Date
June 5, 2025, 7:08 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 29.967624] ================================================================== [ 29.967741] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 29.968068] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.968392] [ 29.968630] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.968868] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.968940] Hardware name: linux,dummy-virt (DT) [ 29.969025] Call trace: [ 29.969270] show_stack+0x20/0x38 (C) [ 29.969736] dump_stack_lvl+0x8c/0xd0 [ 29.970371] print_report+0x118/0x608 [ 29.970895] kasan_report+0xdc/0x128 [ 29.971023] kasan_check_range+0x100/0x1a8 [ 29.971409] __kasan_check_write+0x20/0x30 [ 29.971692] kasan_atomics_helper+0x10c0/0x4858 [ 29.972317] kasan_atomics+0x198/0x2e0 [ 29.972935] kunit_try_run_case+0x170/0x3f0 [ 29.973115] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.973252] kthread+0x328/0x630 [ 29.973391] ret_from_fork+0x10/0x20 [ 29.973516] [ 29.973759] Allocated by task 265: [ 29.974508] kasan_save_stack+0x3c/0x68 [ 29.974703] kasan_save_track+0x20/0x40 [ 29.974913] kasan_save_alloc_info+0x40/0x58 [ 29.975081] __kasan_kmalloc+0xd4/0xd8 [ 29.975203] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.975497] kasan_atomics+0xb8/0x2e0 [ 29.975612] kunit_try_run_case+0x170/0x3f0 [ 29.975937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.976122] kthread+0x328/0x630 [ 29.976258] ret_from_fork+0x10/0x20 [ 29.976394] [ 29.976453] The buggy address belongs to the object at fff00000c770a480 [ 29.976453] which belongs to the cache kmalloc-64 of size 64 [ 29.976624] The buggy address is located 0 bytes to the right of [ 29.976624] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.976880] [ 29.976977] The buggy address belongs to the physical page: [ 29.977063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.977195] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.977356] page_type: f5(slab) [ 29.977472] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.977666] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.977982] page dumped because: kasan: bad access detected [ 29.978120] [ 29.978174] Memory state around the buggy address: [ 29.978256] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.978390] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.978508] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.978605] ^ [ 29.978883] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.979042] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.979160] ================================================================== [ 30.035564] ================================================================== [ 30.035678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 30.035804] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 30.036707] [ 30.036823] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.037654] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.037764] Hardware name: linux,dummy-virt (DT) [ 30.038017] Call trace: [ 30.038189] show_stack+0x20/0x38 (C) [ 30.038989] dump_stack_lvl+0x8c/0xd0 [ 30.039381] print_report+0x118/0x608 [ 30.039756] kasan_report+0xdc/0x128 [ 30.040381] kasan_check_range+0x100/0x1a8 [ 30.040756] __kasan_check_write+0x20/0x30 [ 30.041296] kasan_atomics_helper+0x126c/0x4858 [ 30.041503] kasan_atomics+0x198/0x2e0 [ 30.041630] kunit_try_run_case+0x170/0x3f0 [ 30.042254] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.043034] kthread+0x328/0x630 [ 30.043457] ret_from_fork+0x10/0x20 [ 30.043747] [ 30.044167] Allocated by task 265: [ 30.044256] kasan_save_stack+0x3c/0x68 [ 30.044457] kasan_save_track+0x20/0x40 [ 30.045227] kasan_save_alloc_info+0x40/0x58 [ 30.045387] __kasan_kmalloc+0xd4/0xd8 [ 30.045773] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.045881] kasan_atomics+0xb8/0x2e0 [ 30.046761] kunit_try_run_case+0x170/0x3f0 [ 30.046906] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.047022] kthread+0x328/0x630 [ 30.047074] ret_from_fork+0x10/0x20 [ 30.047126] [ 30.047153] The buggy address belongs to the object at fff00000c770a480 [ 30.047153] which belongs to the cache kmalloc-64 of size 64 [ 30.047230] The buggy address is located 0 bytes to the right of [ 30.047230] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.047314] [ 30.047402] The buggy address belongs to the physical page: [ 30.047609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.047743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.047921] page_type: f5(slab) [ 30.048106] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.048244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.048384] page dumped because: kasan: bad access detected [ 30.048471] [ 30.048519] Memory state around the buggy address: [ 30.048640] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.048993] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.049574] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.049846] ^ [ 30.049943] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.050566] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.050940] ================================================================== [ 29.518953] ================================================================== [ 29.519063] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 29.519172] Write of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.519758] [ 29.520734] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.521094] Hardware name: linux,dummy-virt (DT) [ 29.521247] Call trace: [ 29.521862] show_stack+0x20/0x38 (C) [ 29.522034] dump_stack_lvl+0x8c/0xd0 [ 29.522504] print_report+0x118/0x608 [ 29.522667] kasan_report+0xdc/0x128 [ 29.523456] __kasan_check_write+0x20/0x30 [ 29.526492] kthread+0x328/0x630 [ 29.527268] [ 29.527802] __kasan_kmalloc+0xd4/0xd8 [ 29.527976] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.529084] ret_from_fork+0x10/0x20 [ 29.529204] [ 29.529686] The buggy address is located 0 bytes to the right of [ 29.529686] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.529991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.530883] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.531037] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.531144] page dumped because: kasan: bad access detected [ 29.531257] [ 29.531319] Memory state around the buggy address: [ 29.531602] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.531857] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.532672] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.538462] kasan_report+0xdc/0x128 [ 29.540869] kthread+0x328/0x630 [ 29.542528] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.544317] [ 29.546679] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.546820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.546926] page dumped because: kasan: bad access detected [ 29.547008] [ 29.547080] Memory state around the buggy address: [ 29.547161] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.547274] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.547419] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.547525] ^ [ 29.547612] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.547719] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.548041] ================================================================== [ 30.005300] ================================================================== [ 30.005426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 30.005546] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 30.005676] [ 30.005739] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.006128] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.006243] Hardware name: linux,dummy-virt (DT) [ 30.006356] Call trace: [ 30.006467] show_stack+0x20/0x38 (C) [ 30.006914] dump_stack_lvl+0x8c/0xd0 [ 30.007108] print_report+0x118/0x608 [ 30.007226] kasan_report+0xdc/0x128 [ 30.007360] kasan_check_range+0x100/0x1a8 [ 30.007490] __kasan_check_write+0x20/0x30 [ 30.007610] kasan_atomics_helper+0x11f8/0x4858 [ 30.007728] kasan_atomics+0x198/0x2e0 [ 30.007859] kunit_try_run_case+0x170/0x3f0 [ 30.009660] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.011533] kthread+0x328/0x630 [ 30.012360] ret_from_fork+0x10/0x20 [ 30.013111] [ 30.013166] Allocated by task 265: [ 30.013765] kasan_save_stack+0x3c/0x68 [ 30.014010] kasan_save_track+0x20/0x40 [ 30.014678] kasan_save_alloc_info+0x40/0x58 [ 30.014797] __kasan_kmalloc+0xd4/0xd8 [ 30.015627] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.016075] kasan_atomics+0xb8/0x2e0 [ 30.016175] kunit_try_run_case+0x170/0x3f0 [ 30.016275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.018427] kthread+0x328/0x630 [ 30.018968] ret_from_fork+0x10/0x20 [ 30.019558] [ 30.019616] The buggy address belongs to the object at fff00000c770a480 [ 30.019616] which belongs to the cache kmalloc-64 of size 64 [ 30.020267] The buggy address is located 0 bytes to the right of [ 30.020267] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.021636] [ 30.021783] The buggy address belongs to the physical page: [ 30.021867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.021997] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.022116] page_type: f5(slab) [ 30.022209] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.024544] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.025534] page dumped because: kasan: bad access detected [ 30.025725] [ 30.025777] Memory state around the buggy address: [ 30.026617] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.027438] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.028219] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.028435] ^ [ 30.028920] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.030125] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.030400] ================================================================== [ 30.255580] ================================================================== [ 30.257271] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 30.257889] Read of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 30.258465] [ 30.258541] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.259166] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.259238] Hardware name: linux,dummy-virt (DT) [ 30.259321] Call trace: [ 30.259400] show_stack+0x20/0x38 (C) [ 30.260864] dump_stack_lvl+0x8c/0xd0 [ 30.261855] print_report+0x118/0x608 [ 30.262002] kasan_report+0xdc/0x128 [ 30.262122] __asan_report_load8_noabort+0x20/0x30 [ 30.262251] kasan_atomics_helper+0x3e20/0x4858 [ 30.264588] kasan_atomics+0x198/0x2e0 [ 30.264928] kunit_try_run_case+0x170/0x3f0 [ 30.265520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.266469] kthread+0x328/0x630 [ 30.266586] ret_from_fork+0x10/0x20 [ 30.267766] [ 30.267994] Allocated by task 265: [ 30.268080] kasan_save_stack+0x3c/0x68 [ 30.268188] kasan_save_track+0x20/0x40 [ 30.268286] kasan_save_alloc_info+0x40/0x58 [ 30.269541] __kasan_kmalloc+0xd4/0xd8 [ 30.269652] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.270851] kasan_atomics+0xb8/0x2e0 [ 30.271403] kunit_try_run_case+0x170/0x3f0 [ 30.272726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.273205] kthread+0x328/0x630 [ 30.273534] ret_from_fork+0x10/0x20 [ 30.274292] [ 30.274369] The buggy address belongs to the object at fff00000c770a480 [ 30.274369] which belongs to the cache kmalloc-64 of size 64 [ 30.274780] The buggy address is located 0 bytes to the right of [ 30.274780] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.276119] [ 30.276502] The buggy address belongs to the physical page: [ 30.276921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.277724] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.277867] page_type: f5(slab) [ 30.278844] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.279631] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.280212] page dumped because: kasan: bad access detected [ 30.280302] [ 30.280375] Memory state around the buggy address: [ 30.281582] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.282658] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.283397] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.284089] ^ [ 30.284908] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.285072] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.285175] ================================================================== [ 29.928772] ================================================================== [ 29.928883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 29.929018] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.929146] [ 29.929220] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.929456] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.929525] Hardware name: linux,dummy-virt (DT) [ 29.929604] Call trace: [ 29.929657] show_stack+0x20/0x38 (C) [ 29.929776] dump_stack_lvl+0x8c/0xd0 [ 29.929889] print_report+0x118/0x608 [ 29.930006] kasan_report+0xdc/0x128 [ 29.930118] kasan_check_range+0x100/0x1a8 [ 29.930238] __kasan_check_write+0x20/0x30 [ 29.932295] kasan_atomics_helper+0xf88/0x4858 [ 29.932555] kasan_atomics+0x198/0x2e0 [ 29.932691] kunit_try_run_case+0x170/0x3f0 [ 29.932835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.933479] kthread+0x328/0x630 [ 29.933633] ret_from_fork+0x10/0x20 [ 29.934278] [ 29.934640] Allocated by task 265: [ 29.934954] kasan_save_stack+0x3c/0x68 [ 29.935083] kasan_save_track+0x20/0x40 [ 29.935504] kasan_save_alloc_info+0x40/0x58 [ 29.935908] __kasan_kmalloc+0xd4/0xd8 [ 29.936434] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.937079] kasan_atomics+0xb8/0x2e0 [ 29.937211] kunit_try_run_case+0x170/0x3f0 [ 29.937363] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.937599] kthread+0x328/0x630 [ 29.938076] ret_from_fork+0x10/0x20 [ 29.938436] [ 29.938828] The buggy address belongs to the object at fff00000c770a480 [ 29.938828] which belongs to the cache kmalloc-64 of size 64 [ 29.939025] The buggy address is located 0 bytes to the right of [ 29.939025] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.939979] [ 29.940048] The buggy address belongs to the physical page: [ 29.940141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.940661] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.940938] page_type: f5(slab) [ 29.941039] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.941261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.941898] page dumped because: kasan: bad access detected [ 29.942009] [ 29.942063] Memory state around the buggy address: [ 29.942129] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.942193] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.942250] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.942300] ^ [ 29.942751] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.943031] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.943224] ================================================================== [ 29.731680] ================================================================== [ 29.731744] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 29.731808] Read of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.733223] kthread+0x328/0x630 [ 29.740746] [ 29.740810] The buggy address belongs to the physical page: [ 29.741079] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.742353] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.747385] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 29.748203] dump_stack_lvl+0x8c/0xd0 [ 29.755143] The buggy address belongs to the physical page: [ 29.755511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.755787] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.755959] page_type: f5(slab) [ 29.756299] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.756566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.756676] page dumped because: kasan: bad access detected [ 29.756758] [ 29.756810] Memory state around the buggy address: [ 29.757137] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.757674] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.758206] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.758533] ^ [ 29.758677] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.758909] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.759018] ================================================================== [ 29.979803] ================================================================== [ 29.979906] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 29.980147] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.980380] [ 29.980610] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.981083] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.981250] Hardware name: linux,dummy-virt (DT) [ 29.981477] Call trace: [ 29.981588] show_stack+0x20/0x38 (C) [ 29.981758] dump_stack_lvl+0x8c/0xd0 [ 29.981893] print_report+0x118/0x608 [ 29.982023] kasan_report+0xdc/0x128 [ 29.982248] kasan_check_range+0x100/0x1a8 [ 29.982424] __kasan_check_write+0x20/0x30 [ 29.982544] kasan_atomics_helper+0x1128/0x4858 [ 29.983926] kasan_atomics+0x198/0x2e0 [ 29.984440] kunit_try_run_case+0x170/0x3f0 [ 29.984638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.984884] kthread+0x328/0x630 [ 29.985073] ret_from_fork+0x10/0x20 [ 29.985319] [ 29.985422] Allocated by task 265: [ 29.985757] kasan_save_stack+0x3c/0x68 [ 29.985908] kasan_save_track+0x20/0x40 [ 29.986015] kasan_save_alloc_info+0x40/0x58 [ 29.986165] __kasan_kmalloc+0xd4/0xd8 [ 29.987937] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.988425] kasan_atomics+0xb8/0x2e0 [ 29.989363] kunit_try_run_case+0x170/0x3f0 [ 29.989624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.989929] kthread+0x328/0x630 [ 29.990022] ret_from_fork+0x10/0x20 [ 29.990283] [ 29.990490] The buggy address belongs to the object at fff00000c770a480 [ 29.990490] which belongs to the cache kmalloc-64 of size 64 [ 29.991302] The buggy address is located 0 bytes to the right of [ 29.991302] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.991761] [ 29.992198] The buggy address belongs to the physical page: [ 29.992293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.992506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.992681] page_type: f5(slab) [ 29.992798] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.993084] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.993193] page dumped because: kasan: bad access detected [ 29.993316] [ 29.993447] Memory state around the buggy address: [ 29.993526] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.993717] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.993962] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.994140] ^ [ 29.994277] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.994843] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.995368] ================================================================== [ 29.717808] ================================================================== [ 29.718000] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 29.718119] Write of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.719064] Hardware name: linux,dummy-virt (DT) [ 29.722364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.727282] The buggy address is located 0 bytes to the right of [ 29.727282] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.728211] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.730593] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.730697] ================================================================== [ 29.549485] ================================================================== [ 29.549593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 29.549873] Read of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.550012] [ 29.550081] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.550382] Hardware name: linux,dummy-virt (DT) [ 29.551313] __asan_report_load4_noabort+0x20/0x30 [ 29.554707] [ 29.557094] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.558635] [ 29.558841] The buggy address is located 0 bytes to the right of [ 29.558841] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.560558] page_type: f5(slab) [ 29.561757] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.565879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 29.572364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.572509] kthread+0x328/0x630 [ 29.572627] ret_from_fork+0x10/0x20 [ 29.573964] [ 29.574216] Allocated by task 265: [ 29.574298] kasan_save_stack+0x3c/0x68 [ 29.575018] kasan_save_track+0x20/0x40 [ 29.575404] kasan_save_alloc_info+0x40/0x58 [ 29.576001] __kasan_kmalloc+0xd4/0xd8 [ 29.576119] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.576667] kasan_atomics+0xb8/0x2e0 [ 29.576812] kunit_try_run_case+0x170/0x3f0 [ 29.577223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.577767] kthread+0x328/0x630 [ 29.577910] ret_from_fork+0x10/0x20 [ 29.578013] [ 29.578770] The buggy address belongs to the object at fff00000c770a480 [ 29.578770] which belongs to the cache kmalloc-64 of size 64 [ 29.579245] The buggy address is located 0 bytes to the right of [ 29.579245] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.579705] [ 29.579762] The buggy address belongs to the physical page: [ 29.580451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.581058] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.581191] page_type: f5(slab) [ 29.581298] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.581448] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.581557] page dumped because: kasan: bad access detected [ 29.581640] [ 29.581687] Memory state around the buggy address: [ 29.582380] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.582612] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.582819] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.583902] ^ [ 29.584313] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.584457] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.585261] ================================================================== [ 29.630227] ================================================================== [ 29.630361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 29.630482] Write of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.630610] [ 29.630681] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.632609] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.633964] Hardware name: linux,dummy-virt (DT) [ 29.634054] Call trace: [ 29.635011] show_stack+0x20/0x38 (C) [ 29.635216] dump_stack_lvl+0x8c/0xd0 [ 29.635457] print_report+0x118/0x608 [ 29.636368] kasan_report+0xdc/0x128 [ 29.636642] kasan_check_range+0x100/0x1a8 [ 29.636782] __kasan_check_write+0x20/0x30 [ 29.637702] kasan_atomics_helper+0xa6c/0x4858 [ 29.638559] kasan_atomics+0x198/0x2e0 [ 29.638972] kunit_try_run_case+0x170/0x3f0 [ 29.639431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.640626] kthread+0x328/0x630 [ 29.641037] ret_from_fork+0x10/0x20 [ 29.642016] [ 29.642136] Allocated by task 265: [ 29.642221] kasan_save_stack+0x3c/0x68 [ 29.643293] kasan_save_track+0x20/0x40 [ 29.643571] kasan_save_alloc_info+0x40/0x58 [ 29.644515] __kasan_kmalloc+0xd4/0xd8 [ 29.644994] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.645111] kasan_atomics+0xb8/0x2e0 [ 29.645603] kunit_try_run_case+0x170/0x3f0 [ 29.645970] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.646094] kthread+0x328/0x630 [ 29.647404] ret_from_fork+0x10/0x20 [ 29.647927] [ 29.648104] The buggy address belongs to the object at fff00000c770a480 [ 29.648104] which belongs to the cache kmalloc-64 of size 64 [ 29.648485] The buggy address is located 0 bytes to the right of [ 29.648485] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.648658] [ 29.649421] The buggy address belongs to the physical page: [ 29.649547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.650871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.651436] page_type: f5(slab) [ 29.651577] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.651707] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.651814] page dumped because: kasan: bad access detected [ 29.652877] [ 29.652989] Memory state around the buggy address: [ 29.653506] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.654272] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.654408] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.654512] ^ [ 29.655847] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.656016] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.656809] ================================================================== [ 29.885390] ================================================================== [ 29.885493] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 29.886886] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.887312] [ 29.887434] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.887668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.887953] Hardware name: linux,dummy-virt (DT) [ 29.888940] Call trace: [ 29.889029] show_stack+0x20/0x38 (C) [ 29.889157] dump_stack_lvl+0x8c/0xd0 [ 29.889427] print_report+0x118/0x608 [ 29.889567] kasan_report+0xdc/0x128 [ 29.889797] kasan_check_range+0x100/0x1a8 [ 29.889968] __kasan_check_write+0x20/0x30 [ 29.890160] kasan_atomics_helper+0xeb8/0x4858 [ 29.890443] kasan_atomics+0x198/0x2e0 [ 29.890627] kunit_try_run_case+0x170/0x3f0 [ 29.890955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.891102] kthread+0x328/0x630 [ 29.891668] ret_from_fork+0x10/0x20 [ 29.892078] [ 29.892135] Allocated by task 265: [ 29.892236] kasan_save_stack+0x3c/0x68 [ 29.892369] kasan_save_track+0x20/0x40 [ 29.892473] kasan_save_alloc_info+0x40/0x58 [ 29.893749] __kasan_kmalloc+0xd4/0xd8 [ 29.894823] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.894976] kasan_atomics+0xb8/0x2e0 [ 29.895662] kunit_try_run_case+0x170/0x3f0 [ 29.896129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.896257] kthread+0x328/0x630 [ 29.896375] ret_from_fork+0x10/0x20 [ 29.896482] [ 29.896538] The buggy address belongs to the object at fff00000c770a480 [ 29.896538] which belongs to the cache kmalloc-64 of size 64 [ 29.896687] The buggy address is located 0 bytes to the right of [ 29.896687] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.896847] [ 29.897722] The buggy address belongs to the physical page: [ 29.897982] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.898359] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.898965] page_type: f5(slab) [ 29.899418] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.900026] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.900131] page dumped because: kasan: bad access detected [ 29.900922] [ 29.901356] Memory state around the buggy address: [ 29.901460] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.901590] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.901716] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.902611] ^ [ 29.902866] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.903589] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.903856] ================================================================== [ 30.198510] ================================================================== [ 30.198624] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 30.198801] Read of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 30.199167] [ 30.199248] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.199474] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.199544] Hardware name: linux,dummy-virt (DT) [ 30.199650] Call trace: [ 30.199729] show_stack+0x20/0x38 (C) [ 30.199931] dump_stack_lvl+0x8c/0xd0 [ 30.200362] print_report+0x118/0x608 [ 30.200523] kasan_report+0xdc/0x128 [ 30.200654] __asan_report_load8_noabort+0x20/0x30 [ 30.200791] kasan_atomics_helper+0x3df4/0x4858 [ 30.200942] kasan_atomics+0x198/0x2e0 [ 30.201238] kunit_try_run_case+0x170/0x3f0 [ 30.201532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.201733] kthread+0x328/0x630 [ 30.201882] ret_from_fork+0x10/0x20 [ 30.202165] [ 30.202316] Allocated by task 265: [ 30.202444] kasan_save_stack+0x3c/0x68 [ 30.202717] kasan_save_track+0x20/0x40 [ 30.202833] kasan_save_alloc_info+0x40/0x58 [ 30.202968] __kasan_kmalloc+0xd4/0xd8 [ 30.203264] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.203403] kasan_atomics+0xb8/0x2e0 [ 30.203797] kunit_try_run_case+0x170/0x3f0 [ 30.203933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.204072] kthread+0x328/0x630 [ 30.204174] ret_from_fork+0x10/0x20 [ 30.205034] [ 30.205405] The buggy address belongs to the object at fff00000c770a480 [ 30.205405] which belongs to the cache kmalloc-64 of size 64 [ 30.205833] The buggy address is located 0 bytes to the right of [ 30.205833] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.206486] [ 30.206601] The buggy address belongs to the physical page: [ 30.206699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.207396] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.207565] page_type: f5(slab) [ 30.207668] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.207797] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.207909] page dumped because: kasan: bad access detected [ 30.208015] [ 30.208081] Memory state around the buggy address: [ 30.208359] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.208868] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.208991] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.209674] ^ [ 30.209994] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.210522] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.210703] ================================================================== [ 29.588949] ================================================================== [ 29.589052] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 29.589159] Write of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.589300] [ 29.589429] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.589662] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.589742] Hardware name: linux,dummy-virt (DT) [ 29.589821] Call trace: [ 29.589876] show_stack+0x20/0x38 (C) [ 29.589994] dump_stack_lvl+0x8c/0xd0 [ 29.590116] print_report+0x118/0x608 [ 29.590241] kasan_report+0xdc/0x128 [ 29.590784] kasan_check_range+0x100/0x1a8 [ 29.590916] __kasan_check_write+0x20/0x30 [ 29.591028] kasan_atomics_helper+0x99c/0x4858 [ 29.591147] kasan_atomics+0x198/0x2e0 [ 29.591254] kunit_try_run_case+0x170/0x3f0 [ 29.592032] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.592418] kthread+0x328/0x630 [ 29.592540] ret_from_fork+0x10/0x20 [ 29.592660] [ 29.592712] Allocated by task 265: [ 29.592781] kasan_save_stack+0x3c/0x68 [ 29.592890] kasan_save_track+0x20/0x40 [ 29.592993] kasan_save_alloc_info+0x40/0x58 [ 29.593091] __kasan_kmalloc+0xd4/0xd8 [ 29.593177] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.593289] kasan_atomics+0xb8/0x2e0 [ 29.594416] kunit_try_run_case+0x170/0x3f0 [ 29.594537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.594662] kthread+0x328/0x630 [ 29.594745] ret_from_fork+0x10/0x20 [ 29.594836] [ 29.594897] The buggy address belongs to the object at fff00000c770a480 [ 29.594897] which belongs to the cache kmalloc-64 of size 64 [ 29.596591] The buggy address is located 0 bytes to the right of [ 29.596591] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.597070] [ 29.597128] The buggy address belongs to the physical page: [ 29.597206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.597373] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.597655] page_type: f5(slab) [ 29.597772] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.597903] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.598012] page dumped because: kasan: bad access detected [ 29.598103] [ 29.598159] Memory state around the buggy address: [ 29.598246] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.598383] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.598495] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.598595] ^ [ 29.598677] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.598788] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.598886] ================================================================== [ 29.873306] ================================================================== [ 29.873478] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 