] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.348069] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.348410] page dumped because: kasan: bad access detected [ 19.348818] [ 19.348994] Memory state around the buggy address: [ 19.349421] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.349990] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.350365] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.350661] ^ [ 19.350886] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.351166] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.351462] ================================================================== [ 18.526832] ================================================================== [ 18.527469] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 18.527765] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.528950] [ 18.529145] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.529228] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.529247] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.529277] Call Trace: [ 18.529305] <TASK> [ 18.529332] dump_stack_lvl+0x73/0xb0 [ 18.529378] print_report+0xd1/0x650 [ 18.529407] ? __virt_addr_valid+0x1db/0x2d0 [ 18.529435] ? kasan_atomics_helper+0x1079/0x5450 [ 18.529479] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.529510] ? kasan_atomics_helper+0x1079/0x5450 [ 18.529536] kasan_report+0x141/0x180 [ 18.529563] ? kasan_atomics_helper+0x1079/0x5450 [ 18.529594] kasan_check_range+0x10c/0x1c0 [ 18.529622] __kasan_check_write+0x18/0x20 [ 18.529644] kasan_atomics_helper+0x1079/0x5450 [ 18.529672] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.529699] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.529725] ? kasan_atomics+0x152/0x310 [ 18.529755] kasan_atomics+0x1dc/0x310 [ 18.529782] ? __pfx_kasan_atomics+0x10/0x10 [ 18.529810] ? __pfx_read_tsc+0x10/0x10 [ 18.529837] ? ktime_get_ts64+0x86/0x230 [ 18.529867] kunit_try_run_case+0x1a5/0x480 [ 18.529893] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.529916] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.529945] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.529974] ? __kthread_parkme+0x82/0x180 [ 18.529999] ? preempt_count_sub+0x50/0x80 [ 18.530026] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.530051] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.530079] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.530107] kthread+0x337/0x6f0 [ 18.530131] ? trace_preempt_on+0x20/0xc0 [ 18.530159] ? __pfx_kthread+0x10/0x10 [ 18.530184] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.530257] ? calculate_sigpending+0x7b/0xa0 [ 18.530320] ? __pfx_kthread+0x10/0x10 [ 18.530371] ret_from_fork+0x116/0x1d0 [ 18.530413] ? __pfx_kthread+0x10/0x10 [ 18.530476] ret_from_fork_asm+0x1a/0x30 [ 18.530551] </TASK> [ 18.530602] [ 18.546693] Allocated by task 282: [ 18.547361] kasan_save_stack+0x45/0x70 [ 18.547681] kasan_save_track+0x18/0x40 [ 18.548013] kasan_save_alloc_info+0x3b/0x50 [ 18.548726] __kasan_kmalloc+0xb7/0xc0 [ 18.549029] __kmalloc_cache_noprof+0x189/0x420 [ 18.549265] kasan_atomics+0x95/0x310 [ 18.549727] kunit_try_run_case+0x1a5/0x480 [ 18.550243] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.550767] kthread+0x337/0x6f0 [ 18.551022] ret_from_fork+0x116/0x1d0 [ 18.551523] ret_from_fork_asm+0x1a/0x30 [ 18.551807] [ 18.551981] The buggy address belongs to the object at ffff8881033ecb00 [ 18.551981] which belongs to the cache kmalloc-64 of size 64 [ 18.552786] The buggy address is located 0 bytes to the right of [ 18.552786] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.553908] [ 18.554072] The buggy address belongs to the physical page: [ 18.554744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.555243] flags: 0x200000000000000(node=0|zone=2) [ 18.555891] page_type: f5(slab) [ 18.556221] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.556973] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.557542] page dumped because: kasan: bad access detected [ 18.558108] [ 18.558277] Memory state around the buggy address: [ 18.558578] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.559006] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.559854] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.560477] ^ [ 18.561065] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.561851] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.562604] ================================================================== [ 19.594428] ================================================================== [ 19.595004] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 19.595538] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.595917] [ 19.596067] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.596124] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.596140] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.596185] Call Trace: [ 19.596228] <TASK> [ 19.596250] dump_stack_lvl+0x73/0xb0 [ 19.596282] print_report+0xd1/0x650 [ 19.596309] ? __virt_addr_valid+0x1db/0x2d0 [ 19.596356] ? kasan_atomics_helper+0x218a/0x5450 [ 19.596383] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.596410] ? kasan_atomics_helper+0x218a/0x5450 [ 19.596437] kasan_report+0x141/0x180 [ 19.596475] ? kasan_atomics_helper+0x218a/0x5450 [ 19.596526] kasan_check_range+0x10c/0x1c0 [ 19.596559] __kasan_check_write+0x18/0x20 [ 19.596583] kasan_atomics_helper+0x218a/0x5450 [ 19.596610] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.596636] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.596680] ? kasan_atomics+0x152/0x310 [ 19.596713] kasan_atomics+0x1dc/0x310 [ 19.596740] ? __pfx_kasan_atomics+0x10/0x10 [ 19.596769] ? __pfx_read_tsc+0x10/0x10 [ 19.596795] ? ktime_get_ts64+0x86/0x230 [ 19.596825] kunit_try_run_case+0x1a5/0x480 [ 19.596872] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.596895] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.596925] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.596954] ? __kthread_parkme+0x82/0x180 [ 19.596979] ? preempt_count_sub+0x50/0x80 [ 19.597022] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.597057] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.597086] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.597115] kthread+0x337/0x6f0 [ 19.597136] ? trace_preempt_on+0x20/0xc0 [ 19.597163] ? __pfx_kthread+0x10/0x10 [ 19.597205] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.597239] ? calculate_sigpending+0x7b/0xa0 [ 19.597267] ? __pfx_kthread+0x10/0x10 [ 19.597293] ret_from_fork+0x116/0x1d0 [ 19.597316] ? __pfx_kthread+0x10/0x10 [ 19.597340] ret_from_fork_asm+0x1a/0x30 [ 19.597396] </TASK> [ 19.597413] [ 19.605016] Allocated by task 282: [ 19.605284] kasan_save_stack+0x45/0x70 [ 19.605429] kasan_save_track+0x18/0x40 [ 19.605639] kasan_save_alloc_info+0x3b/0x50 [ 19.605791] __kasan_kmalloc+0xb7/0xc0 [ 19.605924] __kmalloc_cache_noprof+0x189/0x420 [ 19.606261] kasan_atomics+0x95/0x310 [ 19.606551] kunit_try_run_case+0x1a5/0x480 [ 19.606662] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.606790] kthread+0x337/0x6f0 [ 19.607057] ret_from_fork+0x116/0x1d0 [ 19.607345] ret_from_fork_asm+0x1a/0x30 [ 19.607639] [ 19.607754] The buggy address belongs to the object at ffff8881033ecb00 [ 19.607754] which belongs to the cache kmalloc-64 of size 64 [ 19.608098] The buggy address is located 0 bytes to the right of [ 19.608098] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.608676] [ 19.608802] The buggy address belongs to the physical page: [ 19.609093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.609411] flags: 0x200000000000000(node=0|zone=2) [ 19.609766] page_type: f5(slab) [ 19.609945] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.610152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.610657] page dumped because: kasan: bad access detected [ 19.611013] [ 19.611145] Memory state around the buggy address: [ 19.611419] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.611790] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.612098] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.612306] ^ [ 19.612607] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.613032] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.613366] ================================================================== [ 19.550634] ================================================================== [ 19.551122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 19.551939] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.552285] [ 19.552443] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.552515] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.552531] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.552558] Call Trace: [ 19.552583] <TASK> [ 19.552609] dump_stack_lvl+0x73/0xb0 [ 19.552645] print_report+0xd1/0x650 [ 19.552672] ? __virt_addr_valid+0x1db/0x2d0 [ 19.552700] ? kasan_atomics_helper+0x20c8/0x5450 [ 19.552756] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.552786] ? kasan_atomics_helper+0x20c8/0x5450 [ 19.552849] kasan_report+0x141/0x180 [ 19.552878] ? kasan_atomics_helper+0x20c8/0x5450 [ 19.552922] kasan_check_range+0x10c/0x1c0 [ 19.552952] __kasan_check_write+0x18/0x20 [ 19.552975] kasan_atomics_helper+0x20c8/0x5450 [ 19.553002] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.553030] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.553056] ? kasan_atomics+0x152/0x310 [ 19.553089] kasan_atomics+0x1dc/0x310 [ 19.553118] ? __pfx_kasan_atomics+0x10/0x10 [ 19.553147] ? __pfx_read_tsc+0x10/0x10 [ 19.553174] ? ktime_get_ts64+0x86/0x230 [ 19.553219] kunit_try_run_case+0x1a5/0x480 [ 19.553251] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.553274] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.553302] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.553331] ? __kthread_parkme+0x82/0x180 [ 19.553356] ? preempt_count_sub+0x50/0x80 [ 19.553385] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.553530] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.553561] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.553588] kthread+0x337/0x6f0 [ 19.553611] ? trace_preempt_on+0x20/0xc0 [ 19.553637] ? __pfx_kthread+0x10/0x10 [ 19.553662] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.553687] ? calculate_sigpending+0x7b/0xa0 [ 19.553714] ? __pfx_kthread+0x10/0x10 [ 19.553740] ret_from_fork+0x116/0x1d0 [ 19.553766] ? __pfx_kthread+0x10/0x10 [ 19.553791] ret_from_fork_asm+0x1a/0x30 [ 19.553828] </TASK> [ 19.553843] [ 19.564142] Allocated by task 282: [ 19.564603] kasan_save_stack+0x45/0x70 [ 19.564951] kasan_save_track+0x18/0x40 [ 19.565155] kasan_save_alloc_info+0x3b/0x50 [ 19.565521] __kasan_kmalloc+0xb7/0xc0 [ 19.565865] __kmalloc_cache_noprof+0x189/0x420 [ 19.566044] kasan_atomics+0x95/0x310 [ 19.566223] kunit_try_run_case+0x1a5/0x480 [ 19.566374] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.566579] kthread+0x337/0x6f0 [ 19.566744] ret_from_fork+0x116/0x1d0 [ 19.566921] ret_from_fork_asm+0x1a/0x30 [ 19.567117] [ 19.567753] The buggy address belongs to the object at ffff8881033ecb00 [ 19.567753] which belongs to the cache kmalloc-64 of size 64 [ 19.568193] The buggy address is located 0 bytes to the right of [ 19.568193] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.568912] [ 19.568998] The buggy address belongs to the physical page: [ 19.569174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.569871] flags: 0x200000000000000(node=0|zone=2) [ 19.570219] page_type: f5(slab) [ 19.570485] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.570739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.571164] page dumped because: kasan: bad access detected [ 19.571419] [ 19.571677] Memory state around the buggy address: [ 19.572044] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.572267] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.572812] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.573436] ^ [ 19.573645] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.574171] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.574495] ================================================================== [ 17.686155] ================================================================== [ 17.686521] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 17.687491] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 17.688528] [ 17.689351] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.689438] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.689472] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.689502] Call Trace: [ 17.689526] <TASK> [ 17.689554] dump_stack_lvl+0x73/0xb0 [ 17.689602] print_report+0xd1/0x650 [ 17.689630] ? __virt_addr_valid+0x1db/0x2d0 [ 17.689658] ? kasan_atomics_helper+0x4b88/0x5450 [ 17.689683] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.689708] ? kasan_atomics_helper+0x4b88/0x5450 [ 17.689733] kasan_report+0x141/0x180 [ 17.689757] ? kasan_atomics_helper+0x4b88/0x5450 [ 17.689787] __asan_report_load4_noabort+0x18/0x20 [ 17.689814] kasan_atomics_helper+0x4b88/0x5450 [ 17.689889] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.689929] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.689970] ? kasan_atomics+0x152/0x310 [ 17.690003] kasan_atomics+0x1dc/0x310 [ 17.690031] ? __pfx_kasan_atomics+0x10/0x10 [ 17.690058] ? __pfx_read_tsc+0x10/0x10 [ 17.690083] ? ktime_get_ts64+0x86/0x230 [ 17.690113] kunit_try_run_case+0x1a5/0x480 [ 17.690138] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.690160] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.690188] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.690231] ? __kthread_parkme+0x82/0x180 [ 17.690257] ? preempt_count_sub+0x50/0x80 [ 17.690284] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.690308] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.690337] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.690366] kthread+0x337/0x6f0 [ 17.690388] ? trace_preempt_on+0x20/0xc0 [ 17.690414] ? __pfx_kthread+0x10/0x10 [ 17.690438] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.690483] ? calculate_sigpending+0x7b/0xa0 [ 17.690514] ? __pfx_kthread+0x10/0x10 [ 17.690539] ret_from_fork+0x116/0x1d0 [ 17.690561] ? __pfx_kthread+0x10/0x10 [ 17.690584] ret_from_fork_asm+0x1a/0x30 [ 17.690620] </TASK> [ 17.690633] [ 17.705909] Allocated by task 282: [ 17.706111] kasan_save_stack+0x45/0x70 [ 17.706312] kasan_save_track+0x18/0x40 [ 17.706487] kasan_save_alloc_info+0x3b/0x50 [ 17.706668] __kasan_kmalloc+0xb7/0xc0 [ 17.706966] __kmalloc_cache_noprof+0x189/0x420 [ 17.707225] kasan_atomics+0x95/0x310 [ 17.707431] kunit_try_run_case+0x1a5/0x480 [ 17.708560] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.709340] kthread+0x337/0x6f0 [ 17.709887] ret_from_fork+0x116/0x1d0 [ 17.710299] ret_from_fork_asm+0x1a/0x30 [ 17.710635] [ 17.710998] The buggy address belongs to the object at ffff8881033ecb00 [ 17.710998] which belongs to the cache kmalloc-64 of size 64 [ 17.712323] The buggy address is located 0 bytes to the right of [ 17.712323] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 17.713023] [ 17.713535] The buggy address belongs to the physical page: [ 17.714019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 17.714673] flags: 0x200000000000000(node=0|zone=2) [ 17.715217] page_type: f5(slab) [ 17.715434] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.716244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.717158] page dumped because: kasan: bad access detected [ 17.717524] [ 17.717747] Memory state around the buggy address: [ 17.718077] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.718596] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.719206] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.719908] ^ [ 17.720092] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.720403] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.720982] ================================================================== [ 19.201168] ================================================================== [ 19.201801] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 19.202581] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.203142] [ 19.203420] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.203538] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.203567] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.203614] Call Trace: [ 19.203659] <TASK> [ 19.203704] dump_stack_lvl+0x73/0xb0 [ 19.203781] print_report+0xd1/0x650 [ 19.203840] ? __virt_addr_valid+0x1db/0x2d0 [ 19.203897] ? kasan_atomics_helper+0x1a7f/0x5450 [ 19.203954] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.204009] ? kasan_atomics_helper+0x1a7f/0x5450 [ 19.204066] kasan_report+0x141/0x180 [ 19.204122] ? kasan_atomics_helper+0x1a7f/0x5450 [ 19.204188] kasan_check_range+0x10c/0x1c0 [ 19.204242] __kasan_check_write+0x18/0x20 [ 19.204294] kasan_atomics_helper+0x1a7f/0x5450 [ 19.204347] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.204395] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.204445] ? kasan_atomics+0x152/0x310 [ 19.204514] kasan_atomics+0x1dc/0x310 [ 19.204561] ? __pfx_kasan_atomics+0x10/0x10 [ 19.204611] ? __pfx_read_tsc+0x10/0x10 [ 19.204659] ? ktime_get_ts64+0x86/0x230 [ 19.204717] kunit_try_run_case+0x1a5/0x480 [ 19.204766] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.204812] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.204870] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.204925] ? __kthread_parkme+0x82/0x180 [ 19.204974] ? preempt_count_sub+0x50/0x80 [ 19.205032] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.205082] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.205146] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.205190] kthread+0x337/0x6f0 [ 19.205253] ? trace_preempt_on+0x20/0xc0 [ 19.205298] ? __pfx_kthread+0x10/0x10 [ 19.205336] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.205379] ? calculate_sigpending+0x7b/0xa0 [ 19.205430] ? __pfx_kthread+0x10/0x10 [ 19.205484] ret_from_fork+0x116/0x1d0 [ 19.205527] ? __pfx_kthread+0x10/0x10 [ 19.205567] ret_from_fork_asm+0x1a/0x30 [ 19.205635] </TASK> [ 19.205663] [ 19.219955] Allocated by task 282: [ 19.220328] kasan_save_stack+0x45/0x70 [ 19.220854] kasan_save_track+0x18/0x40 [ 19.221355] kasan_save_alloc_info+0x3b/0x50 [ 19.221804] __kasan_kmalloc+0xb7/0xc0 [ 19.222214] __kmalloc_cache_noprof+0x189/0x420 [ 19.222553] kasan_atomics+0x95/0x310 [ 19.222673] kunit_try_run_case+0x1a5/0x480 [ 19.222780] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.222901] kthread+0x337/0x6f0 [ 19.222996] ret_from_fork+0x116/0x1d0 [ 19.223091] ret_from_fork_asm+0x1a/0x30 [ 19.223193] [ 19.223392] The buggy address belongs to the object at ffff8881033ecb00 [ 19.223392] which belongs to the cache kmalloc-64 of size 64 [ 19.224472] The buggy address is located 0 bytes to the right of [ 19.224472] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.225539] [ 19.225775] The buggy address belongs to the physical page: [ 19.226283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.226940] flags: 0x200000000000000(node=0|zone=2) [ 19.227156] page_type: f5(slab) [ 19.227935] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.228592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.229526] page dumped because: kasan: bad access detected [ 19.229859] [ 19.229997] Memory state around the buggy address: [ 19.230610] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.231059] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.231416] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.231898] ^ [ 19.232296] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.232621] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.233494] ================================================================== [ 17.834581] ================================================================== [ 17.835104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 17.835930] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 17.836367] [ 17.836638] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.836990] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.837030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.837079] Call Trace: [ 17.837130] <TASK> [ 17.837190] dump_stack_lvl+0x73/0xb0 [ 17.837295] print_report+0xd1/0x650 [ 17.837343] ? __virt_addr_valid+0x1db/0x2d0 [ 17.837395] ? kasan_atomics_helper+0x4a0/0x5450 [ 17.837474] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.837528] ? kasan_atomics_helper+0x4a0/0x5450 [ 17.837589] kasan_report+0x141/0x180 [ 17.837634] ? kasan_atomics_helper+0x4a0/0x5450 [ 17.837694] kasan_check_range+0x10c/0x1c0 [ 17.837759] __kasan_check_write+0x18/0x20 [ 17.837807] kasan_atomics_helper+0x4a0/0x5450 [ 17.837863] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.837918] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.837973] ? kasan_atomics+0x152/0x310 [ 17.838014] kasan_atomics+0x1dc/0x310 [ 17.838043] ? __pfx_kasan_atomics+0x10/0x10 [ 17.838072] ? __pfx_read_tsc+0x10/0x10 [ 17.838100] ? ktime_get_ts64+0x86/0x230 [ 17.838132] kunit_try_run_case+0x1a5/0x480 [ 17.838159] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.838182] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.838223] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.838260] ? __kthread_parkme+0x82/0x180 [ 17.838286] ? preempt_count_sub+0x50/0x80 [ 17.838314] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.838338] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.838368] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.838397] kthread+0x337/0x6f0 [ 17.838421] ? trace_preempt_on+0x20/0xc0 [ 17.838450] ? __pfx_kthread+0x10/0x10 [ 17.838508] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.838548] ? calculate_sigpending+0x7b/0xa0 [ 17.838591] ? __pfx_kthread+0x10/0x10 [ 17.838628] ret_from_fork+0x116/0x1d0 [ 17.838661] ? __pfx_kthread+0x10/0x10 [ 17.838696] ret_from_fork_asm+0x1a/0x30 [ 17.838744] </TASK> [ 17.838767] [ 17.853604] Allocated by task 282: [ 17.853944] kasan_save_stack+0x45/0x70 [ 17.854629] kasan_save_track+0x18/0x40 [ 17.855570] kasan_save_alloc_info+0x3b/0x50 [ 17.856058] __kasan_kmalloc+0xb7/0xc0 [ 17.856492] __kmalloc_cache_noprof+0x189/0x420 [ 17.856982] kasan_atomics+0x95/0x310 [ 17.857263] kunit_try_run_case+0x1a5/0x480 [ 17.857652] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.858268] kthread+0x337/0x6f0 [ 17.858589] ret_from_fork+0x116/0x1d0 [ 17.858925] ret_from_fork_asm+0x1a/0x30 [ 17.859914] [ 17.860057] The buggy address belongs to the object at ffff8881033ecb00 [ 17.860057] which belongs to the cache kmalloc-64 of size 64 [ 17.860815] The buggy address is located 0 bytes to the right of [ 17.860815] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 17.862620] [ 17.863440] The buggy address belongs to the physical page: [ 17.864031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 17.864622] flags: 0x200000000000000(node=0|zone=2) [ 17.865243] page_type: f5(slab) [ 17.865526] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.866022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.866726] page dumped because: kasan: bad access detected [ 17.867418] [ 17.867648] Memory state around the buggy address: [ 17.868359] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.868746] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.869314] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.869949] ^ [ 17.870405] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.870925] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.871578] ================================================================== [ 19.380959] ================================================================== [ 19.381712] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 19.381993] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.382274] [ 19.382398] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.383308] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.383365] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.383417] Call Trace: [ 19.383478] <TASK> [ 19.383522] dump_stack_lvl+0x73/0xb0 [ 19.383601] print_report+0xd1/0x650 [ 19.383661] ? __virt_addr_valid+0x1db/0x2d0 [ 19.383714] ? kasan_atomics_helper+0x1e12/0x5450 [ 19.383786] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.383848] ? kasan_atomics_helper+0x1e12/0x5450 [ 19.383906] kasan_report+0x141/0x180 [ 19.383965] ? kasan_atomics_helper+0x1e12/0x5450 [ 19.384033] kasan_check_range+0x10c/0x1c0 [ 19.384094] __kasan_check_write+0x18/0x20 [ 19.384139] kasan_atomics_helper+0x1e12/0x5450 [ 19.384191] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.384235] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.384279] ? kasan_atomics+0x152/0x310 [ 19.384336] kasan_atomics+0x1dc/0x310 [ 19.384386] ? __pfx_kasan_atomics+0x10/0x10 [ 19.384443] ? __pfx_read_tsc+0x10/0x10 [ 19.384506] ? ktime_get_ts64+0x86/0x230 [ 19.384569] kunit_try_run_case+0x1a5/0x480 [ 19.384628] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.384679] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.384740] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.384799] ? __kthread_parkme+0x82/0x180 [ 19.384850] ? preempt_count_sub+0x50/0x80 [ 19.384923] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.384968] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.385018] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.385076] kthread+0x337/0x6f0 [ 19.385126] ? trace_preempt_on+0x20/0xc0 [ 19.385182] ? __pfx_kthread+0x10/0x10 [ 19.385228] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.385282] ? calculate_sigpending+0x7b/0xa0 [ 19.385339] ? __pfx_kthread+0x10/0x10 [ 19.385393] ret_from_fork+0x116/0x1d0 [ 19.385438] ? __pfx_kthread+0x10/0x10 [ 19.385501] ret_from_fork_asm+0x1a/0x30 [ 19.385579] </TASK> [ 19.385608] [ 19.395919] Allocated by task 282: [ 19.396177] kasan_save_stack+0x45/0x70 [ 19.396464] kasan_save_track+0x18/0x40 [ 19.396840] kasan_save_alloc_info+0x3b/0x50 [ 19.397330] __kasan_kmalloc+0xb7/0xc0 [ 19.397727] __kmalloc_cache_noprof+0x189/0x420 [ 19.398132] kasan_atomics+0x95/0x310 [ 19.398549] kunit_try_run_case+0x1a5/0x480 [ 19.398958] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.399481] kthread+0x337/0x6f0 [ 19.399845] ret_from_fork+0x116/0x1d0 [ 19.400246] ret_from_fork_asm+0x1a/0x30 [ 19.400653] [ 19.400846] The buggy address belongs to the object at ffff8881033ecb00 [ 19.400846] which belongs to the cache kmalloc-64 of size 64 [ 19.401479] The buggy address is located 0 bytes to the right of [ 19.401479] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.401932] [ 19.402061] The buggy address belongs to the physical page: [ 19.402318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.402922] flags: 0x200000000000000(node=0|zone=2) [ 19.403462] page_type: f5(slab) [ 19.403862] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.404525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.405096] page dumped because: kasan: bad access detected [ 19.405534] [ 19.405655] Memory state around the buggy address: [ 19.405882] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.406171] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.406641] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.407294] ^ [ 19.407749] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.408373] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.408951] ================================================================== [ 17.762034] ================================================================== [ 17.762958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 17.763970] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 17.764717] [ 17.764864] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.764957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.764981] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.765020] Call Trace: [ 17.765061] <TASK> [ 17.765100] dump_stack_lvl+0x73/0xb0 [ 17.765153] print_report+0xd1/0x650 [ 17.765249] ? __virt_addr_valid+0x1db/0x2d0 [ 17.765334] ? kasan_atomics_helper+0x3df/0x5450 [ 17.765384] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.765469] ? kasan_atomics_helper+0x3df/0x5450 [ 17.765525] kasan_report+0x141/0x180 [ 17.765581] ? kasan_atomics_helper+0x3df/0x5450 [ 17.765638] kasan_check_range+0x10c/0x1c0 [ 17.765688] __kasan_check_read+0x15/0x20 [ 17.765968] kasan_atomics_helper+0x3df/0x5450 [ 17.766143] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.766209] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.766258] ? kasan_atomics+0x152/0x310 [ 17.766323] kasan_atomics+0x1dc/0x310 [ 17.766382] ? __pfx_kasan_atomics+0x10/0x10 [ 17.766441] ? __pfx_read_tsc+0x10/0x10 [ 17.766516] ? ktime_get_ts64+0x86/0x230 [ 17.766552] kunit_try_run_case+0x1a5/0x480 [ 17.766581] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.766605] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.766638] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.766667] ? __kthread_parkme+0x82/0x180 [ 17.766700] ? preempt_count_sub+0x50/0x80 [ 17.766747] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.766772] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.766802] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.766832] kthread+0x337/0x6f0 [ 17.766857] ? trace_preempt_on+0x20/0xc0 [ 17.766885] ? __pfx_kthread+0x10/0x10 [ 17.766909] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.766936] ? calculate_sigpending+0x7b/0xa0 [ 17.766965] ? __pfx_kthread+0x10/0x10 [ 17.766990] ret_from_fork+0x116/0x1d0 [ 17.767013] ? __pfx_kthread+0x10/0x10 [ 17.767038] ret_from_fork_asm+0x1a/0x30 [ 17.767075] </TASK> [ 17.767090] [ 17.778020] Allocated by task 282: [ 17.778440] kasan_save_stack+0x45/0x70 [ 17.778954] kasan_save_track+0x18/0x40 [ 17.779312] kasan_save_alloc_info+0x3b/0x50 [ 17.779560] __kasan_kmalloc+0xb7/0xc0 [ 17.779768] __kmalloc_cache_noprof+0x189/0x420 [ 17.779991] kasan_atomics+0x95/0x310 [ 17.780228] kunit_try_run_case+0x1a5/0x480 [ 17.780445] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.780914] kthread+0x337/0x6f0 [ 17.781208] ret_from_fork+0x116/0x1d0 [ 17.781536] ret_from_fork_asm+0x1a/0x30 [ 17.781877] [ 17.782369] The buggy address belongs to the object at ffff8881033ecb00 [ 17.782369] which belongs to the cache kmalloc-64 of size 64 [ 17.783444] The buggy address is located 0 bytes to the right of [ 17.783444] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 17.784133] [ 17.784268] The buggy address belongs to the physical page: [ 17.784521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 17.785105] flags: 0x200000000000000(node=0|zone=2) [ 17.785757] page_type: f5(slab) [ 17.786057] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.786760] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.787444] page dumped because: kasan: bad access detected [ 17.787913] [ 17.788102] Memory state around the buggy address: [ 17.788608] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.789307] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.789841] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.790483] ^ [ 17.790682] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.790931] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.791600] ================================================================== [ 18.054375] ================================================================== [ 18.054936] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 18.055544] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.056029] [ 18.056296] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.056410] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.056443] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.056503] Call Trace: [ 18.056549] <TASK> [ 18.056589] dump_stack_lvl+0x73/0xb0 [ 18.056660] print_report+0xd1/0x650 [ 18.056716] ? __virt_addr_valid+0x1db/0x2d0 [ 18.056769] ? kasan_atomics_helper+0x7c7/0x5450 [ 18.056820] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.056868] ? kasan_atomics_helper+0x7c7/0x5450 [ 18.056916] kasan_report+0x141/0x180 [ 18.056964] ? kasan_atomics_helper+0x7c7/0x5450 [ 18.057024] kasan_check_range+0x10c/0x1c0 [ 18.057080] __kasan_check_write+0x18/0x20 [ 18.057129] kasan_atomics_helper+0x7c7/0x5450 [ 18.057184] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.057280] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.057336] ? kasan_atomics+0x152/0x310 [ 18.057402] kasan_atomics+0x1dc/0x310 [ 18.057467] ? __pfx_kasan_atomics+0x10/0x10 [ 18.057525] ? __pfx_read_tsc+0x10/0x10 [ 18.057572] ? ktime_get_ts64+0x86/0x230 [ 18.057628] kunit_try_run_case+0x1a5/0x480 [ 18.057679] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.057726] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.057789] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.057848] ? __kthread_parkme+0x82/0x180 [ 18.057900] ? preempt_count_sub+0x50/0x80 [ 18.057959] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.058012] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.058061] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.058116] kthread+0x337/0x6f0 [ 18.058164] ? trace_preempt_on+0x20/0xc0 [ 18.058256] ? __pfx_kthread+0x10/0x10 [ 18.058301] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.058348] ? calculate_sigpending+0x7b/0xa0 [ 18.058398] ? __pfx_kthread+0x10/0x10 [ 18.058438] ret_from_fork+0x116/0x1d0 [ 18.058490] ? __pfx_kthread+0x10/0x10 [ 18.058534] ret_from_fork_asm+0x1a/0x30 [ 18.058597] </TASK> [ 18.058624] [ 18.069559] Allocated by task 282: [ 18.069917] kasan_save_stack+0x45/0x70 [ 18.070226] kasan_save_track+0x18/0x40 [ 18.070510] kasan_save_alloc_info+0x3b/0x50 [ 18.070812] __kasan_kmalloc+0xb7/0xc0 [ 18.071077] __kmalloc_cache_noprof+0x189/0x420 [ 18.071330] kasan_atomics+0x95/0x310 [ 18.071621] kunit_try_run_case+0x1a5/0x480 [ 18.071993] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.072462] kthread+0x337/0x6f0 [ 18.072751] ret_from_fork+0x116/0x1d0 [ 18.073071] ret_from_fork_asm+0x1a/0x30 [ 18.073322] [ 18.073512] The buggy address belongs to the object at ffff8881033ecb00 [ 18.073512] which belongs to the cache kmalloc-64 of size 64 [ 18.074084] The buggy address is located 0 bytes to the right of [ 18.074084] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.074748] [ 18.074877] The buggy address belongs to the physical page: [ 18.075094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.075444] flags: 0x200000000000000(node=0|zone=2) [ 18.075686] page_type: f5(slab) [ 18.075864] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.076144] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.076444] page dumped because: kasan: bad access detected [ 18.076878] [ 18.077066] Memory state around the buggy address: [ 18.077490] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.078006] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.078589] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.079095] ^ [ 18.079527] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.080070] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.080630] ================================================================== [ 18.797056] ================================================================== [ 18.798303] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 18.798991] Read of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.799733] [ 18.799918] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.800037] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.800073] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.800164] Call Trace: [ 18.800229] <TASK> [ 18.800303] dump_stack_lvl+0x73/0xb0 [ 18.800397] print_report+0xd1/0x650 [ 18.800465] ? __virt_addr_valid+0x1db/0x2d0 [ 18.800523] ? kasan_atomics_helper+0x13b5/0x5450 [ 18.800575] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.800661] ? kasan_atomics_helper+0x13b5/0x5450 [ 18.800736] kasan_report+0x141/0x180 [ 18.800794] ? kasan_atomics_helper+0x13b5/0x5450 [ 18.800856] kasan_check_range+0x10c/0x1c0 [ 18.800914] __kasan_check_read+0x15/0x20 [ 18.800995] kasan_atomics_helper+0x13b5/0x5450 [ 18.801064] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.801120] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.801163] ? kasan_atomics+0x152/0x310 [ 18.801204] kasan_atomics+0x1dc/0x310 [ 18.801273] ? __pfx_kasan_atomics+0x10/0x10 [ 18.801303] ? __pfx_read_tsc+0x10/0x10 [ 18.801331] ? ktime_get_ts64+0x86/0x230 [ 18.801363] kunit_try_run_case+0x1a5/0x480 [ 18.801390] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.801413] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.801444] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.801498] ? __kthread_parkme+0x82/0x180 [ 18.801524] ? preempt_count_sub+0x50/0x80 [ 18.801552] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.801577] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.801608] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.801636] kthread+0x337/0x6f0 [ 18.801660] ? trace_preempt_on+0x20/0xc0 [ 18.801687] ? __pfx_kthread+0x10/0x10 [ 18.801711] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.801736] ? calculate_sigpending+0x7b/0xa0 [ 18.801765] ? __pfx_kthread+0x10/0x10 [ 18.801788] ret_from_fork+0x116/0x1d0 [ 18.801810] ? __pfx_kthread+0x10/0x10 [ 18.801835] ret_from_fork_asm+0x1a/0x30 [ 18.801871] </TASK> [ 18.801886] [ 18.816589] Allocated by task 282: [ 18.816927] kasan_save_stack+0x45/0x70 [ 18.817939] kasan_save_track+0x18/0x40 [ 18.818205] kasan_save_alloc_info+0x3b/0x50 [ 18.818893] __kasan_kmalloc+0xb7/0xc0 [ 18.819090] __kmalloc_cache_noprof+0x189/0x420 [ 18.819750] kasan_atomics+0x95/0x310 [ 18.820041] kunit_try_run_case+0x1a5/0x480 [ 18.820539] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.820839] kthread+0x337/0x6f0 [ 18.821352] ret_from_fork+0x116/0x1d0 [ 18.821601] ret_from_fork_asm+0x1a/0x30 [ 18.821915] [ 18.822048] The buggy address belongs to the object at ffff8881033ecb00 [ 18.822048] which belongs to the cache kmalloc-64 of size 64 [ 18.823256] The buggy address is located 0 bytes to the right of [ 18.823256] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.823782] [ 18.824290] The buggy address belongs to the physical page: [ 18.824811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.825330] flags: 0x200000000000000(node=0|zone=2) [ 18.825859] page_type: f5(slab) [ 18.826091] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.826726] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.827084] page dumped because: kasan: bad access detected [ 18.827581] [ 18.828048] Memory state around the buggy address: [ 18.828332] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.829115] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.829635] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.829988] ^ [ 18.830700] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.831082] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.831850] ================================================================== [ 19.575176] ================================================================== [ 19.575910] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 19.576398] Read of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.576711] [ 19.576868] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.576932] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.576948] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.576977] Call Trace: [ 19.577004] <TASK> [ 19.577030] dump_stack_lvl+0x73/0xb0 [ 19.577067] print_report+0xd1/0x650 [ 19.577095] ? __virt_addr_valid+0x1db/0x2d0 [ 19.577124] ? kasan_atomics_helper+0x4fb2/0x5450 [ 19.577150] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.577178] ? kasan_atomics_helper+0x4fb2/0x5450 [ 19.577252] kasan_report+0x141/0x180 [ 19.577298] ? kasan_atomics_helper+0x4fb2/0x5450 [ 19.577346] __asan_report_load8_noabort+0x18/0x20 [ 19.577371] kasan_atomics_helper+0x4fb2/0x5450 [ 19.577399] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.577427] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.577462] ? kasan_atomics+0x152/0x310 [ 19.577500] kasan_atomics+0x1dc/0x310 [ 19.577529] ? __pfx_kasan_atomics+0x10/0x10 [ 19.577559] ? __pfx_read_tsc+0x10/0x10 [ 19.577586] ? ktime_get_ts64+0x86/0x230 [ 19.577616] kunit_try_run_case+0x1a5/0x480 [ 19.577644] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.577668] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.577698] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.577729] ? __kthread_parkme+0x82/0x180 [ 19.577755] ? preempt_count_sub+0x50/0x80 [ 19.577784] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.577809] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.577839] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.577868] kthread+0x337/0x6f0 [ 19.577892] ? trace_preempt_on+0x20/0xc0 [ 19.577919] ? __pfx_kthread+0x10/0x10 [ 19.577946] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.577973] ? calculate_sigpending+0x7b/0xa0 [ 19.578003] ? __pfx_kthread+0x10/0x10 [ 19.578030] ret_from_fork+0x116/0x1d0 [ 19.578053] ? __pfx_kthread+0x10/0x10 [ 19.578077] ret_from_fork_asm+0x1a/0x30 [ 19.578116] </TASK> [ 19.578130] [ 19.585582] Allocated by task 282: [ 19.585821] kasan_save_stack+0x45/0x70 [ 19.585936] kasan_save_track+0x18/0x40 [ 19.586037] kasan_save_alloc_info+0x3b/0x50 [ 19.586142] __kasan_kmalloc+0xb7/0xc0 [ 19.586330] __kmalloc_cache_noprof+0x189/0x420 [ 19.586508] kasan_atomics+0x95/0x310 [ 19.586656] kunit_try_run_case+0x1a5/0x480 [ 19.586799] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.586965] kthread+0x337/0x6f0 [ 19.587080] ret_from_fork+0x116/0x1d0 [ 19.587372] ret_from_fork_asm+0x1a/0x30 [ 19.587678] [ 19.587817] The buggy address belongs to the object at ffff8881033ecb00 [ 19.587817] which belongs to the cache kmalloc-64 of size 64 [ 19.588557] The buggy address is located 0 bytes to the right of [ 19.588557] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.589088] [ 19.589156] The buggy address belongs to the physical page: [ 19.589304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.589484] flags: 0x200000000000000(node=0|zone=2) [ 19.589823] page_type: f5(slab) [ 19.590030] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.590526] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.590995] page dumped because: kasan: bad access detected [ 19.591236] [ 19.591369] Memory state around the buggy address: [ 19.591501] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.591651] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.591795] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.592271] ^ [ 19.592613] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.593072] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.593377] ================================================================== [ 19.636035] ================================================================== [ 19.636611] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 19.637140] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.637477] [ 19.637638] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.637839] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.637888] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.637919] Call Trace: [ 19.637949] <TASK> [ 