29.873596] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.873722] [ 29.873806] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.874220] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.874393] Hardware name: linux,dummy-virt (DT) [ 29.874490] Call trace: [ 29.874548] show_stack+0x20/0x38 (C) [ 29.874776] dump_stack_lvl+0x8c/0xd0 [ 29.875137] print_report+0x118/0x608 [ 29.875399] kasan_report+0xdc/0x128 [ 29.875527] __asan_report_store8_noabort+0x20/0x30 [ 29.875670] kasan_atomics_helper+0x3e5c/0x4858 [ 29.875806] kasan_atomics+0x198/0x2e0 [ 29.876060] kunit_try_run_case+0x170/0x3f0 [ 29.876406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.876673] kthread+0x328/0x630 [ 29.876795] ret_from_fork+0x10/0x20 [ 29.876945] [ 29.877010] Allocated by task 265: [ 29.877350] kasan_save_stack+0x3c/0x68 [ 29.877644] kasan_save_track+0x20/0x40 [ 29.877753] kasan_save_alloc_info+0x40/0x58 [ 29.878145] __kasan_kmalloc+0xd4/0xd8 [ 29.878257] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.878385] kasan_atomics+0xb8/0x2e0 [ 29.878589] kunit_try_run_case+0x170/0x3f0 [ 29.878707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.878845] kthread+0x328/0x630 [ 29.879033] ret_from_fork+0x10/0x20 [ 29.879221] [ 29.879792] The buggy address belongs to the object at fff00000c770a480 [ 29.879792] which belongs to the cache kmalloc-64 of size 64 [ 29.880013] The buggy address is located 0 bytes to the right of [ 29.880013] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.880186] [ 29.880250] The buggy address belongs to the physical page: [ 29.880349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.880482] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.880643] page_type: f5(slab) [ 29.880738] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.881009] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.881148] page dumped because: kasan: bad access detected [ 29.881367] [ 29.882201] Memory state around the buggy address: [ 29.882929] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.883101] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.883230] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.883364] ^ [ 29.883624] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.884225] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.884507] ================================================================== [ 29.906919] ================================================================== [ 29.907024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 29.907135] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.907258] [ 29.907324] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.907968] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.908525] Hardware name: linux,dummy-virt (DT) [ 29.908726] Call trace: [ 29.909749] show_stack+0x20/0x38 (C) [ 29.910888] dump_stack_lvl+0x8c/0xd0 [ 29.911387] print_report+0x118/0x608 [ 29.911516] kasan_report+0xdc/0x128 [ 29.912437] kasan_check_range+0x100/0x1a8 [ 29.913205] __kasan_check_write+0x20/0x30 [ 29.913986] kasan_atomics_helper+0xf20/0x4858 [ 29.914136] kasan_atomics+0x198/0x2e0 [ 29.914257] kunit_try_run_case+0x170/0x3f0 [ 29.914407] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.914553] kthread+0x328/0x630 [ 29.914672] ret_from_fork+0x10/0x20 [ 29.915897] [ 29.916046] Allocated by task 265: [ 29.916142] kasan_save_stack+0x3c/0x68 [ 29.916263] kasan_save_track+0x20/0x40 [ 29.917068] kasan_save_alloc_info+0x40/0x58 [ 29.917266] __kasan_kmalloc+0xd4/0xd8 [ 29.917645] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.918121] kasan_atomics+0xb8/0x2e0 [ 29.918768] kunit_try_run_case+0x170/0x3f0 [ 29.918883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.919790] kthread+0x328/0x630 [ 29.919882] ret_from_fork+0x10/0x20 [ 29.919935] [ 29.919962] The buggy address belongs to the object at fff00000c770a480 [ 29.919962] which belongs to the cache kmalloc-64 of size 64 [ 29.920141] The buggy address is located 0 bytes to the right of [ 29.920141] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.920515] [ 29.920600] The buggy address belongs to the physical page: [ 29.920954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.921431] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.921893] page_type: f5(slab) [ 29.922538] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.922676] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.923354] page dumped because: kasan: bad access detected [ 29.923460] [ 29.923509] Memory state around the buggy address: [ 29.924612] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.924825] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.924937] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.925035] ^ [ 29.925126] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.926756] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.927432] ================================================================== [ 30.052058] ================================================================== [ 30.052171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 30.052420] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 30.053102] [ 30.053307] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.053545] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.053616] Hardware name: linux,dummy-virt (DT) [ 30.054136] Call trace: [ 30.054265] show_stack+0x20/0x38 (C) [ 30.054416] dump_stack_lvl+0x8c/0xd0 [ 30.054670] print_report+0x118/0x608 [ 30.054820] kasan_report+0xdc/0x128 [ 30.054953] kasan_check_range+0x100/0x1a8 [ 30.055377] __kasan_check_write+0x20/0x30 [ 30.055541] kasan_atomics_helper+0x12d8/0x4858 [ 30.055790] kasan_atomics+0x198/0x2e0 [ 30.055953] kunit_try_run_case+0x170/0x3f0 [ 30.056095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.056299] kthread+0x328/0x630 [ 30.056431] ret_from_fork+0x10/0x20 [ 30.056626] [ 30.056841] Allocated by task 265: [ 30.056917] kasan_save_stack+0x3c/0x68 [ 30.057024] kasan_save_track+0x20/0x40 [ 30.057120] kasan_save_alloc_info+0x40/0x58 [ 30.057246] __kasan_kmalloc+0xd4/0xd8 [ 30.057404] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.057606] kasan_atomics+0xb8/0x2e0 [ 30.057898] kunit_try_run_case+0x170/0x3f0 [ 30.058008] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.058123] kthread+0x328/0x630 [ 30.058219] ret_from_fork+0x10/0x20 [ 30.058478] [ 30.058536] The buggy address belongs to the object at fff00000c770a480 [ 30.058536] which belongs to the cache kmalloc-64 of size 64 [ 30.058715] The buggy address is located 0 bytes to the right of [ 30.058715] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.058970] [ 30.059133] The buggy address belongs to the physical page: [ 30.059362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.059505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.059626] page_type: f5(slab) [ 30.059740] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.059957] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.060081] page dumped because: kasan: bad access detected [ 30.060175] [ 30.060221] Memory state around the buggy address: [ 30.060300] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.060445] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.060570] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.060736] ^ [ 30.060834] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.060980] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.061124] ================================================================== [ 30.125234] ================================================================== [ 30.125434] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 30.125550] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 30.125668] [ 30.125744] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.125952] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.126028] Hardware name: linux,dummy-virt (DT) [ 30.126107] Call trace: [ 30.126165] show_stack+0x20/0x38 (C) [ 30.126300] dump_stack_lvl+0x8c/0xd0 [ 30.126447] print_report+0x118/0x608 [ 30.126702] kasan_report+0xdc/0x128 [ 30.127535] kasan_check_range+0x100/0x1a8 [ 30.127660] __kasan_check_write+0x20/0x30 [ 30.127768] kasan_atomics_helper+0x14e4/0x4858 [ 30.127979] kasan_atomics+0x198/0x2e0 [ 30.128158] kunit_try_run_case+0x170/0x3f0 [ 30.128277] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.128442] kthread+0x328/0x630 [ 30.128549] ret_from_fork+0x10/0x20 [ 30.128661] [ 30.128722] Allocated by task 265: [ 30.128813] kasan_save_stack+0x3c/0x68 [ 30.129011] kasan_save_track+0x20/0x40 [ 30.130307] kasan_save_alloc_info+0x40/0x58 [ 30.130502] __kasan_kmalloc+0xd4/0xd8 [ 30.130689] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.130825] kasan_atomics+0xb8/0x2e0 [ 30.130936] kunit_try_run_case+0x170/0x3f0 [ 30.131053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.131180] kthread+0x328/0x630 [ 30.131281] ret_from_fork+0x10/0x20 [ 30.131413] [ 30.131468] The buggy address belongs to the object at fff00000c770a480 [ 30.131468] which belongs to the cache kmalloc-64 of size 64 [ 30.131614] The buggy address is located 0 bytes to the right of [ 30.131614] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.131774] [ 30.131825] The buggy address belongs to the physical page: [ 30.131907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.132039] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.132166] page_type: f5(slab) [ 30.132269] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.133035] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.133183] page dumped because: kasan: bad access detected [ 30.133261] [ 30.133316] Memory state around the buggy address: [ 30.133512] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.134464] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.134666] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.134784] ^ [ 30.134877] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.134986] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.135083] ================================================================== [ 29.830139] ================================================================== [ 29.830243] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 29.830374] Read of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.830505] [ 29.830572] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.830771] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.831384] Hardware name: linux,dummy-virt (DT) [ 29.831801] Call trace: [ 29.832456] show_stack+0x20/0x38 (C) [ 29.833366] dump_stack_lvl+0x8c/0xd0 [ 29.833834] print_report+0x118/0x608 [ 29.834085] kasan_report+0xdc/0x128 [ 29.834817] __asan_report_load8_noabort+0x20/0x30 [ 29.834976] kasan_atomics_helper+0x3f58/0x4858 [ 29.835432] kasan_atomics+0x198/0x2e0 [ 29.835656] kunit_try_run_case+0x170/0x3f0 [ 29.835810] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.835978] kthread+0x328/0x630 [ 29.836467] ret_from_fork+0x10/0x20 [ 29.837171] [ 29.837446] Allocated by task 265: [ 29.837538] kasan_save_stack+0x3c/0x68 [ 29.837674] kasan_save_track+0x20/0x40 [ 29.837776] kasan_save_alloc_info+0x40/0x58 [ 29.838297] __kasan_kmalloc+0xd4/0xd8 [ 29.838420] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.839213] kasan_atomics+0xb8/0x2e0 [ 29.839322] kunit_try_run_case+0x170/0x3f0 [ 29.839459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.839581] kthread+0x328/0x630 [ 29.839675] ret_from_fork+0x10/0x20 [ 29.840841] [ 29.840933] The buggy address belongs to the object at fff00000c770a480 [ 29.840933] which belongs to the cache kmalloc-64 of size 64 [ 29.841196] The buggy address is located 0 bytes to the right of [ 29.841196] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.841504] [ 29.841788] The buggy address belongs to the physical page: [ 29.842566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.842959] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.843638] page_type: f5(slab) [ 29.843933] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.844080] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.844193] page dumped because: kasan: bad access detected [ 29.845042] [ 29.845097] Memory state around the buggy address: [ 29.845179] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.846305] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.846450] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.846904] ^ [ 29.847351] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.847701] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.847808] ================================================================== [ 30.076939] ================================================================== [ 30.077130] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 30.077252] Read of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 30.077409] [ 30.077484] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.078122] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.078263] Hardware name: linux,dummy-virt (DT) [ 30.078513] Call trace: [ 30.078731] show_stack+0x20/0x38 (C) [ 30.078864] dump_stack_lvl+0x8c/0xd0 [ 30.078989] print_report+0x118/0x608 [ 30.079105] kasan_report+0xdc/0x128 [ 30.079223] __asan_report_load8_noabort+0x20/0x30 [ 30.079364] kasan_atomics_helper+0x3f04/0x4858 [ 30.079489] kasan_atomics+0x198/0x2e0 [ 30.079620] kunit_try_run_case+0x170/0x3f0 [ 30.079922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.080225] kthread+0x328/0x630 [ 30.080437] ret_from_fork+0x10/0x20 [ 30.080588] [ 30.080647] Allocated by task 265: [ 30.080830] kasan_save_stack+0x3c/0x68 [ 30.081152] kasan_save_track+0x20/0x40 [ 30.081273] kasan_save_alloc_info+0x40/0x58 [ 30.081445] __kasan_kmalloc+0xd4/0xd8 [ 30.081761] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.081872] kasan_atomics+0xb8/0x2e0 [ 30.082028] kunit_try_run_case+0x170/0x3f0 [ 30.082155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.082376] kthread+0x328/0x630 [ 30.082485] ret_from_fork+0x10/0x20 [ 30.082594] [ 30.082644] The buggy address belongs to the object at fff00000c770a480 [ 30.082644] which belongs to the cache kmalloc-64 of size 64 [ 30.082831] The buggy address is located 0 bytes to the right of [ 30.082831] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.083048] [ 30.083221] The buggy address belongs to the physical page: [ 30.083784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.084189] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.084320] page_type: f5(slab) [ 30.084443] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.084570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.084679] page dumped because: kasan: bad access detected [ 30.086253] [ 30.086696] Memory state around the buggy address: [ 30.087449] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.088298] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.088448] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.088987] ^ [ 30.089425] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.089639] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.089742] ================================================================== [ 30.211853] ================================================================== [ 30.211961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 30.212075] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 30.212146] [ 30.212187] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.212442] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.212609] Hardware name: linux,dummy-virt (DT) [ 30.212951] Call trace: [ 30.213011] show_stack+0x20/0x38 (C) [ 30.213880] dump_stack_lvl+0x8c/0xd0 [ 30.214846] print_report+0x118/0x608 [ 30.215789] kasan_report+0xdc/0x128 [ 30.216320] kasan_check_range+0x100/0x1a8 [ 30.217039] __kasan_check_write+0x20/0x30 [ 30.217513] kasan_atomics_helper+0x16d0/0x4858 [ 30.218234] kasan_atomics+0x198/0x2e0 [ 30.218374] kunit_try_run_case+0x170/0x3f0 [ 30.218505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.219898] kthread+0x328/0x630 [ 30.220037] ret_from_fork+0x10/0x20 [ 30.220183] [ 30.220247] Allocated by task 265: [ 30.220350] kasan_save_stack+0x3c/0x68 [ 30.220469] kasan_save_track+0x20/0x40 [ 30.220591] kasan_save_alloc_info+0x40/0x58 [ 30.220717] __kasan_kmalloc+0xd4/0xd8 [ 30.220833] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.220958] kasan_atomics+0xb8/0x2e0 [ 30.221072] kunit_try_run_case+0x170/0x3f0 [ 30.221191] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.221349] kthread+0x328/0x630 [ 30.221457] ret_from_fork+0x10/0x20 [ 30.221573] [ 30.221630] The buggy address belongs to the object at fff00000c770a480 [ 30.221630] which belongs to the cache kmalloc-64 of size 64 [ 30.221776] The buggy address is located 0 bytes to the right of [ 30.221776] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.221938] [ 30.221996] The buggy address belongs to the physical page: [ 30.222072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.222203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.222318] page_type: f5(slab) [ 30.222506] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.222655] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.222778] page dumped because: kasan: bad access detected [ 30.222897] [ 30.222957] Memory state around the buggy address: [ 30.223068] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.223904] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.224033] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.224193] ^ [ 30.224290] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.224428] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.224538] ================================================================== [ 30.290850] ================================================================== [ 30.290959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 30.292260] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 30.292695] [ 30.292775] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.292993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.295585] Hardware name: linux,dummy-virt (DT) [ 30.295845] Call trace: [ 30.295912] show_stack+0x20/0x38 (C) [ 30.296039] dump_stack_lvl+0x8c/0xd0 [ 30.296175] print_report+0x118/0x608 [ 30.297362] kasan_report+0xdc/0x128 [ 30.297504] kasan_check_range+0x100/0x1a8 [ 30.297575] __kasan_check_write+0x20/0x30 [ 30.297651] kasan_atomics_helper+0x17ec/0x4858 [ 30.297758] kasan_atomics+0x198/0x2e0 [ 30.297819] kunit_try_run_case+0x170/0x3f0 [ 30.297888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.297959] kthread+0x328/0x630 [ 30.298012] ret_from_fork+0x10/0x20 [ 30.298074] [ 30.298099] Allocated by task 265: [ 30.298136] kasan_save_stack+0x3c/0x68 [ 30.298191] kasan_save_track+0x20/0x40 [ 30.298241] kasan_save_alloc_info+0x40/0x58 [ 30.298292] __kasan_kmalloc+0xd4/0xd8 [ 30.298413] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.298758] kasan_atomics+0xb8/0x2e0 [ 30.298954] kunit_try_run_case+0x170/0x3f0 [ 30.299188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.299555] kthread+0x328/0x630 [ 30.299663] ret_from_fork+0x10/0x20 [ 30.299782] [ 30.299983] The buggy address belongs to the object at fff00000c770a480 [ 30.299983] which belongs to the cache kmalloc-64 of size 64 [ 30.300618] The buggy address is located 0 bytes to the right of [ 30.300618] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.301135] [ 30.301486] The buggy address belongs to the physical page: [ 30.301613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.301770] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.301911] page_type: f5(slab) [ 30.302117] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.303064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.303180] page dumped because: kasan: bad access detected [ 30.303598] [ 30.303806] Memory state around the buggy address: [ 30.303959] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.304596] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.304977] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.305082] ^ [ 30.305545] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.305660] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.305757] ================================================================== [ 30.182658] ================================================================== [ 30.182764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 30.182883] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 30.183007] [ 30.183073] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.183276] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.183360] Hardware name: linux,dummy-virt (DT) [ 30.184053] Call trace: [ 30.184185] show_stack+0x20/0x38 (C) [ 30.184419] dump_stack_lvl+0x8c/0xd0 [ 30.184763] print_report+0x118/0x608 [ 30.184888] kasan_report+0xdc/0x128 [ 30.185004] kasan_check_range+0x100/0x1a8 [ 30.185531] __kasan_check_write+0x20/0x30 [ 30.185874] kasan_atomics_helper+0x1644/0x4858 [ 30.186292] kasan_atomics+0x198/0x2e0 [ 30.186524] kunit_try_run_case+0x170/0x3f0 [ 30.187054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.187202] kthread+0x328/0x630 [ 30.187313] ret_from_fork+0x10/0x20 [ 30.187572] [ 30.187663] Allocated by task 265: [ 30.187736] kasan_save_stack+0x3c/0x68 [ 30.188836] kasan_save_track+0x20/0x40 [ 30.189060] kasan_save_alloc_info+0x40/0x58 [ 30.189349] __kasan_kmalloc+0xd4/0xd8 [ 30.190105] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.190226] kasan_atomics+0xb8/0x2e0 [ 30.190854] kunit_try_run_case+0x170/0x3f0 [ 30.190971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.191382] kthread+0x328/0x630 [ 30.191937] ret_from_fork+0x10/0x20 [ 30.192230] [ 30.192295] The buggy address belongs to the object at fff00000c770a480 [ 30.192295] which belongs to the cache kmalloc-64 of size 64 [ 30.192757] The buggy address is located 0 bytes to the right of [ 30.192757] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.193077] [ 30.193174] The buggy address belongs to the physical page: [ 30.193348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.193500] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.193889] page_type: f5(slab) [ 30.194171] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.194314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.194659] page dumped because: kasan: bad access detected [ 30.195087] [ 30.195151] Memory state around the buggy address: [ 30.195232] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.195735] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.195975] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.196360] ^ [ 30.196467] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.196581] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.196691] ================================================================== [ 30.165435] ================================================================== [ 30.165831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 30.165970] Read of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 30.166576] [ 30.166662] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.166976] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.167057] Hardware name: linux,dummy-virt (DT) [ 30.167141] Call trace: [ 30.167195] show_stack+0x20/0x38 (C) [ 30.167318] dump_stack_lvl+0x8c/0xd0 [ 30.167467] print_report+0x118/0x608 [ 30.168478] kasan_report+0xdc/0x128 [ 30.168777] __asan_report_load8_noabort+0x20/0x30 [ 30.169043] kasan_atomics_helper+0x3db0/0x4858 [ 30.169400] kasan_atomics+0x198/0x2e0 [ 30.169551] kunit_try_run_case+0x170/0x3f0 [ 30.169691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.170216] kthread+0x328/0x630 [ 30.170366] ret_from_fork+0x10/0x20 [ 30.171133] [ 30.171263] Allocated by task 265: [ 30.171359] kasan_save_stack+0x3c/0x68 [ 30.171488] kasan_save_track+0x20/0x40 [ 30.171606] kasan_save_alloc_info+0x40/0x58 [ 30.171739] __kasan_kmalloc+0xd4/0xd8 [ 30.172013] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.172415] kasan_atomics+0xb8/0x2e0 [ 30.172533] kunit_try_run_case+0x170/0x3f0 [ 30.172875] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.173436] kthread+0x328/0x630 [ 30.173564] ret_from_fork+0x10/0x20 [ 30.173953] [ 30.174310] The buggy address belongs to the object at fff00000c770a480 [ 30.174310] which belongs to the cache kmalloc-64 of size 64 [ 30.174680] The buggy address is located 0 bytes to the right of [ 30.174680] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.174852] [ 30.175705] The buggy address belongs to the physical page: [ 30.176680] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.176957] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.177677] page_type: f5(slab) [ 30.178463] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.179127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.179375] page dumped because: kasan: bad access detected [ 30.180096] [ 30.180155] Memory state around the buggy address: [ 30.180553] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.181083] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.181260] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.181395] ^ [ 30.181480] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.181666] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.181971] ================================================================== [ 30.137118] ================================================================== [ 30.137227] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 30.137367] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 30.137492] [ 30.137562] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.137769] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.137840] Hardware name: linux,dummy-virt (DT) [ 30.137917] Call trace: [ 30.137969] show_stack+0x20/0x38 (C) [ 30.138082] dump_stack_lvl+0x8c/0xd0 [ 30.138199] print_report+0x118/0x608 [ 30.138321] kasan_report+0xdc/0x128 [ 30.138474] kasan_check_range+0x100/0x1a8 [ 30.138593] __kasan_check_write+0x20/0x30 [ 30.138708] kasan_atomics_helper+0x154c/0x4858 [ 30.138857] kasan_atomics+0x198/0x2e0 [ 30.138992] kunit_try_run_case+0x170/0x3f0 [ 30.139125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.139257] kthread+0x328/0x630 [ 30.139766] ret_from_fork+0x10/0x20 [ 30.140464] [ 30.140609] Allocated by task 265: [ 30.140703] kasan_save_stack+0x3c/0x68 [ 30.140812] kasan_save_track+0x20/0x40 [ 30.140909] kasan_save_alloc_info+0x40/0x58 [ 30.141680] __kasan_kmalloc+0xd4/0xd8 [ 30.141791] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.141897] kasan_atomics+0xb8/0x2e0 [ 30.141997] kunit_try_run_case+0x170/0x3f0 [ 30.142780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.143011] kthread+0x328/0x630 [ 30.143291] ret_from_fork+0x10/0x20 [ 30.143418] [ 30.143748] The buggy address belongs to the object at fff00000c770a480 [ 30.143748] which belongs to the cache kmalloc-64 of size 64 [ 30.144040] The buggy address is located 0 bytes to the right of [ 30.144040] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.144853] [ 30.145158] The buggy address belongs to the physical page: [ 30.145349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.145740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.145954] page_type: f5(slab) [ 30.146053] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.146287] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.146861] page dumped because: kasan: bad access detected [ 30.147215] [ 30.147307] Memory state around the buggy address: [ 30.147452] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.148125] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.148312] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.148489] ^ [ 30.148587] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.148720] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.148822] ================================================================== [ 29.788929] ================================================================== [ 29.789043] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 29.789802] Write of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.790848] [ 29.791040] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.791546] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.791634] Hardware name: linux,dummy-virt (DT) [ 29.791884] Call trace: [ 29.791944] show_stack+0x20/0x38 (C) [ 29.792298] dump_stack_lvl+0x8c/0xd0 [ 29.792520] print_report+0x118/0x608 [ 29.792647] kasan_report+0xdc/0x128 [ 29.792811] kasan_check_range+0x100/0x1a8 [ 29.793105] __kasan_check_write+0x20/0x30 [ 29.793484] kasan_atomics_helper+0xd3c/0x4858 [ 29.793627] kasan_atomics+0x198/0x2e0 [ 29.793958] kunit_try_run_case+0x170/0x3f0 [ 29.794086] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.794842] kthread+0x328/0x630 [ 29.794976] ret_from_fork+0x10/0x20 [ 29.795099] [ 29.795163] Allocated by task 265: [ 29.795253] kasan_save_stack+0x3c/0x68 [ 29.795415] kasan_save_track+0x20/0x40 [ 29.795665] kasan_save_alloc_info+0x40/0x58 [ 29.795761] __kasan_kmalloc+0xd4/0xd8 [ 29.796355] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.796484] kasan_atomics+0xb8/0x2e0 [ 29.796750] kunit_try_run_case+0x170/0x3f0 [ 29.796871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.796994] kthread+0x328/0x630 [ 29.797097] ret_from_fork+0x10/0x20 [ 29.797194] [ 29.797245] The buggy address belongs to the object at fff00000c770a480 [ 29.797245] which belongs to the cache kmalloc-64 of size 64 [ 29.799913] The buggy address is located 0 bytes to the right of [ 29.799913] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.800135] [ 29.800257] The buggy address belongs to the physical page: [ 29.800364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.800494] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.800617] page_type: f5(slab) [ 29.800711] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.800840] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.800942] page dumped because: kasan: bad access detected [ 29.801081] [ 29.801175] Memory state around the buggy address: [ 29.801263] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.801457] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.801575] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.801673] ^ [ 29.801759] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.801866] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.801963] ================================================================== [ 30.150550] ================================================================== [ 30.151283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 30.151668] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 30.152203] [ 30.152547] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.153394] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.153706] Hardware name: linux,dummy-virt (DT) [ 30.154072] Call trace: [ 30.154193] show_stack+0x20/0x38 (C) [ 30.154582] dump_stack_lvl+0x8c/0xd0 [ 30.154714] print_report+0x118/0x608 [ 30.155510] kasan_report+0xdc/0x128 [ 30.155744] kasan_check_range+0x100/0x1a8 [ 30.155887] __kasan_check_write+0x20/0x30 [ 30.156007] kasan_atomics_helper+0x15b4/0x4858 [ 30.156134] kasan_atomics+0x198/0x2e0 [ 30.156246] kunit_try_run_case+0x170/0x3f0 [ 30.156389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.156548] kthread+0x328/0x630 [ 30.157324] ret_from_fork+0x10/0x20 [ 30.158771] [ 30.158836] Allocated by task 265: [ 30.158943] kasan_save_stack+0x3c/0x68 [ 30.159058] kasan_save_track+0x20/0x40 [ 30.159223] kasan_save_alloc_info+0x40/0x58 [ 30.159514] __kasan_kmalloc+0xd4/0xd8 [ 30.159657] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.159794] kasan_atomics+0xb8/0x2e0 [ 30.159970] kunit_try_run_case+0x170/0x3f0 [ 30.160111] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.160235] kthread+0x328/0x630 [ 30.160364] ret_from_fork+0x10/0x20 [ 30.160482] [ 30.160544] The buggy address belongs to the object at fff00000c770a480 [ 30.160544] which belongs to the cache kmalloc-64 of size 64 [ 30.160811] The buggy address is located 0 bytes to the right of [ 30.160811] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.160999] [ 30.161063] The buggy address belongs to the physical page: [ 30.161154] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.161307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.161488] page_type: f5(slab) [ 30.161592] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.161714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.161819] page dumped because: kasan: bad access detected [ 30.161895] [ 30.161994] Memory state around the buggy address: [ 30.162083] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.162196] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.162374] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.162932] ^ [ 30.163058] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.163174] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.163272] ================================================================== [ 29.603599] ================================================================== [ 29.603720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 29.603832] Write of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.603951] [ 29.604022] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.604288] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.609294] ret_from_fork+0x10/0x20 [ 29.614357] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.614959] kthread+0x328/0x630 [ 29.615058] ret_from_fork+0x10/0x20 [ 29.615155] [ 29.615838] The buggy address belongs to the object at fff00000c770a480 [ 29.615838] which belongs to the cache kmalloc-64 of size 64 [ 29.616206] The buggy address is located 0 bytes to the right of [ 29.616206] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.616473] [ 29.616535] The buggy address belongs to the physical page: [ 29.616618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.618603] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.618787] page_type: f5(slab) [ 29.618881] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.620115] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.620965] page dumped because: kasan: bad access detected [ 29.621103] [ 29.621153] Memory state around the buggy address: [ 29.621234] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.622306] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.622520] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.623244] ^ [ 29.623411] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.623911] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.624156] ================================================================== [ 29.849046] ================================================================== [ 29.849150] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 29.850287] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.850449] [ 29.851242] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.852063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.852776] Hardware name: linux,dummy-virt (DT) [ 29.852921] Call trace: [ 29.852984] show_stack+0x20/0x38 (C) [ 29.853117] dump_stack_lvl+0x8c/0xd0 [ 29.853238] print_report+0x118/0x608 [ 29.853388] kasan_report+0xdc/0x128 [ 29.853512] kasan_check_range+0x100/0x1a8 [ 29.853630] __kasan_check_write+0x20/0x30 [ 29.856402] kasan_atomics_helper+0xe44/0x4858 [ 29.856545] kasan_atomics+0x198/0x2e0 [ 29.858130] kunit_try_run_case+0x170/0x3f0 [ 29.858401] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.858553] kthread+0x328/0x630 [ 29.858676] ret_from_fork+0x10/0x20 [ 29.858802] [ 29.858851] Allocated by task 265: [ 29.858928] kasan_save_stack+0x3c/0x68 [ 29.859062] kasan_save_track+0x20/0x40 [ 29.859168] kasan_save_alloc_info+0x40/0x58 [ 29.859302] __kasan_kmalloc+0xd4/0xd8 [ 29.859426] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.859537] kasan_atomics+0xb8/0x2e0 [ 29.860066] kunit_try_run_case+0x170/0x3f0 [ 29.860742] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.862856] kthread+0x328/0x630 [ 29.862970] ret_from_fork+0x10/0x20 [ 29.863081] [ 29.863140] The buggy address belongs to the object at fff00000c770a480 [ 29.863140] which belongs to the cache kmalloc-64 of size 64 [ 29.863299] The buggy address is located 0 bytes to the right of [ 29.863299] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.863558] [ 29.865397] The buggy address belongs to the physical page: [ 29.865485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.865629] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.865811] page_type: f5(slab) [ 29.865907] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.866045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.866145] page dumped because: kasan: bad access detected [ 29.866229] [ 29.866276] Memory state around the buggy address: [ 29.867410] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.867540] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.869305] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.870028] ^ [ 29.870168] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.872738] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.872861] ================================================================== [ 30.091306] ================================================================== [ 30.091895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 30.092650] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 30.093032] [ 30.093152] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.094175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.094303] Hardware name: linux,dummy-virt (DT) [ 30.094484] Call trace: [ 30.094541] show_stack+0x20/0x38 (C) [ 30.094663] dump_stack_lvl+0x8c/0xd0 [ 30.094783] print_report+0x118/0x608 [ 30.094908] kasan_report+0xdc/0x128 [ 30.095023] kasan_check_range+0x100/0x1a8 [ 30.095146] __kasan_check_write+0x20/0x30 [ 30.095263] kasan_atomics_helper+0x1414/0x4858 [ 30.096531] kasan_atomics+0x198/0x2e0 [ 30.096879] kunit_try_run_case+0x170/0x3f0 [ 30.097229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.097404] kthread+0x328/0x630 [ 30.098219] ret_from_fork+0x10/0x20 [ 30.098982] [ 30.099268] Allocated by task 265: [ 30.099887] kasan_save_stack+0x3c/0x68 [ 30.100015] kasan_save_track+0x20/0x40 [ 30.100231] kasan_save_alloc_info+0x40/0x58 [ 30.100815] __kasan_kmalloc+0xd4/0xd8 [ 30.101185] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.101433] kasan_atomics+0xb8/0x2e0 [ 30.101535] kunit_try_run_case+0x170/0x3f0 [ 30.101948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.102096] kthread+0x328/0x630 [ 30.102190] ret_from_fork+0x10/0x20 [ 30.102792] [ 30.102863] The buggy address belongs to the object at fff00000c770a480 [ 30.102863] which belongs to the cache kmalloc-64 of size 64 [ 30.103570] The buggy address is located 0 bytes to the right of [ 30.103570] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.104501] [ 30.104653] The buggy address belongs to the physical page: [ 30.104829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.105221] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.106024] page_type: f5(slab) [ 30.106134] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.106805] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.106934] page dumped because: kasan: bad access detected [ 30.107782] [ 30.108019] Memory state around the buggy address: [ 30.108247] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.108449] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.108561] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.108657] ^ [ 30.110823] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.110893] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.110945] ================================================================== [ 29.944511] ================================================================== [ 29.944616] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 29.944725] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.944849] [ 29.944927] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.946064] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.946601] Hardware name: linux,dummy-virt (DT) [ 29.946872] Call trace: [ 29.946967] show_stack+0x20/0x38 (C) [ 29.947305] dump_stack_lvl+0x8c/0xd0 [ 29.948013] print_report+0x118/0x608 [ 29.948180] kasan_report+0xdc/0x128 [ 29.948345] kasan_check_range+0x100/0x1a8 [ 29.949041] __kasan_check_write+0x20/0x30 [ 29.949173] kasan_atomics_helper+0xff0/0x4858 [ 29.949632] kasan_atomics+0x198/0x2e0 [ 29.950316] kunit_try_run_case+0x170/0x3f0 [ 29.950758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.950905] kthread+0x328/0x630 [ 29.951577] ret_from_fork+0x10/0x20 [ 29.951743] [ 29.951801] Allocated by task 265: [ 29.952322] kasan_save_stack+0x3c/0x68 [ 29.952827] kasan_save_track+0x20/0x40 [ 29.952977] kasan_save_alloc_info+0x40/0x58 [ 29.953259] __kasan_kmalloc+0xd4/0xd8 [ 29.953589] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.953913] kasan_atomics+0xb8/0x2e0 [ 29.954398] kunit_try_run_case+0x170/0x3f0 [ 29.954531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.954996] kthread+0x328/0x630 [ 29.955091] ret_from_fork+0x10/0x20 [ 29.955186] [ 29.955733] The buggy address belongs to the object at fff00000c770a480 [ 29.955733] which belongs to the cache kmalloc-64 of size 64 [ 29.956280] The buggy address is located 0 bytes to the right of [ 29.956280] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.956790] [ 29.956892] The buggy address belongs to the physical page: [ 29.956985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.957119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.957238] page_type: f5(slab) [ 29.957356] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.957619] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.957880] page dumped because: kasan: bad access detected [ 29.958047] [ 29.958098] Memory state around the buggy address: [ 29.958244] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.958406] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.958520] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.958618] ^ [ 29.958704] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.958816] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.958978] ================================================================== [ 29.761942] ================================================================== [ 29.762047] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 29.762164] Read of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.762287] [ 29.762603] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.763137] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.763418] Hardware name: linux,dummy-virt (DT) [ 29.764314] Call trace: [ 29.764962] show_stack+0x20/0x38 (C) [ 29.765919] dump_stack_lvl+0x8c/0xd0 [ 29.766419] print_report+0x118/0x608 [ 29.767422] kasan_report+0xdc/0x128 [ 29.767947] __asan_report_load4_noabort+0x20/0x30 [ 29.768223] kasan_atomics_helper+0x3dd8/0x4858 [ 29.768845] kasan_atomics+0x198/0x2e0 [ 29.769411] kunit_try_run_case+0x170/0x3f0 [ 29.770395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.770675] kthread+0x328/0x630 [ 29.770798] ret_from_fork+0x10/0x20 [ 29.771769] [ 29.772049] Allocated by task 265: [ 29.772221] kasan_save_stack+0x3c/0x68 [ 29.772931] kasan_save_track+0x20/0x40 [ 29.773063] kasan_save_alloc_info+0x40/0x58 [ 29.773742] __kasan_kmalloc+0xd4/0xd8 [ 29.773850] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.774772] kasan_atomics+0xb8/0x2e0 [ 29.775196] kunit_try_run_case+0x170/0x3f0 [ 29.775763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.776181] kthread+0x328/0x630 [ 29.776737] ret_from_fork+0x10/0x20 [ 29.776846] [ 29.777105] The buggy address belongs to the object at fff00000c770a480 [ 29.777105] which belongs to the cache kmalloc-64 of size 64 [ 29.777738] The buggy address is located 0 bytes to the right of [ 29.777738] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.777946] [ 29.778807] The buggy address belongs to the physical page: [ 29.779036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.779425] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.780247] page_type: f5(slab) [ 29.780477] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.780608] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.781622] page dumped because: kasan: bad access detected [ 29.782030] [ 29.782364] Memory state around the buggy address: [ 29.782623] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.782745] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.782861] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.783942] ^ [ 29.784423] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.784613] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.784737] ================================================================== [ 30.112460] ================================================================== [ 30.112575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 30.112703] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 30.113053] [ 30.113217] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.113457] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.113554] Hardware name: linux,dummy-virt (DT) [ 30.113793] Call trace: [ 30.113888] show_stack+0x20/0x38 (C) [ 30.114006] dump_stack_lvl+0x8c/0xd0 [ 30.114126] print_report+0x118/0x608 [ 30.114238] kasan_report+0xdc/0x128 [ 30.114694] kasan_check_range+0x100/0x1a8 [ 30.115495] __kasan_check_write+0x20/0x30 [ 30.115875] kasan_atomics_helper+0x147c/0x4858 [ 30.116033] kasan_atomics+0x198/0x2e0 [ 30.116223] kunit_try_run_case+0x170/0x3f0 [ 30.116721] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.117172] kthread+0x328/0x630 [ 30.117323] ret_from_fork+0x10/0x20 [ 30.117475] [ 30.117845] Allocated by task 265: [ 30.117934] kasan_save_stack+0x3c/0x68 [ 30.118042] kasan_save_track+0x20/0x40 [ 30.118160] kasan_save_alloc_info+0x40/0x58 [ 30.118288] __kasan_kmalloc+0xd4/0xd8 [ 30.118428] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.118543] kasan_atomics+0xb8/0x2e0 [ 30.119367] kunit_try_run_case+0x170/0x3f0 [ 30.119514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.119863] kthread+0x328/0x630 [ 30.119987] ret_from_fork+0x10/0x20 [ 30.120199] [ 30.120292] The buggy address belongs to the object at fff00000c770a480 [ 30.120292] which belongs to the cache kmalloc-64 of size 64 [ 30.120616] The buggy address is located 0 bytes to the right of [ 30.120616] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.121222] [ 30.121290] The buggy address belongs to the physical page: [ 30.121389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.121520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.122143] page_type: f5(slab) [ 30.123122] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.123274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.123413] page dumped because: kasan: bad access detected [ 30.123499] [ 30.123553] Memory state around the buggy address: [ 30.123642] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.123756] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.123970] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.124071] ^ [ 30.124155] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.124264] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.124383] ================================================================== [ 30.225505] ================================================================== [ 30.225631] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 30.225815] Read of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 30.225945] [ 30.226015] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.226211] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.226282] Hardware name: linux,dummy-virt (DT) [ 30.226385] Call trace: [ 30.226555] show_stack+0x20/0x38 (C) [ 30.226677] dump_stack_lvl+0x8c/0xd0 [ 30.226956] print_report+0x118/0x608 [ 30.227317] kasan_report+0xdc/0x128 [ 30.227602] __asan_report_load8_noabort+0x20/0x30 [ 30.227760] kasan_atomics_helper+0x3e10/0x4858 [ 30.227904] kasan_atomics+0x198/0x2e0 [ 30.228048] kunit_try_run_case+0x170/0x3f0 [ 30.228300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.228484] kthread+0x328/0x630 [ 30.228798] ret_from_fork+0x10/0x20 [ 30.229164] [ 30.229248] Allocated by task 265: [ 30.229419] kasan_save_stack+0x3c/0x68 [ 30.229523] kasan_save_track+0x20/0x40 [ 30.229630] kasan_save_alloc_info+0x40/0x58 [ 30.229738] __kasan_kmalloc+0xd4/0xd8 [ 30.229839] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.229941] kasan_atomics+0xb8/0x2e0 [ 30.230036] kunit_try_run_case+0x170/0x3f0 [ 30.230145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.230401] kthread+0x328/0x630 [ 30.230542] ret_from_fork+0x10/0x20 [ 30.230691] [ 30.230756] The buggy address belongs to the object at fff00000c770a480 [ 30.230756] which belongs to the cache kmalloc-64 of size 64 [ 30.230915] The buggy address is located 0 bytes to the right of [ 30.230915] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.231179] [ 30.231246] The buggy address belongs to the physical page: [ 30.231425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.231663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.231812] page_type: f5(slab) [ 30.231923] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.232107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.232232] page dumped because: kasan: bad access detected [ 30.232321] [ 30.232385] Memory state around the buggy address: [ 30.232465] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.232645] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.232780] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.233113] ^ [ 30.233234] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.233436] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.233553] ================================================================== [ 30.234145] ================================================================== [ 30.234248] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 30.234376] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 30.234502] [ 30.234568] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.234771] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.234853] Hardware name: linux,dummy-virt (DT) [ 30.234952] Call trace: [ 30.235054] show_stack+0x20/0x38 (C) [ 30.235194] dump_stack_lvl+0x8c/0xd0 [ 30.235344] print_report+0x118/0x608 [ 30.235642] kasan_report+0xdc/0x128 [ 30.235865] kasan_check_range+0x100/0x1a8 [ 30.236130] __kasan_check_write+0x20/0x30 [ 30.236353] kasan_atomics_helper+0x175c/0x4858 [ 30.236545] kasan_atomics+0x198/0x2e0 [ 30.236685] kunit_try_run_case+0x170/0x3f0 [ 30.236866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.237024] kthread+0x328/0x630 [ 30.237203] ret_from_fork+0x10/0x20 [ 30.237356] [ 30.237407] Allocated by task 265: [ 30.237611] kasan_save_stack+0x3c/0x68 [ 30.237990] kasan_save_track+0x20/0x40 [ 30.238348] kasan_save_alloc_info+0x40/0x58 [ 30.238694] __kasan_kmalloc+0xd4/0xd8 [ 30.239594] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.239833] kasan_atomics+0xb8/0x2e0 [ 30.239935] kunit_try_run_case+0x170/0x3f0 [ 30.241578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.241713] kthread+0x328/0x630 [ 30.241811] ret_from_fork+0x10/0x20 [ 30.241920] [ 30.241976] The buggy address belongs to the object at fff00000c770a480 [ 30.241976] which belongs to the cache kmalloc-64 of size 64 [ 30.244171] The buggy address is located 0 bytes to the right of [ 30.244171] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.244811] [ 30.244868] The buggy address belongs to the physical page: [ 30.244959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.245790] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.246414] page_type: f5(slab) [ 30.246635] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.246790] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.247176] page dumped because: kasan: bad access detected [ 30.247421] [ 30.247483] Memory state around the buggy address: [ 30.247586] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.248605] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.248736] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.248912] ^ [ 30.249212] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.249555] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.249679] ================================================================== [ 29.802345] ================================================================== [ 29.802456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 29.802585] Read of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.802725] [ 29.802914] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.803237] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.803363] Hardware name: linux,dummy-virt (DT) [ 29.803438] Call trace: [ 29.803573] show_stack+0x20/0x38 (C) [ 29.804213] dump_stack_lvl+0x8c/0xd0 [ 29.804378] print_report+0x118/0x608 [ 29.804511] kasan_report+0xdc/0x128 [ 29.804705] __asan_report_load4_noabort+0x20/0x30 [ 29.804838] kasan_atomics_helper+0x3e04/0x4858 [ 29.804974] kasan_atomics+0x198/0x2e0 [ 29.805324] kunit_try_run_case+0x170/0x3f0 [ 29.805661] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.805898] kthread+0x328/0x630 [ 29.806029] ret_from_fork+0x10/0x20 [ 29.806362] [ 29.806411] Allocated by task 265: [ 29.806483] kasan_save_stack+0x3c/0x68 [ 29.806675] kasan_save_track+0x20/0x40 [ 29.807007] kasan_save_alloc_info+0x40/0x58 [ 29.807154] __kasan_kmalloc+0xd4/0xd8 [ 29.807256] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.807397] kasan_atomics+0xb8/0x2e0 [ 29.807508] kunit_try_run_case+0x170/0x3f0 [ 29.807650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.807894] kthread+0x328/0x630 [ 29.808054] ret_from_fork+0x10/0x20 [ 29.808273] [ 29.808360] The buggy address belongs to the object at fff00000c770a480 [ 29.808360] which belongs to the cache kmalloc-64 of size 64 [ 29.808547] The buggy address is located 0 bytes to the right of [ 29.808547] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.808718] [ 29.808773] The buggy address belongs to the physical page: [ 29.808862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.809105] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.809248] page_type: f5(slab) [ 29.809387] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.809515] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.809644] page dumped because: kasan: bad access detected [ 29.809819] [ 29.809864] Memory state around the buggy address: [ 29.809986] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.810110] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.810219] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.810322] ^ [ 29.810453] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.810909] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.811017] ================================================================== [ 30.061751] ================================================================== [ 30.061830] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 30.061897] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 30.062007] [ 30.062130] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 30.062379] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.062447] Hardware name: linux,dummy-virt (DT) [ 30.062525] Call trace: [ 30.062579] show_stack+0x20/0x38 (C) [ 30.062693] dump_stack_lvl+0x8c/0xd0 [ 30.062812] print_report+0x118/0x608 [ 30.062930] kasan_report+0xdc/0x128 [ 30.063043] kasan_check_range+0x100/0x1a8 [ 30.063165] __kasan_check_write+0x20/0x30 [ 30.063279] kasan_atomics_helper+0x1384/0x4858 [ 30.064120] kasan_atomics+0x198/0x2e0 [ 30.064487] kunit_try_run_case+0x170/0x3f0 [ 30.064649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.064827] kthread+0x328/0x630 [ 30.065138] ret_from_fork+0x10/0x20 [ 30.065496] [ 30.065576] Allocated by task 265: [ 30.065652] kasan_save_stack+0x3c/0x68 [ 30.065831] kasan_save_track+0x20/0x40 [ 30.065985] kasan_save_alloc_info+0x40/0x58 [ 30.066319] __kasan_kmalloc+0xd4/0xd8 [ 30.067270] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.067420] kasan_atomics+0xb8/0x2e0 [ 30.067767] kunit_try_run_case+0x170/0x3f0 [ 30.068343] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.069051] kthread+0x328/0x630 [ 30.069470] ret_from_fork+0x10/0x20 [ 30.069717] [ 30.069887] The buggy address belongs to the object at fff00000c770a480 [ 30.069887] which belongs to the cache kmalloc-64 of size 64 [ 30.070036] The buggy address is located 0 bytes to the right of [ 30.070036] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.070200] [ 30.070960] The buggy address belongs to the physical page: [ 30.071377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.071851] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.072079] page_type: f5(slab) [ 30.072287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.072748] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.073353] page dumped because: kasan: bad access detected [ 30.073442] [ 30.073959] Memory state around the buggy address: [ 30.074057] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.074625] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.074978] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.075085] ^ [ 30.075175] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.075287] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.075405] ================================================================== [ 29.662141] ================================================================== [ 29.662252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 29.663236] Write of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.664683] [ 29.664774] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.664997] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.665743] Hardware name: linux,dummy-virt (DT) [ 29.665834] Call trace: [ 29.666436] show_stack+0x20/0x38 (C) [ 29.666577] dump_stack_lvl+0x8c/0xd0 [ 29.667445] kasan_atomics_helper+0xad4/0x4858 [ 29.669120] ret_from_fork+0x10/0x20 [ 29.670043] kasan_save_alloc_info+0x40/0x58 [ 29.670814] kasan_atomics+0xb8/0x2e0 [ 29.672071] The buggy address belongs to the object at fff00000c770a480 [ 29.672071] which belongs to the cache kmalloc-64 of size 64 [ 29.672255] The buggy address is located 0 bytes to the right of [ 29.672255] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.672451] [ 29.672612] The buggy address belongs to the physical page: [ 29.672938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.673152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.673583] page_type: f5(slab) [ 29.673697] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.673771] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.673825] page dumped because: kasan: bad access detected [ 29.673915] [ 29.673946] Memory state around the buggy address: [ 29.674104] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.674303] ================================================================== [ 29.959463] ================================================================== [ 29.959577] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 29.959709] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.959852] [ 29.959934] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.960167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.960247] Hardware name: linux,dummy-virt (DT) [ 29.960342] Call trace: [ 29.960468] show_stack+0x20/0x38 (C) [ 29.960596] dump_stack_lvl+0x8c/0xd0 [ 29.960716] print_report+0x118/0x608 [ 29.960840] kasan_report+0xdc/0x128 [ 29.960974] kasan_check_range+0x100/0x1a8 [ 29.961197] __kasan_check_write+0x20/0x30 [ 29.961364] kasan_atomics_helper+0x1058/0x4858 [ 29.961510] kasan_atomics+0x198/0x2e0 [ 29.961667] kunit_try_run_case+0x170/0x3f0 [ 29.961834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.961980] kthread+0x328/0x630 [ 29.962271] ret_from_fork+0x10/0x20 [ 29.962416] [ 29.962467] Allocated by task 265: [ 29.962552] kasan_save_stack+0x3c/0x68 [ 29.962860] kasan_save_track+0x20/0x40 [ 29.962974] kasan_save_alloc_info+0x40/0x58 [ 29.963098] __kasan_kmalloc+0xd4/0xd8 [ 29.963312] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.963466] kasan_atomics+0xb8/0x2e0 [ 29.963584] kunit_try_run_case+0x170/0x3f0 [ 29.963706] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.963869] kthread+0x328/0x630 [ 29.963976] ret_from_fork+0x10/0x20 [ 29.964107] [ 29.964233] The buggy address belongs to the object at fff00000c770a480 [ 29.964233] which belongs to the cache kmalloc-64 of size 64 [ 29.964504] The buggy address is located 0 bytes to the right of [ 29.964504] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.964740] [ 29.964804] The buggy address belongs to the physical page: [ 29.964895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.965047] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.965174] page_type: f5(slab) [ 29.965324] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.965525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.965825] page dumped because: kasan: bad access detected [ 29.965912] [ 29.965966] Memory state around the buggy address: [ 29.966052] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.966177] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.966313] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.966475] ^ [ 29.966569] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.966677] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.966875] ================================================================== [ 29.813045] ================================================================== [ 29.813148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 29.813268] Read of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.813423] [ 29.813492] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.813693] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.813763] Hardware name: linux,dummy-virt (DT) [ 29.813836] Call trace: [ 29.813894] show_stack+0x20/0x38 (C) [ 29.814008] dump_stack_lvl+0x8c/0xd0 [ 29.814260] print_report+0x118/0x608 [ 29.814402] kasan_report+0xdc/0x128 [ 29.814523] kasan_check_range+0x100/0x1a8 [ 29.814652] __kasan_check_read+0x20/0x30 [ 29.814783] kasan_atomics_helper+0xdd4/0x4858 [ 29.814913] kasan_atomics+0x198/0x2e0 [ 29.815029] kunit_try_run_case+0x170/0x3f0 [ 29.815148] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.816454] kthread+0x328/0x630 [ 29.816777] ret_from_fork+0x10/0x20 [ 29.817068] [ 29.817128] Allocated by task 265: [ 29.817236] kasan_save_stack+0x3c/0x68 [ 29.817368] kasan_save_track+0x20/0x40 [ 29.817591] kasan_save_alloc_info+0x40/0x58 [ 29.817756] __kasan_kmalloc+0xd4/0xd8 [ 29.818079] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.818193] kasan_atomics+0xb8/0x2e0 [ 29.818947] kunit_try_run_case+0x170/0x3f0 [ 29.819809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.820041] kthread+0x328/0x630 [ 29.820582] ret_from_fork+0x10/0x20 [ 29.820719] [ 29.820777] The buggy address belongs to the object at fff00000c770a480 [ 29.820777] which belongs to the cache kmalloc-64 of size 64 [ 29.820930] The buggy address is located 0 bytes to the right of [ 29.820930] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 29.821996] [ 29.822159] The buggy address belongs to the physical page: [ 29.822759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 29.823240] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.823403] page_type: f5(slab) [ 29.824206] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.824589] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.825220] page dumped because: kasan: bad access detected [ 29.825944] [ 29.826006] Memory state around the buggy address: [ 29.826385] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.827186] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.827433] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.827548] ^ [ 29.827648] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.827777] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.829119] ================================================================== [ 29.996546] ================================================================== [ 29.996653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 29.996776] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265 [ 29.996904] [ 29.996976] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 29.997181] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.997259] Hardware name: linux,dummy-virt (DT) [ 29.997368] Call trace: [ 29.997428] show_stack+0x20/0x38 (C) [ 29.997547] dump_stack_lvl+0x8c/0xd0 [ 29.997666] print_report+0x118/0x608 [ 29.997777] kasan_report+0xdc/0x128 [ 29.997893] kasan_check_range+0x100/0x1a8 [ 29.998367] __kasan_check_write+0x20/0x30 [ 29.998852] kasan_atomics_helper+0x1190/0x4858 [ 29.999125] kasan_atomics+0x198/0x2e0 [ 29.999283] kunit_try_run_case+0x170/0x3f0 [ 29.999701] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.000017] kthread+0x328/0x630 [ 30.000142] ret_from_fork+0x10/0x20 [ 30.000290] [ 30.000376] Allocated by task 265: [ 30.000859] kasan_save_stack+0x3c/0x68 [ 30.001211] kasan_save_track+0x20/0x40 [ 30.001374] kasan_save_alloc_info+0x40/0x58 [ 30.001514] __kasan_kmalloc+0xd4/0xd8 [ 30.001741] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.001858] kasan_atomics+0xb8/0x2e0 [ 30.001963] kunit_try_run_case+0x170/0x3f0 [ 30.002145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.002728] kthread+0x328/0x630 [ 30.002902] ret_from_fork+0x10/0x20 [ 30.003483] [ 30.003620] The buggy address belongs to the object at fff00000c770a480 [ 30.003620] which belongs to the cache kmalloc-64 of size 64 [ 30.003974] The buggy address is located 0 bytes to the right of [ 30.003974] allocated 48-byte region [fff00000c770a480, fff00000c770a4b0) [ 30.004124] [ 30.004155] The buggy address belongs to the physical page: [ 30.004197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a [ 30.004277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.004395] page_type: f5(slab) [ 30.004447] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.004513] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.004567] page dumped because: kasan: bad access detected [ 30.004609] [ 30.004633] Memory state around the buggy address: [ 30.004672] fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.004728] fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.004784] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.004834] ^ [ 30.004874] fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.004930] fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.004981] ==================================================================