19.637977] dump_stack_lvl+0x73/0xb0 [ 19.638033] print_report+0xd1/0x650 [ 19.638063] ? __virt_addr_valid+0x1db/0x2d0 [ 19.638093] ? kasan_atomics_helper+0x224c/0x5450 [ 19.638121] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.638149] ? kasan_atomics_helper+0x224c/0x5450 [ 19.638176] kasan_report+0x141/0x180 [ 19.638218] ? kasan_atomics_helper+0x224c/0x5450 [ 19.638252] kasan_check_range+0x10c/0x1c0 [ 19.638281] __kasan_check_write+0x18/0x20 [ 19.638306] kasan_atomics_helper+0x224c/0x5450 [ 19.638333] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.638361] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.638387] ? kasan_atomics+0x152/0x310 [ 19.638420] kasan_atomics+0x1dc/0x310 [ 19.638448] ? __pfx_kasan_atomics+0x10/0x10 [ 19.638500] ? __pfx_read_tsc+0x10/0x10 [ 19.638529] ? ktime_get_ts64+0x86/0x230 [ 19.638560] kunit_try_run_case+0x1a5/0x480 [ 19.638589] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.638614] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.638645] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.638677] ? __kthread_parkme+0x82/0x180 [ 19.638705] ? preempt_count_sub+0x50/0x80 [ 19.638735] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.638762] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.638793] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.638826] kthread+0x337/0x6f0 [ 19.638853] ? trace_preempt_on+0x20/0xc0 [ 19.638883] ? __pfx_kthread+0x10/0x10 [ 19.638910] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.638940] ? calculate_sigpending+0x7b/0xa0 [ 19.638974] ? __pfx_kthread+0x10/0x10 [ 19.639003] ret_from_fork+0x116/0x1d0 [ 19.639029] ? __pfx_kthread+0x10/0x10 [ 19.639057] ret_from_fork_asm+0x1a/0x30 [ 19.639098] </TASK> [ 19.639114] [ 19.647954] Allocated by task 282: [ 19.648254] kasan_save_stack+0x45/0x70 [ 19.648514] kasan_save_track+0x18/0x40 [ 19.648667] kasan_save_alloc_info+0x3b/0x50 [ 19.648814] __kasan_kmalloc+0xb7/0xc0 [ 19.648953] __kmalloc_cache_noprof+0x189/0x420 [ 19.649289] kasan_atomics+0x95/0x310 [ 19.649591] kunit_try_run_case+0x1a5/0x480 [ 19.649918] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.650338] kthread+0x337/0x6f0 [ 19.650609] ret_from_fork+0x116/0x1d0 [ 19.650869] ret_from_fork_asm+0x1a/0x30 [ 19.651146] [ 19.651335] The buggy address belongs to the object at ffff8881033ecb00 [ 19.651335] which belongs to the cache kmalloc-64 of size 64 [ 19.651843] The buggy address is located 0 bytes to the right of [ 19.651843] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.652402] [ 19.652515] The buggy address belongs to the physical page: [ 19.653370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.653610] flags: 0x200000000000000(node=0|zone=2) [ 19.653749] page_type: f5(slab) [ 19.653889] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.654436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.655482] page dumped because: kasan: bad access detected [ 19.655871] [ 19.655985] Memory state around the buggy address: [ 19.656234] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.656562] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.656727] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.657148] ^ [ 19.657502] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.657843] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.658234] ================================================================== [ 18.267042] ================================================================== [ 18.267520] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 18.268284] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.269073] [ 18.269649] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.269725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.269743] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.269772] Call Trace: [ 18.269798] <TASK> [ 18.269828] dump_stack_lvl+0x73/0xb0 [ 18.269873] print_report+0xd1/0x650 [ 18.269901] ? __virt_addr_valid+0x1db/0x2d0 [ 18.269930] ? kasan_atomics_helper+0xc70/0x5450 [ 18.269955] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.269982] ? kasan_atomics_helper+0xc70/0x5450 [ 18.270007] kasan_report+0x141/0x180 [ 18.270032] ? kasan_atomics_helper+0xc70/0x5450 [ 18.270063] kasan_check_range+0x10c/0x1c0 [ 18.270089] __kasan_check_write+0x18/0x20 [ 18.270111] kasan_atomics_helper+0xc70/0x5450 [ 18.270135] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.270159] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.270184] ? kasan_atomics+0x152/0x310 [ 18.270246] kasan_atomics+0x1dc/0x310 [ 18.270277] ? __pfx_kasan_atomics+0x10/0x10 [ 18.270306] ? __pfx_read_tsc+0x10/0x10 [ 18.270332] ? ktime_get_ts64+0x86/0x230 [ 18.270360] kunit_try_run_case+0x1a5/0x480 [ 18.270386] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.270408] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.270437] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.270486] ? __kthread_parkme+0x82/0x180 [ 18.270514] ? preempt_count_sub+0x50/0x80 [ 18.270545] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.270568] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.270598] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.270626] kthread+0x337/0x6f0 [ 18.270650] ? trace_preempt_on+0x20/0xc0 [ 18.270677] ? __pfx_kthread+0x10/0x10 [ 18.270701] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.270726] ? calculate_sigpending+0x7b/0xa0 [ 18.270756] ? __pfx_kthread+0x10/0x10 [ 18.270780] ret_from_fork+0x116/0x1d0 [ 18.270803] ? __pfx_kthread+0x10/0x10 [ 18.270826] ret_from_fork_asm+0x1a/0x30 [ 18.270861] </TASK> [ 18.270875] [ 18.284791] Allocated by task 282: [ 18.285035] kasan_save_stack+0x45/0x70 [ 18.285320] kasan_save_track+0x18/0x40 [ 18.286009] kasan_save_alloc_info+0x3b/0x50 [ 18.286192] __kasan_kmalloc+0xb7/0xc0 [ 18.286772] __kmalloc_cache_noprof+0x189/0x420 [ 18.287225] kasan_atomics+0x95/0x310 [ 18.287618] kunit_try_run_case+0x1a5/0x480 [ 18.288032] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.288858] kthread+0x337/0x6f0 [ 18.289104] ret_from_fork+0x116/0x1d0 [ 18.289296] ret_from_fork_asm+0x1a/0x30 [ 18.289797] [ 18.290006] The buggy address belongs to the object at ffff8881033ecb00 [ 18.290006] which belongs to the cache kmalloc-64 of size 64 [ 18.291179] The buggy address is located 0 bytes to the right of [ 18.291179] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.291784] [ 18.292165] The buggy address belongs to the physical page: [ 18.292533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.293066] flags: 0x200000000000000(node=0|zone=2) [ 18.293477] page_type: f5(slab) [ 18.293833] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.294239] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.294724] page dumped because: kasan: bad access detected [ 18.295133] [ 18.295267] Memory state around the buggy address: [ 18.295528] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.296106] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.296470] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.297017] ^ [ 18.297428] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.297742] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.298300] ================================================================== [ 18.563835] ================================================================== [ 18.564830] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 18.565440] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.565761] [ 18.565972] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.566078] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.566110] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.566163] Call Trace: [ 18.566206] <TASK> [ 18.566537] dump_stack_lvl+0x73/0xb0 [ 18.566627] print_report+0xd1/0x650 [ 18.566687] ? __virt_addr_valid+0x1db/0x2d0 [ 18.566747] ? kasan_atomics_helper+0x4a1c/0x5450 [ 18.566788] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.566817] ? kasan_atomics_helper+0x4a1c/0x5450 [ 18.566845] kasan_report+0x141/0x180 [ 18.566871] ? kasan_atomics_helper+0x4a1c/0x5450 [ 18.566902] __asan_report_load4_noabort+0x18/0x20 [ 18.566926] kasan_atomics_helper+0x4a1c/0x5450 [ 18.566953] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.566980] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.567006] ? kasan_atomics+0x152/0x310 [ 18.567037] kasan_atomics+0x1dc/0x310 [ 18.567065] ? __pfx_kasan_atomics+0x10/0x10 [ 18.567093] ? __pfx_read_tsc+0x10/0x10 [ 18.567119] ? ktime_get_ts64+0x86/0x230 [ 18.567147] kunit_try_run_case+0x1a5/0x480 [ 18.567174] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.567219] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.567259] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.567291] ? __kthread_parkme+0x82/0x180 [ 18.567316] ? preempt_count_sub+0x50/0x80 [ 18.567385] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.567416] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.567447] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.567498] kthread+0x337/0x6f0 [ 18.567523] ? trace_preempt_on+0x20/0xc0 [ 18.567552] ? __pfx_kthread+0x10/0x10 [ 18.567577] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.567604] ? calculate_sigpending+0x7b/0xa0 [ 18.567633] ? __pfx_kthread+0x10/0x10 [ 18.567659] ret_from_fork+0x116/0x1d0 [ 18.567682] ? __pfx_kthread+0x10/0x10 [ 18.567706] ret_from_fork_asm+0x1a/0x30 [ 18.567744] </TASK> [ 18.567759] [ 18.581790] Allocated by task 282: [ 18.582574] kasan_save_stack+0x45/0x70 [ 18.582903] kasan_save_track+0x18/0x40 [ 18.583190] kasan_save_alloc_info+0x3b/0x50 [ 18.583799] __kasan_kmalloc+0xb7/0xc0 [ 18.584067] __kmalloc_cache_noprof+0x189/0x420 [ 18.584703] kasan_atomics+0x95/0x310 [ 18.584958] kunit_try_run_case+0x1a5/0x480 [ 18.585152] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.585736] kthread+0x337/0x6f0 [ 18.585959] ret_from_fork+0x116/0x1d0 [ 18.586174] ret_from_fork_asm+0x1a/0x30 [ 18.587107] [ 18.587239] The buggy address belongs to the object at ffff8881033ecb00 [ 18.587239] which belongs to the cache kmalloc-64 of size 64 [ 18.588450] The buggy address is located 0 bytes to the right of [ 18.588450] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.589551] [ 18.589809] The buggy address belongs to the physical page: [ 18.590033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.590672] flags: 0x200000000000000(node=0|zone=2) [ 18.591286] page_type: f5(slab) [ 18.591842] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.592299] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.592898] page dumped because: kasan: bad access detected [ 18.593225] [ 18.593817] Memory state around the buggy address: [ 18.594128] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.594695] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.595173] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.595970] ^ [ 18.596478] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.596875] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.597525] ================================================================== [ 17.913775] ================================================================== [ 17.914856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 17.916402] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 17.917849] [ 17.918036] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.918145] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.918177] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.918224] Call Trace: [ 17.918268] <TASK> [ 17.918310] dump_stack_lvl+0x73/0xb0 [ 17.918386] print_report+0xd1/0x650 [ 17.918435] ? __virt_addr_valid+0x1db/0x2d0 [ 17.918498] ? kasan_atomics_helper+0x565/0x5450 [ 17.918571] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.918618] ? kasan_atomics_helper+0x565/0x5450 [ 17.918667] kasan_report+0x141/0x180 [ 17.918716] ? kasan_atomics_helper+0x565/0x5450 [ 17.918773] kasan_check_range+0x10c/0x1c0 [ 17.918825] __kasan_check_write+0x18/0x20 [ 17.918868] kasan_atomics_helper+0x565/0x5450 [ 17.918917] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.918965] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.919005] ? kasan_atomics+0x152/0x310 [ 17.919053] kasan_atomics+0x1dc/0x310 [ 17.919095] ? __pfx_kasan_atomics+0x10/0x10 [ 17.919139] ? __pfx_read_tsc+0x10/0x10 [ 17.919194] ? ktime_get_ts64+0x86/0x230 [ 17.919241] kunit_try_run_case+0x1a5/0x480 [ 17.919284] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.919324] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.919385] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.919430] ? __kthread_parkme+0x82/0x180 [ 17.921094] ? preempt_count_sub+0x50/0x80 [ 17.921177] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.921265] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.921323] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.921371] kthread+0x337/0x6f0 [ 17.921412] ? trace_preempt_on+0x20/0xc0 [ 17.921478] ? __pfx_kthread+0x10/0x10 [ 17.921521] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.921568] ? calculate_sigpending+0x7b/0xa0 [ 17.921618] ? __pfx_kthread+0x10/0x10 [ 17.921662] ret_from_fork+0x116/0x1d0 [ 17.921949] ? __pfx_kthread+0x10/0x10 [ 17.922005] ret_from_fork_asm+0x1a/0x30 [ 17.922072] </TASK> [ 17.922098] [ 17.941360] Allocated by task 282: [ 17.942813] kasan_save_stack+0x45/0x70 [ 17.943053] kasan_save_track+0x18/0x40 [ 17.943196] kasan_save_alloc_info+0x3b/0x50 [ 17.943865] __kasan_kmalloc+0xb7/0xc0 [ 17.944544] __kmalloc_cache_noprof+0x189/0x420 [ 17.944758] kasan_atomics+0x95/0x310 [ 17.945452] kunit_try_run_case+0x1a5/0x480 [ 17.945969] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.946423] kthread+0x337/0x6f0 [ 17.946616] ret_from_fork+0x116/0x1d0 [ 17.946919] ret_from_fork_asm+0x1a/0x30 [ 17.947273] [ 17.947412] The buggy address belongs to the object at ffff8881033ecb00 [ 17.947412] which belongs to the cache kmalloc-64 of size 64 [ 17.948533] The buggy address is located 0 bytes to the right of [ 17.948533] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 17.949023] [ 17.949240] The buggy address belongs to the physical page: [ 17.949850] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 17.950523] flags: 0x200000000000000(node=0|zone=2) [ 17.950971] page_type: f5(slab) [ 17.952285] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.952683] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.953306] page dumped because: kasan: bad access detected [ 17.953926] [ 17.954101] Memory state around the buggy address: [ 17.954518] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.955734] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.956258] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.956909] ^ [ 17.957545] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.958169] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.958730] ================================================================== [ 17.996533] ================================================================== [ 17.997207] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 17.997844] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 17.998617] [ 17.998865] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.998965] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.998990] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.999031] Call Trace: [ 17.999071] <TASK> [ 17.999112] dump_stack_lvl+0x73/0xb0 [ 17.999175] print_report+0xd1/0x650 [ 17.999253] ? __virt_addr_valid+0x1db/0x2d0 [ 17.999295] ? kasan_atomics_helper+0x697/0x5450 [ 17.999332] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.999385] ? kasan_atomics_helper+0x697/0x5450 [ 17.999428] kasan_report+0x141/0x180 [ 17.999491] ? kasan_atomics_helper+0x697/0x5450 [ 17.999545] kasan_check_range+0x10c/0x1c0 [ 17.999596] __kasan_check_write+0x18/0x20 [ 17.999643] kasan_atomics_helper+0x697/0x5450 [ 17.999724] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.999784] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.999834] ? kasan_atomics+0x152/0x310 [ 17.999899] kasan_atomics+0x1dc/0x310 [ 17.999963] ? __pfx_kasan_atomics+0x10/0x10 [ 18.000019] ? __pfx_read_tsc+0x10/0x10 [ 18.000073] ? ktime_get_ts64+0x86/0x230 [ 18.000137] kunit_try_run_case+0x1a5/0x480 [ 18.000222] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.000275] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.000332] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.000379] ? __kthread_parkme+0x82/0x180 [ 18.000424] ? preempt_count_sub+0x50/0x80 [ 18.000490] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.000549] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.000622] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.000677] kthread+0x337/0x6f0 [ 18.000725] ? trace_preempt_on+0x20/0xc0 [ 18.000774] ? __pfx_kthread+0x10/0x10 [ 18.000834] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.000903] ? calculate_sigpending+0x7b/0xa0 [ 18.000955] ? __pfx_kthread+0x10/0x10 [ 18.000994] ret_from_fork+0x116/0x1d0 [ 18.001030] ? __pfx_kthread+0x10/0x10 [ 18.001054] ret_from_fork_asm+0x1a/0x30 [ 18.001091] </TASK> [ 18.001107] [ 18.012114] Allocated by task 282: [ 18.012568] kasan_save_stack+0x45/0x70 [ 18.013115] kasan_save_track+0x18/0x40 [ 18.013555] kasan_save_alloc_info+0x3b/0x50 [ 18.013980] __kasan_kmalloc+0xb7/0xc0 [ 18.014332] __kmalloc_cache_noprof+0x189/0x420 [ 18.014789] kasan_atomics+0x95/0x310 [ 18.015270] kunit_try_run_case+0x1a5/0x480 [ 18.015837] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.016410] kthread+0x337/0x6f0 [ 18.016816] ret_from_fork+0x116/0x1d0 [ 18.017237] ret_from_fork_asm+0x1a/0x30 [ 18.017535] [ 18.017735] The buggy address belongs to the object at ffff8881033ecb00 [ 18.017735] which belongs to the cache kmalloc-64 of size 64 [ 18.018687] The buggy address is located 0 bytes to the right of [ 18.018687] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.019716] [ 18.019874] The buggy address belongs to the physical page: [ 18.020308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.020780] flags: 0x200000000000000(node=0|zone=2) [ 18.021265] page_type: f5(slab) [ 18.021510] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.022013] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.022506] page dumped because: kasan: bad access detected [ 18.022892] [ 18.023084] Memory state around the buggy address: [ 18.023573] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.024131] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.024741] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.025080] ^ [ 18.025531] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.025990] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.026544] ================================================================== [ 18.171675] ================================================================== [ 18.172504] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 18.173092] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.173470] [ 18.173637] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.173744] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.173776] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.173829] Call Trace: [ 18.173877] <TASK> [ 18.173921] dump_stack_lvl+0x73/0xb0 [ 18.173959] print_report+0xd1/0x650 [ 18.173987] ? __virt_addr_valid+0x1db/0x2d0 [ 18.174015] ? kasan_atomics_helper+0xa2b/0x5450 [ 18.174045] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.174089] ? kasan_atomics_helper+0xa2b/0x5450 [ 18.174131] kasan_report+0x141/0x180 [ 18.174175] ? kasan_atomics_helper+0xa2b/0x5450 [ 18.174232] kasan_check_range+0x10c/0x1c0 [ 18.174288] __kasan_check_write+0x18/0x20 [ 18.174335] kasan_atomics_helper+0xa2b/0x5450 [ 18.174390] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.174443] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.174565] ? kasan_atomics+0x152/0x310 [ 18.174621] kasan_atomics+0x1dc/0x310 [ 18.174669] ? __pfx_kasan_atomics+0x10/0x10 [ 18.174723] ? __pfx_read_tsc+0x10/0x10 [ 18.174775] ? ktime_get_ts64+0x86/0x230 [ 18.174837] kunit_try_run_case+0x1a5/0x480 [ 18.174890] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.174938] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.175000] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.175060] ? __kthread_parkme+0x82/0x180 [ 18.175114] ? preempt_count_sub+0x50/0x80 [ 18.175175] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.175274] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.175365] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.175427] kthread+0x337/0x6f0 [ 18.175480] ? trace_preempt_on+0x20/0xc0 [ 18.175537] ? __pfx_kthread+0x10/0x10 [ 18.175590] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.175648] ? calculate_sigpending+0x7b/0xa0 [ 18.175711] ? __pfx_kthread+0x10/0x10 [ 18.175766] ret_from_fork+0x116/0x1d0 [ 18.175815] ? __pfx_kthread+0x10/0x10 [ 18.175867] ret_from_fork_asm+0x1a/0x30 [ 18.175947] </TASK> [ 18.175978] [ 18.189363] Allocated by task 282: [ 18.189751] kasan_save_stack+0x45/0x70 [ 18.190142] kasan_save_track+0x18/0x40 [ 18.190515] kasan_save_alloc_info+0x3b/0x50 [ 18.190859] __kasan_kmalloc+0xb7/0xc0 [ 18.191215] __kmalloc_cache_noprof+0x189/0x420 [ 18.191544] kasan_atomics+0x95/0x310 [ 18.191732] kunit_try_run_case+0x1a5/0x480 [ 18.191912] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.192116] kthread+0x337/0x6f0 [ 18.192396] ret_from_fork+0x116/0x1d0 [ 18.192632] ret_from_fork_asm+0x1a/0x30 [ 18.192937] [ 18.193104] The buggy address belongs to the object at ffff8881033ecb00 [ 18.193104] which belongs to the cache kmalloc-64 of size 64 [ 18.193886] The buggy address is located 0 bytes to the right of [ 18.193886] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.194350] [ 18.194480] The buggy address belongs to the physical page: [ 18.194709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.195044] flags: 0x200000000000000(node=0|zone=2) [ 18.195528] page_type: f5(slab) [ 18.195727] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.196032] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.196367] page dumped because: kasan: bad access detected [ 18.196777] [ 18.196994] Memory state around the buggy address: [ 18.197506] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.198059] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.198742] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.199041] ^ [ 18.199308] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.199645] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.200034] ================================================================== [ 18.729234] ================================================================== [ 18.731298] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 18.732347] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.733014] [ 18.733247] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.733563] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.733612] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.733666] Call Trace: [ 18.733725] <TASK> [ 18.733763] dump_stack_lvl+0x73/0xb0 [ 18.733816] print_report+0xd1/0x650 [ 18.733845] ? __virt_addr_valid+0x1db/0x2d0 [ 18.733874] ? kasan_atomics_helper+0x12e6/0x5450 [ 18.733900] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.733926] ? kasan_atomics_helper+0x12e6/0x5450 [ 18.733952] kasan_report+0x141/0x180 [ 18.733977] ? kasan_atomics_helper+0x12e6/0x5450 [ 18.734007] kasan_check_range+0x10c/0x1c0 [ 18.734035] __kasan_check_write+0x18/0x20 [ 18.734057] kasan_atomics_helper+0x12e6/0x5450 [ 18.734084] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.734110] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.734135] ? kasan_atomics+0x152/0x310 [ 18.734166] kasan_atomics+0x1dc/0x310 [ 18.734194] ? __pfx_kasan_atomics+0x10/0x10 [ 18.734252] ? __pfx_read_tsc+0x10/0x10 [ 18.734280] ? ktime_get_ts64+0x86/0x230 [ 18.734309] kunit_try_run_case+0x1a5/0x480 [ 18.734337] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.734360] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.734389] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.734416] ? __kthread_parkme+0x82/0x180 [ 18.734440] ? preempt_count_sub+0x50/0x80 [ 18.734491] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.734520] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.734549] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.734578] kthread+0x337/0x6f0 [ 18.734601] ? trace_preempt_on+0x20/0xc0 [ 18.734629] ? __pfx_kthread+0x10/0x10 [ 18.734654] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.734680] ? calculate_sigpending+0x7b/0xa0 [ 18.734708] ? __pfx_kthread+0x10/0x10 [ 18.734732] ret_from_fork+0x116/0x1d0 [ 18.734754] ? __pfx_kthread+0x10/0x10 [ 18.734779] ret_from_fork_asm+0x1a/0x30 [ 18.734815] </TASK> [ 18.734829] [ 18.747718] Allocated by task 282: [ 18.747953] kasan_save_stack+0x45/0x70 [ 18.748161] kasan_save_track+0x18/0x40 [ 18.748964] kasan_save_alloc_info+0x3b/0x50 [ 18.749675] __kasan_kmalloc+0xb7/0xc0 [ 18.750186] __kmalloc_cache_noprof+0x189/0x420 [ 18.750789] kasan_atomics+0x95/0x310 [ 18.751116] kunit_try_run_case+0x1a5/0x480 [ 18.751426] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.751906] kthread+0x337/0x6f0 [ 18.752118] ret_from_fork+0x116/0x1d0 [ 18.752637] ret_from_fork_asm+0x1a/0x30 [ 18.752882] [ 18.753004] The buggy address belongs to the object at ffff8881033ecb00 [ 18.753004] which belongs to the cache kmalloc-64 of size 64 [ 18.754099] The buggy address is located 0 bytes to the right of [ 18.754099] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.754594] [ 18.755220] The buggy address belongs to the physical page: [ 18.755674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.756221] flags: 0x200000000000000(node=0|zone=2) [ 18.756563] page_type: f5(slab) [ 18.756850] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.757336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.757844] page dumped because: kasan: bad access detected [ 18.758105] [ 18.758231] Memory state around the buggy address: [ 18.758644] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.759387] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.759899] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.760978] ^ [ 18.761652] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.762015] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.762625] ================================================================== [ 18.925261] ================================================================== [ 18.925940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 18.926637] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.927097] [ 18.927471] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.927594] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.927626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.927675] Call Trace: [ 18.927723] <TASK> [ 18.927771] dump_stack_lvl+0x73/0xb0 [ 18.927831] print_report+0xd1/0x650 [ 18.927861] ? __virt_addr_valid+0x1db/0x2d0 [ 18.927889] ? kasan_atomics_helper+0x151d/0x5450 [ 18.927915] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.927944] ? kasan_atomics_helper+0x151d/0x5450 [ 18.927984] kasan_report+0x141/0x180 [ 18.928031] ? kasan_atomics_helper+0x151d/0x5450 [ 18.928091] kasan_check_range+0x10c/0x1c0 [ 18.928146] __kasan_check_write+0x18/0x20 [ 18.928205] kasan_atomics_helper+0x151d/0x5450 [ 18.928250] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.928277] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.928303] ? kasan_atomics+0x152/0x310 [ 18.928334] kasan_atomics+0x1dc/0x310 [ 18.928361] ? __pfx_kasan_atomics+0x10/0x10 [ 18.928389] ? __pfx_read_tsc+0x10/0x10 [ 18.928416] ? ktime_get_ts64+0x86/0x230 [ 18.928444] kunit_try_run_case+0x1a5/0x480 [ 18.928500] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.928535] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.928565] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.928593] ? __kthread_parkme+0x82/0x180 [ 18.928619] ? preempt_count_sub+0x50/0x80 [ 18.928647] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.928672] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.928700] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.928731] kthread+0x337/0x6f0 [ 18.928753] ? trace_preempt_on+0x20/0xc0 [ 18.928779] ? __pfx_kthread+0x10/0x10 [ 18.928803] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.928829] ? calculate_sigpending+0x7b/0xa0 [ 18.928858] ? __pfx_kthread+0x10/0x10 [ 18.928883] ret_from_fork+0x116/0x1d0 [ 18.928906] ? __pfx_kthread+0x10/0x10 [ 18.928929] ret_from_fork_asm+0x1a/0x30 [ 18.928966] </TASK> [ 18.928981] [ 18.940302] Allocated by task 282: [ 18.940635] kasan_save_stack+0x45/0x70 [ 18.941038] kasan_save_track+0x18/0x40 [ 18.941427] kasan_save_alloc_info+0x3b/0x50 [ 18.941774] __kasan_kmalloc+0xb7/0xc0 [ 18.942051] __kmalloc_cache_noprof+0x189/0x420 [ 18.942256] kasan_atomics+0x95/0x310 [ 18.942433] kunit_try_run_case+0x1a5/0x480 [ 18.942638] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.943018] kthread+0x337/0x6f0 [ 18.943387] ret_from_fork+0x116/0x1d0 [ 18.943745] ret_from_fork_asm+0x1a/0x30 [ 18.944081] [ 18.944246] The buggy address belongs to the object at ffff8881033ecb00 [ 18.944246] which belongs to the cache kmalloc-64 of size 64 [ 18.945486] The buggy address is located 0 bytes to the right of [ 18.945486] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.945948] [ 18.946120] The buggy address belongs to the physical page: [ 18.946676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.947336] flags: 0x200000000000000(node=0|zone=2) [ 18.947631] page_type: f5(slab) [ 18.947837] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.948147] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.948736] page dumped because: kasan: bad access detected [ 18.949190] [ 18.949415] Memory state around the buggy address: [ 18.949815] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.950339] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.950628] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.950906] ^ [ 18.951126] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.951674] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.952227] ================================================================== [ 19.143484] ================================================================== [ 19.145286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 19.146099] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.146852] [ 19.147082] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.147201] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.147247] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.147299] Call Trace: [ 19.147380] <TASK> [ 19.147424] dump_stack_lvl+0x73/0xb0 [ 19.147511] print_report+0xd1/0x650 [ 19.147566] ? __virt_addr_valid+0x1db/0x2d0 [ 19.147624] ? kasan_atomics_helper+0x194a/0x5450 [ 19.147682] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.147740] ? kasan_atomics_helper+0x194a/0x5450 [ 19.147794] kasan_report+0x141/0x180 [ 19.147849] ? kasan_atomics_helper+0x194a/0x5450 [ 19.147917] kasan_check_range+0x10c/0x1c0 [ 19.147977] __kasan_check_write+0x18/0x20 [ 19.148030] kasan_atomics_helper+0x194a/0x5450 [ 19.148087] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.148145] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.148199] ? kasan_atomics+0x152/0x310 [ 19.148263] kasan_atomics+0x1dc/0x310 [ 19.148321] ? __pfx_kasan_atomics+0x10/0x10 [ 19.148380] ? __pfx_read_tsc+0x10/0x10 [ 19.148435] ? ktime_get_ts64+0x86/0x230 [ 19.148502] kunit_try_run_case+0x1a5/0x480 [ 19.148572] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.148615] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.148672] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.148744] ? __kthread_parkme+0x82/0x180 [ 19.148808] ? preempt_count_sub+0x50/0x80 [ 19.148866] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.148944] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.148998] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.149052] kthread+0x337/0x6f0 [ 19.149097] ? trace_preempt_on+0x20/0xc0 [ 19.149167] ? __pfx_kthread+0x10/0x10 [ 19.149230] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.149296] ? calculate_sigpending+0x7b/0xa0 [ 19.149345] ? __pfx_kthread+0x10/0x10 [ 19.149389] ret_from_fork+0x116/0x1d0 [ 19.149434] ? __pfx_kthread+0x10/0x10 [ 19.149495] ret_from_fork_asm+0x1a/0x30 [ 19.149570] </TASK> [ 19.149600] [ 19.163225] Allocated by task 282: [ 19.163604] kasan_save_stack+0x45/0x70 [ 19.163885] kasan_save_track+0x18/0x40 [ 19.164086] kasan_save_alloc_info+0x3b/0x50 [ 19.164710] __kasan_kmalloc+0xb7/0xc0 [ 19.165276] __kmalloc_cache_noprof+0x189/0x420 [ 19.165488] kasan_atomics+0x95/0x310 [ 19.165717] kunit_try_run_case+0x1a5/0x480 [ 19.165908] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.166106] kthread+0x337/0x6f0 [ 19.166245] ret_from_fork+0x116/0x1d0 [ 19.166421] ret_from_fork_asm+0x1a/0x30 [ 19.166633] [ 19.166740] The buggy address belongs to the object at ffff8881033ecb00 [ 19.166740] which belongs to the cache kmalloc-64 of size 64 [ 19.167136] The buggy address is located 0 bytes to the right of [ 19.167136] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.168056] [ 19.168193] The buggy address belongs to the physical page: [ 19.168421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.168703] flags: 0x200000000000000(node=0|zone=2) [ 19.169103] page_type: f5(slab) [ 19.169342] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.169676] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.170240] page dumped because: kasan: bad access detected [ 19.170697] [ 19.170850] Memory state around the buggy address: [ 19.171189] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.171819] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.172112] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.172963] ^ [ 19.173410] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.173743] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.174134] ================================================================== [ 19.352951] ================================================================== [ 19.354129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 19.354771] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.355044] [ 19.355169] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.355258] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.355277] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.355307] Call Trace: [ 19.355334] <TASK> [ 19.355372] dump_stack_lvl+0x73/0xb0 [ 19.355410] print_report+0xd1/0x650 [ 19.355438] ? __virt_addr_valid+0x1db/0x2d0 [ 19.355522] ? kasan_atomics_helper+0x1d7a/0x5450 [ 19.355571] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.355615] ? kasan_atomics_helper+0x1d7a/0x5450 [ 19.355663] kasan_report+0x141/0x180 [ 19.355715] ? kasan_atomics_helper+0x1d7a/0x5450 [ 19.356071] kasan_check_range+0x10c/0x1c0 [ 19.356565] __kasan_check_write+0x18/0x20 [ 19.356633] kasan_atomics_helper+0x1d7a/0x5450 [ 19.356691] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.356748] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.356802] ? kasan_atomics+0x152/0x310 [ 19.356867] kasan_atomics+0x1dc/0x310 [ 19.356923] ? __pfx_kasan_atomics+0x10/0x10 [ 19.356986] ? __pfx_read_tsc+0x10/0x10 [ 19.357040] ? ktime_get_ts64+0x86/0x230 [ 19.357104] kunit_try_run_case+0x1a5/0x480 [ 19.357158] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.357200] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.357251] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.357294] ? __kthread_parkme+0x82/0x180 [ 19.357333] ? preempt_count_sub+0x50/0x80 [ 19.357385] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.357431] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.357509] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.357562] kthread+0x337/0x6f0 [ 19.357611] ? trace_preempt_on+0x20/0xc0 [ 19.357664] ? __pfx_kthread+0x10/0x10 [ 19.357713] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.357761] ? calculate_sigpending+0x7b/0xa0 [ 19.357821] ? __pfx_kthread+0x10/0x10 [ 19.357874] ret_from_fork+0x116/0x1d0 [ 19.357919] ? __pfx_kthread+0x10/0x10 [ 19.357964] ret_from_fork_asm+0x1a/0x30 [ 19.358026] </TASK> [ 19.358053] [ 19.368002] Allocated by task 282: [ 19.368393] kasan_save_stack+0x45/0x70 [ 19.368818] kasan_save_track+0x18/0x40 [ 19.369138] kasan_save_alloc_info+0x3b/0x50 [ 19.369433] __kasan_kmalloc+0xb7/0xc0 [ 19.369707] __kmalloc_cache_noprof+0x189/0x420 [ 19.369920] kasan_atomics+0x95/0x310 [ 19.370119] kunit_try_run_case+0x1a5/0x480 [ 19.370369] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.370809] kthread+0x337/0x6f0 [ 19.371136] ret_from_fork+0x116/0x1d0 [ 19.371526] ret_from_fork_asm+0x1a/0x30 [ 19.371880] [ 19.372066] The buggy address belongs to the object at ffff8881033ecb00 [ 19.372066] which belongs to the cache kmalloc-64 of size 64 [ 19.372879] The buggy address is located 0 bytes to the right of [ 19.372879] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.373365] [ 19.373506] The buggy address belongs to the physical page: [ 19.373940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.374569] flags: 0x200000000000000(node=0|zone=2) [ 19.374969] page_type: f5(slab) [ 19.375292] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.375860] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.376281] page dumped because: kasan: bad access detected [ 19.376635] [ 19.376760] Memory state around the buggy address: [ 19.376981] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.377307] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.377610] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.378063] ^ [ 19.378484] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.379026] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.379543] ================================================================== [ 18.299679] ================================================================== [ 18.300373] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 18.300846] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.301525] [ 18.301736] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.301847] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.301904] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.301955] Call Trace: [ 18.302006] <TASK> [ 18.302052] dump_stack_lvl+0x73/0xb0 [ 18.302126] print_report+0xd1/0x650 [ 18.302180] ? __virt_addr_valid+0x1db/0x2d0 [ 18.302257] ? kasan_atomics_helper+0x4a84/0x5450 [ 18.302307] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.302359] ? kasan_atomics_helper+0x4a84/0x5450 [ 18.302435] kasan_report+0x141/0x180 [ 18.302502] ? kasan_atomics_helper+0x4a84/0x5450 [ 18.302586] __asan_report_load4_noabort+0x18/0x20 [ 18.302637] kasan_atomics_helper+0x4a84/0x5450 [ 18.302693] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.302745] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.302817] ? kasan_atomics+0x152/0x310 [ 18.302881] kasan_atomics+0x1dc/0x310 [ 18.302936] ? __pfx_kasan_atomics+0x10/0x10 [ 18.302993] ? __pfx_read_tsc+0x10/0x10 [ 18.303041] ? ktime_get_ts64+0x86/0x230 [ 18.303125] kunit_try_run_case+0x1a5/0x480 [ 18.303179] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.303223] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.303274] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.303334] ? __kthread_parkme+0x82/0x180 [ 18.303396] ? preempt_count_sub+0x50/0x80 [ 18.303462] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.303512] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.303603] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.303659] kthread+0x337/0x6f0 [ 18.303708] ? trace_preempt_on+0x20/0xc0 [ 18.303766] ? __pfx_kthread+0x10/0x10 [ 18.303818] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.303869] ? calculate_sigpending+0x7b/0xa0 [ 18.303901] ? __pfx_kthread+0x10/0x10 [ 18.303927] ret_from_fork+0x116/0x1d0 [ 18.303950] ? __pfx_kthread+0x10/0x10 [ 18.303975] ret_from_fork_asm+0x1a/0x30 [ 18.304013] </TASK> [ 18.304027] [ 18.315525] Allocated by task 282: [ 18.315787] kasan_save_stack+0x45/0x70 [ 18.316036] kasan_save_track+0x18/0x40 [ 18.316917] kasan_save_alloc_info+0x3b/0x50 [ 18.317712] __kasan_kmalloc+0xb7/0xc0 [ 18.318178] __kmalloc_cache_noprof+0x189/0x420 [ 18.318774] kasan_atomics+0x95/0x310 [ 18.319003] kunit_try_run_case+0x1a5/0x480 [ 18.319623] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.319933] kthread+0x337/0x6f0 [ 18.320152] ret_from_fork+0x116/0x1d0 [ 18.320798] ret_from_fork_asm+0x1a/0x30 [ 18.321449] [ 18.321718] The buggy address belongs to the object at ffff8881033ecb00 [ 18.321718] which belongs to the cache kmalloc-64 of size 64 [ 18.322262] The buggy address is located 0 bytes to the right of [ 18.322262] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.322960] [ 18.323150] The buggy address belongs to the physical page: [ 18.323663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.324248] flags: 0x200000000000000(node=0|zone=2) [ 18.324649] page_type: f5(slab) [ 18.324852] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.325558] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.325998] page dumped because: kasan: bad access detected [ 18.326531] [ 18.326721] Memory state around the buggy address: [ 18.327064] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.327374] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.327955] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.328641] ^ [ 18.328910] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.329291] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.329675] ================================================================== [ 18.598846] ================================================================== [ 18.600335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 18.600806] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.601197] [ 18.601440] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.601570] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.601604] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.601682] Call Trace: [ 18.601730] <TASK> [ 18.601776] dump_stack_lvl+0x73/0xb0 [ 18.601865] print_report+0xd1/0x650 [ 18.601919] ? __virt_addr_valid+0x1db/0x2d0 [ 18.601974] ? kasan_atomics_helper+0x1148/0x5450 [ 18.602022] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.602078] ? kasan_atomics_helper+0x1148/0x5450 [ 18.602125] kasan_report+0x141/0x180 [ 18.602176] ? kasan_atomics_helper+0x1148/0x5450 [ 18.602493] kasan_check_range+0x10c/0x1c0 [ 18.602580] __kasan_check_write+0x18/0x20 [ 18.602632] kasan_atomics_helper+0x1148/0x5450 [ 18.602663] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.602691] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.602716] ? kasan_atomics+0x152/0x310 [ 18.602749] kasan_atomics+0x1dc/0x310 [ 18.602776] ? __pfx_kasan_atomics+0x10/0x10 [ 18.602804] ? __pfx_read_tsc+0x10/0x10 [ 18.602830] ? ktime_get_ts64+0x86/0x230 [ 18.602859] kunit_try_run_case+0x1a5/0x480 [ 18.602885] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.602907] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.602936] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.602965] ? __kthread_parkme+0x82/0x180 [ 