[ 14.047964] ================================================================== [ 14.048358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 14.048682] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.049029] [ 14.049123] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.049202] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.049217] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.049238] Call Trace: [ 14.049276] <TASK> [ 14.049290] dump_stack_lvl+0x73/0xb0 [ 14.049317] print_report+0xd1/0x650 [ 14.049352] ? __virt_addr_valid+0x1db/0x2d0 [ 14.049376] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.049398] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.049421] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.049444] kasan_report+0x141/0x180 [ 14.049467] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.049493] kasan_check_range+0x10c/0x1c0 [ 14.049518] __kasan_check_write+0x18/0x20 [ 14.049538] kasan_atomics_helper+0x5fe/0x5450 [ 14.049562] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.049584] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.049610] ? ret_from_fork_asm+0x1a/0x30 [ 14.049651] ? kasan_atomics+0x152/0x310 [ 14.049678] kasan_atomics+0x1dc/0x310 [ 14.049702] ? __pfx_kasan_atomics+0x10/0x10 [ 14.049727] ? __pfx_read_tsc+0x10/0x10 [ 14.049749] ? ktime_get_ts64+0x86/0x230 [ 14.049773] kunit_try_run_case+0x1a5/0x480 [ 14.049795] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.049816] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.049841] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.049867] ? __kthread_parkme+0x82/0x180 [ 14.049889] ? preempt_count_sub+0x50/0x80 [ 14.049924] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.049946] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.049971] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.049997] kthread+0x337/0x6f0 [ 14.050017] ? trace_preempt_on+0x20/0xc0 [ 14.050091] ? __pfx_kthread+0x10/0x10 [ 14.050113] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.050138] ? calculate_sigpending+0x7b/0xa0 [ 14.050163] ? __pfx_kthread+0x10/0x10 [ 14.050186] ret_from_fork+0x116/0x1d0 [ 14.050206] ? __pfx_kthread+0x10/0x10 [ 14.050227] ret_from_fork_asm+0x1a/0x30 [ 14.050257] </TASK> [ 14.050268] [ 14.062857] Allocated by task 282: [ 14.063421] kasan_save_stack+0x45/0x70 [ 14.063912] kasan_save_track+0x18/0x40 [ 14.064401] kasan_save_alloc_info+0x3b/0x50 [ 14.064557] __kasan_kmalloc+0xb7/0xc0 [ 14.064711] __kmalloc_cache_noprof+0x189/0x420 [ 14.064863] kasan_atomics+0x95/0x310 [ 14.065019] kunit_try_run_case+0x1a5/0x480 [ 14.065789] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.066296] kthread+0x337/0x6f0 [ 14.066424] ret_from_fork+0x116/0x1d0 [ 14.066919] ret_from_fork_asm+0x1a/0x30 [ 14.067457] [ 14.067554] The buggy address belongs to the object at ffff888102b49680 [ 14.067554] which belongs to the cache kmalloc-64 of size 64 [ 14.068387] The buggy address is located 0 bytes to the right of [ 14.068387] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.069240] [ 14.069532] The buggy address belongs to the physical page: [ 14.069930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.070794] flags: 0x200000000000000(node=0|zone=2) [ 14.071158] page_type: f5(slab) [ 14.071554] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.072113] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.072583] page dumped because: kasan: bad access detected [ 14.072954] [ 14.073027] Memory state around the buggy address: [ 14.073464] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.074088] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.074313] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.074520] ^ [ 14.074679] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.074956] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.075284] ================================================================== [ 15.147031] ================================================================== [ 15.147283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 15.147514] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 15.147762] [ 15.147871] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 15.147923] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.147956] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.147978] Call Trace: [ 15.147994] <TASK> [ 15.148010] dump_stack_lvl+0x73/0xb0 [ 15.148036] print_report+0xd1/0x650 [ 15.148058] ? __virt_addr_valid+0x1db/0x2d0 [ 15.148082] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.148104] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.148128] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.148151] kasan_report+0x141/0x180 [ 15.148175] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.148202] kasan_check_range+0x10c/0x1c0 [ 15.148227] __kasan_check_write+0x18/0x20 [ 15.148247] kasan_atomics_helper+0x1e12/0x5450 [ 15.148270] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.148293] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.148319] ? ret_from_fork_asm+0x1a/0x30 [ 15.148341] ? kasan_atomics+0x152/0x310 [ 15.148368] kasan_atomics+0x1dc/0x310 [ 15.148392] ? __pfx_kasan_atomics+0x10/0x10 [ 15.148417] ? __pfx_read_tsc+0x10/0x10 [ 15.148439] ? ktime_get_ts64+0x86/0x230 [ 15.148463] kunit_try_run_case+0x1a5/0x480 [ 15.148485] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.148505] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.148531] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.148556] ? __kthread_parkme+0x82/0x180 [ 15.148577] ? preempt_count_sub+0x50/0x80 [ 15.148602] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.148643] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.148669] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.148694] kthread+0x337/0x6f0 [ 15.148715] ? trace_preempt_on+0x20/0xc0 [ 15.148739] ? __pfx_kthread+0x10/0x10 [ 15.148760] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.148784] ? calculate_sigpending+0x7b/0xa0 [ 15.148809] ? __pfx_kthread+0x10/0x10 [ 15.148831] ret_from_fork+0x116/0x1d0 [ 15.148850] ? __pfx_kthread+0x10/0x10 [ 15.148871] ret_from_fork_asm+0x1a/0x30 [ 15.148909] </TASK> [ 15.148920] [ 15.156445] Allocated by task 282: [ 15.156593] kasan_save_stack+0x45/0x70 [ 15.156810] kasan_save_track+0x18/0x40 [ 15.157003] kasan_save_alloc_info+0x3b/0x50 [ 15.157205] __kasan_kmalloc+0xb7/0xc0 [ 15.157372] __kmalloc_cache_noprof+0x189/0x420 [ 15.157526] kasan_atomics+0x95/0x310 [ 15.157685] kunit_try_run_case+0x1a5/0x480 [ 15.157831] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.158017] kthread+0x337/0x6f0 [ 15.158138] ret_from_fork+0x116/0x1d0 [ 15.158271] ret_from_fork_asm+0x1a/0x30 [ 15.158410] [ 15.158481] The buggy address belongs to the object at ffff888102b49680 [ 15.158481] which belongs to the cache kmalloc-64 of size 64 [ 15.158979] The buggy address is located 0 bytes to the right of [ 15.158979] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 15.159520] [ 15.159632] The buggy address belongs to the physical page: [ 15.159882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 15.160236] flags: 0x200000000000000(node=0|zone=2) [ 15.160464] page_type: f5(slab) [ 15.160592] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.160931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.161213] page dumped because: kasan: bad access detected [ 15.161386] [ 15.161456] Memory state around the buggy address: [ 15.161628] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.161853] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.162185] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.162506] ^ [ 15.162763] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.163100] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.163410] ================================================================== [ 14.825512] ================================================================== [ 14.826481] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 14.827532] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.828749] [ 14.829198] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.829248] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.829263] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.829285] Call Trace: [ 14.829300] <TASK> [ 14.829315] dump_stack_lvl+0x73/0xb0 [ 14.829342] print_report+0xd1/0x650 [ 14.829401] ? __virt_addr_valid+0x1db/0x2d0 [ 14.829427] ? kasan_atomics_helper+0x164f/0x5450 [ 14.829450] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.829566] ? kasan_atomics_helper+0x164f/0x5450 [ 14.829591] kasan_report+0x141/0x180 [ 14.829615] ? kasan_atomics_helper+0x164f/0x5450 [ 14.829652] kasan_check_range+0x10c/0x1c0 [ 14.829677] __kasan_check_write+0x18/0x20 [ 14.829697] kasan_atomics_helper+0x164f/0x5450 [ 14.829720] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.829743] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.829769] ? ret_from_fork_asm+0x1a/0x30 [ 14.829792] ? kasan_atomics+0x152/0x310 [ 14.829818] kasan_atomics+0x1dc/0x310 [ 14.829841] ? __pfx_kasan_atomics+0x10/0x10 [ 14.829866] ? __pfx_read_tsc+0x10/0x10 [ 14.829888] ? ktime_get_ts64+0x86/0x230 [ 14.829925] kunit_try_run_case+0x1a5/0x480 [ 14.829958] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.829978] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.830004] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.830030] ? __kthread_parkme+0x82/0x180 [ 14.830051] ? preempt_count_sub+0x50/0x80 [ 14.830075] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.830096] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.830121] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.830147] kthread+0x337/0x6f0 [ 14.830166] ? trace_preempt_on+0x20/0xc0 [ 14.830190] ? __pfx_kthread+0x10/0x10 [ 14.830210] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.830234] ? calculate_sigpending+0x7b/0xa0 [ 14.830259] ? __pfx_kthread+0x10/0x10 [ 14.830281] ret_from_fork+0x116/0x1d0 [ 14.830301] ? __pfx_kthread+0x10/0x10 [ 14.830323] ret_from_fork_asm+0x1a/0x30 [ 14.830353] </TASK> [ 14.830364] [ 14.845288] Allocated by task 282: [ 14.845425] kasan_save_stack+0x45/0x70 [ 14.845575] kasan_save_track+0x18/0x40 [ 14.845713] kasan_save_alloc_info+0x3b/0x50 [ 14.845861] __kasan_kmalloc+0xb7/0xc0 [ 14.846224] __kmalloc_cache_noprof+0x189/0x420 [ 14.846642] kasan_atomics+0x95/0x310 [ 14.846983] kunit_try_run_case+0x1a5/0x480 [ 14.847352] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.848051] kthread+0x337/0x6f0 [ 14.848358] ret_from_fork+0x116/0x1d0 [ 14.848714] ret_from_fork_asm+0x1a/0x30 [ 14.849098] [ 14.849443] The buggy address belongs to the object at ffff888102b49680 [ 14.849443] which belongs to the cache kmalloc-64 of size 64 [ 14.850673] The buggy address is located 0 bytes to the right of [ 14.850673] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.852018] [ 14.852191] The buggy address belongs to the physical page: [ 14.852669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.853075] flags: 0x200000000000000(node=0|zone=2) [ 14.853510] page_type: f5(slab) [ 14.853824] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.854287] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.854519] page dumped because: kasan: bad access detected [ 14.854816] [ 14.854989] Memory state around the buggy address: [ 14.855463] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.856360] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.857086] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.857450] ^ [ 14.857606] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.858311] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.859060] ================================================================== [ 14.493102] ================================================================== [ 14.493333] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 14.493564] Read of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.493815] [ 14.493908] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.493989] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.494002] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.494023] Call Trace: [ 14.494035] <TASK> [ 14.494049] dump_stack_lvl+0x73/0xb0 [ 14.494073] print_report+0xd1/0x650 [ 14.494097] ? __virt_addr_valid+0x1db/0x2d0 [ 14.494120] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.494143] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.494166] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.494189] kasan_report+0x141/0x180 [ 14.494212] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.494240] __asan_report_load4_noabort+0x18/0x20 [ 14.494262] kasan_atomics_helper+0x4a02/0x5450 [ 14.494286] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.494309] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.494333] ? ret_from_fork_asm+0x1a/0x30 [ 14.494355] ? kasan_atomics+0x152/0x310 [ 14.494383] kasan_atomics+0x1dc/0x310 [ 14.494407] ? __pfx_kasan_atomics+0x10/0x10 [ 14.494433] ? __pfx_read_tsc+0x10/0x10 [ 14.494456] ? ktime_get_ts64+0x86/0x230 [ 14.494480] kunit_try_run_case+0x1a5/0x480 [ 14.494502] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.494523] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.494548] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.494574] ? __kthread_parkme+0x82/0x180 [ 14.494595] ? preempt_count_sub+0x50/0x80 [ 14.494636] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.494659] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.494683] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.494709] kthread+0x337/0x6f0 [ 14.494730] ? trace_preempt_on+0x20/0xc0 [ 14.494753] ? __pfx_kthread+0x10/0x10 [ 14.494774] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.494798] ? calculate_sigpending+0x7b/0xa0 [ 14.494823] ? __pfx_kthread+0x10/0x10 [ 14.494845] ret_from_fork+0x116/0x1d0 [ 14.494864] ? __pfx_kthread+0x10/0x10 [ 14.494885] ret_from_fork_asm+0x1a/0x30 [ 14.494925] </TASK> [ 14.494954] [ 14.503108] Allocated by task 282: [ 14.503294] kasan_save_stack+0x45/0x70 [ 14.503493] kasan_save_track+0x18/0x40 [ 14.503688] kasan_save_alloc_info+0x3b/0x50 [ 14.503911] __kasan_kmalloc+0xb7/0xc0 [ 14.504105] __kmalloc_cache_noprof+0x189/0x420 [ 14.504274] kasan_atomics+0x95/0x310 [ 14.504426] kunit_try_run_case+0x1a5/0x480 [ 14.504635] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.504879] kthread+0x337/0x6f0 [ 14.505103] ret_from_fork+0x116/0x1d0 [ 14.505332] ret_from_fork_asm+0x1a/0x30 [ 14.505524] [ 14.505665] The buggy address belongs to the object at ffff888102b49680 [ 14.505665] which belongs to the cache kmalloc-64 of size 64 [ 14.506062] The buggy address is located 0 bytes to the right of [ 14.506062] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.506435] [ 14.506513] The buggy address belongs to the physical page: [ 14.506685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.507005] flags: 0x200000000000000(node=0|zone=2) [ 14.507241] page_type: f5(slab) [ 14.507407] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.507742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.508110] page dumped because: kasan: bad access detected [ 14.508359] [ 14.508451] Memory state around the buggy address: [ 14.508700] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.509023] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.509426] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.509659] ^ [ 14.509815] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.510144] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.510466] ================================================================== [ 14.604193] ================================================================== [ 14.604590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 14.604977] Read of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.605782] [ 14.605972] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.606015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.606027] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.606048] Call Trace: [ 14.606064] <TASK> [ 14.606079] dump_stack_lvl+0x73/0xb0 [ 14.606105] print_report+0xd1/0x650 [ 14.606127] ? __virt_addr_valid+0x1db/0x2d0 [ 14.606151] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.606173] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.606196] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.606219] kasan_report+0x141/0x180 [ 14.606241] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.606269] __asan_report_load4_noabort+0x18/0x20 [ 14.606290] kasan_atomics_helper+0x49ce/0x5450 [ 14.606314] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.606337] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.606362] ? ret_from_fork_asm+0x1a/0x30 [ 14.606384] ? kasan_atomics+0x152/0x310 [ 14.606414] kasan_atomics+0x1dc/0x310 [ 14.606438] ? __pfx_kasan_atomics+0x10/0x10 [ 14.606463] ? __pfx_read_tsc+0x10/0x10 [ 14.606484] ? ktime_get_ts64+0x86/0x230 [ 14.606509] kunit_try_run_case+0x1a5/0x480 [ 14.606531] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.606551] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.606576] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.606601] ? __kthread_parkme+0x82/0x180 [ 14.606622] ? preempt_count_sub+0x50/0x80 [ 14.606647] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.606669] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.606694] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.606720] kthread+0x337/0x6f0 [ 14.606740] ? trace_preempt_on+0x20/0xc0 [ 14.606762] ? __pfx_kthread+0x10/0x10 [ 14.606784] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.606806] ? calculate_sigpending+0x7b/0xa0 [ 14.606831] ? __pfx_kthread+0x10/0x10 [ 14.606852] ret_from_fork+0x116/0x1d0 [ 14.606872] ? __pfx_kthread+0x10/0x10 [ 14.606903] ret_from_fork_asm+0x1a/0x30 [ 14.606933] </TASK> [ 14.606958] [ 14.617340] Allocated by task 282: [ 14.617516] kasan_save_stack+0x45/0x70 [ 14.617663] kasan_save_track+0x18/0x40 [ 14.617801] kasan_save_alloc_info+0x3b/0x50 [ 14.617963] __kasan_kmalloc+0xb7/0xc0 [ 14.618290] __kmalloc_cache_noprof+0x189/0x420 [ 14.618697] kasan_atomics+0x95/0x310 [ 14.618902] kunit_try_run_case+0x1a5/0x480 [ 14.619109] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.619337] kthread+0x337/0x6f0 [ 14.619511] ret_from_fork+0x116/0x1d0 [ 14.619706] ret_from_fork_asm+0x1a/0x30 [ 14.619875] [ 14.619956] The buggy address belongs to the object at ffff888102b49680 [ 14.619956] which belongs to the cache kmalloc-64 of size 64 [ 14.620459] The buggy address is located 0 bytes to the right of [ 14.620459] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.621066] [ 14.621139] The buggy address belongs to the physical page: [ 14.621475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.621755] flags: 0x200000000000000(node=0|zone=2) [ 14.622595] page_type: f5(slab) [ 14.622806] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.623172] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.623490] page dumped because: kasan: bad access detected [ 14.623702] [ 14.623794] Memory state around the buggy address: [ 14.624029] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.624301] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.624598] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.624885] ^ [ 14.625864] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.626565] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.627504] ================================================================== [ 15.241871] ================================================================== [ 15.242831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 15.243337] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 15.243781] [ 15.244113] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 15.244166] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.244181] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.244202] Call Trace: [ 15.244217] <TASK> [ 15.244230] dump_stack_lvl+0x73/0xb0 [ 15.244295] print_report+0xd1/0x650 [ 15.244322] ? __virt_addr_valid+0x1db/0x2d0 [ 15.244347] ? kasan_atomics_helper+0x2006/0x5450 [ 15.244371] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.244395] ? kasan_atomics_helper+0x2006/0x5450 [ 15.244418] kasan_report+0x141/0x180 [ 15.244441] ? kasan_atomics_helper+0x2006/0x5450 [ 15.244468] kasan_check_range+0x10c/0x1c0 [ 15.244492] __kasan_check_write+0x18/0x20 [ 15.244513] kasan_atomics_helper+0x2006/0x5450 [ 15.244536] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.244559] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.244585] ? ret_from_fork_asm+0x1a/0x30 [ 15.244607] ? kasan_atomics+0x152/0x310 [ 15.244648] kasan_atomics+0x1dc/0x310 [ 15.244671] ? __pfx_kasan_atomics+0x10/0x10 [ 15.244696] ? __pfx_read_tsc+0x10/0x10 [ 15.244717] ? ktime_get_ts64+0x86/0x230 [ 15.244742] kunit_try_run_case+0x1a5/0x480 [ 15.244764] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.244784] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.244810] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.244835] ? __kthread_parkme+0x82/0x180 [ 15.244856] ? preempt_count_sub+0x50/0x80 [ 15.244881] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.244913] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.244939] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.244965] kthread+0x337/0x6f0 [ 15.244985] ? trace_preempt_on+0x20/0xc0 [ 15.245008] ? __pfx_kthread+0x10/0x10 [ 15.245029] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.245057] ? calculate_sigpending+0x7b/0xa0 [ 15.245082] ? __pfx_kthread+0x10/0x10 [ 15.245104] ret_from_fork+0x116/0x1d0 [ 15.245123] ? __pfx_kthread+0x10/0x10 [ 15.245144] ret_from_fork_asm+0x1a/0x30 [ 15.245174] </TASK> [ 15.245186] [ 15.255020] Allocated by task 282: [ 15.255152] kasan_save_stack+0x45/0x70 [ 15.255342] kasan_save_track+0x18/0x40 [ 15.255537] kasan_save_alloc_info+0x3b/0x50 [ 15.255732] __kasan_kmalloc+0xb7/0xc0 [ 15.255865] __kmalloc_cache_noprof+0x189/0x420 [ 15.256032] kasan_atomics+0x95/0x310 [ 15.256235] kunit_try_run_case+0x1a5/0x480 [ 15.256445] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.256702] kthread+0x337/0x6f0 [ 15.256886] ret_from_fork+0x116/0x1d0 [ 15.257185] ret_from_fork_asm+0x1a/0x30 [ 15.257433] [ 15.257519] The buggy address belongs to the object at ffff888102b49680 [ 15.257519] which belongs to the cache kmalloc-64 of size 64 [ 15.257994] The buggy address is located 0 bytes to the right of [ 15.257994] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 15.258498] [ 15.258599] The buggy address belongs to the physical page: [ 15.258829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 15.259078] flags: 0x200000000000000(node=0|zone=2) [ 15.259238] page_type: f5(slab) [ 15.259507] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.259931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.260156] page dumped because: kasan: bad access detected [ 15.260325] [ 15.260393] Memory state around the buggy address: [ 15.260562] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.260821] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.261383] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.261599] ^ [ 15.262474] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.263192] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.263650] ================================================================== [ 14.193655] ================================================================== [ 14.194038] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 14.194387] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.194756] [ 14.194852] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.194922] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.194953] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.194977] Call Trace: [ 14.194995] <TASK> [ 14.195010] dump_stack_lvl+0x73/0xb0 [ 14.195036] print_report+0xd1/0x650 [ 14.195060] ? __virt_addr_valid+0x1db/0x2d0 [ 14.195085] ? kasan_atomics_helper+0x992/0x5450 [ 14.195107] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.195131] ? kasan_atomics_helper+0x992/0x5450 [ 14.195154] kasan_report+0x141/0x180 [ 14.195177] ? kasan_atomics_helper+0x992/0x5450 [ 14.195206] kasan_check_range+0x10c/0x1c0 [ 14.195231] __kasan_check_write+0x18/0x20 [ 14.195252] kasan_atomics_helper+0x992/0x5450 [ 14.195276] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.195299] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.195324] ? ret_from_fork_asm+0x1a/0x30 [ 14.195347] ? kasan_atomics+0x152/0x310 [ 14.195375] kasan_atomics+0x1dc/0x310 [ 14.195398] ? __pfx_kasan_atomics+0x10/0x10 [ 14.195423] ? __pfx_read_tsc+0x10/0x10 [ 14.195445] ? ktime_get_ts64+0x86/0x230 [ 14.195471] kunit_try_run_case+0x1a5/0x480 [ 14.195494] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.195514] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.195541] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.195566] ? __kthread_parkme+0x82/0x180 [ 14.195588] ? preempt_count_sub+0x50/0x80 [ 14.195629] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.195651] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.195677] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.195702] kthread+0x337/0x6f0 [ 14.195722] ? trace_preempt_on+0x20/0xc0 [ 14.195746] ? __pfx_kthread+0x10/0x10 [ 14.195767] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.195790] ? calculate_sigpending+0x7b/0xa0 [ 14.195815] ? __pfx_kthread+0x10/0x10 [ 14.195836] ret_from_fork+0x116/0x1d0 [ 14.195855] ? __pfx_kthread+0x10/0x10 [ 14.195877] ret_from_fork_asm+0x1a/0x30 [ 14.195916] </TASK> [ 14.195945] [ 14.204170] Allocated by task 282: [ 14.204336] kasan_save_stack+0x45/0x70 [ 14.204482] kasan_save_track+0x18/0x40 [ 14.204665] kasan_save_alloc_info+0x3b/0x50 [ 14.204879] __kasan_kmalloc+0xb7/0xc0 [ 14.205104] __kmalloc_cache_noprof+0x189/0x420 [ 14.205382] kasan_atomics+0x95/0x310 [ 14.205518] kunit_try_run_case+0x1a5/0x480 [ 14.205791] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.206058] kthread+0x337/0x6f0 [ 14.206235] ret_from_fork+0x116/0x1d0 [ 14.206433] ret_from_fork_asm+0x1a/0x30 [ 14.206580] [ 14.206653] The buggy address belongs to the object at ffff888102b49680 [ 14.206653] which belongs to the cache kmalloc-64 of size 64 [ 14.207034] The buggy address is located 0 bytes to the right of [ 14.207034] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.207572] [ 14.207666] The buggy address belongs to the physical page: [ 14.208374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.209217] flags: 0x200000000000000(node=0|zone=2) [ 14.209406] page_type: f5(slab) [ 14.209533] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.210344] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.210945] page dumped because: kasan: bad access detected [ 14.211448] [ 14.211738] Memory state around the buggy address: [ 14.212213] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.212526] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.213258] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.213576] ^ [ 14.214042] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.214495] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.215037] ================================================================== [ 15.322028] ================================================================== [ 15.322364] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 15.322623] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 15.323088] [ 15.323199] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 15.323241] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.323253] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.323274] Call Trace: [ 15.323287] <TASK> [ 15.323300] dump_stack_lvl+0x73/0xb0 [ 15.323324] print_report+0xd1/0x650 [ 15.323346] ? __virt_addr_valid+0x1db/0x2d0 [ 15.323369] ? kasan_atomics_helper+0x218a/0x5450 [ 15.323390] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.323413] ? kasan_atomics_helper+0x218a/0x5450 [ 15.323435] kasan_report+0x141/0x180 [ 15.323457] ? kasan_atomics_helper+0x218a/0x5450 [ 15.323484] kasan_check_range+0x10c/0x1c0 [ 15.323507] __kasan_check_write+0x18/0x20 [ 15.323526] kasan_atomics_helper+0x218a/0x5450 [ 15.323549] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.323572] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.323596] ? ret_from_fork_asm+0x1a/0x30 [ 15.323618] ? kasan_atomics+0x152/0x310 [ 15.323644] kasan_atomics+0x1dc/0x310 [ 15.323667] ? __pfx_kasan_atomics+0x10/0x10 [ 15.323692] ? __pfx_read_tsc+0x10/0x10 [ 15.323712] ? ktime_get_ts64+0x86/0x230 [ 15.323736] kunit_try_run_case+0x1a5/0x480 [ 15.323757] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.323777] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.323802] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.323827] ? __kthread_parkme+0x82/0x180 [ 15.323847] ? preempt_count_sub+0x50/0x80 [ 15.323871] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.323902] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.323927] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.323952] kthread+0x337/0x6f0 [ 15.323971] ? trace_preempt_on+0x20/0xc0 [ 15.323993] ? __pfx_kthread+0x10/0x10 [ 15.324014] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.324037] ? calculate_sigpending+0x7b/0xa0 [ 15.324061] ? __pfx_kthread+0x10/0x10 [ 15.324082] ret_from_fork+0x116/0x1d0 [ 15.324101] ? __pfx_kthread+0x10/0x10 [ 15.324122] ret_from_fork_asm+0x1a/0x30 [ 15.324152] </TASK> [ 15.324162] [ 15.331583] Allocated by task 282: [ 15.331771] kasan_save_stack+0x45/0x70 [ 15.331976] kasan_save_track+0x18/0x40 [ 15.332128] kasan_save_alloc_info+0x3b/0x50 [ 15.332323] __kasan_kmalloc+0xb7/0xc0 [ 15.332457] __kmalloc_cache_noprof+0x189/0x420 [ 15.332613] kasan_atomics+0x95/0x310 [ 15.332799] kunit_try_run_case+0x1a5/0x480 [ 15.333071] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.333322] kthread+0x337/0x6f0 [ 15.333466] ret_from_fork+0x116/0x1d0 [ 15.333597] ret_from_fork_asm+0x1a/0x30 [ 15.333761] [ 15.333861] The buggy address belongs to the object at ffff888102b49680 [ 15.333861] which belongs to the cache kmalloc-64 of size 64 [ 15.334413] The buggy address is located 0 bytes to the right of [ 15.334413] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 15.334862] [ 15.334967] The buggy address belongs to the physical page: [ 15.335222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 15.335531] flags: 0x200000000000000(node=0|zone=2) [ 15.335707] page_type: f5(slab) [ 15.335844] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.336192] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.336421] page