18.602990] ? preempt_count_sub+0x50/0x80 [ 18.603018] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.603043] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.603071] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.603100] kthread+0x337/0x6f0 [ 18.603123] ? trace_preempt_on+0x20/0xc0 [ 18.603150] ? __pfx_kthread+0x10/0x10 [ 18.603175] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.603209] ? calculate_sigpending+0x7b/0xa0 [ 18.603269] ? __pfx_kthread+0x10/0x10 [ 18.603296] ret_from_fork+0x116/0x1d0 [ 18.603319] ? __pfx_kthread+0x10/0x10 [ 18.603354] ret_from_fork_asm+0x1a/0x30 [ 18.603398] </TASK> [ 18.603414] [ 18.615401] Allocated by task 282: [ 18.615880] kasan_save_stack+0x45/0x70 [ 18.616577] kasan_save_track+0x18/0x40 [ 18.616808] kasan_save_alloc_info+0x3b/0x50 [ 18.617159] __kasan_kmalloc+0xb7/0xc0 [ 18.617783] __kmalloc_cache_noprof+0x189/0x420 [ 18.618058] kasan_atomics+0x95/0x310 [ 18.618687] kunit_try_run_case+0x1a5/0x480 [ 18.618968] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.619199] kthread+0x337/0x6f0 [ 18.619847] ret_from_fork+0x116/0x1d0 [ 18.620069] ret_from_fork_asm+0x1a/0x30 [ 18.620529] [ 18.620663] The buggy address belongs to the object at ffff8881033ecb00 [ 18.620663] which belongs to the cache kmalloc-64 of size 64 [ 18.621125] The buggy address is located 0 bytes to the right of [ 18.621125] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.621964] [ 18.622103] The buggy address belongs to the physical page: [ 18.622442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.622997] flags: 0x200000000000000(node=0|zone=2) [ 18.623489] page_type: f5(slab) [ 18.623712] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.624101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.624703] page dumped because: kasan: bad access detected [ 18.625141] [ 18.625338] Memory state around the buggy address: [ 18.625576] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.626078] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.626506] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.627043] ^ [ 18.627358] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.627658] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.628217] ================================================================== [ 17.792436] ================================================================== [ 17.793420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 17.794344] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 17.795828] [ 17.796024] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.796140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.796172] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.796391] Call Trace: [ 17.796445] <TASK> [ 17.796499] dump_stack_lvl+0x73/0xb0 [ 17.796574] print_report+0xd1/0x650 [ 17.796619] ? __virt_addr_valid+0x1db/0x2d0 [ 17.796669] ? kasan_atomics_helper+0x4b54/0x5450 [ 17.797130] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.797279] ? kasan_atomics_helper+0x4b54/0x5450 [ 17.797344] kasan_report+0x141/0x180 [ 17.797404] ? kasan_atomics_helper+0x4b54/0x5450 [ 17.797480] __asan_report_load4_noabort+0x18/0x20 [ 17.797538] kasan_atomics_helper+0x4b54/0x5450 [ 17.797597] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.797656] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.797866] ? kasan_atomics+0x152/0x310 [ 17.797936] kasan_atomics+0x1dc/0x310 [ 17.797996] ? __pfx_kasan_atomics+0x10/0x10 [ 17.798055] ? __pfx_read_tsc+0x10/0x10 [ 17.798108] ? ktime_get_ts64+0x86/0x230 [ 17.798172] kunit_try_run_case+0x1a5/0x480 [ 17.798255] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.798309] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.798365] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.798425] ? __kthread_parkme+0x82/0x180 [ 17.798489] ? preempt_count_sub+0x50/0x80 [ 17.798550] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.798604] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.798666] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.799433] kthread+0x337/0x6f0 [ 17.799545] ? trace_preempt_on+0x20/0xc0 [ 17.799617] ? __pfx_kthread+0x10/0x10 [ 17.799668] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.799892] ? calculate_sigpending+0x7b/0xa0 [ 17.799957] ? __pfx_kthread+0x10/0x10 [ 17.800015] ret_from_fork+0x116/0x1d0 [ 17.800065] ? __pfx_kthread+0x10/0x10 [ 17.800105] ret_from_fork_asm+0x1a/0x30 [ 17.800145] </TASK> [ 17.800161] [ 17.815264] Allocated by task 282: [ 17.815722] kasan_save_stack+0x45/0x70 [ 17.816386] kasan_save_track+0x18/0x40 [ 17.816828] kasan_save_alloc_info+0x3b/0x50 [ 17.817112] __kasan_kmalloc+0xb7/0xc0 [ 17.817559] __kmalloc_cache_noprof+0x189/0x420 [ 17.818046] kasan_atomics+0x95/0x310 [ 17.818608] kunit_try_run_case+0x1a5/0x480 [ 17.819018] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.819717] kthread+0x337/0x6f0 [ 17.820397] ret_from_fork+0x116/0x1d0 [ 17.821049] ret_from_fork_asm+0x1a/0x30 [ 17.821288] [ 17.821451] The buggy address belongs to the object at ffff8881033ecb00 [ 17.821451] which belongs to the cache kmalloc-64 of size 64 [ 17.822792] The buggy address is located 0 bytes to the right of [ 17.822792] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 17.823387] [ 17.823657] The buggy address belongs to the physical page: [ 17.824096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 17.824733] flags: 0x200000000000000(node=0|zone=2) [ 17.825787] page_type: f5(slab) [ 17.826034] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.826918] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.827513] page dumped because: kasan: bad access detected [ 17.828021] [ 17.828253] Memory state around the buggy address: [ 17.828828] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.829812] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.830507] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.831020] ^ [ 17.831608] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.832080] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.832908] ================================================================== [ 17.640602] ================================================================== [ 17.641382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 17.642065] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 17.643110] [ 17.643840] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.643967] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.643999] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.644045] Call Trace: [ 17.644086] <TASK> [ 17.644113] dump_stack_lvl+0x73/0xb0 [ 17.644159] print_report+0xd1/0x650 [ 17.644187] ? __virt_addr_valid+0x1db/0x2d0 [ 17.644254] ? kasan_atomics_helper+0x4ba2/0x5450 [ 17.644293] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.644329] ? kasan_atomics_helper+0x4ba2/0x5450 [ 17.644363] kasan_report+0x141/0x180 [ 17.644402] ? kasan_atomics_helper+0x4ba2/0x5450 [ 17.644448] __asan_report_store4_noabort+0x1b/0x30 [ 17.644500] kasan_atomics_helper+0x4ba2/0x5450 [ 17.644537] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.644573] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.644613] ? kasan_atomics+0x152/0x310 [ 17.644661] kasan_atomics+0x1dc/0x310 [ 17.644698] ? __pfx_kasan_atomics+0x10/0x10 [ 17.644741] ? __pfx_read_tsc+0x10/0x10 [ 17.644780] ? ktime_get_ts64+0x86/0x230 [ 17.644827] kunit_try_run_case+0x1a5/0x480 [ 17.644861] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.644884] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.644914] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.644942] ? __kthread_parkme+0x82/0x180 [ 17.644967] ? preempt_count_sub+0x50/0x80 [ 17.644995] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.645019] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.645047] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.645075] kthread+0x337/0x6f0 [ 17.645097] ? trace_preempt_on+0x20/0xc0 [ 17.645124] ? __pfx_kthread+0x10/0x10 [ 17.645148] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.645174] ? calculate_sigpending+0x7b/0xa0 [ 17.645210] ? __pfx_kthread+0x10/0x10 [ 17.645242] ret_from_fork+0x116/0x1d0 [ 17.645263] ? __pfx_kthread+0x10/0x10 [ 17.645286] ret_from_fork_asm+0x1a/0x30 [ 17.645320] </TASK> [ 17.645335] [ 17.665235] Allocated by task 282: [ 17.665666] kasan_save_stack+0x45/0x70 [ 17.666566] kasan_save_track+0x18/0x40 [ 17.666866] kasan_save_alloc_info+0x3b/0x50 [ 17.667274] __kasan_kmalloc+0xb7/0xc0 [ 17.667519] __kmalloc_cache_noprof+0x189/0x420 [ 17.668315] kasan_atomics+0x95/0x310 [ 17.668652] kunit_try_run_case+0x1a5/0x480 [ 17.669585] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.670241] kthread+0x337/0x6f0 [ 17.670887] ret_from_fork+0x116/0x1d0 [ 17.671177] ret_from_fork_asm+0x1a/0x30 [ 17.671431] [ 17.671898] The buggy address belongs to the object at ffff8881033ecb00 [ 17.671898] which belongs to the cache kmalloc-64 of size 64 [ 17.672610] The buggy address is located 0 bytes to the right of [ 17.672610] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 17.674307] [ 17.674565] The buggy address belongs to the physical page: [ 17.674895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 17.675671] flags: 0x200000000000000(node=0|zone=2) [ 17.675940] page_type: f5(slab) [ 17.676149] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.677273] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.677729] page dumped because: kasan: bad access detected [ 17.678271] [ 17.678655] Memory state around the buggy address: [ 17.679504] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.680523] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.681042] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.681672] ^ [ 17.682469] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.683321] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.684092] ================================================================== [ 19.269506] ================================================================== [ 19.269949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 19.270636] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.271198] [ 19.271442] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.271643] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.271673] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.271728] Call Trace: [ 19.271777] <TASK> [ 19.271825] dump_stack_lvl+0x73/0xb0 [ 19.271898] print_report+0xd1/0x650 [ 19.271959] ? __virt_addr_valid+0x1db/0x2d0 [ 19.272020] ? kasan_atomics_helper+0x1c18/0x5450 [ 19.272071] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.272108] ? kasan_atomics_helper+0x1c18/0x5450 [ 19.272133] kasan_report+0x141/0x180 [ 19.272160] ? kasan_atomics_helper+0x1c18/0x5450 [ 19.272206] kasan_check_range+0x10c/0x1c0 [ 19.272286] __kasan_check_write+0x18/0x20 [ 19.272336] kasan_atomics_helper+0x1c18/0x5450 [ 19.272392] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.272480] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.272534] ? kasan_atomics+0x152/0x310 [ 19.272609] kasan_atomics+0x1dc/0x310 [ 19.272657] ? __pfx_kasan_atomics+0x10/0x10 [ 19.272705] ? __pfx_read_tsc+0x10/0x10 [ 19.272751] ? ktime_get_ts64+0x86/0x230 [ 19.272812] kunit_try_run_case+0x1a5/0x480 [ 19.272866] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.272915] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.272956] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.272984] ? __kthread_parkme+0x82/0x180 [ 19.273011] ? preempt_count_sub+0x50/0x80 [ 19.273110] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.273159] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.273216] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.273256] kthread+0x337/0x6f0 [ 19.273319] ? trace_preempt_on+0x20/0xc0 [ 19.273349] ? __pfx_kthread+0x10/0x10 [ 19.273375] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.273402] ? calculate_sigpending+0x7b/0xa0 [ 19.273430] ? __pfx_kthread+0x10/0x10 [ 19.273473] ret_from_fork+0x116/0x1d0 [ 19.273501] ? __pfx_kthread+0x10/0x10 [ 19.273524] ret_from_fork_asm+0x1a/0x30 [ 19.273563] </TASK> [ 19.273577] [ 19.284331] Allocated by task 282: [ 19.284609] kasan_save_stack+0x45/0x70 [ 19.285009] kasan_save_track+0x18/0x40 [ 19.285400] kasan_save_alloc_info+0x3b/0x50 [ 19.285789] __kasan_kmalloc+0xb7/0xc0 [ 19.286135] __kmalloc_cache_noprof+0x189/0x420 [ 19.286533] kasan_atomics+0x95/0x310 [ 19.286735] kunit_try_run_case+0x1a5/0x480 [ 19.286961] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.287407] kthread+0x337/0x6f0 [ 19.287765] ret_from_fork+0x116/0x1d0 [ 19.288114] ret_from_fork_asm+0x1a/0x30 [ 19.288504] [ 19.288636] The buggy address belongs to the object at ffff8881033ecb00 [ 19.288636] which belongs to the cache kmalloc-64 of size 64 [ 19.289071] The buggy address is located 0 bytes to the right of [ 19.289071] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.290044] [ 19.290278] The buggy address belongs to the physical page: [ 19.290741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.291322] flags: 0x200000000000000(node=0|zone=2) [ 19.291598] page_type: f5(slab) [ 19.291945] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.292582] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.293005] page dumped because: kasan: bad access detected [ 19.293268] [ 19.293393] Memory state around the buggy address: [ 19.293847] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.294448] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.294991] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.295513] ^ [ 19.295776] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.296073] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.296688] ================================================================== [ 18.863422] ================================================================== [ 18.864038] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 18.864377] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.865069] [ 18.865357] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.865492] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.865526] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.865574] Call Trace: [ 18.865620] <TASK> [ 18.865664] dump_stack_lvl+0x73/0xb0 [ 18.865740] print_report+0xd1/0x650 [ 18.865797] ? __virt_addr_valid+0x1db/0x2d0 [ 18.865858] ? kasan_atomics_helper+0x1467/0x5450 [ 18.865907] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.865968] ? kasan_atomics_helper+0x1467/0x5450 [ 18.866037] kasan_report+0x141/0x180 [ 18.866092] ? kasan_atomics_helper+0x1467/0x5450 [ 18.866160] kasan_check_range+0x10c/0x1c0 [ 18.866249] __kasan_check_write+0x18/0x20 [ 18.866304] kasan_atomics_helper+0x1467/0x5450 [ 18.866361] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.866418] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.866485] ? kasan_atomics+0x152/0x310 [ 18.866553] kasan_atomics+0x1dc/0x310 [ 18.866598] ? __pfx_kasan_atomics+0x10/0x10 [ 18.866649] ? __pfx_read_tsc+0x10/0x10 [ 18.866699] ? ktime_get_ts64+0x86/0x230 [ 18.866757] kunit_try_run_case+0x1a5/0x480 [ 18.866808] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.866850] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.866915] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.866992] ? __kthread_parkme+0x82/0x180 [ 18.867064] ? preempt_count_sub+0x50/0x80 [ 18.867130] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.867173] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.867260] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.867295] kthread+0x337/0x6f0 [ 18.867320] ? trace_preempt_on+0x20/0xc0 [ 18.867364] ? __pfx_kthread+0x10/0x10 [ 18.867392] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.867421] ? calculate_sigpending+0x7b/0xa0 [ 18.867451] ? __pfx_kthread+0x10/0x10 [ 18.867501] ret_from_fork+0x116/0x1d0 [ 18.867528] ? __pfx_kthread+0x10/0x10 [ 18.867554] ret_from_fork_asm+0x1a/0x30 [ 18.867592] </TASK> [ 18.867608] [ 18.877766] Allocated by task 282: [ 18.878146] kasan_save_stack+0x45/0x70 [ 18.878569] kasan_save_track+0x18/0x40 [ 18.878852] kasan_save_alloc_info+0x3b/0x50 [ 18.879125] __kasan_kmalloc+0xb7/0xc0 [ 18.879406] __kmalloc_cache_noprof+0x189/0x420 [ 18.881482] kasan_atomics+0x95/0x310 [ 18.881854] kunit_try_run_case+0x1a5/0x480 [ 18.882502] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.883090] kthread+0x337/0x6f0 [ 18.883683] ret_from_fork+0x116/0x1d0 [ 18.883929] ret_from_fork_asm+0x1a/0x30 [ 18.884166] [ 18.884654] The buggy address belongs to the object at ffff8881033ecb00 [ 18.884654] which belongs to the cache kmalloc-64 of size 64 [ 18.885622] The buggy address is located 0 bytes to the right of [ 18.885622] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.886521] [ 18.886655] The buggy address belongs to the physical page: [ 18.887116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.887633] flags: 0x200000000000000(node=0|zone=2) [ 18.888069] page_type: f5(slab) [ 18.888503] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.888938] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.889446] page dumped because: kasan: bad access detected [ 18.889836] [ 18.890023] Memory state around the buggy address: [ 18.890353] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.890939] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.891238] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.891974] ^ [ 18.892198] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.892699] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.893164] ================================================================== [ 19.175545] ================================================================== [ 19.175926] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 19.176526] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.176811] [ 19.176939] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.177004] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.177021] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.177049] Call Trace: [ 19.177075] <TASK> [ 19.177103] dump_stack_lvl+0x73/0xb0 [ 19.177139] print_report+0xd1/0x650 [ 19.177165] ? __virt_addr_valid+0x1db/0x2d0 [ 19.177194] ? kasan_atomics_helper+0x19e3/0x5450 [ 19.177218] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.177246] ? kasan_atomics_helper+0x19e3/0x5450 [ 19.177271] kasan_report+0x141/0x180 [ 19.177297] ? kasan_atomics_helper+0x19e3/0x5450 [ 19.177327] kasan_check_range+0x10c/0x1c0 [ 19.177354] __kasan_check_write+0x18/0x20 [ 19.177377] kasan_atomics_helper+0x19e3/0x5450 [ 19.177403] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.177429] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.177681] ? kasan_atomics+0x152/0x310 [ 19.177757] kasan_atomics+0x1dc/0x310 [ 19.177819] ? __pfx_kasan_atomics+0x10/0x10 [ 19.177879] ? __pfx_read_tsc+0x10/0x10 [ 19.177926] ? ktime_get_ts64+0x86/0x230 [ 19.177975] kunit_try_run_case+0x1a5/0x480 [ 19.178014] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.178053] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.178101] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.178155] ? __kthread_parkme+0x82/0x180 [ 19.178213] ? preempt_count_sub+0x50/0x80 [ 19.178273] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.178323] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.178379] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.178447] kthread+0x337/0x6f0 [ 19.178500] ? trace_preempt_on+0x20/0xc0 [ 19.178547] ? __pfx_kthread+0x10/0x10 [ 19.178589] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.178637] ? calculate_sigpending+0x7b/0xa0 [ 19.178689] ? __pfx_kthread+0x10/0x10 [ 19.178731] ret_from_fork+0x116/0x1d0 [ 19.178767] ? __pfx_kthread+0x10/0x10 [ 19.178803] ret_from_fork_asm+0x1a/0x30 [ 19.178864] </TASK> [ 19.178890] [ 19.188486] Allocated by task 282: [ 19.188853] kasan_save_stack+0x45/0x70 [ 19.189228] kasan_save_track+0x18/0x40 [ 19.189579] kasan_save_alloc_info+0x3b/0x50 [ 19.189948] __kasan_kmalloc+0xb7/0xc0 [ 19.190309] __kmalloc_cache_noprof+0x189/0x420 [ 19.190588] kasan_atomics+0x95/0x310 [ 19.190900] kunit_try_run_case+0x1a5/0x480 [ 19.191137] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.191472] kthread+0x337/0x6f0 [ 19.191769] ret_from_fork+0x116/0x1d0 [ 19.191975] ret_from_fork_asm+0x1a/0x30 [ 19.192185] [ 19.192391] The buggy address belongs to the object at ffff8881033ecb00 [ 19.192391] which belongs to the cache kmalloc-64 of size 64 [ 19.193183] The buggy address is located 0 bytes to the right of [ 19.193183] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.193851] [ 19.194020] The buggy address belongs to the physical page: [ 19.194412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.194785] flags: 0x200000000000000(node=0|zone=2) [ 19.195026] page_type: f5(slab) [ 19.195219] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.195902] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.196482] page dumped because: kasan: bad access detected [ 19.196880] [ 19.197010] Memory state around the buggy address: [ 19.197229] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.197568] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.198089] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.198827] ^ [ 19.199206] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.199549] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.199837] ================================================================== [ 19.658945] ================================================================== [ 19.659431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 19.660025] Read of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.660401] [ 19.660572] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.660633] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.660650] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.660677] Call Trace: [ 19.660721] <TASK> [ 19.660750] dump_stack_lvl+0x73/0xb0 [ 19.660785] print_report+0xd1/0x650 [ 19.660813] ? __virt_addr_valid+0x1db/0x2d0 [ 19.660843] ? kasan_atomics_helper+0x5115/0x5450 [ 19.660892] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.660921] ? kasan_atomics_helper+0x5115/0x5450 [ 19.660948] kasan_report+0x141/0x180 [ 19.660975] ? kasan_atomics_helper+0x5115/0x5450 [ 19.661006] __asan_report_load8_noabort+0x18/0x20 [ 19.661031] kasan_atomics_helper+0x5115/0x5450 [ 19.661058] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.661085] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.661133] ? kasan_atomics+0x152/0x310 [ 19.661168] kasan_atomics+0x1dc/0x310 [ 19.661218] ? __pfx_kasan_atomics+0x10/0x10 [ 19.661251] ? __pfx_read_tsc+0x10/0x10 [ 19.661298] ? ktime_get_ts64+0x86/0x230 [ 19.661331] kunit_try_run_case+0x1a5/0x480 [ 19.661359] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.661382] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.661412] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.661442] ? __kthread_parkme+0x82/0x180 [ 19.661486] ? preempt_count_sub+0x50/0x80 [ 19.661516] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.661541] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.661571] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.661600] kthread+0x337/0x6f0 [ 19.661625] ? trace_preempt_on+0x20/0xc0 [ 19.661653] ? __pfx_kthread+0x10/0x10 [ 19.661678] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.661705] ? calculate_sigpending+0x7b/0xa0 [ 19.661734] ? __pfx_kthread+0x10/0x10 [ 19.661760] ret_from_fork+0x116/0x1d0 [ 19.661785] ? __pfx_kthread+0x10/0x10 [ 19.661809] ret_from_fork_asm+0x1a/0x30 [ 19.661847] </TASK> [ 19.661861] [ 19.669802] Allocated by task 282: [ 19.670054] kasan_save_stack+0x45/0x70 [ 19.670308] kasan_save_track+0x18/0x40 [ 19.670549] kasan_save_alloc_info+0x3b/0x50 [ 19.670808] __kasan_kmalloc+0xb7/0xc0 [ 19.671062] __kmalloc_cache_noprof+0x189/0x420 [ 19.671244] kasan_atomics+0x95/0x310 [ 19.671460] kunit_try_run_case+0x1a5/0x480 [ 19.671712] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.671937] kthread+0x337/0x6f0 [ 19.672170] ret_from_fork+0x116/0x1d0 [ 19.672332] ret_from_fork_asm+0x1a/0x30 [ 19.672636] [ 19.672792] The buggy address belongs to the object at ffff8881033ecb00 [ 19.672792] which belongs to the cache kmalloc-64 of size 64 [ 19.673314] The buggy address is located 0 bytes to the right of [ 19.673314] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.673873] [ 19.673981] The buggy address belongs to the physical page: [ 19.674264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.674510] flags: 0x200000000000000(node=0|zone=2) [ 19.674688] page_type: f5(slab) [ 19.674819] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.675033] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.675609] page dumped because: kasan: bad access detected [ 19.676019] [ 19.676170] Memory state around the buggy address: [ 19.676506] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.676672] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.676834] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.677026] ^ [ 19.677402] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.677963] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.678445] ================================================================== [ 18.422888] ================================================================== [ 18.423412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 18.424075] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.424813] [ 18.425088] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.425213] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.425245] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.425314] Call Trace: [ 18.425362] <TASK> [ 18.425410] dump_stack_lvl+0x73/0xb0 [ 18.425505] print_report+0xd1/0x650 [ 18.425580] ? __virt_addr_valid+0x1db/0x2d0 [ 18.425634] ? kasan_atomics_helper+0xf10/0x5450 [ 18.425687] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.425749] ? kasan_atomics_helper+0xf10/0x5450 [ 18.425817] kasan_report+0x141/0x180 [ 18.425875] ? kasan_atomics_helper+0xf10/0x5450 [ 18.425939] kasan_check_range+0x10c/0x1c0 [ 18.426008] __kasan_check_write+0x18/0x20 [ 18.426076] kasan_atomics_helper+0xf10/0x5450 [ 18.426132] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.426193] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.426298] ? kasan_atomics+0x152/0x310 [ 18.426361] kasan_atomics+0x1dc/0x310 [ 18.426411] ? __pfx_kasan_atomics+0x10/0x10 [ 18.426479] ? __pfx_read_tsc+0x10/0x10 [ 18.426529] ? ktime_get_ts64+0x86/0x230 [ 18.426578] kunit_try_run_case+0x1a5/0x480 [ 18.426622] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.426661] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.426708] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.426756] ? __kthread_parkme+0x82/0x180 [ 18.426803] ? preempt_count_sub+0x50/0x80 [ 18.426855] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.426897] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.426948] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.427000] kthread+0x337/0x6f0 [ 18.427037] ? trace_preempt_on+0x20/0xc0 [ 18.427080] ? __pfx_kthread+0x10/0x10 [ 18.427119] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.427164] ? calculate_sigpending+0x7b/0xa0 [ 18.427212] ? __pfx_kthread+0x10/0x10 [ 18.427289] ret_from_fork+0x116/0x1d0 [ 18.427332] ? __pfx_kthread+0x10/0x10 [ 18.427426] ret_from_fork_asm+0x1a/0x30 [ 18.427516] </TASK> [ 18.427544] [ 18.437830] Allocated by task 282: [ 18.438109] kasan_save_stack+0x45/0x70 [ 18.439898] kasan_save_track+0x18/0x40 [ 18.440380] kasan_save_alloc_info+0x3b/0x50 [ 18.440746] __kasan_kmalloc+0xb7/0xc0 [ 18.441019] __kmalloc_cache_noprof+0x189/0x420 [ 18.441764] kasan_atomics+0x95/0x310 [ 18.442018] kunit_try_run_case+0x1a5/0x480 [ 18.442252] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.442494] kthread+0x337/0x6f0 [ 18.442606] ret_from_fork+0x116/0x1d0 [ 18.442711] ret_from_fork_asm+0x1a/0x30 [ 18.442826] [ 18.442888] The buggy address belongs to the object at ffff8881033ecb00 [ 18.442888] which belongs to the cache kmalloc-64 of size 64 [ 18.443142] The buggy address is located 0 bytes to the right of [ 18.443142] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.444405] [ 18.444686] The buggy address belongs to the physical page: [ 18.445147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.446418] flags: 0x200000000000000(node=0|zone=2) [ 18.446699] page_type: f5(slab) [ 18.446894] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.447409] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.447988] page dumped because: kasan: bad access detected [ 18.449074] [ 18.449715] Memory state around the buggy address: [ 18.450597] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.452316] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.452885] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.454299] ^ [ 18.454631] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.455136] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.456702] ================================================================== [ 19.021704] ================================================================== [ 19.022781] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 19.023186] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.023620] [ 19.023922] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.024085] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.024121] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.024223] Call Trace: [ 19.024284] <TASK> [ 19.024331] dump_stack_lvl+0x73/0xb0 [ 19.024533] print_report+0xd1/0x650 [ 19.024588] ? __virt_addr_valid+0x1db/0x2d0 [ 19.024639] ? kasan_atomics_helper+0x16e7/0x5450 [ 19.024689] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.024744] ? kasan_atomics_helper+0x16e7/0x5450 [ 19.024797] kasan_report+0x141/0x180 [ 19.024852] ? kasan_atomics_helper+0x16e7/0x5450 [ 19.024899] kasan_check_range+0x10c/0x1c0 [ 19.024929] __kasan_check_write+0x18/0x20 [ 19.024953] kasan_atomics_helper+0x16e7/0x5450 [ 19.024981] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.025008] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.025034] ? kasan_atomics+0x152/0x310 [ 19.025065] kasan_atomics+0x1dc/0x310 [ 19.025092] ? __pfx_kasan_atomics+0x10/0x10 [ 19.025121] ? __pfx_read_tsc+0x10/0x10 [ 19.025147] ? ktime_get_ts64+0x86/0x230 [ 19.025178] kunit_try_run_case+0x1a5/0x480 [ 19.025262] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.025313] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.025351] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.025383] ? __kthread_parkme+0x82/0x180 [ 19.025409] ? preempt_count_sub+0x50/0x80 [ 19.025440] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.025490] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.025522] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.025552] kthread+0x337/0x6f0 [ 19.025576] ? trace_preempt_on+0x20/0xc0 [ 19.025605] ? __pfx_kthread+0x10/0x10 [ 19.025630] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.025658] ? calculate_sigpending+0x7b/0xa0 [ 19.025687] ? __pfx_kthread+0x10/0x10 [ 19.025713] ret_from_fork+0x116/0x1d0 [ 19.025736] ? __pfx_kthread+0x10/0x10 [ 19.025761] ret_from_fork_asm+0x1a/0x30 [ 19.025798] </TASK> [ 19.025813] [ 19.039077] Allocated by task 282: [ 19.040032] kasan_save_stack+0x45/0x70 [ 19.040268] kasan_save_track+0x18/0x40 [ 19.040903] kasan_save_alloc_info+0x3b/0x50 [ 19.041374] __kasan_kmalloc+0xb7/0xc0 [ 19.041598] __kmalloc_cache_noprof+0x189/0x420 [ 19.041988] kasan_atomics+0x95/0x310 [ 19.042270] kunit_try_run_case+0x1a5/0x480 [ 19.042526] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.042770] kthread+0x337/0x6f0 [ 19.043134] ret_from_fork+0x116/0x1d0 [ 19.043543] ret_from_fork_asm+0x1a/0x30 [ 19.043950] [ 19.044198] The buggy address belongs to the object at ffff8881033ecb00 [ 19.044198] which belongs to the cache kmalloc-64 of size 64 [ 19.044802] The buggy address is located 0 bytes to the right of [ 19.044802] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.045776] [ 19.046016] The buggy address belongs to the physical page: [ 19.046678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.047108] flags: 0x200000000000000(node=0|zone=2) [ 19.047529] page_type: f5(slab) [ 19.047749] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.048317] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.048821] page dumped because: kasan: bad access detected [ 19.049351] [ 19.049556] Memory state around the buggy address: [ 19.049942] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.050347] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.050824] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.051102] ^ [ 19.051520] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.052045] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.053120] ================================================================== [ 19.054876] ================================================================== [ 19.055262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 19.055997] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.056727] [ 19.056978] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.057072] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.057089] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.057116] Call Trace: [ 19.057140] <TASK> [ 19.057166] dump_stack_lvl+0x73/0xb0 [ 19.057224] print_report+0xd1/0x650 [ 19.057547] ? __virt_addr_valid+0x1db/0x2d0 [ 19.057589] ? kasan_atomics_helper+0x177f/0x5450 [ 19.057616] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.057643] ? kasan_atomics_helper+0x177f/0x5450 [ 19.057669] kasan_report+0x141/0x180 [ 19.057695] ? kasan_atomics_helper+0x177f/0x5450 [ 19.057724] kasan_check_range+0x10c/0x1c0 [ 19.057752] __kasan_check_write+0x18/0x20 [ 19.057775] kasan_atomics_helper+0x177f/0x5450 [ 19.057802] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.057828] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.057855] ? kasan_atomics+0x152/0x310 [ 19.057883] kasan_atomics+0x1dc/0x310 [ 19.057907] ? __pfx_kasan_atomics+0x10/0x10 [ 19.057934] ? __pfx_read_tsc+0x10/0x10 [ 19.057957] ? ktime_get_ts64+0x86/0x230 [ 19.057984] kunit_try_run_case+0x1a5/0x480 [ 19.058008] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.058029] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.058056] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.058082] ? __kthread_parkme+0x82/0x180 [ 19.058104] ? preempt_count_sub+0x50/0x80 [ 19.058129] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.058152] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.058178] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.058250] kthread+0x337/0x6f0 [ 19.058275] ? trace_preempt_on+0x20/0xc0 [ 19.058302] ? __pfx_kthread+0x10/0x10 [ 19.058324] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.058350] ? calculate_sigpending+0x7b/0xa0 [ 19.058377] ? __pfx_kthread+0x10/0x10 [ 19.058401] ret_from_fork+0x116/0x1d0 [ 19.058423] ? __pfx_kthread+0x10/0x10 [ 19.058446] ret_from_fork_asm+0x1a/0x30 [ 19.058499] </TASK> [ 19.058512] [ 19.069516] Allocated by task 282: [ 19.069909] kasan_save_stack+0x45/0x70 [ 19.070325] kasan_save_track+0x18/0x40 [ 19.070660] kasan_save_alloc_info+0x3b/0x50 [ 19.071041] __kasan_kmalloc+0xb7/0xc0 [ 19.071391] __kmalloc_cache_noprof+0x189/0x420 [ 19.071822] kasan_atomics+0x95/0x310 [ 19.072160] kunit_try_run_case+0x1a5/0x480 [ 19.072488] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.072727] kthread+0x337/0x6f0 [ 19.072909] ret_from_fork+0x116/0x1d0 [ 19.073102] ret_from_fork_asm+0x1a/0x30 [ 19.073498] [ 19.073750] The buggy address belongs to the object at ffff8881033ecb00 [ 19.073750] which belongs to the cache kmalloc-64 of size 64 [ 19.074864] The buggy address is located 0 bytes to the right of [ 19.074864] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.075655] [ 19.075822] The buggy address belongs to the physical page: [ 19.076107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.076472] flags: 0x200000000000000(node=0|zone=2) [ 19.076909] page_type: f5(slab) [ 19.077262] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.078024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.078732] page dumped because: kasan: bad access detected [ 19.079153] [ 19.079401] Memory state around the buggy address: [ 19.079761] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.080240] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.080761] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.081234] ^ [ 19.081604] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.082117] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.082467] ================================================================== [ 19.502421] ================================================================== [ 19.502712] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 19.503628] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.504526] [ 19.504628] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.504732] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.504751] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.504789] Call Trace: [ 19.504818] <TASK> [ 19.504845] dump_stack_lvl+0x73/0xb0 [ 19.504885] print_report+0xd1/0x650 [ 19.504912] ? __virt_addr_valid+0x1db/0x2d0 [ 19.504941] ? kasan_atomics_helper+0x2006/0x5450 [ 19.504967] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.504993] ? kasan_atomics_helper+0x2006/0x5450 [ 19.505046] kasan_report+0x141/0x180 [ 19.505077] ? kasan_atomics_helper+0x2006/0x5450 [ 19.505136] kasan_check_range+0x10c/0x1c0 [ 19.505168] __kasan_check_write+0x18/0x20 [ 19.505219] kasan_atomics_helper+0x2006/0x5450 [ 19.505249] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.505276] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.505304] ? kasan_atomics+0x152/0x310 [ 19.505335] kasan_atomics+0x1dc/0x310 [ 19.505362] ? __pfx_kasan_atomics+0x10/0x10 [ 19.505390] ? __pfx_read_tsc+0x10/0x10 [ 19.505417] ? ktime_get_ts64+0x86/0x230 [ 19.505446] kunit_try_run_case+0x1a5/0x480 [ 19.505492] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.505516] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.505546] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.505575] ? __kthread_parkme+0x82/0x180 [ 19.505602] ? preempt_count_sub+0x50/0x80 [ 19.505631] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.505656] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.505684] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.505713] kthread+0x337/0x6f0 [ 19.505736] ? trace_preempt_on+0x20/0xc0 [ 19.505765] ? __pfx_kthread+0x10/0x10 [ 19.505789] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.505815] ? calculate_sigpending+0x7b/0xa0 [ 19.505844] ? __pfx_kthread+0x10/0x10 [ 19.505869] ret_from_fork+0x116/0x1d0 [ 19.505892] ? __pfx_kthread+0x10/0x10 [ 19.505916] ret_from_fork_asm+0x1a/0x30 [ 19.505952] </TASK> [ 19.505966] [ 19.513093] Allocated by task 282: [ 19.513790] kasan_save_stack+0x45/0x70 [ 19.514135] kasan_save_track+0x18/0x40 [ 19.514405] kasan_save_alloc_info+0x3b/0x50 [ 19.515123] __kasan_kmalloc+0xb7/0xc0 [ 19.515405] __kmalloc_cache_noprof+0x189/0x420 [ 19.516088] kasan_atomics+0x95/0x310 [ 19.516895] kunit_try_run_case+0x1a5/0x480 [ 19.517767] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.518376] kthread+0x337/0x6f0 [ 19.518936] ret_from_fork+0x116/0x1d0 [ 19.519293] ret_from_fork_asm+0x1a/0x30 [ 19.519704] [ 19.519941] The buggy address belongs to the object at ffff8881033ecb00 [ 19.519941] which belongs to the cache kmalloc-64 of size 64 [ 19.520849] The buggy address is located 0 bytes to the right of [ 19.520849] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.521756] [ 19.522004] The buggy address belongs to the physical page: [ 19.522370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.522759] flags: 0x200000000000000(node=0|zone=2) [ 19.522905] page_type: f5(slab) [ 19.523013] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.523174] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.523899] page dumped because: kasan: bad access detected [ 19.524351] [ 19.524488] Memory state around the buggy address: [ 19.524940] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.525349] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.525747] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.526077] ^ [ 19.526218] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.526675] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.526844] ================================================================== [ 18.894269] ================================================================== [ 18.894663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 18.895047] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.895736] [ 18.895948] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.896032] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.896055] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.896093] Call Trace: [ 18.896132] <TASK> [ 18.896168] dump_stack_lvl+0x73/0xb0 [ 18.896219] print_report+0xd1/0x650 [ 18.896258] ? __virt_addr_valid+0x1db/0x2d0 [ 18.896297] ? kasan_atomics_helper+0x50d4/0x5450 [ 18.896332] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.896369] ? kasan_atomics_helper+0x50d4/0x5450 [ 18.896407] kasan_report+0x141/0x180 [ 18.896448] ? kasan_atomics_helper+0x50d4/0x5450 [ 18.896509] __asan_report_store8_noabort+0x1b/0x30 [ 18.896544] kasan_atomics_helper+0x50d4/0x5450 [ 18.896583] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.896621] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.896656] ? kasan_atomics+0x152/0x310 [ 18.896698] kasan_atomics+0x1dc/0x310 [ 18.896748] ? __pfx_kasan_atomics+0x10/0x10 [ 18.896792] ? __pfx_read_tsc+0x10/0x10 [ 18.896834] ? ktime_get_ts64+0x86/0x230 [ 18.896889] kunit_try_run_case+0x1a5/0x480 [ 18.896936] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.896982] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.897038] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.897094] ? __kthread_parkme+0x82/0x180 [ 18.897139] ? preempt_count_sub+0x50/0x80 [ 18.897194] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.897244] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.897301] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.897354] kthread+0x337/0x6f0 [ 18.897400] ? trace_preempt_on+0x20/0xc0 [ 18.897449] ? __pfx_kthread+0x10/0x10 [ 18.897559] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.897604] ? calculate_sigpending+0x7b/0xa0 [ 18.897651] ? __pfx_kthread+0x10/0x10 [ 18.897699] ret_from_fork+0x116/0x1d0 [ 18.897742] ? __pfx_kthread+0x10/0x10 [ 18.897791] ret_from_fork_asm+0x1a/0x30 [ 18.897853] </TASK> [ 18.897882] [ 18.909702] Allocated by task 282: [ 18.910098] kasan_save_stack+0x45/0x70 [ 18.910689] kasan_save_track+0x18/0x40 [ 18.911043] kasan_save_alloc_info+0x3b/0x50 [ 18.911476] __kasan_kmalloc+0xb7/0xc0 [ 18.911833] __kmalloc_cache_noprof+0x189/0x420 [ 18.912335] kasan_atomics+0x95/0x310 [ 18.912706] kunit_try_run_case+0x1a5/0x480 [ 18.912969] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.913521] kthread+0x337/0x6f0 [ 18.913891] ret_from_fork+0x116/0x1d0 [ 18.914102] ret_from_fork_asm+0x1a/0x30 [ 18.914334] [ 