dumped because: kasan: bad access detected [ 15.336591] [ 15.336659] Memory state around the buggy address: [ 15.336812] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.337038] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.337260] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.337474] ^ [ 15.337629] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.337955] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.338272] ================================================================== [ 14.075708] ================================================================== [ 14.076200] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 14.076513] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.076783] [ 14.076958] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.077011] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.077024] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.077049] Call Trace: [ 14.077063] <TASK> [ 14.077089] dump_stack_lvl+0x73/0xb0 [ 14.077114] print_report+0xd1/0x650 [ 14.077137] ? __virt_addr_valid+0x1db/0x2d0 [ 14.077162] ? kasan_atomics_helper+0x697/0x5450 [ 14.077198] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.077221] ? kasan_atomics_helper+0x697/0x5450 [ 14.077253] kasan_report+0x141/0x180 [ 14.077276] ? kasan_atomics_helper+0x697/0x5450 [ 14.077303] kasan_check_range+0x10c/0x1c0 [ 14.077338] __kasan_check_write+0x18/0x20 [ 14.077359] kasan_atomics_helper+0x697/0x5450 [ 14.077383] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.077406] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.077430] ? ret_from_fork_asm+0x1a/0x30 [ 14.077452] ? kasan_atomics+0x152/0x310 [ 14.077480] kasan_atomics+0x1dc/0x310 [ 14.077503] ? __pfx_kasan_atomics+0x10/0x10 [ 14.077528] ? __pfx_read_tsc+0x10/0x10 [ 14.077549] ? ktime_get_ts64+0x86/0x230 [ 14.077574] kunit_try_run_case+0x1a5/0x480 [ 14.077595] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.077616] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.077652] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.077677] ? __kthread_parkme+0x82/0x180 [ 14.077707] ? preempt_count_sub+0x50/0x80 [ 14.077732] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.077753] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.077788] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.077814] kthread+0x337/0x6f0 [ 14.077834] ? trace_preempt_on+0x20/0xc0 [ 14.077857] ? __pfx_kthread+0x10/0x10 [ 14.077885] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.077924] ? calculate_sigpending+0x7b/0xa0 [ 14.077959] ? __pfx_kthread+0x10/0x10 [ 14.077982] ret_from_fork+0x116/0x1d0 [ 14.078001] ? __pfx_kthread+0x10/0x10 [ 14.078023] ret_from_fork_asm+0x1a/0x30 [ 14.078054] </TASK> [ 14.078066] [ 14.088252] Allocated by task 282: [ 14.088859] kasan_save_stack+0x45/0x70 [ 14.089220] kasan_save_track+0x18/0x40 [ 14.089405] kasan_save_alloc_info+0x3b/0x50 [ 14.089605] __kasan_kmalloc+0xb7/0xc0 [ 14.090042] __kmalloc_cache_noprof+0x189/0x420 [ 14.090389] kasan_atomics+0x95/0x310 [ 14.090778] kunit_try_run_case+0x1a5/0x480 [ 14.091173] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.091537] kthread+0x337/0x6f0 [ 14.092000] ret_from_fork+0x116/0x1d0 [ 14.092277] ret_from_fork_asm+0x1a/0x30 [ 14.092562] [ 14.092880] The buggy address belongs to the object at ffff888102b49680 [ 14.092880] which belongs to the cache kmalloc-64 of size 64 [ 14.094039] The buggy address is located 0 bytes to the right of [ 14.094039] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.094827] [ 14.094943] The buggy address belongs to the physical page: [ 14.095388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.096011] flags: 0x200000000000000(node=0|zone=2) [ 14.096351] page_type: f5(slab) [ 14.096506] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.097148] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.097827] page dumped because: kasan: bad access detected [ 14.098312] [ 14.098475] Memory state around the buggy address: [ 14.098667] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.099092] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.099337] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.099626] ^ [ 14.099831] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.100272] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.100605] ================================================================== [ 14.215505] ================================================================== [ 14.215773] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 14.216214] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.216490] [ 14.216603] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.216665] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.216679] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.216700] Call Trace: [ 14.216716] <TASK> [ 14.216732] dump_stack_lvl+0x73/0xb0 [ 14.216758] print_report+0xd1/0x650 [ 14.216781] ? __virt_addr_valid+0x1db/0x2d0 [ 14.216804] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.216826] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.216850] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.216873] kasan_report+0x141/0x180 [ 14.216905] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.216950] kasan_check_range+0x10c/0x1c0 [ 14.216976] __kasan_check_write+0x18/0x20 [ 14.216996] kasan_atomics_helper+0xa2b/0x5450 [ 14.217019] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.217053] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.217079] ? ret_from_fork_asm+0x1a/0x30 [ 14.217102] ? kasan_atomics+0x152/0x310 [ 14.217129] kasan_atomics+0x1dc/0x310 [ 14.217153] ? __pfx_kasan_atomics+0x10/0x10 [ 14.217178] ? __pfx_read_tsc+0x10/0x10 [ 14.217200] ? ktime_get_ts64+0x86/0x230 [ 14.217225] kunit_try_run_case+0x1a5/0x480 [ 14.217247] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.217268] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.217294] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.217320] ? __kthread_parkme+0x82/0x180 [ 14.217342] ? preempt_count_sub+0x50/0x80 [ 14.217366] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.217388] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.217414] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.217440] kthread+0x337/0x6f0 [ 14.217460] ? trace_preempt_on+0x20/0xc0 [ 14.217484] ? __pfx_kthread+0x10/0x10 [ 14.217505] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.217528] ? calculate_sigpending+0x7b/0xa0 [ 14.217553] ? __pfx_kthread+0x10/0x10 [ 14.217575] ret_from_fork+0x116/0x1d0 [ 14.217595] ? __pfx_kthread+0x10/0x10 [ 14.217631] ret_from_fork_asm+0x1a/0x30 [ 14.217662] </TASK> [ 14.217673] [ 14.226087] Allocated by task 282: [ 14.226271] kasan_save_stack+0x45/0x70 [ 14.226437] kasan_save_track+0x18/0x40 [ 14.226573] kasan_save_alloc_info+0x3b/0x50 [ 14.226795] __kasan_kmalloc+0xb7/0xc0 [ 14.227067] __kmalloc_cache_noprof+0x189/0x420 [ 14.227295] kasan_atomics+0x95/0x310 [ 14.227453] kunit_try_run_case+0x1a5/0x480 [ 14.227636] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.227888] kthread+0x337/0x6f0 [ 14.228041] ret_from_fork+0x116/0x1d0 [ 14.228175] ret_from_fork_asm+0x1a/0x30 [ 14.228415] [ 14.228509] The buggy address belongs to the object at ffff888102b49680 [ 14.228509] which belongs to the cache kmalloc-64 of size 64 [ 14.229180] The buggy address is located 0 bytes to the right of [ 14.229180] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.229560] [ 14.229659] The buggy address belongs to the physical page: [ 14.229919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.230473] flags: 0x200000000000000(node=0|zone=2) [ 14.230710] page_type: f5(slab) [ 14.230915] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.231190] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.231507] page dumped because: kasan: bad access detected [ 14.231748] [ 14.231843] Memory state around the buggy address: [ 14.232111] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.232370] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.232689] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.232973] ^ [ 14.233204] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.233590] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.233984] ================================================================== [ 14.859681] ================================================================== [ 14.859928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 14.860736] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.861522] [ 14.861702] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.861747] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.861759] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.861781] Call Trace: [ 14.861797] <TASK> [ 14.861813] dump_stack_lvl+0x73/0xb0 [ 14.861849] print_report+0xd1/0x650 [ 14.861872] ? __virt_addr_valid+0x1db/0x2d0 [ 14.861909] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.861932] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.861971] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.861994] kasan_report+0x141/0x180 [ 14.862017] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.862045] kasan_check_range+0x10c/0x1c0 [ 14.862070] __kasan_check_write+0x18/0x20 [ 14.862090] kasan_atomics_helper+0x16e7/0x5450 [ 14.862113] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.862136] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.862160] ? ret_from_fork_asm+0x1a/0x30 [ 14.862183] ? kasan_atomics+0x152/0x310 [ 14.862210] kasan_atomics+0x1dc/0x310 [ 14.862233] ? __pfx_kasan_atomics+0x10/0x10 [ 14.862258] ? __pfx_read_tsc+0x10/0x10 [ 14.862280] ? ktime_get_ts64+0x86/0x230 [ 14.862304] kunit_try_run_case+0x1a5/0x480 [ 14.862327] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.862346] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.862372] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.862397] ? __kthread_parkme+0x82/0x180 [ 14.862418] ? preempt_count_sub+0x50/0x80 [ 14.862444] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.862466] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.862491] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.862516] kthread+0x337/0x6f0 [ 14.862536] ? trace_preempt_on+0x20/0xc0 [ 14.862559] ? __pfx_kthread+0x10/0x10 [ 14.862580] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.862604] ? calculate_sigpending+0x7b/0xa0 [ 14.862670] ? __pfx_kthread+0x10/0x10 [ 14.862695] ret_from_fork+0x116/0x1d0 [ 14.862715] ? __pfx_kthread+0x10/0x10 [ 14.862736] ret_from_fork_asm+0x1a/0x30 [ 14.862766] </TASK> [ 14.862777] [ 14.876482] Allocated by task 282: [ 14.876640] kasan_save_stack+0x45/0x70 [ 14.877220] kasan_save_track+0x18/0x40 [ 14.877567] kasan_save_alloc_info+0x3b/0x50 [ 14.878030] __kasan_kmalloc+0xb7/0xc0 [ 14.878203] __kmalloc_cache_noprof+0x189/0x420 [ 14.878376] kasan_atomics+0x95/0x310 [ 14.878513] kunit_try_run_case+0x1a5/0x480 [ 14.878783] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.879337] kthread+0x337/0x6f0 [ 14.879696] ret_from_fork+0x116/0x1d0 [ 14.880110] ret_from_fork_asm+0x1a/0x30 [ 14.880477] [ 14.880656] The buggy address belongs to the object at ffff888102b49680 [ 14.880656] which belongs to the cache kmalloc-64 of size 64 [ 14.881735] The buggy address is located 0 bytes to the right of [ 14.881735] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.882126] [ 14.882206] The buggy address belongs to the physical page: [ 14.882377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.882619] flags: 0x200000000000000(node=0|zone=2) [ 14.882783] page_type: f5(slab) [ 14.882915] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.883148] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.883377] page dumped because: kasan: bad access detected [ 14.883549] [ 14.883619] Memory state around the buggy address: [ 14.883772] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.884104] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.884324] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.884539] ^ [ 14.884779] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.885310] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.885657] ================================================================== [ 14.628356] ================================================================== [ 14.629345] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 14.629901] Read of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.631054] [ 14.631240] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.631285] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.631298] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.631320] Call Trace: [ 14.631335] <TASK> [ 14.631349] dump_stack_lvl+0x73/0xb0 [ 14.631375] print_report+0xd1/0x650 [ 14.631399] ? __virt_addr_valid+0x1db/0x2d0 [ 14.631424] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.631446] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.631470] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.631492] kasan_report+0x141/0x180 [ 14.631515] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.631542] kasan_check_range+0x10c/0x1c0 [ 14.631566] __kasan_check_read+0x15/0x20 [ 14.631586] kasan_atomics_helper+0x13b5/0x5450 [ 14.631610] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.631634] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.631659] ? ret_from_fork_asm+0x1a/0x30 [ 14.631681] ? kasan_atomics+0x152/0x310 [ 14.631708] kasan_atomics+0x1dc/0x310 [ 14.631732] ? __pfx_kasan_atomics+0x10/0x10 [ 14.631757] ? __pfx_read_tsc+0x10/0x10 [ 14.631779] ? ktime_get_ts64+0x86/0x230 [ 14.631803] kunit_try_run_case+0x1a5/0x480 [ 14.631825] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.631845] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.631871] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.631906] ? __kthread_parkme+0x82/0x180 [ 14.631927] ? preempt_count_sub+0x50/0x80 [ 14.631952] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.631973] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.631998] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.632024] kthread+0x337/0x6f0 [ 14.632045] ? trace_preempt_on+0x20/0xc0 [ 14.632068] ? __pfx_kthread+0x10/0x10 [ 14.632089] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.632158] ? calculate_sigpending+0x7b/0xa0 [ 14.632184] ? __pfx_kthread+0x10/0x10 [ 14.632216] ret_from_fork+0x116/0x1d0 [ 14.632236] ? __pfx_kthread+0x10/0x10 [ 14.632257] ret_from_fork_asm+0x1a/0x30 [ 14.632287] </TASK> [ 14.632298] [ 14.647394] Allocated by task 282: [ 14.647527] kasan_save_stack+0x45/0x70 [ 14.647692] kasan_save_track+0x18/0x40 [ 14.648064] kasan_save_alloc_info+0x3b/0x50 [ 14.648566] __kasan_kmalloc+0xb7/0xc0 [ 14.649012] __kmalloc_cache_noprof+0x189/0x420 [ 14.649584] kasan_atomics+0x95/0x310 [ 14.650068] kunit_try_run_case+0x1a5/0x480 [ 14.650350] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.650528] kthread+0x337/0x6f0 [ 14.650668] ret_from_fork+0x116/0x1d0 [ 14.651030] ret_from_fork_asm+0x1a/0x30 [ 14.651644] [ 14.651879] The buggy address belongs to the object at ffff888102b49680 [ 14.651879] which belongs to the cache kmalloc-64 of size 64 [ 14.653124] The buggy address is located 0 bytes to the right of [ 14.653124] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.653650] [ 14.653837] The buggy address belongs to the physical page: [ 14.654453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.655248] flags: 0x200000000000000(node=0|zone=2) [ 14.655661] page_type: f5(slab) [ 14.656048] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.656647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.657234] page dumped because: kasan: bad access detected [ 14.657412] [ 14.657482] Memory state around the buggy address: [ 14.657638] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.657860] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.658112] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.658587] ^ [ 14.659078] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.659494] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.659741] ================================================================== [ 13.952437] ================================================================== [ 13.953125] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 13.953505] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 13.953726] [ 13.953807] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 13.953857] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.953870] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.953899] Call Trace: [ 13.953915] <TASK> [ 13.953928] dump_stack_lvl+0x73/0xb0 [ 13.953953] print_report+0xd1/0x650 [ 13.953975] ? __virt_addr_valid+0x1db/0x2d0 [ 13.953999] ? kasan_atomics_helper+0x4a0/0x5450 [ 13.954022] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.954045] ? kasan_atomics_helper+0x4a0/0x5450 [ 13.954068] kasan_report+0x141/0x180 [ 13.954092] ? kasan_atomics_helper+0x4a0/0x5450 [ 13.954120] kasan_check_range+0x10c/0x1c0 [ 13.954145] __kasan_check_write+0x18/0x20 [ 13.954166] kasan_atomics_helper+0x4a0/0x5450 [ 13.954190] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.954213] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.954239] ? ret_from_fork_asm+0x1a/0x30 [ 13.954261] ? kasan_atomics+0x152/0x310 [ 13.954289] kasan_atomics+0x1dc/0x310 [ 13.954313] ? __pfx_kasan_atomics+0x10/0x10 [ 13.954339] ? __pfx_read_tsc+0x10/0x10 [ 13.954361] ? ktime_get_ts64+0x86/0x230 [ 13.954386] kunit_try_run_case+0x1a5/0x480 [ 13.954409] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.954429] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.954456] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.954482] ? __kthread_parkme+0x82/0x180 [ 13.954503] ? preempt_count_sub+0x50/0x80 [ 13.954529] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.954552] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.954579] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.954605] kthread+0x337/0x6f0 [ 13.954626] ? trace_preempt_on+0x20/0xc0 [ 13.954649] ? __pfx_kthread+0x10/0x10 [ 13.954673] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.954696] ? calculate_sigpending+0x7b/0xa0 [ 13.954721] ? __pfx_kthread+0x10/0x10 [ 13.954744] ret_from_fork+0x116/0x1d0 [ 13.954763] ? __pfx_kthread+0x10/0x10 [ 13.954785] ret_from_fork_asm+0x1a/0x30 [ 13.954817] </TASK> [ 13.954828] [ 13.971672] Allocated by task 282: [ 13.972100] kasan_save_stack+0x45/0x70 [ 13.972476] kasan_save_track+0x18/0x40 [ 13.972986] kasan_save_alloc_info+0x3b/0x50 [ 13.973400] __kasan_kmalloc+0xb7/0xc0 [ 13.973818] __kmalloc_cache_noprof+0x189/0x420 [ 13.974228] kasan_atomics+0x95/0x310 [ 13.974757] kunit_try_run_case+0x1a5/0x480 [ 13.975055] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.975565] kthread+0x337/0x6f0 [ 13.975806] ret_from_fork+0x116/0x1d0 [ 13.976253] ret_from_fork_asm+0x1a/0x30 [ 13.976603] [ 13.976696] The buggy address belongs to the object at ffff888102b49680 [ 13.976696] which belongs to the cache kmalloc-64 of size 64 [ 13.977106] The buggy address is located 0 bytes to the right of [ 13.977106] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 13.978270] [ 13.978446] The buggy address belongs to the physical page: [ 13.979059] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 13.979779] flags: 0x200000000000000(node=0|zone=2) [ 13.980175] page_type: f5(slab) [ 13.980496] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.981170] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.981398] page dumped because: kasan: bad access detected [ 13.981566] [ 13.981643] Memory state around the buggy address: [ 13.982073] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.982807] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.983587] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.984286] ^ [ 13.984824] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.985706] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.986120] ================================================================== [ 14.252818] ================================================================== [ 14.253186] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 14.253516] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.253843] [ 14.253946] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.254008] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.254021] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.254042] Call Trace: [ 14.254055] <TASK> [ 14.254069] dump_stack_lvl+0x73/0xb0 [ 14.254093] print_report+0xd1/0x650 [ 14.254115] ? __virt_addr_valid+0x1db/0x2d0 [ 14.254140] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.254162] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.254185] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.254207] kasan_report+0x141/0x180 [ 14.254230] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.254257] kasan_check_range+0x10c/0x1c0 [ 14.254282] __kasan_check_write+0x18/0x20 [ 14.254302] kasan_atomics_helper+0xb6a/0x5450 [ 14.254325] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.254348] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.254373] ? ret_from_fork_asm+0x1a/0x30 [ 14.254395] ? kasan_atomics+0x152/0x310 [ 14.254422] kasan_atomics+0x1dc/0x310 [ 14.254445] ? __pfx_kasan_atomics+0x10/0x10 [ 14.254471] ? __pfx_read_tsc+0x10/0x10 [ 14.254493] ? ktime_get_ts64+0x86/0x230 [ 14.254518] kunit_try_run_case+0x1a5/0x480 [ 14.254543] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.254564] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.254590] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.254634] ? __kthread_parkme+0x82/0x180 [ 14.254673] ? preempt_count_sub+0x50/0x80 [ 14.254697] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.254719] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.254744] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.254771] kthread+0x337/0x6f0 [ 14.254792] ? trace_preempt_on+0x20/0xc0 [ 14.254815] ? __pfx_kthread+0x10/0x10 [ 14.254836] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.254859] ? calculate_sigpending+0x7b/0xa0 [ 14.254884] ? __pfx_kthread+0x10/0x10 [ 14.254916] ret_from_fork+0x116/0x1d0 [ 14.254954] ? __pfx_kthread+0x10/0x10 [ 14.254975] ret_from_fork_asm+0x1a/0x30 [ 14.255006] </TASK> [ 14.255017] [ 14.267169] Allocated by task 282: [ 14.267319] kasan_save_stack+0x45/0x70 [ 14.267503] kasan_save_track+0x18/0x40 [ 14.267688] kasan_save_alloc_info+0x3b/0x50 [ 14.268003] __kasan_kmalloc+0xb7/0xc0 [ 14.268309] __kmalloc_cache_noprof+0x189/0x420 [ 14.268470] kasan_atomics+0x95/0x310 [ 14.269231] kunit_try_run_case+0x1a5/0x480 [ 14.269756] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.270073] kthread+0x337/0x6f0 [ 14.271096] ret_from_fork+0x116/0x1d0 [ 14.271249] ret_from_fork_asm+0x1a/0x30 [ 14.271455] [ 14.271555] The buggy address belongs to the object at ffff888102b49680 [ 14.271555] which belongs to the cache kmalloc-64 of size 64 [ 14.272069] The buggy address is located 0 bytes to the right of [ 14.272069] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.272859] [ 14.272986] The buggy address belongs to the physical page: [ 14.273271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.273622] flags: 0x200000000000000(node=0|zone=2) [ 14.273845] page_type: f5(slab) [ 14.274169] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.274420] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.274649] page dumped because: kasan: bad access detected [ 14.274821] [ 14.274968] Memory state around the buggy address: [ 14.275195] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.275675] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.276080] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.276388] ^ [ 14.276620] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.276992] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.277359] ================================================================== [ 14.886125] ================================================================== [ 14.886444] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 14.886742] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.887045] [ 14.887154] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.887198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.887211] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.887231] Call Trace: [ 14.887246] <TASK> [ 14.887260] dump_stack_lvl+0x73/0xb0 [ 14.887285] print_report+0xd1/0x650 [ 14.887307] ? __virt_addr_valid+0x1db/0x2d0 [ 14.887332] ? kasan_atomics_helper+0x177f/0x5450 [ 14.887354] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.887378] ? kasan_atomics_helper+0x177f/0x5450 [ 14.887401] kasan_report+0x141/0x180 [ 14.887424] ? kasan_atomics_helper+0x177f/0x5450 [ 14.887451] kasan_check_range+0x10c/0x1c0 [ 14.887476] __kasan_check_write+0x18/0x20 [ 14.887497] kasan_atomics_helper+0x177f/0x5450 [ 14.887521] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.887544] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.887569] ? ret_from_fork_asm+0x1a/0x30 [ 14.887592] ? kasan_atomics+0x152/0x310 [ 14.887637] kasan_atomics+0x1dc/0x310 [ 14.887661] ? __pfx_kasan_atomics+0x10/0x10 [ 14.887687] ? __pfx_read_tsc+0x10/0x10 [ 14.887708] ? ktime_get_ts64+0x86/0x230 [ 14.887732] kunit_try_run_case+0x1a5/0x480 [ 14.887754] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.887774] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.887801] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.887825] ? __kthread_parkme+0x82/0x180 [ 14.887847] ? preempt_count_sub+0x50/0x80 [ 14.887870] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.887901] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.887944] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.887971] kthread+0x337/0x6f0 [ 14.887990] ? trace_preempt_on+0x20/0xc0 [ 14.888014] ? __pfx_kthread+0x10/0x10 [ 14.888035] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.888059] ? calculate_sigpending+0x7b/0xa0 [ 14.888085] ? __pfx_kthread+0x10/0x10 [ 14.888107] ret_from_fork+0x116/0x1d0 [ 14.888126] ? __pfx_kthread+0x10/0x10 [ 14.888147] ret_from_fork_asm+0x1a/0x30 [ 14.888178] </TASK> [ 14.888189] [ 14.896517] Allocated by task 282: [ 14.896723] kasan_save_stack+0x45/0x70 [ 14.896950] kasan_save_track+0x18/0x40 [ 14.897248] kasan_save_alloc_info+0x3b/0x50 [ 14.897426] __kasan_kmalloc+0xb7/0xc0 [ 14.897631] __kmalloc_cache_noprof+0x189/0x420 [ 14.897818] kasan_atomics+0x95/0x310 [ 14.897987] kunit_try_run_case+0x1a5/0x480 [ 14.898135] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.898318] kthread+0x337/0x6f0 [ 14.898487] ret_from_fork+0x116/0x1d0 [ 14.898749] ret_from_fork_asm+0x1a/0x30 [ 14.898993] [ 14.899094] The buggy address belongs to the object at ffff888102b49680 [ 14.899094] which belongs to the cache kmalloc-64 of size 64 [ 14.899651] The buggy address is located 0 bytes to the right of [ 14.899651] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.900196] [ 14.900296] The buggy address belongs to the physical page: [ 14.900527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.901012] flags: 0x200000000000000(node=0|zone=2) [ 14.901211] page_type: f5(slab) [ 14.901333] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.901635] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.901984] page dumped because: kasan: bad access detected [ 14.902238] [ 14.902325] Memory state around the buggy address: [ 14.902481] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.902697] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.902946] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.903176] ^ [ 14.903396] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.903741] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.904211] ================================================================== [ 14.123683] ================================================================== [ 14.123963] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 14.124622] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.124975] [ 14.125348] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.125467] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.125496] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.125517] Call Trace: [ 14.125532] <TASK> [ 14.125659] dump_stack_lvl+0x73/0xb0 [ 14.125691] print_report+0xd1/0x650 [ 14.125716] ? __virt_addr_valid+0x1db/0x2d0 [ 14.125741] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.125764] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.125789] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.125811] kasan_report+0x141/0x180 [ 14.125834] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.125862] kasan_check_range+0x10c/0x1c0 [ 14.125887] __kasan_check_write+0x18/0x20 [ 14.125918] kasan_atomics_helper+0x7c7/0x5450 [ 14.125961] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.125985] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.126009] ? ret_from_fork_asm+0x1a/0x30 [ 14.126032] ? kasan_atomics+0x152/0x310 [ 14.126059] kasan_atomics+0x1dc/0x310 [ 14.126083] ? __pfx_kasan_atomics+0x10/0x10 [ 14.126109] ? __pfx_read_tsc+0x10/0x10 [ 14.126131] ? ktime_get_ts64+0x86/0x230 [ 14.126157] kunit_try_run_case+0x1a5/0x480 [ 14.126179] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.126199] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.126225] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.126250] ? __kthread_parkme+0x82/0x180 [ 14.126270] ? preempt_count_sub+0x50/0x80 [ 14.126295] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.126317] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.126343] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.126369] kthread+0x337/0x6f0 [ 14.126389] ? trace_preempt_on+0x20/0xc0 [ 14.126413] ? __pfx_kthread+0x10/0x10 [ 14.126435] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.126458] ? calculate_sigpending+0x7b/0xa0 [ 14.126483] ? __pfx_kthread+0x10/0x10 [ 14.126505] ret_from_fork+0x116/0x1d0 [ 14.126526] ? __pfx_kthread+0x10/0x10 [ 14.126549] ret_from_fork_asm+0x1a/0x30 [ 14.126580] </TASK> [ 14.126591] [ 14.138062] Allocated by task 282: [ 14.138409] kasan_save_stack+0x45/0x70 [ 14.138752] kasan_save_track+0x18/0x40 [ 14.138962] kasan_save_alloc_info+0x3b/0x50 [ 14.139451] __kasan_kmalloc+0xb7/0xc0 [ 14.139620] __kmalloc_cache_noprof+0x189/0x420 [ 14.140026] kasan_atomics+0x95/0x310 [ 14.140264] kunit_try_run_case+0x1a5/0x480 [ 14.140438] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.140693] kthread+0x337/0x6f0 [ 14.141189] ret_from_fork+0x116/0x1d0 [ 14.141470] ret_from_fork_asm+0x1a/0x30 [ 14.141640] [ 14.141876] The buggy address belongs to the object at ffff888102b49680 [ 14.141876] which belongs to the cache kmalloc-64 of size 64 [ 14.142745] The buggy address is located 0 bytes to the right of [ 14.142745] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.143494] [ 14.143599] The buggy address belongs to the physical page: [ 14.144048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.144402] flags: 0x200000000000000(node=0|zone=2) [ 14.144735] page_type: f5(slab) [ 14.144922] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.145443] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.145991] page dumped because: kasan: bad access detected [ 14.146238] [ 14.146504] Memory state around the buggy address: [ 14.146735] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.147411] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.147773] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.148085] ^ [ 14.148456] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.148797] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.149360] ================================================================== [ 14.168802] ================================================================== [ 14.169265] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 14.169719] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.170009] [ 14.170162] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.170204] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.170216] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.170237] Call Trace: [ 14.170250] <TASK> [ 14.170264] dump_stack_lvl+0x73/0xb0 [ 14.170288] print_report+0xd1/0x650 [ 14.170311] ? __virt_addr_valid+0x1db/0x2d0 [ 14.170334] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.170356] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.170379] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.170402] kasan_report+0x141/0x180 [ 14.170424] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.170451] kasan_check_range+0x10c/0x1c0 [ 14.170477] __kasan_check_write+0x18/0x20 [ 14.170497] kasan_atomics_helper+0x8f9/0x5450 [ 14.170521] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.170544] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.170569] ? ret_from_fork_asm+0x1a/0x30 [ 14.170592] ? kasan_atomics+0x152/0x310 [ 14.170619] kasan_atomics+0x1dc/0x310 [ 14.170644] ? __pfx_kasan_atomics+0x10/0x10 [ 14.170671] ? __pfx_read_tsc+0x10/0x10 [ 14.170692] ? ktime_get_ts64+0x86/0x230 [ 14.170717] kunit_try_run_case+0x1a5/0x480 [ 14.170738] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.170759] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.170786] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.170812] ? __kthread_parkme+0x82/0x180 [ 14.170833] ? preempt_count_sub+0x50/0x80 [ 14.170857] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.170880] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.170918] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.170943] kthread+0x337/0x6f0 [ 14.170963] ? trace_preempt_on+0x20/0xc0 [ 14.170996] ? __pfx_kthread+0x10/0x10 [ 14.171027] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.171050] ? calculate_sigpending+0x7b/0xa0 [ 14.171075] ? __pfx_kthread+0x10/0x10 [ 14.171098] ret_from_fork+0x116/0x1d0 [ 14.171118] ? __pfx_kthread+0x10/0x10 [ 14.171139] ret_from_fork_asm+0x1a/0x30 [ 14.171170] </TASK> [ 14.171181] [ 14.182312] Allocated by task 282: [ 14.182607] kasan_save_stack+0x45/0x70 [ 14.183018] kasan_save_track+0x18/0x40 [ 14.183424] kasan_save_alloc_info+0x3b/0x50 [ 14.183789] __kasan_kmalloc+0xb7/0xc0 [ 14.184159] __kmalloc_cache_noprof+0x189/0x420 [ 14.184398] kasan_atomics+0x95/0x310 [ 14.184576] kunit_try_run_case+0x1a5/0x480 [ 14.185095] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.185538] kthread+0x337/0x6f0 [ 14.185840] ret_from_fork+0x116/0x1d0 [ 14.186254] ret_from_fork_asm+0x1a/0x30 [ 14.186560] [ 14.186798] The buggy address belongs to the object at ffff888102b49680 [ 14.186798] which belongs to the cache kmalloc-64 of size 64 [ 14.187851] The buggy address is located 0 bytes to the right of [ 14.187851] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.188839] [ 14.188925] The buggy address belongs to the physical page: [ 14.189323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.189584] flags: 0x200000000000000(node=0|zone=2) [ 14.189836] page_type: f5(slab) [ 14.190033] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.190320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.190687] page dumped because: kasan: bad access detected [ 14.190908] [ 14.191034] Memory state around the buggy address: [ 14.191255] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.191533] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.191790] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.192107] ^ [ 14.192336] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.192685] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.193110] ================================================================== [ 14.361133] ================================================================== [ 14.361369] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 14.361601] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.362104] [ 14.362242] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.362287] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.362317] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.362352] Call Trace: [ 14.362367] <TASK> [ 14.362382] dump_stack_lvl+0x73/0xb0 [ 14.362422] print_report+0xd1/0x650 [ 14.362445] ? __virt_addr_valid+0x1db/0x2d0 [ 14.362487] ? kasan_atomics_helper+0xe78/0x5450 [ 14.362509] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.362550] ? kasan_atomics_helper+0xe78/0x5450 [ 14.362573] kasan_report+0x141/0x180 [ 14.362612] ? kasan_atomics_helper+0xe78/0x5450 [ 14.362689] kasan_check_range+0x10c/0x1c0 [ 14.362729] __kasan_check_write+0x18/0x20 [ 14.362753] kasan_atomics_helper+0xe78/0x5450 [ 14.362791] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.362828] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.362854] ? ret_from_fork_asm+0x1a/0x30 [ 14.362876] ? kasan_atomics+0x152/0x310 [ 14.362913] kasan_atomics+0x1dc/0x310 [ 14.362956] ? __pfx_kasan_atomics+0x10/0x10 [ 14.362984] ? __pfx_read_tsc+0x10/0x10 [ 14.363007] ? ktime_get_ts64+0x86/0x230 [ 14.363031] kunit_try_run_case+0x1a5/0x480 [ 14.363054] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.363075] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.363102] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.363128] ? __kthread_parkme+0x82/0x180 [ 14.363167] ? preempt_count_sub+0x50/0x80 [ 14.363192] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.363215] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.363257] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.363284] kthread+0x337/0x6f0 [ 14.363304] ? trace_preempt_on+0x20/0xc0 [ 14.363327] ? __pfx_kthread+0x10/0x10 [ 14.363349] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.363372] ? calculate_sigpending+0x7b/0xa0 [ 14.363397] ? __pfx_kthread+0x10/0x10 [ 14.363420] ret_from_fork+0x116/0x1d0 [ 14.363439] ? __pfx_kthread+0x10/0x10 [ 14.363461] ret_from_fork_asm+0x1a/0x30 [ 14.363491] </TASK> [ 14.363502] [ 14.373189] Allocated by task 282: [ 14.373319] kasan_save_stack+0x45/0x70 [ 14.373463] kasan_save_track+0x18/0x40 [ 14.373628] kasan_save_alloc_info+0x3b/0x50 [ 14.373790] __kasan_kmalloc+0xb7/0xc0 [ 14.373988] __kmalloc_cache_noprof+0x189/0x420 [ 14.374172] kasan_atomics+0x95/0x310 [ 14.374311] kunit_try_run_case+0x1a5/0x480 [ 14.374456] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.374678] kthread+0x337/0x6f0 [ 14.374845] ret_from_fork+0x116/0x1d0 [ 14.375213] ret_from_fork_asm+0x1a/0x30 [ 14.375412] [ 14.375511] The buggy address belongs to the object at ffff888102b49680 [ 14.375511] which belongs to the cache kmalloc-64 of size 64 [ 14.376125] The buggy address is located 0 bytes to the right of [ 14.376125] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.376649] [ 14.376724] The buggy address belongs to the physical page: [ 14.377078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.377322] flags: 0x200000000000000(node=0|zone=2) [ 14.377486] page_type: f5(slab) [ 14.377607] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.377857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.378200] page dumped because: kasan: bad access detected [ 14.378459] [ 14.378555] Memory state around the buggy address: [ 14.378816] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.379203] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.379422] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.379667] ^ [ 14.379924] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.380246] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.380564] ================================================================== [ 14.692593] ================================================================== [ 14.693291] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 14.694141] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.695134] [ 14.695277] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.695339] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.695351] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.695392] Call Trace: [ 14.695408] <TASK> [ 14.695423] dump_stack_lvl+0x73/0xb0 [ 14.695450] print_report+0xd1/0x650 [ 14.695483] ? __virt_addr_valid+0x1db/0x2d0 [ 14.695507] ? kasan_atomics_helper+0x1467/0x5450 [ 14.695530] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.695554] ? kasan_atomics_helper+0x1467/0x5450 [ 14.695576] kasan_report+0x141/0x180 [ 14.695599] ? kasan_atomics_helper+0x1467/0x5450 [ 14.695626] kasan_check_range+0x10c/0x1c0 [ 14.695663] __kasan_check_write+0x18/0x20 [ 14.695684] kasan_atomics_helper+0x1467/0x5450 [ 14.695708] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.695730] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.695756] ? ret_from_fork_asm+0x1a/0x30 [ 14.695778] ? kasan_atomics+0x152/0x310 [ 14.695805] kasan_atomics+0x1dc/0x310 [ 14.695829] ? __pfx_kasan_atomics+0x10/0x10 [ 14.695854] ? __pfx_read_tsc+0x10/0x10 [ 14.695875] ? ktime_get_ts64+0x86/0x230 [ 14.695912] kunit_try_run_case+0x1a5/0x480 [ 14.695933] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.695996] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.696023] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.696049] ? __kthread_parkme+0x82/0x180 [ 14.696069] ? preempt_count_sub+0x50/0x80 [ 14.696094] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.696116] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.696142] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.696168] kthread+0x337/0x6f0 [ 14.696188] ? trace_preempt_on+0x20/0xc0 [ 14.696212] ? __pfx_kthread+0x10/0x10 [ 14.696233] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.696257] ? calculate_sigpending+0x7b/0xa0 [ 14.696281] ? __pfx_kthread+0x10/0x10 [ 14.696304] ret_from_fork+0x116/0x1d0 [ 14.696323] ? __pfx_kthread+0x10/0x10 [ 14.696344] ret_from_fork_asm+0x1a/0x30 [ 14.696375] </TASK> [ 14.696387] [ 14.711140] Allocated by task 282: [ 14.711408] kasan_save_stack+0x45/0x70 [ 14.711742] kasan_save_track+0x18/0x40 [ 14.711883] kasan_save_alloc_info+0x3b/0x50 [ 14.712325] __kasan_kmalloc+0xb7/0xc0 [ 14.712701] __kmalloc_cache_noprof+0x189/0x420 [ 14.713178] kasan_atomics+0x95/0x310 [ 14.713479] kunit_try_run_case+0x1a5/0x480 [ 14.713627] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.713804] kthread+0x337/0x6f0 [ 14.714097] ret_from_fork+0x116/0x1d0 [ 14.714489] ret_from_fork_asm+0x1a/0x30 [ 14.714902] [ 14.715102] The buggy address belongs to the object at ffff888102b49680 [ 14.715102] which belongs to the cache kmalloc-64 of size 64 [ 14.716435] The buggy address is located 0 bytes to the right of [ 14.716435] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.717576] [ 14.717673] The buggy address belongs to the physical page: [ 14.718259] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.718781] flags: 0x200000000000000(node=0|zone=2) [ 14.719003] page_type: f5(slab) [ 14.719339] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.720287] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.720959] page dumped because: kasan: bad access detected [ 14.721265] [ 14.721355] Memory state around the buggy address: [ 14.721618] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.721930] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.722299] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.722619] ^ [ 14.722847] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.723228] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.723996] ================================================================== [ 15.129532] ================================================================== [ 15.129866] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 15.130251] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 15.130584] [ 15.130718] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 15.130760] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.130772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.130792] Call Trace: [ 15.130807] <TASK> [ 15.130821] dump_stack_lvl+0x73/0xb0 [ 15.130855] print_report+0xd1/0x650 [ 15.130877] ? __virt_addr_valid+0x1db/0x2d0 [ 15.130911] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.130933] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.130957] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.130981] kasan_report+0x141/0x180 [ 15.131004] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.131031] kasan_check_range+0x10c/0x1c0 [ 15.131055] __kasan_check_write+0x18/0x20 [ 15.131109] kasan_atomics_helper+0x1d7a/0x5450 [ 15.131134] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.131157] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.131182] ? ret_from_fork_asm+0x1a/0x30 [ 15.131204] ? kasan_atomics+0x152/0x310 [ 15.131231] kasan_atomics+0x1dc/0x310 [ 15.131256] ? __pfx_kasan_atomics+0x10/0x10 [ 15.131280] ? __pfx_read_tsc+0x10/0x10 [ 15.131302] ? ktime_get_ts64+0x86/0x230 [ 15.131326] kunit_try_run_case+0x1a5/0x480 [ 15.131348] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.131369] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.131394] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.131419] ? __kthread_parkme+0x82/0x180 [ 15.131441] ? preempt_count_sub+0x50/0x80 [ 15.131465] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.131487] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.131513] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.131538] kthread+0x337/0x6f0 [ 15.131559] ? trace_preempt_on+0x20/0xc0 [ 15.131581] ? __pfx_kthread+0x10/0x10 [ 15.131603] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.131633] ? calculate_sigpending+0x7b/0xa0 [ 15.131657] ? __pfx_kthread+0x10/0x10 [ 15.131679] ret_from_fork+0x116/0x1d0 [ 15.131698] ? __pfx_kthread+0x10/0x10 [ 15.131720] ret_from_fork_asm+0x1a/0x30 [ 15.131750] </TASK> [ 15.131760] [ 15.139102] Allocated by task 282: [ 15.139277] kasan_save_stack+0x45/0x70 [ 15.139454] kasan_save_track+0x18/0x40 [ 15.139666] kasan_save_alloc_info+0x3b/0x50 [ 15.139875] __kasan_kmalloc+0xb7/0xc0 [ 15.140072] __kmalloc_cache_noprof+0x189/0x420 [ 15.140296] kasan_atomics+0x95/0x310 [ 15.140480] kunit_try_run_case+0x1a5/0x480 [ 15.140712] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.140966] kthread+0x337/0x6f0 [ 15.141144] ret_from_fork+0x116/0x1d0 [ 15.141307] ret_from_fork_asm+0x1a/0x30 [ 15.141467] [ 15.141539] The buggy address belongs to the object at ffff888102b49680 [ 15.141539] which belongs to the cache kmalloc-64 of size 64 [ 15.141922] The buggy address is located 0 bytes to the right of [ 15.141922] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 15.142473] [ 15.142568] The buggy address belongs to the physical page: [ 15.142842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 15.143214] flags: 0x200000000000000(node=0|zone=2) [ 15.143425] page_type: f5(slab) [ 15.143580] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.143907] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.144134] page dumped because: kasan: bad access detected [ 15.144377] [ 15.144469] Memory state around the buggy address: [ 15.144719] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.145053] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.145329] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.145672] ^ [ 15.145865] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.146160] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.146404] ================================================================== [ 14.572332] ================================================================== [ 14.573045] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 14.573371] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.573594] [ 14.573720] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.573763] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.573776] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.573797] Call Trace: [ 14.573812] <TASK> [ 14.573827] dump_stack_lvl+0x73/0xb0 [ 14.573851] print_report+0xd1/0x650 [ 14.573873] ? __virt_addr_valid+0x1db/0x2d0 [ 14.573908] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.573932] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.573958] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.573982] kasan_report+0x141/0x180 [ 14.574005] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.574032] kasan_check_range+0x10c/0x1c0 [ 14.574058] __kasan_check_write+0x18/0x20 [ 14.574086] kasan_atomics_helper+0x12e6/0x5450 [ 14.574110] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.574133] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.574158] ? ret_from_fork_asm+0x1a/0x30 [ 14.574180] ? kasan_atomics+0x152/0x310 [ 14.574210] kasan_atomics+0x1dc/0x310 [ 14.574233] ? __pfx_kasan_atomics+0x10/0x10 [ 14.574259] ? __pfx_read_tsc+0x10/0x10 [ 14.574280] ? ktime_get_ts64+0x86/0x230 [ 14.574305] kunit_try_run_case+0x1a5/0x480 [ 14.574327] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.574348] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.574374] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.574400] ? __kthread_parkme+0x82/0x180 [ 14.574421] ? preempt_count_sub+0x50/0x80 [ 14.574446] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.574467] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.574492] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.574518] kthread+0x337/0x6f0 [ 14.574538] ? trace_preempt_on+0x20/0xc0 [ 14.574561] ? __pfx_kthread+0x10/0x10 [ 14.574583] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.574606] ? calculate_sigpending+0x7b/0xa0 [ 14.574630] ? __pfx_kthread+0x10/0x10 [ 14.574653] ret_from_fork+0x116/0x1d0 [ 14.574672] ? __pfx_kthread+0x10/0x10 [ 14.574693] ret_from_fork_asm+0x1a/0x30 [ 14.574724] </TASK> [ 14.574746] [ 14.589803] Allocated by task 282: [ 14.590074] kasan_save_stack+0x45/0x70 [ 14.590280] kasan_save_track+0x18/0x40 [ 14.590432] kasan_save_alloc_info+0x3b/0x50 [ 14.590824] __kasan_kmalloc+0xb7/0xc0 [ 14.591215] __kmalloc_cache_noprof+0x189/0x420 [ 14.591647] kasan_atomics+0x95/0x310 [ 14.592007] kunit_try_run_case+0x1a5/0x480 [ 14.592397] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.592719] kthread+0x337/0x6f0 [ 14.592842] ret_from_fork+0x116/0x1d0 [ 14.593128] ret_from_fork_asm+0x1a/0x30 [ 14.593494] [ 14.593658] The buggy address belongs to the object at ffff888102b49680 [ 14.593658] which belongs to the cache kmalloc-64 of size 64 [ 14.594843] The buggy address is located 0 bytes to the right of [ 14.594843] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.596027] [ 14.596201] The buggy address belongs to the physical page: [ 14.596435] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.596918] flags: 0x200000000000000(node=0|zone=2) [ 14.597132] page_type: f5(slab) [ 14.597482] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.598229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.599013] page dumped because: kasan: bad access detected [ 14.599270] [ 14.599340] Memory state around the buggy address: [ 14.599496] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.599871] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.600576] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.601328] ^ [ 14.601828] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.602571] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.603336] ================================================================== [ 13.928504] ================================================================== [ 13.928847] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 13.929404] Read of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 13.929647] [ 13.929799] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 13.929843] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.929875] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.929905] Call Trace: [ 13.929919] <TASK> [ 13.930009] dump_stack_lvl+0x73/0xb0 [ 13.930039] print_report+0xd1/0x650 [ 13.930063] ? __virt_addr_valid+0x1db/0x2d0 [ 13.930087] ? kasan_atomics_helper+0x4b54/0x5450 [ 13.930109] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.930133] ? kasan_atomics_helper+0x4b54/0x5450 [ 13.930156] kasan_report+0x141/0x180 [ 13.930179] ? kasan_atomics_helper+0x4b54/0x5450 [ 13.930206] __asan_report_load4_noabort+0x18/0x20 [ 13.930227] kasan_atomics_helper+0x4b54/0x5450 [ 13.930251] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.930275] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.930321] ? ret_from_fork_asm+0x1a/0x30 [ 13.930357] ? kasan_atomics+0x152/0x310 [ 13.930397] kasan_atomics+0x1dc/0x310 [ 13.930434] ? __pfx_kasan_atomics+0x10/0x10 [ 13.930459] ? __pfx_read_tsc+0x10/0x10 [ 13.930495] ? ktime_get_ts64+0x86/0x230 [ 13.930519] kunit_try_run_case+0x1a5/0x480 [ 13.930555] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.930575] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.930601] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.930645] ? __kthread_parkme+0x82/0x180 [ 13.930666] ? preempt_count_sub+0x50/0x80 [ 13.930691] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.930712] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.930738] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.930764] kthread+0x337/0x6f0 [ 13.930783] ? trace_preempt_on+0x20/0xc0 [ 13.930807] ? __pfx_kthread+0x10/0x10 [ 13.930829] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.930852] ? calculate_sigpending+0x7b/0xa0 [ 13.930876] ? __pfx_kthread+0x10/0x10 [ 13.930907] ret_from_fork+0x116/0x1d0 [ 13.930984] ? __pfx_kthread+0x10/0x10 [ 13.931011] ret_from_fork_asm+0x1a/0x30 [ 13.931042] </TASK> [ 13.931053] [ 13.939811] Allocated by task 282: [ 13.940099] kasan_save_stack+0x45/0x70 [ 13.940257] kasan_save_track+0x18/0x40 [ 13.940448] kasan_save_alloc_info+0x3b/0x50 [ 13.940643] __kasan_kmalloc+0xb7/0xc0 [ 13.940845] __kmalloc_cache_noprof+0x189/0x420 [ 13.941162] kasan_atomics+0x95/0x310 [ 13.941354] kunit_try_run_case+0x1a5/0x480 [ 13.941569] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.941824] kthread+0x337/0x6f0 [ 13.942045] ret_from_fork+0x116/0x1d0 [ 13.942225] ret_from_fork_asm+0x1a/0x30 [ 13.942361] [ 13.942458] The buggy address belongs to the object at ffff888102b49680 [ 13.942458] which belongs to the cache kmalloc-64 of size 64 [ 13.943103] The buggy address is located 0 bytes to the right of [ 13.943103] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 13.944010] [ 13.944197] The buggy address belongs to the physical page: [ 13.944705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 13.945423] flags: 0x200000000000000(node=0|zone=2) [ 13.945600] page_type: f5(slab) [ 13.946039] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.946722] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.947450] page dumped because: kasan: bad access detected [ 13.948024] [ 13.948099] Memory state around the buggy address: [ 13.948251] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.948465] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.948879] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.949591] ^ [ 13.950036] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.950851] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.951566] ================================================================== [ 14.101161] ================================================================== [ 14.101522] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 14.101989] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.102296] [ 14.102425] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.102470] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.102483] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.102504] Call Trace: [ 14.102520] <TASK> [ 14.102535] dump_stack_lvl+0x73/0xb0 [ 14.102559] print_report+0xd1/0x650 [ 14.102583] ? __virt_addr_valid+0x1db/0x2d0 [ 14.102607] ? kasan_atomics_helper+0x72f/0x5450 [ 14.102640] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.102664] ? kasan_atomics_helper+0x72f/0x5450 [ 14.102687] kasan_report+0x141/0x180 [ 14.102710] ? kasan_atomics_helper+0x72f/0x5450 [ 14.102748] kasan_check_range+0x10c/0x1c0 [ 14.102773] __kasan_check_write+0x18/0x20 [ 14.102792] kasan_atomics_helper+0x72f/0x5450 [ 14.102827] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.102850] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.102875] ? ret_from_fork_asm+0x1a/0x30 [ 14.102918] ? kasan_atomics+0x152/0x310 [ 14.102945] kasan_atomics+0x1dc/0x310 [ 14.102968] ? __pfx_kasan_atomics+0x10/0x10 [ 14.102993] ? __pfx_read_tsc+0x10/0x10 [ 14.103015] ? ktime_get_ts64+0x86/0x230 [ 14.103039] kunit_try_run_case+0x1a5/0x480 [ 14.103061] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.103085] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.103113] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.103138] ? __kthread_parkme+0x82/0x180 [ 14.103159] ? preempt_count_sub+0x50/0x80 [ 14.103184] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.103217] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.103243] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.103268] kthread+0x337/0x6f0 [ 14.103289] ? trace_preempt_on+0x20/0xc0 [ 14.103311] ? __pfx_kthread+0x10/0x10 [ 14.103333] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.103365] ? calculate_sigpending+0x7b/0xa0 [ 14.103391] ? __pfx_kthread+0x10/0x10 [ 14.103413] ret_from_fork+0x116/0x1d0 [ 14.103443] ? __pfx_kthread+0x10/0x10 [ 14.103464] ret_from_fork_asm+0x1a/0x30 [ 14.103494] </TASK> [ 14.103506] [ 14.111905] Allocated by task 282: [ 14.112035] kasan_save_stack+0x45/0x70 [ 14.112178] kasan_save_track+0x18/0x40 [ 14.112384] kasan_save_alloc_info+0x3b/0x50 [ 14.112623] __kasan_kmalloc+0xb7/0xc0 [ 14.112811] __kmalloc_cache_noprof+0x189/0x420 [ 14.113051] kasan_atomics+0x95/0x310 [ 14.113187] kunit_try_run_case+0x1a5/0x480 [ 14.113330] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.113507] kthread+0x337/0x6f0 [ 14.113627] ret_from_fork+0x116/0x1d0 [ 14.113983] ret_from_fork_asm+0x1a/0x30 [ 14.114186] [ 14.114283] The buggy address belongs to the object at ffff888102b49680 [ 14.114283] which belongs to the cache kmalloc-64 of size 64 [ 14.115559] The buggy address is located 0 bytes to the right of [ 14.115559] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.117051] [ 14.117147] The buggy address belongs to the physical page: [ 14.117381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.117711] flags: 0x200000000000000(node=0|zone=2) [ 14.118577] page_type: f5(slab) [ 14.118833] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.119326] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.119757] page dumped because: kasan: bad access detected [ 14.120154] [ 14.120257] Memory state around the buggy address: [ 14.120466] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.120967] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.121344] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.121807] ^ [ 14.122196] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.122491] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.122809] ================================================================== [ 15.189328] ================================================================== [ 15.189843] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 15.190253] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 15.190869] [ 15.191131] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 15.191183] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.191198] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.191221] Call Trace: [ 15.191238] <TASK> [ 15.191254] dump_stack_lvl+0x73/0xb0 [ 15.191316] print_report+0xd1/0x650 [ 15.191340] ? __virt_addr_valid+0x1db/0x2d0 [ 15.191365] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.191388] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.191411] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.191434] kasan_report+0x141/0x180 [ 15.191458] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.191486] kasan_check_range+0x10c/0x1c0 [ 15.191512] __kasan_check_write+0x18/0x20 [ 15.191531] kasan_atomics_helper+0x1f43/0x5450 [ 15.191555] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.191578] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.191603] ? ret_from_fork_asm+0x1a/0x30 [ 15.191649] ? kasan_atomics+0x152/0x310 [ 15.191676] kasan_atomics+0x1dc/0x310 [ 15.191699] ? __pfx_kasan_atomics+0x10/0x10 [ 15.191724] ? __pfx_read_tsc+0x10/0x10 [ 15.191746] ? ktime_get_ts64+0x86/0x230 [ 15.191771] kunit_try_run_case+0x1a5/0x480 [ 15.191793] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.191813] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.191839] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.191865] ? __kthread_parkme+0x82/0x180 [ 15.191886] ? preempt_count_sub+0x50/0x80 [ 15.191920] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.191941] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.191966] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.191992] kthread+0x337/0x6f0 [ 15.192012] ? trace_preempt_on+0x20/0xc0 [ 15.192035] ? __pfx_kthread+0x10/0x10 [ 15.192056] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.192080] ? calculate_sigpending+0x7b/0xa0 [ 15.192107] ? __pfx_kthread+0x10/0x10 [ 15.192129] ret_from_fork+0x116/0x1d0 [ 15.192148] ? __pfx_kthread+0x10/0x10 [ 15.192169] ret_from_fork_asm+0x1a/0x30 [ 15.192201] </TASK> [ 15.192213] [ 15.203587] Allocated by task 282: [ 15.204012] kasan_save_stack+0x45/0x70 [ 15.204319] kasan_save_track+0x18/0x40 [ 15.204640] kasan_save_alloc_info+0x3b/0x50 [ 15.204849] __kasan_kmalloc+0xb7/0xc0 [ 15.205035] __kmalloc_cache_noprof+0x189/0x420 [ 15.205247] kasan_atomics+0x95/0x310 [ 15.205416] kunit_try_run_case+0x1a5/0x480 [ 15.205589] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.206220] kthread+0x337/0x6f0 [ 15.206510] ret_from_fork+0x116/0x1d0 [ 15.206853] ret_from_fork_asm+0x1a/0x30 [ 15.207049] [ 15.207139] The buggy address belongs to the object at ffff888102b49680 [ 15.207139] which belongs to the cache kmalloc-64 of size 64 [ 15.207888] The buggy address is located 0 bytes to the right of [ 15.207888] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 15.208643] [ 15.208871] The buggy address belongs to the physical page: [ 15.209239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 15.209795] flags: 0x200000000000000(node=0|zone=2) [ 15.210028] page_type: f5(slab) [ 15.210178] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.210484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.211119] page dumped because: kasan: bad access detected [ 15.211470] [ 15.211713] Memory state around the buggy address: [ 15.212048] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.212667] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.212972] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.213264] ^ [ 15.213467] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.214103] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.214546] ================================================================== [ 13.986864] ================================================================== [ 13.987499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 13.987986] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 13.988267] [ 13.988447] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 13.988492] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.988505] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.988527] Call Trace: [ 13.988542] <TASK> [ 13.988557] dump_stack_lvl+0x73/0xb0 [ 13.988582] print_report+0xd1/0x650 [ 13.988604] ? __virt_addr_valid+0x1db/0x2d0 [ 13.988628] ? kasan_atomics_helper+0x4b3a/0x5450 [ 13.988650] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.988674] ? kasan_atomics_helper+0x4b3a/0x5450 [ 13.988707] kasan_report+0x141/0x180 [ 13.988731] ? kasan_atomics_helper+0x4b3a/0x5450 [ 13.988758] __asan_report_store4_noabort+0x1b/0x30 [ 13.988780] kasan_atomics_helper+0x4b3a/0x5450 [ 13.988803] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.988827] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.988851] ? ret_from_fork_asm+0x1a/0x30 [ 13.988874] ? kasan_atomics+0x152/0x310 [ 13.988914] kasan_atomics+0x1dc/0x310 [ 13.988938] ? __pfx_kasan_atomics+0x10/0x10 [ 13.988973] ? __pfx_read_tsc+0x10/0x10 [ 13.988996] ? ktime_get_ts64+0x86/0x230 [ 13.989020] kunit_try_run_case+0x1a5/0x480 [ 13.989046] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.989067] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.989094] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.989119] ? __kthread_parkme+0x82/0x180 [ 13.989141] ? preempt_count_sub+0x50/0x80 [ 13.989166] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.989188] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.989213] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.989239] kthread+0x337/0x6f0 [ 13.989260] ? trace_preempt_on+0x20/0xc0 [ 13.989283] ? __pfx_kthread+0x10/0x10 [ 13.989304] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.989328] ? calculate_sigpending+0x7b/0xa0 [ 13.989353] ? __pfx_kthread+0x10/0x10 [ 13.989375] ret_from_fork+0x116/0x1d0 [ 13.989394] ? __pfx_kthread+0x10/0x10 [ 13.989416] ret_from_fork_asm+0x1a/0x30 [ 13.989447] </TASK> [ 13.989458] [ 14.007346] Allocated by task 282: [ 14.007936] kasan_save_stack+0x45/0x70 [ 14.008389] kasan_save_track+0x18/0x40 [ 14.008766] kasan_save_alloc_info+0x3b/0x50 [ 14.009259] __kasan_kmalloc+0xb7/0xc0 [ 14.009400] __kmalloc_cache_noprof+0x189/0x420 [ 14.009558] kasan_atomics+0x95/0x310 [ 14.009776] kunit_try_run_case+0x1a5/0x480 [ 14.010192] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.010743] kthread+0x337/0x6f0 [ 14.011164] ret_from_fork+0x116/0x1d0 [ 14.011524] ret_from_fork_asm+0x1a/0x30 [ 14.011885] [ 14.012215] The buggy address belongs to the object at ffff888102b49680 [ 14.012215] which belongs to the cache kmalloc-64 of size 64 [ 14.013178] The buggy address is located 0 bytes to the right of [ 14.013178] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.013560] [ 14.013644] The buggy address belongs to the physical page: [ 14.014153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.014890] flags: 0x200000000000000(node=0|zone=2) [ 14.015381] page_type: f5(slab) [ 14.015702] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.016401] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.017315] page dumped because: kasan: bad access detected [ 14.017749] [ 14.017822] Memory state around the buggy address: [ 14.018073] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.018721] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.019436] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.020069] ^ [ 14.020231] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.020448] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.020723] ================================================================== [ 15.284263] ================================================================== [ 15.284566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 15.284853] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 15.285095] [ 15.285258] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 15.285301] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.285312] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.285334] Call Trace: [ 15.285347] <TASK> [ 15.285361] dump_stack_lvl+0x73/0xb0 [ 15.285385] print_report+0xd1/0x650 [ 15.285408] ? __virt_addr_valid+0x1db/0x2d0 [ 15.285431] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.285454] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.285478] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.285501] kasan_report+0x141/0x180 [ 15.285524] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.285550] kasan_check_range+0x10c/0x1c0 [ 15.285575] __kasan_check_write+0x18/0x20 [ 15.285596] kasan_atomics_helper+0x20c8/0x5450 [ 15.285619] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.285642] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.285678] ? ret_from_fork_asm+0x1a/0x30 [ 15.285700] ? kasan_atomics+0x152/0x310 [ 15.285727] kasan_atomics+0x1dc/0x310 [ 15.285751] ? __pfx_kasan_atomics+0x10/0x10 [ 15.285776] ? __pfx_read_tsc+0x10/0x10 [ 15.285798] ? ktime_get_ts64+0x86/0x230 [ 15.285823] kunit_try_run_case+0x1a5/0x480 [ 15.285846] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.285867] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.285903] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.285931] ? __kthread_parkme+0x82/0x180 [ 15.285952] ? preempt_count_sub+0x50/0x80 [ 15.285977] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.286001] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.286027] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.286052] kthread+0x337/0x6f0 [ 15.286072] ? trace_preempt_on+0x20/0xc0 [ 15.286095] ? __pfx_kthread+0x10/0x10 [ 15.286117] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.286140] ? calculate_sigpending+0x7b/0xa0 [ 15.286166] ? __pfx_kthread+0x10/0x10 [ 15.286188] ret_from_fork+0x116/0x1d0 [ 15.286207] ? __pfx_kthread+0x10/0x10 [ 15.286229] ret_from_fork_asm+0x1a/0x30 [ 15.286259] </TASK> [ 15.286270] [ 15.293935] Allocated by task 282: [ 15.294094] kasan_save_stack+0x45/0x70 [ 15.294260] kasan_save_track+0x18/0x40 [ 15.294443] kasan_save_alloc_info+0x3b/0x50 [ 15.294642] __kasan_kmalloc+0xb7/0xc0 [ 15.294816] __kmalloc_cache_noprof+0x189/0x420 [ 15.295024] kasan_atomics+0x95/0x310 [ 15.295212] kunit_try_run_case+0x1a5/0x480 [ 15.295398] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.295616] kthread+0x337/0x6f0 [ 15.295791] ret_from_fork+0x116/0x1d0 [ 15.295946] ret_from_fork_asm+0x1a/0x30 [ 15.296086] [ 15.296159] The buggy address belongs to the object at ffff888102b49680 [ 15.296159] which belongs to the cache kmalloc-64 of size 64 [ 15.296507] The buggy address is located 0 bytes to the right of [ 15.296507] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 15.296871] [ 15.296972] The buggy address belongs to the physical page: [ 15.297494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 15.297973] flags: 0x200000000000000(node=0|zone=2) [ 15.298204] page_type: f5(slab) [ 15.298369] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.298907] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.299134] page dumped because: kasan: bad access detected [ 15.299304] [ 15.299373] Memory state around the buggy address: [ 15.299527] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.299743] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.299967] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.300180] ^ [ 15.300422] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.300746] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.303054] ================================================================== [ 15.387343] ================================================================== [ 15.387630] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 15.388006] Read of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 15.388608] [ 15.388843] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 15.388985] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.389000] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.389085] Call Trace: [ 15.389101] <TASK> [ 15.389115] dump_stack_lvl+0x73/0xb0 [ 15.389142] print_report+0xd1/0x650 [ 15.389165] ? __virt_addr_valid+0x1db/0x2d0 [ 15.389189] ? kasan_atomics_helper+0x5115/0x5450 [ 15.389210] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.389233] ? kasan_atomics_helper+0x5115/0x5450 [ 15.389256] kasan_report+0x141/0x180 [ 15.389279] ? kasan_atomics_helper+0x5115/0x5450 [ 15.389306] __asan_report_load8_noabort+0x18/0x20 [ 15.389327] kasan_atomics_helper+0x5115/0x5450 [ 15.389351] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.389373] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.389398] ? ret_from_fork_asm+0x1a/0x30 [ 15.389421] ? kasan_atomics+0x152/0x310 [ 15.389448] kasan_atomics+0x1dc/0x310 [ 15.389471] ? __pfx_kasan_atomics+0x10/0x10 [ 15.389496] ? __pfx_read_tsc+0x10/0x10 [ 15.389518] ? ktime_get_ts64+0x86/0x230 [ 15.389543] kunit_try_run_case+0x1a5/0x480 [ 15.389564] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.389585] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.389611] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.389646] ? __kthread_parkme+0x82/0x180 [ 15.389668] ? preempt_count_sub+0x50/0x80 [ 15.389692] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.389714] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.389740] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.389767] kthread+0x337/0x6f0 [ 15.389787] ? trace_preempt_on+0x20/0xc0 [ 15.389811] ? __pfx_kthread+0x10/0x10 [ 15.389832] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.389856] ? calculate_sigpending+0x7b/0xa0 [ 15.389880] ? __pfx_kthread+0x10/0x10 [ 15.389914] ret_from_fork+0x116/0x1d0 [ 15.389934] ? __pfx_kthread+0x10/0x10 [ 15.389954] ret_from_fork_asm+0x1a/0x30 [ 15.389984] </TASK> [ 15.389995] [ 15.399656] Allocated by task 282: [ 15.400161] kasan_save_stack+0x45/0x70 [ 15.400361] kasan_save_track+0x18/0x40 [ 15.400607] kasan_save_alloc_info+0x3b/0x50 [ 15.400796] __kasan_kmalloc+0xb7/0xc0 [ 15.401128] __kmalloc_cache_noprof+0x189/0x420 [ 15.401496] kasan_atomics+0x95/0x310 [ 15.401690] kunit_try_run_case+0x1a5/0x480 [ 15.401998] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.402295] kthread+0x337/0x6f0 [ 15.402462] ret_from_fork+0x116/0x1d0 [ 15.402689] ret_from_fork_asm+0x1a/0x30 [ 15.402986] [ 15.403076] The buggy address belongs to the object at ffff888102b49680 [ 15.403076] which belongs to the cache kmalloc-64 of size 64 [ 15.403572] The buggy address is located 0 bytes to the right of [ 15.403572] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 15.404355] [ 15.404452] The buggy address belongs to the physical page: [ 15.404659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 15.405156] flags: 0x200000000000000(node=0|zone=2) [ 15.405464] page_type: f5(slab) [ 15.405594] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.406162] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.406486] page dumped because: kasan: bad access detected [ 15.406833] [ 15.406920] Memory state around the buggy address: [ 15.407276] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.407571] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.408002] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.408351] ^ [ 15.408612] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.409073] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.409352] ================================================================== [ 13.822324] ================================================================== [ 13.823099] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 13.823415] Read of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 13.824246] [ 13.824371] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 13.824418] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.824430] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.824453] Call Trace: [ 13.824464] <TASK> [ 13.824478] dump_stack_lvl+0x73/0xb0 [ 13.824506] print_report+0xd1/0x650 [ 13.824648] ? __virt_addr_valid+0x1db/0x2d0 [ 13.824676] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.824699] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.824722] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.824744] kasan_report+0x141/0x180 [ 13.824765] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.824791] __asan_report_load4_noabort+0x18/0x20 [ 13.824811] kasan_atomics_helper+0x4bbc/0x5450 [ 13.824834] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.824856] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.824880] ? ret_from_fork_asm+0x1a/0x30 [ 13.824914] ? kasan_atomics+0x152/0x310 [ 13.824940] kasan_atomics+0x1dc/0x310 [ 13.825011] ? __pfx_kasan_atomics+0x10/0x10 [ 13.825036] ? __pfx_read_tsc+0x10/0x10 [ 13.825065] ? ktime_get_ts64+0x86/0x230 [ 13.825089] kunit_try_run_case+0x1a5/0x480 [ 13.825110] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.825129] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.825154] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.825178] ? __kthread_parkme+0x82/0x180 [ 13.825199] ? preempt_count_sub+0x50/0x80 [ 13.825222] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.825243] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.825267] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.825291] kthread+0x337/0x6f0 [ 13.825311] ? trace_preempt_on+0x20/0xc0 [ 13.825332] ? __pfx_kthread+0x10/0x10 [ 13.825353] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.825375] ? calculate_sigpending+0x7b/0xa0 [ 13.825398] ? __pfx_kthread+0x10/0x10 [ 13.825419] ret_from_fork+0x116/0x1d0 [ 13.825437] ? __pfx_kthread+0x10/0x10 [ 13.825458] ret_from_fork_asm+0x1a/0x30 [ 13.825486] </TASK> [ 13.825497] [ 13.838311] Allocated by task 282: [ 13.838638] kasan_save_stack+0x45/0x70 [ 13.838937] kasan_save_track+0x18/0x40 [ 13.839316] kasan_save_alloc_info+0x3b/0x50 [ 13.839759] __kasan_kmalloc+0xb7/0xc0 [ 13.840135] __kmalloc_cache_noprof+0x189/0x420 [ 13.840494] kasan_atomics+0x95/0x310 [ 13.840712] kunit_try_run_case+0x1a5/0x480 [ 13.840905] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.841173] kthread+0x337/0x6f0 [ 13.841526] ret_from_fork+0x116/0x1d0 [ 13.841711] ret_from_fork_asm+0x1a/0x30 [ 13.841916] [ 13.842043] The buggy address belongs to the object at ffff888102b49680 [ 13.842043] which belongs to the cache kmalloc-64 of size 64 [ 13.842619] The buggy address is located 0 bytes to the right of [ 13.842619] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 13.843174] [ 13.843314] The buggy address belongs to the physical page: [ 13.843594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 13.844032] flags: 0x200000000000000(node=0|zone=2) [ 13.844286] page_type: f5(slab) [ 13.844431] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.844885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.845184] page dumped because: kasan: bad access detected [ 13.845468] [ 13.845579] Memory state around the buggy address: [ 13.845802] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.846347] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.846762] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.847146] ^ [ 13.847344] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.847643] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.847980] ================================================================== [ 14.381055] ================================================================== [ 14.381400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 14.381701] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.382059] [ 14.382290] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.382334] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.382346] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.382368] Call Trace: [ 14.382382] <TASK> [ 14.382396] dump_stack_lvl+0x73/0xb0 [ 14.382421] print_report+0xd1/0x650 [ 14.382444] ? __virt_addr_valid+0x1db/0x2d0 [ 14.382468] ? kasan_atomics_helper+0xf10/0x5450 [ 14.382490] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.382513] ? kasan_atomics_helper+0xf10/0x5450 [ 14.382536] kasan_report+0x141/0x180 [ 14.382559] ? kasan_atomics_helper+0xf10/0x5450 [ 14.382586] kasan_check_range+0x10c/0x1c0 [ 14.382611] __kasan_check_write+0x18/0x20 [ 14.382639] kasan_atomics_helper+0xf10/0x5450 [ 14.382662] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.382686] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.382711] ? ret_from_fork_asm+0x1a/0x30 [ 14.382733] ? kasan_atomics+0x152/0x310 [ 14.382761] kasan_atomics+0x1dc/0x310 [ 14.382784] ? __pfx_kasan_atomics+0x10/0x10 [ 14.382809] ? __pfx_read_tsc+0x10/0x10 [ 14.382831] ? ktime_get_ts64+0x86/0x230 [ 14.382855] kunit_try_run_case+0x1a5/0x480 [ 14.382877] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.382907] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.382934] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.382959] ? __kthread_parkme+0x82/0x180 [ 14.382981] ? preempt_count_sub+0x50/0x80 [ 14.383006] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.383028] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.383053] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.383078] kthread+0x337/0x6f0 [ 14.383098] ? trace_preempt_on+0x20/0xc0 [ 14.383121] ? __pfx_kthread+0x10/0x10 [ 14.383142] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.383165] ? calculate_sigpending+0x7b/0xa0 [ 14.383190] ? __pfx_kthread+0x10/0x10 [ 14.383212] ret_from_fork+0x116/0x1d0 [ 14.383231] ? __pfx_kthread+0x10/0x10 [ 14.383253] ret_from_fork_asm+0x1a/0x30 [ 14.383284] </TASK> [ 14.383295] [ 14.392047] Allocated by task 282: [ 14.392231] kasan_save_stack+0x45/0x70 [ 14.392425] kasan_save_track+0x18/0x40 [ 14.392570] kasan_save_alloc_info+0x3b/0x50 [ 14.392731] __kasan_kmalloc+0xb7/0xc0 [ 14.392867] __kmalloc_cache_noprof+0x189/0x420 [ 14.393036] kasan_atomics+0x95/0x310 [ 14.393176] kunit_try_run_case+0x1a5/0x480 [ 14.393323] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.393541] kthread+0x337/0x6f0 [ 14.393709] ret_from_fork+0x116/0x1d0 [ 14.393921] ret_from_fork_asm+0x1a/0x30 [ 14.394141] [ 14.394238] The buggy address belongs to the object at ffff888102b49680 [ 14.394238] which belongs to the cache kmalloc-64 of size 64 [ 14.394958] The buggy address is located 0 bytes to the right of [ 14.394958] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.395507] [ 14.395601] The buggy address belongs to the physical page: [ 14.395886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.396138] flags: 0x200000000000000(node=0|zone=2) [ 14.396302] page_type: f5(slab) [ 14.396423] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.397025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.397367] page dumped because: kasan: bad access detected [ 14.397592] [ 14.397695] Memory state around the buggy address: [ 14.397905] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.398244] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.398496] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.398819] ^ [ 14.399015] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.399326] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.399674] ================================================================== [ 14.924133] ================================================================== [ 14.924464] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 14.924756] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.925032] [ 14.925120] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.925162] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.925174] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.925195] Call Trace: [ 14.925207] <TASK> [ 14.925222] dump_stack_lvl+0x73/0xb0 [ 14.925246] print_report+0xd1/0x650 [ 14.925268] ? __virt_addr_valid+0x1db/0x2d0 [ 14.925291] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.925314] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.925337] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.925359] kasan_report+0x141/0x180 [ 14.925382] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.925410] kasan_check_range+0x10c/0x1c0 [ 14.925434] __kasan_check_write+0x18/0x20 [ 14.925455] kasan_atomics_helper+0x18b1/0x5450 [ 14.925478] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.925501] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.925526] ? ret_from_fork_asm+0x1a/0x30 [ 14.925548] ? kasan_atomics+0x152/0x310 [ 14.925574] kasan_atomics+0x1dc/0x310 [ 14.925598] ? __pfx_kasan_atomics+0x10/0x10 [ 14.925622] ? __pfx_read_tsc+0x10/0x10 [ 14.925643] ? ktime_get_ts64+0x86/0x230 [ 14.925667] kunit_try_run_case+0x1a5/0x480 [ 14.925689] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.925710] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.925735] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.925759] ? __kthread_parkme+0x82/0x180 [ 14.925779] ? preempt_count_sub+0x50/0x80 [ 14.925803] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.925825] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.925850] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.925875] kthread+0x337/0x6f0 [ 14.925929] ? trace_preempt_on+0x20/0xc0 [ 14.925955] ? __pfx_kthread+0x10/0x10 [ 14.925985] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.926008] ? calculate_sigpending+0x7b/0xa0 [ 14.926034] ? __pfx_kthread+0x10/0x10 [ 14.926057] ret_from_fork+0x116/0x1d0 [ 14.926078] ? __pfx_kthread+0x10/0x10 [ 14.926099] ret_from_fork_asm+0x1a/0x30 [ 14.926131] </TASK> [ 14.926142] [ 14.933672] Allocated by task 282: [ 14.933859] kasan_save_stack+0x45/0x70 [ 14.934073] kasan_save_track+0x18/0x40 [ 14.934442] kasan_save_alloc_info+0x3b/0x50 [ 14.934629] __kasan_kmalloc+0xb7/0xc0 [ 14.934765] __kmalloc_cache_noprof+0x189/0x420 [ 14.934970] kasan_atomics+0x95/0x310 [ 14.935165] kunit_try_run_case+0x1a5/0x480 [ 14.935372] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.935646] kthread+0x337/0x6f0 [ 14.935813] ret_from_fork+0x116/0x1d0 [ 14.936052] ret_from_fork_asm+0x1a/0x30 [ 14.936224] [ 14.936296] The buggy address belongs to the object at ffff888102b49680 [ 14.936296] which belongs to the cache kmalloc-64 of size 64 [ 14.936770] The buggy address is located 0 bytes to the right of [ 14.936770] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.937812] [ 14.938010] The buggy address belongs to the physical page: [ 14.938478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.939170] flags: 0x200000000000000(node=0|zone=2) [ 14.939702] page_type: f5(slab) [ 14.940003] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.940767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.941642] page dumped because: kasan: bad access detected [ 14.942231] [ 14.942395] Memory state around the buggy address: [ 14.942841] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.943573] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.944325] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.944821] ^ [ 14.945129] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.945348] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.945792] ================================================================== [ 15.000550] ================================================================== [ 15.001161] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 15.001506] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 15.001911] [ 15.002123] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 15.002168] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.002213] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.002235] Call Trace: [ 15.002249] <TASK> [ 15.002274] dump_stack_lvl+0x73/0xb0 [ 15.002302] print_report+0xd1/0x650 [ 15.002325] ? __virt_addr_valid+0x1db/0x2d0 [ 15.002348] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.002371] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.002395] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.002445] kasan_report+0x141/0x180 [ 15.002470] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.002497] kasan_check_range+0x10c/0x1c0 [ 15.002533] __kasan_check_write+0x18/0x20 [ 15.002553] kasan_atomics_helper+0x1a7f/0x5450 [ 15.002577] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.002601] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.002639] ? ret_from_fork_asm+0x1a/0x30 [ 15.002663] ? kasan_atomics+0x152/0x310 [ 15.002690] kasan_atomics+0x1dc/0x310 [ 15.002714] ? __pfx_kasan_atomics+0x10/0x10 [ 15.002739] ? __pfx_read_tsc+0x10/0x10 [ 15.002761] ? ktime_get_ts64+0x86/0x230 [ 15.002812] kunit_try_run_case+0x1a5/0x480 [ 15.002835] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.002855] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.002881] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.002917] ? __kthread_parkme+0x82/0x180 [ 15.002938] ? preempt_count_sub+0x50/0x80 [ 15.003009] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.003032] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.003058] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.003083] kthread+0x337/0x6f0 [ 15.003103] ? trace_preempt_on+0x20/0xc0 [ 15.003125] ? __pfx_kthread+0x10/0x10 [ 15.003146] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.003171] ? calculate_sigpending+0x7b/0xa0 [ 15.003195] ? __pfx_kthread+0x10/0x10 [ 15.003217] ret_from_fork+0x116/0x1d0 [ 15.003236] ? __pfx_kthread+0x10/0x10 [ 15.003257] ret_from_fork_asm+0x1a/0x30 [ 15.003288] </TASK> [ 15.003299] [ 15.016254] Allocated by task 282: [ 15.016411] kasan_save_stack+0x45/0x70 [ 15.016710] kasan_save_track+0x18/0x40 [ 15.017099] kasan_save_alloc_info+0x3b/0x50 [ 15.017327] __kasan_kmalloc+0xb7/0xc0 [ 15.017521] __kmalloc_cache_noprof+0x189/0x420 [ 15.017913] kasan_atomics+0x95/0x310 [ 15.018211] kunit_try_run_case+0x1a5/0x480 [ 15.018409] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.018629] kthread+0x337/0x6f0 [ 15.018785] ret_from_fork+0x116/0x1d0 [ 15.018927] ret_from_fork_asm+0x1a/0x30 [ 15.019125] [ 15.019223] The buggy address belongs to the object at ffff888102b49680 [ 15.019223] which belongs to the cache kmalloc-64 of size 64 [ 15.020092] The buggy address is located 0 bytes to the right of [ 15.020092] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 15.020688] [ 15.020810] The buggy address belongs to the physical page: [ 15.021104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 15.021351] flags: 0x200000000000000(node=0|zone=2) [ 15.021517] page_type: f5(slab) [ 15.021702] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.022120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.022762] page dumped because: kasan: bad access detected [ 15.023167] [ 15.023271] Memory state around the buggy address: [ 15.023557] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.023861] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.024220] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.025088] ^ [ 15.025325] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.025633] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.025972] ================================================================== [ 14.149889] ================================================================== [ 14.150154] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 14.150454] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.150820] [ 14.150979] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.151025] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.151038] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.151059] Call Trace: [ 14.151074] <TASK> [ 14.151096] dump_stack_lvl+0x73/0xb0 [ 14.151121] print_report+0xd1/0x650 [ 14.151144] ? __virt_addr_valid+0x1db/0x2d0 [ 14.151167] ? kasan_atomics_helper+0x860/0x5450 [ 14.151189] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.151213] ? kasan_atomics_helper+0x860/0x5450 [ 14.151235] kasan_report+0x141/0x180 [ 14.151259] ? kasan_atomics_helper+0x860/0x5450 [ 14.151285] kasan_check_range+0x10c/0x1c0 [ 14.151310] __kasan_check_write+0x18/0x20 [ 14.151330] kasan_atomics_helper+0x860/0x5450 [ 14.151353] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.151377] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.151401] ? ret_from_fork_asm+0x1a/0x30 [ 14.151424] ? kasan_atomics+0x152/0x310 [ 14.151450] kasan_atomics+0x1dc/0x310 [ 14.151474] ? __pfx_kasan_atomics+0x10/0x10 [ 14.151498] ? __pfx_read_tsc+0x10/0x10 [ 14.151520] ? ktime_get_ts64+0x86/0x230 [ 14.151544] kunit_try_run_case+0x1a5/0x480 [ 14.151566] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.151587] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.151612] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.151649] ? __kthread_parkme+0x82/0x180 [ 14.151669] ? preempt_count_sub+0x50/0x80 [ 14.151693] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.151716] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.151740] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.151766] kthread+0x337/0x6f0 [ 14.151786] ? trace_preempt_on+0x20/0xc0 [ 14.151810] ? __pfx_kthread+0x10/0x10 [ 14.151832] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.151856] ? calculate_sigpending+0x7b/0xa0 [ 14.151881] ? __pfx_kthread+0x10/0x10 [ 14.151914] ret_from_fork+0x116/0x1d0 [ 14.151933] ? __pfx_kthread+0x10/0x10 [ 14.151954] ret_from_fork_asm+0x1a/0x30 [ 14.151985] </TASK> [ 14.151995] [ 14.160303] Allocated by task 282: [ 14.160433] kasan_save_stack+0x45/0x70 [ 14.160595] kasan_save_track+0x18/0x40 [ 14.161087] kasan_save_alloc_info+0x3b/0x50 [ 14.161290] __kasan_kmalloc+0xb7/0xc0 [ 14.161424] __kmalloc_cache_noprof+0x189/0x420 [ 14.161580] kasan_atomics+0x95/0x310 [ 14.161942] kunit_try_run_case+0x1a5/0x480 [ 14.162154] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.162414] kthread+0x337/0x6f0 [ 14.162618] ret_from_fork+0x116/0x1d0 [ 14.162815] ret_from_fork_asm+0x1a/0x30 [ 14.163051] [ 14.163147] The buggy address belongs to the object at ffff888102b49680 [ 14.163147] which belongs to the cache kmalloc-64 of size 64 [ 14.163510] The buggy address is located 0 bytes to the right of [ 14.163510] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.164103] [ 14.164203] The buggy address belongs to the physical page: [ 14.164608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.164978] flags: 0x200000000000000(node=0|zone=2) [ 14.165263] page_type: f5(slab) [ 14.165387] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.165621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.165848] page dumped because: kasan: bad access detected [ 14.166190] [ 14.166307] Memory state around the buggy address: [ 14.166533] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.166833] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.167261] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.167477] ^ [ 14.167643] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.168010] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.168324] ================================================================== [ 15.093073] ================================================================== [ 15.093596] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 15.094270] Read of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 15.095042] [ 15.095216] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 15.095260] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.095273] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.095295] Call Trace: [ 15.095307] <TASK> [ 15.095320] dump_stack_lvl+0x73/0xb0 [ 15.095345] print_report+0xd1/0x650 [ 15.095367] ? __virt_addr_valid+0x1db/0x2d0 [ 15.095391] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.095413] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.095437] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.095460] kasan_report+0x141/0x180 [ 15.095482] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.095510] __asan_report_load8_noabort+0x18/0x20 [ 15.095531] kasan_atomics_helper+0x4f30/0x5450 [ 15.095554] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.095577] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.095601] ? ret_from_fork_asm+0x1a/0x30 [ 15.095623] ? kasan_atomics+0x152/0x310 [ 15.095663] kasan_atomics+0x1dc/0x310 [ 15.095687] ? __pfx_kasan_atomics+0x10/0x10 [ 15.095712] ? __pfx_read_tsc+0x10/0x10 [ 15.095733] ? ktime_get_ts64+0x86/0x230 [ 15.095758] kunit_try_run_case+0x1a5/0x480 [ 15.095780] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.095801] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.095827] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.095853] ? __kthread_parkme+0x82/0x180 [ 15.095874] ? preempt_count_sub+0x50/0x80 [ 15.095908] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.095930] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.095955] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.095981] kthread+0x337/0x6f0 [ 15.096000] ? trace_preempt_on+0x20/0xc0 [ 15.096023] ? __pfx_kthread+0x10/0x10 [ 15.096045] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.096068] ? calculate_sigpending+0x7b/0xa0 [ 15.096092] ? __pfx_kthread+0x10/0x10 [ 15.096113] ret_from_fork+0x116/0x1d0 [ 15.096132] ? __pfx_kthread+0x10/0x10 [ 15.096153] ret_from_fork_asm+0x1a/0x30 [ 15.096183] </TASK> [ 15.096194] [ 15.104598] Allocated by task 282: [ 15.104791] kasan_save_stack+0x45/0x70 [ 15.105001] kasan_save_track+0x18/0x40 [ 15.105200] kasan_save_alloc_info+0x3b/0x50 [ 15.105413] __kasan_kmalloc+0xb7/0xc0 [ 15.105615] __kmalloc_cache_noprof+0x189/0x420 [ 15.105812] kasan_atomics+0x95/0x310 [ 15.106036] kunit_try_run_case+0x1a5/0x480 [ 15.106221] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.106404] kthread+0x337/0x6f0 [ 15.106524] ret_from_fork+0x116/0x1d0 [ 15.106704] ret_from_fork_asm+0x1a/0x30 [ 15.106916] [ 15.107017] The buggy address belongs to the object at ffff888102b49680 [ 15.107017] which belongs to the cache kmalloc-64 of size 64 [ 15.107562] The buggy address is located 0 bytes to the right of [ 15.107562] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 15.108079] [ 15.108154] The buggy address belongs to the physical page: [ 15.108345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 15.108723] flags: 0x200000000000000(node=0|zone=2) [ 15.108955] page_type: f5(slab) [ 15.109119] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.109413] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.109675] page dumped