18.914473] The buggy address belongs to the object at ffff8881033ecb00 [ 18.914473] which belongs to the cache kmalloc-64 of size 64 [ 18.915654] The buggy address is located 0 bytes to the right of [ 18.915654] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.916625] [ 18.916824] The buggy address belongs to the physical page: [ 18.917172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.917898] flags: 0x200000000000000(node=0|zone=2) [ 18.918144] page_type: f5(slab) [ 18.918371] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.919082] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.919794] page dumped because: kasan: bad access detected [ 18.920305] [ 18.920492] Memory state around the buggy address: [ 18.920895] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.921519] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.922094] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.922488] ^ [ 18.922761] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.923412] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.923953] ================================================================== [ 19.614101] ================================================================== [ 19.615169] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 19.615675] Read of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.615969] [ 19.616057] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.616115] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.616131] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.616159] Call Trace: [ 19.616183] <TASK> [ 19.616229] dump_stack_lvl+0x73/0xb0 [ 19.616262] print_report+0xd1/0x650 [ 19.616312] ? __virt_addr_valid+0x1db/0x2d0 [ 19.616342] ? kasan_atomics_helper+0x4fa5/0x5450 [ 19.616381] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.616409] ? kasan_atomics_helper+0x4fa5/0x5450 [ 19.616435] kasan_report+0x141/0x180 [ 19.616472] ? kasan_atomics_helper+0x4fa5/0x5450 [ 19.616505] __asan_report_load8_noabort+0x18/0x20 [ 19.616531] kasan_atomics_helper+0x4fa5/0x5450 [ 19.616559] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.616585] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.616611] ? kasan_atomics+0x152/0x310 [ 19.616666] kasan_atomics+0x1dc/0x310 [ 19.616694] ? __pfx_kasan_atomics+0x10/0x10 [ 19.616722] ? __pfx_read_tsc+0x10/0x10 [ 19.616749] ? ktime_get_ts64+0x86/0x230 [ 19.616795] kunit_try_run_case+0x1a5/0x480 [ 19.616828] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.616851] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.616881] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.616911] ? __kthread_parkme+0x82/0x180 [ 19.616936] ? preempt_count_sub+0x50/0x80 [ 19.616966] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.616991] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.617021] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.617049] kthread+0x337/0x6f0 [ 19.617071] ? trace_preempt_on+0x20/0xc0 [ 19.617098] ? __pfx_kthread+0x10/0x10 [ 19.617122] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.617148] ? calculate_sigpending+0x7b/0xa0 [ 19.617176] ? __pfx_kthread+0x10/0x10 [ 19.617220] ret_from_fork+0x116/0x1d0 [ 19.617298] ? __pfx_kthread+0x10/0x10 [ 19.617325] ret_from_fork_asm+0x1a/0x30 [ 19.617361] </TASK> [ 19.617376] [ 19.625011] Allocated by task 282: [ 19.625302] kasan_save_stack+0x45/0x70 [ 19.625558] kasan_save_track+0x18/0x40 [ 19.625821] kasan_save_alloc_info+0x3b/0x50 [ 19.626020] __kasan_kmalloc+0xb7/0xc0 [ 19.626233] __kmalloc_cache_noprof+0x189/0x420 [ 19.626400] kasan_atomics+0x95/0x310 [ 19.626532] kunit_try_run_case+0x1a5/0x480 [ 19.626814] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.627148] kthread+0x337/0x6f0 [ 19.627525] ret_from_fork+0x116/0x1d0 [ 19.627749] ret_from_fork_asm+0x1a/0x30 [ 19.627966] [ 19.628110] The buggy address belongs to the object at ffff8881033ecb00 [ 19.628110] which belongs to the cache kmalloc-64 of size 64 [ 19.628715] The buggy address is located 0 bytes to the right of [ 19.628715] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.629200] [ 19.629308] The buggy address belongs to the physical page: [ 19.629536] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.629932] flags: 0x200000000000000(node=0|zone=2) [ 19.630132] page_type: f5(slab) [ 19.630317] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.630676] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.631112] page dumped because: kasan: bad access detected [ 19.631305] [ 19.631394] Memory state around the buggy address: [ 19.631595] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.631830] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.632308] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.632812] ^ [ 19.633164] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.634496] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.635060] ================================================================== [ 19.527932] ================================================================== [ 19.528659] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 19.529052] Read of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.529413] [ 19.529702] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.529767] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.529784] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.529811] Call Trace: [ 19.529836] <TASK> [ 19.529863] dump_stack_lvl+0x73/0xb0 [ 19.529922] print_report+0xd1/0x650 [ 19.529951] ? __virt_addr_valid+0x1db/0x2d0 [ 19.529998] ? kasan_atomics_helper+0x4f98/0x5450 [ 19.530027] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.530055] ? kasan_atomics_helper+0x4f98/0x5450 [ 19.530082] kasan_report+0x141/0x180 [ 19.530108] ? kasan_atomics_helper+0x4f98/0x5450 [ 19.530140] __asan_report_load8_noabort+0x18/0x20 [ 19.530165] kasan_atomics_helper+0x4f98/0x5450 [ 19.530192] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.530218] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.530245] ? kasan_atomics+0x152/0x310 [ 19.530297] kasan_atomics+0x1dc/0x310 [ 19.530337] ? __pfx_kasan_atomics+0x10/0x10 [ 19.530366] ? __pfx_read_tsc+0x10/0x10 [ 19.530394] ? ktime_get_ts64+0x86/0x230 [ 19.530425] kunit_try_run_case+0x1a5/0x480 [ 19.530451] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.530488] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.530520] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.530549] ? __kthread_parkme+0x82/0x180 [ 19.530574] ? preempt_count_sub+0x50/0x80 [ 19.530602] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.530627] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.530657] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.530688] kthread+0x337/0x6f0 [ 19.530711] ? trace_preempt_on+0x20/0xc0 [ 19.530740] ? __pfx_kthread+0x10/0x10 [ 19.530765] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.530792] ? calculate_sigpending+0x7b/0xa0 [ 19.530821] ? __pfx_kthread+0x10/0x10 [ 19.530847] ret_from_fork+0x116/0x1d0 [ 19.530870] ? __pfx_kthread+0x10/0x10 [ 19.530895] ret_from_fork_asm+0x1a/0x30 [ 19.530931] </TASK> [ 19.530948] [ 19.540428] Allocated by task 282: [ 19.540595] kasan_save_stack+0x45/0x70 [ 19.541481] kasan_save_track+0x18/0x40 [ 19.541765] kasan_save_alloc_info+0x3b/0x50 [ 19.542083] __kasan_kmalloc+0xb7/0xc0 [ 19.542229] __kmalloc_cache_noprof+0x189/0x420 [ 19.542344] kasan_atomics+0x95/0x310 [ 19.542442] kunit_try_run_case+0x1a5/0x480 [ 19.542554] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.542678] kthread+0x337/0x6f0 [ 19.542769] ret_from_fork+0x116/0x1d0 [ 19.542866] ret_from_fork_asm+0x1a/0x30 [ 19.542967] [ 19.543081] The buggy address belongs to the object at ffff8881033ecb00 [ 19.543081] which belongs to the cache kmalloc-64 of size 64 [ 19.543795] The buggy address is located 0 bytes to the right of [ 19.543795] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.544131] [ 19.544198] The buggy address belongs to the physical page: [ 19.544321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.544498] flags: 0x200000000000000(node=0|zone=2) [ 19.544696] page_type: f5(slab) [ 19.545513] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.546029] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.546915] page dumped because: kasan: bad access detected [ 19.547332] [ 19.547406] Memory state around the buggy address: [ 19.547538] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.548103] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.548571] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.548975] ^ [ 19.549225] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.549669] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.549870] ================================================================== [ 18.832906] ================================================================== [ 18.833728] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 18.834306] Read of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.834574] [ 18.834738] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.834847] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.834866] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.834895] Call Trace: [ 18.834921] <TASK> [ 18.834947] dump_stack_lvl+0x73/0xb0 [ 18.834989] print_report+0xd1/0x650 [ 18.835032] ? __virt_addr_valid+0x1db/0x2d0 [ 18.835063] ? kasan_atomics_helper+0x4eae/0x5450 [ 18.835089] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.835115] ? kasan_atomics_helper+0x4eae/0x5450 [ 18.835140] kasan_report+0x141/0x180 [ 18.835167] ? kasan_atomics_helper+0x4eae/0x5450 [ 18.835197] __asan_report_load8_noabort+0x18/0x20 [ 18.835221] kasan_atomics_helper+0x4eae/0x5450 [ 18.835249] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.835275] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.835300] ? kasan_atomics+0x152/0x310 [ 18.835331] kasan_atomics+0x1dc/0x310 [ 18.835380] ? __pfx_kasan_atomics+0x10/0x10 [ 18.835410] ? __pfx_read_tsc+0x10/0x10 [ 18.835437] ? ktime_get_ts64+0x86/0x230 [ 18.835601] kunit_try_run_case+0x1a5/0x480 [ 18.835665] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.835714] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.835771] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.835825] ? __kthread_parkme+0x82/0x180 [ 18.835878] ? preempt_count_sub+0x50/0x80 [ 18.835936] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.835991] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.836046] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.836105] kthread+0x337/0x6f0 [ 18.836154] ? trace_preempt_on+0x20/0xc0 [ 18.836211] ? __pfx_kthread+0x10/0x10 [ 18.836260] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.836316] ? calculate_sigpending+0x7b/0xa0 [ 18.836374] ? __pfx_kthread+0x10/0x10 [ 18.836429] ret_from_fork+0x116/0x1d0 [ 18.836491] ? __pfx_kthread+0x10/0x10 [ 18.836562] ret_from_fork_asm+0x1a/0x30 [ 18.836602] </TASK> [ 18.836617] [ 18.849289] Allocated by task 282: [ 18.849722] kasan_save_stack+0x45/0x70 [ 18.850175] kasan_save_track+0x18/0x40 [ 18.850627] kasan_save_alloc_info+0x3b/0x50 [ 18.851045] __kasan_kmalloc+0xb7/0xc0 [ 18.851357] __kmalloc_cache_noprof+0x189/0x420 [ 18.851571] kasan_atomics+0x95/0x310 [ 18.851754] kunit_try_run_case+0x1a5/0x480 [ 18.851941] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.852157] kthread+0x337/0x6f0 [ 18.852518] ret_from_fork+0x116/0x1d0 [ 18.852849] ret_from_fork_asm+0x1a/0x30 [ 18.853223] [ 18.853404] The buggy address belongs to the object at ffff8881033ecb00 [ 18.853404] which belongs to the cache kmalloc-64 of size 64 [ 18.854415] The buggy address is located 0 bytes to the right of [ 18.854415] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.855432] [ 18.855655] The buggy address belongs to the physical page: [ 18.856097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.856821] flags: 0x200000000000000(node=0|zone=2) [ 18.857326] page_type: f5(slab) [ 18.857590] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.857883] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.858593] page dumped because: kasan: bad access detected [ 18.858987] [ 18.859104] Memory state around the buggy address: [ 18.859438] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.860029] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.860488] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.860909] ^ [ 18.861371] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.861721] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.861971] ================================================================== [ 19.298000] ================================================================== [ 19.299039] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 19.299517] Read of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.300025] [ 19.300309] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.300431] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.300477] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.300535] Call Trace: [ 19.300585] <TASK> [ 19.300651] dump_stack_lvl+0x73/0xb0 [ 19.300729] print_report+0xd1/0x650 [ 19.300784] ? __virt_addr_valid+0x1db/0x2d0 [ 19.300839] ? kasan_atomics_helper+0x4f30/0x5450 [ 19.300892] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.300948] ? kasan_atomics_helper+0x4f30/0x5450 [ 19.301027] kasan_report+0x141/0x180 [ 19.301076] ? kasan_atomics_helper+0x4f30/0x5450 [ 19.301136] __asan_report_load8_noabort+0x18/0x20 [ 19.301187] kasan_atomics_helper+0x4f30/0x5450 [ 19.301281] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.301336] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.301389] ? kasan_atomics+0x152/0x310 [ 19.301464] kasan_atomics+0x1dc/0x310 [ 19.301526] ? __pfx_kasan_atomics+0x10/0x10 [ 19.301609] ? __pfx_read_tsc+0x10/0x10 [ 19.301664] ? ktime_get_ts64+0x86/0x230 [ 19.301723] kunit_try_run_case+0x1a5/0x480 [ 19.301781] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.301826] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.301865] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.301899] ? __kthread_parkme+0x82/0x180 [ 19.301925] ? preempt_count_sub+0x50/0x80 [ 19.301955] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.301981] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.302011] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.302040] kthread+0x337/0x6f0 [ 19.302064] ? trace_preempt_on+0x20/0xc0 [ 19.302092] ? __pfx_kthread+0x10/0x10 [ 19.302118] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.302144] ? calculate_sigpending+0x7b/0xa0 [ 19.302173] ? __pfx_kthread+0x10/0x10 [ 19.302222] ret_from_fork+0x116/0x1d0 [ 19.302276] ? __pfx_kthread+0x10/0x10 [ 19.302302] ret_from_fork_asm+0x1a/0x30 [ 19.302342] </TASK> [ 19.302358] [ 19.313120] Allocated by task 282: [ 19.313446] kasan_save_stack+0x45/0x70 [ 19.313905] kasan_save_track+0x18/0x40 [ 19.314116] kasan_save_alloc_info+0x3b/0x50 [ 19.314913] __kasan_kmalloc+0xb7/0xc0 [ 19.315501] __kmalloc_cache_noprof+0x189/0x420 [ 19.315718] kasan_atomics+0x95/0x310 [ 19.316036] kunit_try_run_case+0x1a5/0x480 [ 19.316387] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.316699] kthread+0x337/0x6f0 [ 19.316992] ret_from_fork+0x116/0x1d0 [ 19.317267] ret_from_fork_asm+0x1a/0x30 [ 19.317623] [ 19.317759] The buggy address belongs to the object at ffff8881033ecb00 [ 19.317759] which belongs to the cache kmalloc-64 of size 64 [ 19.318511] The buggy address is located 0 bytes to the right of [ 19.318511] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.319167] [ 19.319369] The buggy address belongs to the physical page: [ 19.319748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.320245] flags: 0x200000000000000(node=0|zone=2) [ 19.320646] page_type: f5(slab) [ 19.320966] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.321383] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.321919] page dumped because: kasan: bad access detected [ 19.322263] [ 19.322416] Memory state around the buggy address: [ 19.322636] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.323139] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.323481] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.323762] ^ [ 19.324144] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.324718] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.325263] ================================================================== [ 18.692301] ================================================================== [ 18.693021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 18.693368] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.693667] [ 18.694290] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.694416] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.694450] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.694515] Call Trace: [ 18.694563] <TASK> [ 18.694608] dump_stack_lvl+0x73/0xb0 [ 18.694680] print_report+0xd1/0x650 [ 18.694737] ? __virt_addr_valid+0x1db/0x2d0 [ 18.694794] ? kasan_atomics_helper+0x49e8/0x5450 [ 18.694843] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.694888] ? kasan_atomics_helper+0x49e8/0x5450 [ 18.694935] kasan_report+0x141/0x180 [ 18.695039] ? kasan_atomics_helper+0x49e8/0x5450 [ 18.695135] __asan_report_load4_noabort+0x18/0x20 [ 18.695185] kasan_atomics_helper+0x49e8/0x5450 [ 18.695258] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.695317] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.695406] ? kasan_atomics+0x152/0x310 [ 18.695442] kasan_atomics+0x1dc/0x310 [ 18.695496] ? __pfx_kasan_atomics+0x10/0x10 [ 18.695526] ? __pfx_read_tsc+0x10/0x10 [ 18.695554] ? ktime_get_ts64+0x86/0x230 [ 18.695586] kunit_try_run_case+0x1a5/0x480 [ 18.695613] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.695636] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.695667] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.695696] ? __kthread_parkme+0x82/0x180 [ 18.695721] ? preempt_count_sub+0x50/0x80 [ 18.695752] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.695777] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.695805] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.695834] kthread+0x337/0x6f0 [ 18.695858] ? trace_preempt_on+0x20/0xc0 [ 18.695885] ? __pfx_kthread+0x10/0x10 [ 18.695910] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.695937] ? calculate_sigpending+0x7b/0xa0 [ 18.695966] ? __pfx_kthread+0x10/0x10 [ 18.695990] ret_from_fork+0x116/0x1d0 [ 18.696014] ? __pfx_kthread+0x10/0x10 [ 18.696038] ret_from_fork_asm+0x1a/0x30 [ 18.696074] </TASK> [ 18.696089] [ 18.709032] Allocated by task 282: [ 18.709847] kasan_save_stack+0x45/0x70 [ 18.710245] kasan_save_track+0x18/0x40 [ 18.710478] kasan_save_alloc_info+0x3b/0x50 [ 18.710702] __kasan_kmalloc+0xb7/0xc0 [ 18.710926] __kmalloc_cache_noprof+0x189/0x420 [ 18.711171] kasan_atomics+0x95/0x310 [ 18.711516] kunit_try_run_case+0x1a5/0x480 [ 18.711834] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.712089] kthread+0x337/0x6f0 [ 18.712427] ret_from_fork+0x116/0x1d0 [ 18.712782] ret_from_fork_asm+0x1a/0x30 [ 18.713082] [ 18.713270] The buggy address belongs to the object at ffff8881033ecb00 [ 18.713270] which belongs to the cache kmalloc-64 of size 64 [ 18.714643] The buggy address is located 0 bytes to the right of [ 18.714643] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.715885] [ 18.716113] The buggy address belongs to the physical page: [ 18.716772] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.717433] flags: 0x200000000000000(node=0|zone=2) [ 18.717657] page_type: f5(slab) [ 18.717818] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.719760] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.720719] page dumped because: kasan: bad access detected [ 18.721607] [ 18.721820] Memory state around the buggy address: [ 18.723734] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.724801] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.725900] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.726874] ^ [ 18.727598] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.727894] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.728145] ================================================================== [ 18.658281] ================================================================== [ 18.659216] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 18.659888] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.660450] [ 18.660994] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.661150] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.661198] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.661256] Call Trace: [ 18.661307] <TASK> [ 18.661351] dump_stack_lvl+0x73/0xb0 [ 18.661406] print_report+0xd1/0x650 [ 18.661435] ? __virt_addr_valid+0x1db/0x2d0 [ 18.661490] ? kasan_atomics_helper+0x1217/0x5450 [ 18.661519] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.661547] ? kasan_atomics_helper+0x1217/0x5450 [ 18.661574] kasan_report+0x141/0x180 [ 18.661601] ? kasan_atomics_helper+0x1217/0x5450 [ 18.661632] kasan_check_range+0x10c/0x1c0 [ 18.661661] __kasan_check_write+0x18/0x20 [ 18.661685] kasan_atomics_helper+0x1217/0x5450 [ 18.661712] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.661739] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.661766] ? kasan_atomics+0x152/0x310 [ 18.661796] kasan_atomics+0x1dc/0x310 [ 18.661823] ? __pfx_kasan_atomics+0x10/0x10 [ 18.661851] ? __pfx_read_tsc+0x10/0x10 [ 18.661877] ? ktime_get_ts64+0x86/0x230 [ 18.661905] kunit_try_run_case+0x1a5/0x480 [ 18.661932] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.661956] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.661985] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.662013] ? __kthread_parkme+0x82/0x180 [ 18.662037] ? preempt_count_sub+0x50/0x80 [ 18.662065] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.662089] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.662118] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.662147] kthread+0x337/0x6f0 [ 18.662171] ? trace_preempt_on+0x20/0xc0 [ 18.662206] ? __pfx_kthread+0x10/0x10 [ 18.662260] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.662288] ? calculate_sigpending+0x7b/0xa0 [ 18.662318] ? __pfx_kthread+0x10/0x10 [ 18.662343] ret_from_fork+0x116/0x1d0 [ 18.662366] ? __pfx_kthread+0x10/0x10 [ 18.662392] ret_from_fork_asm+0x1a/0x30 [ 18.662428] </TASK> [ 18.662443] [ 18.676091] Allocated by task 282: [ 18.676524] kasan_save_stack+0x45/0x70 [ 18.676802] kasan_save_track+0x18/0x40 [ 18.677010] kasan_save_alloc_info+0x3b/0x50 [ 18.677841] __kasan_kmalloc+0xb7/0xc0 [ 18.678238] __kmalloc_cache_noprof+0x189/0x420 [ 18.678653] kasan_atomics+0x95/0x310 [ 18.678837] kunit_try_run_case+0x1a5/0x480 [ 18.679016] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.679228] kthread+0x337/0x6f0 [ 18.679388] ret_from_fork+0x116/0x1d0 [ 18.680297] ret_from_fork_asm+0x1a/0x30 [ 18.680555] [ 18.680692] The buggy address belongs to the object at ffff8881033ecb00 [ 18.680692] which belongs to the cache kmalloc-64 of size 64 [ 18.681985] The buggy address is located 0 bytes to the right of [ 18.681985] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.683086] [ 18.683443] The buggy address belongs to the physical page: [ 18.683748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.684201] flags: 0x200000000000000(node=0|zone=2) [ 18.684908] page_type: f5(slab) [ 18.685278] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.685939] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.686530] page dumped because: kasan: bad access detected [ 18.686864] [ 18.687046] Memory state around the buggy address: [ 18.687416] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.687936] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.688964] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.689312] ^ [ 18.689959] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.690691] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.691085] ================================================================== [ 17.960312] ================================================================== [ 17.960862] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 17.961698] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 17.962448] [ 17.962739] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.962857] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.962889] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.962934] Call Trace: [ 17.962979] <TASK> [ 17.963022] dump_stack_lvl+0x73/0xb0 [ 17.963197] print_report+0xd1/0x650 [ 17.963319] ? __virt_addr_valid+0x1db/0x2d0 [ 17.963385] ? kasan_atomics_helper+0x5fe/0x5450 [ 17.963439] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.963508] ? kasan_atomics_helper+0x5fe/0x5450 [ 17.963558] kasan_report+0x141/0x180 [ 17.963606] ? kasan_atomics_helper+0x5fe/0x5450 [ 17.963667] kasan_check_range+0x10c/0x1c0 [ 17.964518] __kasan_check_write+0x18/0x20 [ 17.964582] kasan_atomics_helper+0x5fe/0x5450 [ 17.964612] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.964640] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.964667] ? kasan_atomics+0x152/0x310 [ 17.964711] kasan_atomics+0x1dc/0x310 [ 17.964751] ? __pfx_kasan_atomics+0x10/0x10 [ 17.964793] ? __pfx_read_tsc+0x10/0x10 [ 17.964834] ? ktime_get_ts64+0x86/0x230 [ 17.964875] kunit_try_run_case+0x1a5/0x480 [ 17.964902] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.964925] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.964957] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.964986] ? __kthread_parkme+0x82/0x180 [ 17.965009] ? preempt_count_sub+0x50/0x80 [ 17.965037] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.965061] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.965089] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.965117] kthread+0x337/0x6f0 [ 17.965140] ? trace_preempt_on+0x20/0xc0 [ 17.965167] ? __pfx_kthread+0x10/0x10 [ 17.965195] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.965246] ? calculate_sigpending+0x7b/0xa0 [ 17.965274] ? __pfx_kthread+0x10/0x10 [ 17.965299] ret_from_fork+0x116/0x1d0 [ 17.965322] ? __pfx_kthread+0x10/0x10 [ 17.965347] ret_from_fork_asm+0x1a/0x30 [ 17.965384] </TASK> [ 17.965399] [ 17.975836] Allocated by task 282: [ 17.976577] kasan_save_stack+0x45/0x70 [ 17.977901] kasan_save_track+0x18/0x40 [ 17.978620] kasan_save_alloc_info+0x3b/0x50 [ 17.979247] __kasan_kmalloc+0xb7/0xc0 [ 17.979624] __kmalloc_cache_noprof+0x189/0x420 [ 17.980261] kasan_atomics+0x95/0x310 [ 17.980497] kunit_try_run_case+0x1a5/0x480 [ 17.980884] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.982426] kthread+0x337/0x6f0 [ 17.982968] ret_from_fork+0x116/0x1d0 [ 17.983266] ret_from_fork_asm+0x1a/0x30 [ 17.983511] [ 17.983948] The buggy address belongs to the object at ffff8881033ecb00 [ 17.983948] which belongs to the cache kmalloc-64 of size 64 [ 17.985625] The buggy address is located 0 bytes to the right of [ 17.985625] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 17.986676] [ 17.987013] The buggy address belongs to the physical page: [ 17.987429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 17.988253] flags: 0x200000000000000(node=0|zone=2) [ 17.988884] page_type: f5(slab) [ 17.989490] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.990294] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.990758] page dumped because: kasan: bad access detected [ 17.991069] [ 17.991303] Memory state around the buggy address: [ 17.991701] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.992147] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.992602] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.993232] ^ [ 17.993770] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.993994] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.994216] ================================================================== [ 19.442969] ================================================================== [ 19.443688] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 19.444469] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 19.444768] [ 19.444934] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 19.445042] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.445069] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.445119] Call Trace: [ 19.445167] <TASK> [ 19.445210] dump_stack_lvl+0x73/0xb0 [ 19.445281] print_report+0xd1/0x650 [ 19.445332] ? __virt_addr_valid+0x1db/0x2d0 [ 19.445382] ? kasan_atomics_helper+0x1f43/0x5450 [ 19.445434] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.445499] ? kasan_atomics_helper+0x1f43/0x5450 [ 19.445548] kasan_report+0x141/0x180 [ 19.445577] ? kasan_atomics_helper+0x1f43/0x5450 [ 19.445609] kasan_check_range+0x10c/0x1c0 [ 19.445637] __kasan_check_write+0x18/0x20 [ 19.445660] kasan_atomics_helper+0x1f43/0x5450 [ 19.445687] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 19.445714] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.445740] ? kasan_atomics+0x152/0x310 [ 19.445771] kasan_atomics+0x1dc/0x310 [ 19.445797] ? __pfx_kasan_atomics+0x10/0x10 [ 19.445826] ? __pfx_read_tsc+0x10/0x10 [ 19.445852] ? ktime_get_ts64+0x86/0x230 [ 19.445882] kunit_try_run_case+0x1a5/0x480 [ 19.445908] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.445930] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.445959] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.445986] ? __kthread_parkme+0x82/0x180 [ 19.446010] ? preempt_count_sub+0x50/0x80 [ 19.446038] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.446062] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.446089] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.446118] kthread+0x337/0x6f0 [ 19.446141] ? trace_preempt_on+0x20/0xc0 [ 19.446168] ? __pfx_kthread+0x10/0x10 [ 19.446196] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.446253] ? calculate_sigpending+0x7b/0xa0 [ 19.446304] ? __pfx_kthread+0x10/0x10 [ 19.446352] ret_from_fork+0x116/0x1d0 [ 19.446399] ? __pfx_kthread+0x10/0x10 [ 19.446448] ret_from_fork_asm+0x1a/0x30 [ 19.446520] </TASK> [ 19.446544] [ 19.459233] Allocated by task 282: [ 19.459642] kasan_save_stack+0x45/0x70 [ 19.460034] kasan_save_track+0x18/0x40 [ 19.460581] kasan_save_alloc_info+0x3b/0x50 [ 19.460823] __kasan_kmalloc+0xb7/0xc0 [ 19.461010] __kmalloc_cache_noprof+0x189/0x420 [ 19.461595] kasan_atomics+0x95/0x310 [ 19.461889] kunit_try_run_case+0x1a5/0x480 [ 19.462110] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.462576] kthread+0x337/0x6f0 [ 19.462897] ret_from_fork+0x116/0x1d0 [ 19.463154] ret_from_fork_asm+0x1a/0x30 [ 19.463483] [ 19.463676] The buggy address belongs to the object at ffff8881033ecb00 [ 19.463676] which belongs to the cache kmalloc-64 of size 64 [ 19.464509] The buggy address is located 0 bytes to the right of [ 19.464509] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 19.465308] [ 19.465517] The buggy address belongs to the physical page: [ 19.465984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 19.466508] flags: 0x200000000000000(node=0|zone=2) [ 19.466946] page_type: f5(slab) [ 19.467267] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.467803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.468096] page dumped because: kasan: bad access detected [ 19.468593] [ 19.468797] Memory state around the buggy address: [ 19.469250] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.469688] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.470040] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.470557] ^ [ 19.470923] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.471439] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.471948] ================================================================== [ 18.235263] ================================================================== [ 18.235854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 18.236557] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.237083] [ 18.237384] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.237552] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.237587] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.237636] Call Trace: [ 18.237684] <TASK> [ 18.237760] dump_stack_lvl+0x73/0xb0 [ 18.237855] print_report+0xd1/0x650 [ 18.237909] ? __virt_addr_valid+0x1db/0x2d0 [ 18.237956] ? kasan_atomics_helper+0xb6a/0x5450 [ 18.238001] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.238052] ? kasan_atomics_helper+0xb6a/0x5450 [ 18.238134] kasan_report+0x141/0x180 [ 18.238238] ? kasan_atomics_helper+0xb6a/0x5450 [ 18.238302] kasan_check_range+0x10c/0x1c0 [ 18.238385] __kasan_check_write+0x18/0x20 [ 18.238442] kasan_atomics_helper+0xb6a/0x5450 [ 18.238512] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.238568] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.238601] ? kasan_atomics+0x152/0x310 [ 18.238634] kasan_atomics+0x1dc/0x310 [ 18.238662] ? __pfx_kasan_atomics+0x10/0x10 [ 18.238691] ? __pfx_read_tsc+0x10/0x10 [ 18.238718] ? ktime_get_ts64+0x86/0x230 [ 18.238750] kunit_try_run_case+0x1a5/0x480 [ 18.238777] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.238801] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.238831] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.238860] ? __kthread_parkme+0x82/0x180 [ 18.238885] ? preempt_count_sub+0x50/0x80 [ 18.238913] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.238938] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.238966] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.238995] kthread+0x337/0x6f0 [ 18.239018] ? trace_preempt_on+0x20/0xc0 [ 18.239044] ? __pfx_kthread+0x10/0x10 [ 18.239069] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.239094] ? calculate_sigpending+0x7b/0xa0 [ 18.239122] ? __pfx_kthread+0x10/0x10 [ 18.239148] ret_from_fork+0x116/0x1d0 [ 18.239170] ? __pfx_kthread+0x10/0x10 [ 18.239214] ret_from_fork_asm+0x1a/0x30 [ 18.239279] </TASK> [ 18.239295] [ 18.251845] Allocated by task 282: [ 18.252120] kasan_save_stack+0x45/0x70 [ 18.252392] kasan_save_track+0x18/0x40 [ 18.252585] kasan_save_alloc_info+0x3b/0x50 [ 18.252702] __kasan_kmalloc+0xb7/0xc0 [ 18.252804] __kmalloc_cache_noprof+0x189/0x420 [ 18.252917] kasan_atomics+0x95/0x310 [ 18.253018] kunit_try_run_case+0x1a5/0x480 [ 18.253120] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.253242] kthread+0x337/0x6f0 [ 18.253338] ret_from_fork+0x116/0x1d0 [ 18.253438] ret_from_fork_asm+0x1a/0x30 [ 18.254141] [ 18.254392] The buggy address belongs to the object at ffff8881033ecb00 [ 18.254392] which belongs to the cache kmalloc-64 of size 64 [ 18.256716] The buggy address is located 0 bytes to the right of [ 18.256716] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.257763] [ 18.257856] The buggy address belongs to the physical page: [ 18.257987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.258164] flags: 0x200000000000000(node=0|zone=2) [ 18.258595] page_type: f5(slab) [ 18.258912] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.259534] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.260128] page dumped because: kasan: bad access detected [ 18.260562] [ 18.260692] Memory state around the buggy address: [ 18.261044] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.262208] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.262866] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.263223] ^ [ 18.263425] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.263687] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.264197] ================================================================== [ 18.081979] ================================================================== [ 18.083013] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 18.083577] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.083962] [ 18.084222] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.084328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.084358] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.084407] Call Trace: [ 18.084463] <TASK> [ 18.084511] dump_stack_lvl+0x73/0xb0 [ 18.084584] print_report+0xd1/0x650 [ 18.084642] ? __virt_addr_valid+0x1db/0x2d0 [ 18.084700] ? kasan_atomics_helper+0x860/0x5450 [ 18.084754] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.084809] ? kasan_atomics_helper+0x860/0x5450 [ 18.084863] kasan_report+0x141/0x180 [ 18.084919] ? kasan_atomics_helper+0x860/0x5450 [ 18.084986] kasan_check_range+0x10c/0x1c0 [ 18.085045] __kasan_check_write+0x18/0x20 [ 18.085096] kasan_atomics_helper+0x860/0x5450 [ 18.085153] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.085239] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.085297] ? kasan_atomics+0x152/0x310 [ 18.085352] kasan_atomics+0x1dc/0x310 [ 18.085396] ? __pfx_kasan_atomics+0x10/0x10 [ 18.085442] ? __pfx_read_tsc+0x10/0x10 [ 18.085502] ? ktime_get_ts64+0x86/0x230 [ 18.085560] kunit_try_run_case+0x1a5/0x480 [ 18.085612] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.085658] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.085714] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.085770] ? __kthread_parkme+0x82/0x180 [ 18.085818] ? preempt_count_sub+0x50/0x80 [ 18.085874] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.085922] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.085973] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.086027] kthread+0x337/0x6f0 [ 18.086072] ? trace_preempt_on+0x20/0xc0 [ 18.086125] ? __pfx_kthread+0x10/0x10 [ 18.086175] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.086254] ? calculate_sigpending+0x7b/0xa0 [ 18.086300] ? __pfx_kthread+0x10/0x10 [ 18.086347] ret_from_fork+0x116/0x1d0 [ 18.086389] ? __pfx_kthread+0x10/0x10 [ 18.086427] ret_from_fork_asm+0x1a/0x30 [ 18.086505] </TASK> [ 18.086534] [ 18.096286] Allocated by task 282: [ 18.096682] kasan_save_stack+0x45/0x70 [ 18.097087] kasan_save_track+0x18/0x40 [ 18.097426] kasan_save_alloc_info+0x3b/0x50 [ 18.097837] __kasan_kmalloc+0xb7/0xc0 [ 18.098222] __kmalloc_cache_noprof+0x189/0x420 [ 18.098500] kasan_atomics+0x95/0x310 [ 18.098682] kunit_try_run_case+0x1a5/0x480 [ 18.098883] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.099126] kthread+0x337/0x6f0 [ 18.099513] ret_from_fork+0x116/0x1d0 [ 18.099854] ret_from_fork_asm+0x1a/0x30 [ 18.100285] [ 18.100496] The buggy address belongs to the object at ffff8881033ecb00 [ 18.100496] which belongs to the cache kmalloc-64 of size 64 [ 18.101437] The buggy address is located 0 bytes to the right of [ 18.101437] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.102429] [ 18.102629] The buggy address belongs to the physical page: [ 18.103051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.103750] flags: 0x200000000000000(node=0|zone=2) [ 18.104165] page_type: f5(slab) [ 18.104492] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.105077] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.105651] page dumped because: kasan: bad access detected [ 18.106080] [ 18.106298] Memory state around the buggy address: [ 18.106726] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.107347] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.107849] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.108602] ^ [ 18.109028] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.109813] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.110302] ================================================================== [ 18.953540] ================================================================== [ 18.954060] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 18.954399] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282 [ 18.954976] [ 18.955181] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 18.955267] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.955326] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.955382] Call Trace: [ 18.955443] <TASK> [ 18.955497] dump_stack_lvl+0x73/0xb0 [ 18.955568] print_report+0xd1/0x650 [ 18.955618] ? __virt_addr_valid+0x1db/0x2d0 [ 18.955675] ? kasan_atomics_helper+0x15b6/0x5450 [ 18.955730] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.955788] ? kasan_atomics_helper+0x15b6/0x5450 [ 18.955845] kasan_report+0x141/0x180 [ 18.955902] ? kasan_atomics_helper+0x15b6/0x5450 [ 18.955983] kasan_check_range+0x10c/0x1c0 [ 18.956038] __kasan_check_write+0x18/0x20 [ 18.956083] kasan_atomics_helper+0x15b6/0x5450 [ 18.956136] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.956204] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.956268] ? kasan_atomics+0x152/0x310 [ 18.956327] kasan_atomics+0x1dc/0x310 [ 18.956385] ? __pfx_kasan_atomics+0x10/0x10 [ 18.956447] ? __pfx_read_tsc+0x10/0x10 [ 18.956516] ? ktime_get_ts64+0x86/0x230 [ 18.956580] kunit_try_run_case+0x1a5/0x480 [ 18.956637] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.956688] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.956750] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.956808] ? __kthread_parkme+0x82/0x180 [ 18.956858] ? preempt_count_sub+0x50/0x80 [ 18.956918] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.956972] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.957033] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.957093] kthread+0x337/0x6f0 [ 18.957142] ? trace_preempt_on+0x20/0xc0 [ 18.957199] ? __pfx_kthread+0x10/0x10 [ 18.957266] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.957319] ? calculate_sigpending+0x7b/0xa0 [ 18.957373] ? __pfx_kthread+0x10/0x10 [ 18.957419] ret_from_fork+0x116/0x1d0 [ 18.957502] ? __pfx_kthread+0x10/0x10 [ 18.957552] ret_from_fork_asm+0x1a/0x30 [ 18.957632] </TASK> [ 18.957665] [ 18.969853] Allocated by task 282: [ 18.970451] kasan_save_stack+0x45/0x70 [ 18.970750] kasan_save_track+0x18/0x40 [ 18.971037] kasan_save_alloc_info+0x3b/0x50 [ 18.971479] __kasan_kmalloc+0xb7/0xc0 [ 18.971760] __kmalloc_cache_noprof+0x189/0x420 [ 18.972153] kasan_atomics+0x95/0x310 [ 18.972556] kunit_try_run_case+0x1a5/0x480 [ 18.972861] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.973310] kthread+0x337/0x6f0 [ 18.973681] ret_from_fork+0x116/0x1d0 [ 18.973937] ret_from_fork_asm+0x1a/0x30 [ 18.974299] [ 18.974512] The buggy address belongs to the object at ffff8881033ecb00 [ 18.974512] which belongs to the cache kmalloc-64 of size 64 [ 18.975148] The buggy address is located 0 bytes to the right of [ 18.975148] allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30) [ 18.975910] [ 18.976112] The buggy address belongs to the physical page: [ 18.976491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec [ 18.977057] flags: 0x200000000000000(node=0|zone=2) [ 18.977529] page_type: f5(slab) [ 18.977819] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.978292] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.978864] page dumped because: kasan: bad access detected [ 18.979181] [ 18.979429] Memory state around the buggy address: [ 18.979743] ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.980296] ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.980626] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.980861] ^ [ 18.982749] ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.983275] ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.984601] ==================================================================