because: kasan: bad access detected [ 15.109847] [ 15.109925] Memory state around the buggy address: [ 15.110082] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.110399] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.110726] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.111010] ^ [ 15.111165] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.111381] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.111594] ================================================================== [ 15.026544] ================================================================== [ 15.027047] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 15.027381] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 15.027720] [ 15.027877] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 15.027936] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.027999] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.028021] Call Trace: [ 15.028075] <TASK> [ 15.028090] dump_stack_lvl+0x73/0xb0 [ 15.028141] print_report+0xd1/0x650 [ 15.028164] ? __virt_addr_valid+0x1db/0x2d0 [ 15.028212] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.028236] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.028259] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.028282] kasan_report+0x141/0x180 [ 15.028305] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.028332] kasan_check_range+0x10c/0x1c0 [ 15.028357] __kasan_check_write+0x18/0x20 [ 15.028377] kasan_atomics_helper+0x1b22/0x5450 [ 15.028401] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.028424] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.028449] ? ret_from_fork_asm+0x1a/0x30 [ 15.028471] ? kasan_atomics+0x152/0x310 [ 15.028499] kasan_atomics+0x1dc/0x310 [ 15.028522] ? __pfx_kasan_atomics+0x10/0x10 [ 15.028548] ? __pfx_read_tsc+0x10/0x10 [ 15.028571] ? ktime_get_ts64+0x86/0x230 [ 15.028595] kunit_try_run_case+0x1a5/0x480 [ 15.028617] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.028665] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.028692] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.028718] ? __kthread_parkme+0x82/0x180 [ 15.028740] ? preempt_count_sub+0x50/0x80 [ 15.028765] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.028788] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.028813] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.028838] kthread+0x337/0x6f0 [ 15.028858] ? trace_preempt_on+0x20/0xc0 [ 15.028881] ? __pfx_kthread+0x10/0x10 [ 15.028914] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.028937] ? calculate_sigpending+0x7b/0xa0 [ 15.028972] ? __pfx_kthread+0x10/0x10 [ 15.028994] ret_from_fork+0x116/0x1d0 [ 15.029014] ? __pfx_kthread+0x10/0x10 [ 15.029035] ret_from_fork_asm+0x1a/0x30 [ 15.029071] </TASK> [ 15.029082] [ 15.040318] Allocated by task 282: [ 15.040469] kasan_save_stack+0x45/0x70 [ 15.042495] kasan_save_track+0x18/0x40 [ 15.042716] kasan_save_alloc_info+0x3b/0x50 [ 15.042869] __kasan_kmalloc+0xb7/0xc0 [ 15.043789] __kmalloc_cache_noprof+0x189/0x420 [ 15.044388] kasan_atomics+0x95/0x310 [ 15.044737] kunit_try_run_case+0x1a5/0x480 [ 15.044902] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.045902] kthread+0x337/0x6f0 [ 15.046610] ret_from_fork+0x116/0x1d0 [ 15.046953] ret_from_fork_asm+0x1a/0x30 [ 15.047095] [ 15.047170] The buggy address belongs to the object at ffff888102b49680 [ 15.047170] which belongs to the cache kmalloc-64 of size 64 [ 15.047515] The buggy address is located 0 bytes to the right of [ 15.047515] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 15.047865] [ 15.048546] The buggy address belongs to the physical page: [ 15.049816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 15.050865] flags: 0x200000000000000(node=0|zone=2) [ 15.051748] page_type: f5(slab) [ 15.052191] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.053393] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.054309] page dumped because: kasan: bad access detected [ 15.055002] [ 15.055240] Memory state around the buggy address: [ 15.055654] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.056406] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.057129] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.057869] ^ [ 15.058586] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.059331] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.059558] ================================================================== [ 14.791906] ================================================================== [ 14.792741] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 14.793202] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.793581] [ 14.793816] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.793888] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.793926] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.793947] Call Trace: [ 14.794015] <TASK> [ 14.794031] dump_stack_lvl+0x73/0xb0 [ 14.794062] print_report+0xd1/0x650 [ 14.794110] ? __virt_addr_valid+0x1db/0x2d0 [ 14.794135] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.794181] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.794222] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.794256] kasan_report+0x141/0x180 [ 14.794279] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.794307] kasan_check_range+0x10c/0x1c0 [ 14.794332] __kasan_check_write+0x18/0x20 [ 14.794352] kasan_atomics_helper+0x15b6/0x5450 [ 14.794376] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.794399] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.794423] ? ret_from_fork_asm+0x1a/0x30 [ 14.794446] ? kasan_atomics+0x152/0x310 [ 14.794497] kasan_atomics+0x1dc/0x310 [ 14.794520] ? __pfx_kasan_atomics+0x10/0x10 [ 14.794545] ? __pfx_read_tsc+0x10/0x10 [ 14.794577] ? ktime_get_ts64+0x86/0x230 [ 14.794602] kunit_try_run_case+0x1a5/0x480 [ 14.794623] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.794644] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.794670] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.794695] ? __kthread_parkme+0x82/0x180 [ 14.794742] ? preempt_count_sub+0x50/0x80 [ 14.794767] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.794788] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.794836] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.794862] kthread+0x337/0x6f0 [ 14.794911] ? trace_preempt_on+0x20/0xc0 [ 14.794944] ? __pfx_kthread+0x10/0x10 [ 14.794965] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.794989] ? calculate_sigpending+0x7b/0xa0 [ 14.795023] ? __pfx_kthread+0x10/0x10 [ 14.795094] ret_from_fork+0x116/0x1d0 [ 14.795116] ? __pfx_kthread+0x10/0x10 [ 14.795138] ret_from_fork_asm+0x1a/0x30 [ 14.795169] </TASK> [ 14.795181] [ 14.809601] Allocated by task 282: [ 14.810052] kasan_save_stack+0x45/0x70 [ 14.810574] kasan_save_track+0x18/0x40 [ 14.811054] kasan_save_alloc_info+0x3b/0x50 [ 14.811479] __kasan_kmalloc+0xb7/0xc0 [ 14.811923] __kmalloc_cache_noprof+0x189/0x420 [ 14.812303] kasan_atomics+0x95/0x310 [ 14.812441] kunit_try_run_case+0x1a5/0x480 [ 14.812587] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.813249] kthread+0x337/0x6f0 [ 14.813605] ret_from_fork+0x116/0x1d0 [ 14.814003] ret_from_fork_asm+0x1a/0x30 [ 14.814511] [ 14.814713] The buggy address belongs to the object at ffff888102b49680 [ 14.814713] which belongs to the cache kmalloc-64 of size 64 [ 14.815528] The buggy address is located 0 bytes to the right of [ 14.815528] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.816754] [ 14.816937] The buggy address belongs to the physical page: [ 14.817469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.817877] flags: 0x200000000000000(node=0|zone=2) [ 14.818472] page_type: f5(slab) [ 14.818812] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.819607] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.820003] page dumped because: kasan: bad access detected [ 14.820177] [ 14.820246] Memory state around the buggy address: [ 14.820400] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.820614] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.821778] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.822604] ^ [ 14.823421] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.824285] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.825140] ================================================================== [ 14.474104] ================================================================== [ 14.474446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 14.474815] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.475213] [ 14.475298] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.475343] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.475355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.475376] Call Trace: [ 14.475390] <TASK> [ 14.475405] dump_stack_lvl+0x73/0xb0 [ 14.475428] print_report+0xd1/0x650 [ 14.475451] ? __virt_addr_valid+0x1db/0x2d0 [ 14.475475] ? kasan_atomics_helper+0x1148/0x5450 [ 14.475497] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.475522] ? kasan_atomics_helper+0x1148/0x5450 [ 14.475545] kasan_report+0x141/0x180 [ 14.475568] ? kasan_atomics_helper+0x1148/0x5450 [ 14.475596] kasan_check_range+0x10c/0x1c0 [ 14.475639] __kasan_check_write+0x18/0x20 [ 14.475659] kasan_atomics_helper+0x1148/0x5450 [ 14.475683] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.475707] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.475731] ? ret_from_fork_asm+0x1a/0x30 [ 14.475754] ? kasan_atomics+0x152/0x310 [ 14.475780] kasan_atomics+0x1dc/0x310 [ 14.475804] ? __pfx_kasan_atomics+0x10/0x10 [ 14.475828] ? __pfx_read_tsc+0x10/0x10 [ 14.475851] ? ktime_get_ts64+0x86/0x230 [ 14.475875] kunit_try_run_case+0x1a5/0x480 [ 14.475906] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.475945] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.475973] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.475999] ? __kthread_parkme+0x82/0x180 [ 14.476019] ? preempt_count_sub+0x50/0x80 [ 14.476044] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.476067] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.476092] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.476118] kthread+0x337/0x6f0 [ 14.476137] ? trace_preempt_on+0x20/0xc0 [ 14.476161] ? __pfx_kthread+0x10/0x10 [ 14.476182] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.476205] ? calculate_sigpending+0x7b/0xa0 [ 14.476229] ? __pfx_kthread+0x10/0x10 [ 14.476252] ret_from_fork+0x116/0x1d0 [ 14.476271] ? __pfx_kthread+0x10/0x10 [ 14.476292] ret_from_fork_asm+0x1a/0x30 [ 14.476323] </TASK> [ 14.476334] [ 14.485025] Allocated by task 282: [ 14.485181] kasan_save_stack+0x45/0x70 [ 14.485415] kasan_save_track+0x18/0x40 [ 14.485674] kasan_save_alloc_info+0x3b/0x50 [ 14.485872] __kasan_kmalloc+0xb7/0xc0 [ 14.486068] __kmalloc_cache_noprof+0x189/0x420 [ 14.486357] kasan_atomics+0x95/0x310 [ 14.486518] kunit_try_run_case+0x1a5/0x480 [ 14.486689] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.486869] kthread+0x337/0x6f0 [ 14.486999] ret_from_fork+0x116/0x1d0 [ 14.487132] ret_from_fork_asm+0x1a/0x30 [ 14.487271] [ 14.487343] The buggy address belongs to the object at ffff888102b49680 [ 14.487343] which belongs to the cache kmalloc-64 of size 64 [ 14.487754] The buggy address is located 0 bytes to the right of [ 14.487754] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.488306] [ 14.488402] The buggy address belongs to the physical page: [ 14.488673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.489068] flags: 0x200000000000000(node=0|zone=2) [ 14.489302] page_type: f5(slab) [ 14.489466] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.489805] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.490151] page dumped because: kasan: bad access detected [ 14.490406] [ 14.490499] Memory state around the buggy address: [ 14.490676] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.490924] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.491629] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.491901] ^ [ 14.492101] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.492383] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.492729] ================================================================== [ 14.437082] ================================================================== [ 14.437432] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 14.437799] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.438312] [ 14.438422] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.438465] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.438477] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.438498] Call Trace: [ 14.438513] <TASK> [ 14.438527] dump_stack_lvl+0x73/0xb0 [ 14.438553] print_report+0xd1/0x650 [ 14.438575] ? __virt_addr_valid+0x1db/0x2d0 [ 14.438599] ? kasan_atomics_helper+0x1079/0x5450 [ 14.438643] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.438668] ? kasan_atomics_helper+0x1079/0x5450 [ 14.438691] kasan_report+0x141/0x180 [ 14.438714] ? kasan_atomics_helper+0x1079/0x5450 [ 14.438742] kasan_check_range+0x10c/0x1c0 [ 14.438766] __kasan_check_write+0x18/0x20 [ 14.438787] kasan_atomics_helper+0x1079/0x5450 [ 14.438811] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.438835] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.438860] ? ret_from_fork_asm+0x1a/0x30 [ 14.438884] ? kasan_atomics+0x152/0x310 [ 14.438920] kasan_atomics+0x1dc/0x310 [ 14.438962] ? __pfx_kasan_atomics+0x10/0x10 [ 14.438988] ? __pfx_read_tsc+0x10/0x10 [ 14.439010] ? ktime_get_ts64+0x86/0x230 [ 14.439035] kunit_try_run_case+0x1a5/0x480 [ 14.439057] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.439077] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.439103] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.439128] ? __kthread_parkme+0x82/0x180 [ 14.439149] ? preempt_count_sub+0x50/0x80 [ 14.439174] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.439195] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.439220] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.439245] kthread+0x337/0x6f0 [ 14.439265] ? trace_preempt_on+0x20/0xc0 [ 14.439288] ? __pfx_kthread+0x10/0x10 [ 14.439309] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.439333] ? calculate_sigpending+0x7b/0xa0 [ 14.439357] ? __pfx_kthread+0x10/0x10 [ 14.439380] ret_from_fork+0x116/0x1d0 [ 14.439399] ? __pfx_kthread+0x10/0x10 [ 14.439421] ret_from_fork_asm+0x1a/0x30 [ 14.439450] </TASK> [ 14.439462] [ 14.447636] Allocated by task 282: [ 14.447794] kasan_save_stack+0x45/0x70 [ 14.448055] kasan_save_track+0x18/0x40 [ 14.448194] kasan_save_alloc_info+0x3b/0x50 [ 14.448407] __kasan_kmalloc+0xb7/0xc0 [ 14.448601] __kmalloc_cache_noprof+0x189/0x420 [ 14.448823] kasan_atomics+0x95/0x310 [ 14.449095] kunit_try_run_case+0x1a5/0x480 [ 14.449257] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.449434] kthread+0x337/0x6f0 [ 14.449556] ret_from_fork+0x116/0x1d0 [ 14.449712] ret_from_fork_asm+0x1a/0x30 [ 14.449854] [ 14.449956] The buggy address belongs to the object at ffff888102b49680 [ 14.449956] which belongs to the cache kmalloc-64 of size 64 [ 14.450312] The buggy address is located 0 bytes to the right of [ 14.450312] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.450785] [ 14.450880] The buggy address belongs to the physical page: [ 14.451136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.451482] flags: 0x200000000000000(node=0|zone=2) [ 14.451739] page_type: f5(slab) [ 14.451911] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.452247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.452848] page dumped because: kasan: bad access detected [ 14.453301] [ 14.453399] Memory state around the buggy address: [ 14.453637] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.453882] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.454512] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.454809] ^ [ 14.455052] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.455317] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.455630] ================================================================== [ 15.112218] ================================================================== [ 15.112723] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 15.113212] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 15.113542] [ 15.113675] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 15.113719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.113730] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.113751] Call Trace: [ 15.113763] <TASK> [ 15.113777] dump_stack_lvl+0x73/0xb0 [ 15.113801] print_report+0xd1/0x650 [ 15.113824] ? __virt_addr_valid+0x1db/0x2d0 [ 15.113848] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.113871] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.113905] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.113927] kasan_report+0x141/0x180 [ 15.113950] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.113977] kasan_check_range+0x10c/0x1c0 [ 15.114002] __kasan_check_write+0x18/0x20 [ 15.114022] kasan_atomics_helper+0x1ce1/0x5450 [ 15.114045] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.114069] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.114093] ? ret_from_fork_asm+0x1a/0x30 [ 15.114115] ? kasan_atomics+0x152/0x310 [ 15.114141] kasan_atomics+0x1dc/0x310 [ 15.114165] ? __pfx_kasan_atomics+0x10/0x10 [ 15.114190] ? __pfx_read_tsc+0x10/0x10 [ 15.114211] ? ktime_get_ts64+0x86/0x230 [ 15.114236] kunit_try_run_case+0x1a5/0x480 [ 15.114258] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.114279] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.114306] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.114332] ? __kthread_parkme+0x82/0x180 [ 15.114352] ? preempt_count_sub+0x50/0x80 [ 15.114377] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.114399] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.114424] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.114450] kthread+0x337/0x6f0 [ 15.114470] ? trace_preempt_on+0x20/0xc0 [ 15.114492] ? __pfx_kthread+0x10/0x10 [ 15.114514] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.114537] ? calculate_sigpending+0x7b/0xa0 [ 15.114562] ? __pfx_kthread+0x10/0x10 [ 15.114584] ret_from_fork+0x116/0x1d0 [ 15.114603] ? __pfx_kthread+0x10/0x10 [ 15.114645] ret_from_fork_asm+0x1a/0x30 [ 15.114675] </TASK> [ 15.114687] [ 15.121901] Allocated by task 282: [ 15.122079] kasan_save_stack+0x45/0x70 [ 15.122275] kasan_save_track+0x18/0x40 [ 15.122464] kasan_save_alloc_info+0x3b/0x50 [ 15.122704] __kasan_kmalloc+0xb7/0xc0 [ 15.122890] __kmalloc_cache_noprof+0x189/0x420 [ 15.123118] kasan_atomics+0x95/0x310 [ 15.123297] kunit_try_run_case+0x1a5/0x480 [ 15.123442] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.123655] kthread+0x337/0x6f0 [ 15.123826] ret_from_fork+0x116/0x1d0 [ 15.124022] ret_from_fork_asm+0x1a/0x30 [ 15.124218] [ 15.124313] The buggy address belongs to the object at ffff888102b49680 [ 15.124313] which belongs to the cache kmalloc-64 of size 64 [ 15.124831] The buggy address is located 0 bytes to the right of [ 15.124831] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 15.125344] [ 15.125419] The buggy address belongs to the physical page: [ 15.125693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 15.126022] flags: 0x200000000000000(node=0|zone=2) [ 15.126215] page_type: f5(slab) [ 15.126376] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.126683] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.126919] page dumped because: kasan: bad access detected [ 15.127090] [ 15.127158] Memory state around the buggy address: [ 15.127329] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.127671] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.127995] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.128307] ^ [ 15.128513] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.128811] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.129056] ================================================================== [ 14.418518] ================================================================== [ 14.418852] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 14.419195] Read of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.419470] [ 14.419558] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.419601] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.419614] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.419635] Call Trace: [ 14.419648] <TASK> [ 14.419661] dump_stack_lvl+0x73/0xb0 [ 14.419684] print_report+0xd1/0x650 [ 14.419707] ? __virt_addr_valid+0x1db/0x2d0 [ 14.419731] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.419753] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.419776] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.419799] kasan_report+0x141/0x180 [ 14.419822] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.419849] __asan_report_load4_noabort+0x18/0x20 [ 14.419870] kasan_atomics_helper+0x4a36/0x5450 [ 14.419927] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.419952] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.419978] ? ret_from_fork_asm+0x1a/0x30 [ 14.420000] ? kasan_atomics+0x152/0x310 [ 14.420028] kasan_atomics+0x1dc/0x310 [ 14.420052] ? __pfx_kasan_atomics+0x10/0x10 [ 14.420079] ? __pfx_read_tsc+0x10/0x10 [ 14.420101] ? ktime_get_ts64+0x86/0x230 [ 14.420125] kunit_try_run_case+0x1a5/0x480 [ 14.420147] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.420167] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.420193] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.420219] ? __kthread_parkme+0x82/0x180 [ 14.420240] ? preempt_count_sub+0x50/0x80 [ 14.420264] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.420286] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.420312] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.420337] kthread+0x337/0x6f0 [ 14.420356] ? trace_preempt_on+0x20/0xc0 [ 14.420379] ? __pfx_kthread+0x10/0x10 [ 14.420401] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.420424] ? calculate_sigpending+0x7b/0xa0 [ 14.420448] ? __pfx_kthread+0x10/0x10 [ 14.420471] ret_from_fork+0x116/0x1d0 [ 14.420489] ? __pfx_kthread+0x10/0x10 [ 14.420511] ret_from_fork_asm+0x1a/0x30 [ 14.420541] </TASK> [ 14.420552] [ 14.429100] Allocated by task 282: [ 14.429380] kasan_save_stack+0x45/0x70 [ 14.429573] kasan_save_track+0x18/0x40 [ 14.429806] kasan_save_alloc_info+0x3b/0x50 [ 14.430028] __kasan_kmalloc+0xb7/0xc0 [ 14.430212] __kmalloc_cache_noprof+0x189/0x420 [ 14.430394] kasan_atomics+0x95/0x310 [ 14.430559] kunit_try_run_case+0x1a5/0x480 [ 14.430776] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.431086] kthread+0x337/0x6f0 [ 14.431249] ret_from_fork+0x116/0x1d0 [ 14.431384] ret_from_fork_asm+0x1a/0x30 [ 14.431581] [ 14.431698] The buggy address belongs to the object at ffff888102b49680 [ 14.431698] which belongs to the cache kmalloc-64 of size 64 [ 14.432273] The buggy address is located 0 bytes to the right of [ 14.432273] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.432761] [ 14.432837] The buggy address belongs to the physical page: [ 14.433052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.433298] flags: 0x200000000000000(node=0|zone=2) [ 14.433465] page_type: f5(slab) [ 14.433586] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.433838] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.434279] page dumped because: kasan: bad access detected [ 14.434664] [ 14.434759] Memory state around the buggy address: [ 14.435001] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.435506] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.435734] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.435959] ^ [ 14.436122] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.436343] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.436559] ================================================================== [ 14.340520] ================================================================== [ 14.340916] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 14.341242] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.341461] [ 14.341543] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.341605] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.341636] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.341658] Call Trace: [ 14.341673] <TASK> [ 14.341688] dump_stack_lvl+0x73/0xb0 [ 14.341734] print_report+0xd1/0x650 [ 14.341758] ? __virt_addr_valid+0x1db/0x2d0 [ 14.341799] ? kasan_atomics_helper+0xde0/0x5450 [ 14.341821] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.341844] ? kasan_atomics_helper+0xde0/0x5450 [ 14.341884] kasan_report+0x141/0x180 [ 14.341920] ? kasan_atomics_helper+0xde0/0x5450 [ 14.341970] kasan_check_range+0x10c/0x1c0 [ 14.341996] __kasan_check_write+0x18/0x20 [ 14.342017] kasan_atomics_helper+0xde0/0x5450 [ 14.342040] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.342063] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.342088] ? ret_from_fork_asm+0x1a/0x30 [ 14.342110] ? kasan_atomics+0x152/0x310 [ 14.342137] kasan_atomics+0x1dc/0x310 [ 14.342160] ? __pfx_kasan_atomics+0x10/0x10 [ 14.342186] ? __pfx_read_tsc+0x10/0x10 [ 14.342207] ? ktime_get_ts64+0x86/0x230 [ 14.342232] kunit_try_run_case+0x1a5/0x480 [ 14.342254] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.342274] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.342300] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.342325] ? __kthread_parkme+0x82/0x180 [ 14.342346] ? preempt_count_sub+0x50/0x80 [ 14.342371] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.342393] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.342418] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.342443] kthread+0x337/0x6f0 [ 14.342464] ? trace_preempt_on+0x20/0xc0 [ 14.342486] ? __pfx_kthread+0x10/0x10 [ 14.342509] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.342532] ? calculate_sigpending+0x7b/0xa0 [ 14.342557] ? __pfx_kthread+0x10/0x10 [ 14.342579] ret_from_fork+0x116/0x1d0 [ 14.342598] ? __pfx_kthread+0x10/0x10 [ 14.342627] ret_from_fork_asm+0x1a/0x30 [ 14.342657] </TASK> [ 14.342668] [ 14.351347] Allocated by task 282: [ 14.351481] kasan_save_stack+0x45/0x70 [ 14.351649] kasan_save_track+0x18/0x40 [ 14.351848] kasan_save_alloc_info+0x3b/0x50 [ 14.352261] __kasan_kmalloc+0xb7/0xc0 [ 14.352457] __kmalloc_cache_noprof+0x189/0x420 [ 14.352727] kasan_atomics+0x95/0x310 [ 14.352924] kunit_try_run_case+0x1a5/0x480 [ 14.353260] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.353529] kthread+0x337/0x6f0 [ 14.353751] ret_from_fork+0x116/0x1d0 [ 14.353908] ret_from_fork_asm+0x1a/0x30 [ 14.354188] [ 14.354287] The buggy address belongs to the object at ffff888102b49680 [ 14.354287] which belongs to the cache kmalloc-64 of size 64 [ 14.354880] The buggy address is located 0 bytes to the right of [ 14.354880] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.355517] [ 14.355695] The buggy address belongs to the physical page: [ 14.356265] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.356641] flags: 0x200000000000000(node=0|zone=2) [ 14.356873] page_type: f5(slab) [ 14.357204] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.357472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.357723] page dumped because: kasan: bad access detected [ 14.357904] [ 14.358111] Memory state around the buggy address: [ 14.358338] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.358690] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.359064] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.359472] ^ [ 14.359830] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.360227] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.360719] ================================================================== [ 14.234414] ================================================================== [ 14.234754] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 14.235033] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.235360] [ 14.235465] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.235508] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.235520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.235542] Call Trace: [ 14.235555] <TASK> [ 14.235569] dump_stack_lvl+0x73/0xb0 [ 14.235595] print_report+0xd1/0x650 [ 14.235634] ? __virt_addr_valid+0x1db/0x2d0 [ 14.235659] ? kasan_atomics_helper+0xac7/0x5450 [ 14.235681] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.235705] ? kasan_atomics_helper+0xac7/0x5450 [ 14.235727] kasan_report+0x141/0x180 [ 14.235750] ? kasan_atomics_helper+0xac7/0x5450 [ 14.235776] kasan_check_range+0x10c/0x1c0 [ 14.235801] __kasan_check_write+0x18/0x20 [ 14.235821] kasan_atomics_helper+0xac7/0x5450 [ 14.235844] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.235868] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.235901] ? ret_from_fork_asm+0x1a/0x30 [ 14.235923] ? kasan_atomics+0x152/0x310 [ 14.235968] kasan_atomics+0x1dc/0x310 [ 14.235992] ? __pfx_kasan_atomics+0x10/0x10 [ 14.236017] ? __pfx_read_tsc+0x10/0x10 [ 14.236038] ? ktime_get_ts64+0x86/0x230 [ 14.236062] kunit_try_run_case+0x1a5/0x480 [ 14.236083] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.236104] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.236129] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.236154] ? __kthread_parkme+0x82/0x180 [ 14.236175] ? preempt_count_sub+0x50/0x80 [ 14.236199] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.236221] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.236246] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.236271] kthread+0x337/0x6f0 [ 14.236291] ? trace_preempt_on+0x20/0xc0 [ 14.236314] ? __pfx_kthread+0x10/0x10 [ 14.236335] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.236359] ? calculate_sigpending+0x7b/0xa0 [ 14.236383] ? __pfx_kthread+0x10/0x10 [ 14.236405] ret_from_fork+0x116/0x1d0 [ 14.236424] ? __pfx_kthread+0x10/0x10 [ 14.236445] ret_from_fork_asm+0x1a/0x30 [ 14.236476] </TASK> [ 14.236487] [ 14.244715] Allocated by task 282: [ 14.244906] kasan_save_stack+0x45/0x70 [ 14.245061] kasan_save_track+0x18/0x40 [ 14.245216] kasan_save_alloc_info+0x3b/0x50 [ 14.245515] __kasan_kmalloc+0xb7/0xc0 [ 14.245727] __kmalloc_cache_noprof+0x189/0x420 [ 14.245961] kasan_atomics+0x95/0x310 [ 14.246267] kunit_try_run_case+0x1a5/0x480 [ 14.246418] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.246596] kthread+0x337/0x6f0 [ 14.246733] ret_from_fork+0x116/0x1d0 [ 14.246867] ret_from_fork_asm+0x1a/0x30 [ 14.247247] [ 14.247344] The buggy address belongs to the object at ffff888102b49680 [ 14.247344] which belongs to the cache kmalloc-64 of size 64 [ 14.247910] The buggy address is located 0 bytes to the right of [ 14.247910] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.248529] [ 14.248638] The buggy address belongs to the physical page: [ 14.248855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.249237] flags: 0x200000000000000(node=0|zone=2) [ 14.249422] page_type: f5(slab) [ 14.249542] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.249799] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.250128] page dumped because: kasan: bad access detected [ 14.250383] [ 14.250475] Memory state around the buggy address: [ 14.250719] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.251070] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.251366] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.251580] ^ [ 14.251734] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.251987] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.252304] ================================================================== [ 14.540845] ================================================================== [ 14.541606] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 14.542498] Read of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.543237] [ 14.543481] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.543526] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.543539] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.543561] Call Trace: [ 14.543577] <TASK> [ 14.543593] dump_stack_lvl+0x73/0xb0 [ 14.543620] print_report+0xd1/0x650 [ 14.543642] ? __virt_addr_valid+0x1db/0x2d0 [ 14.543681] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.543704] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.543728] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.543751] kasan_report+0x141/0x180 [ 14.543774] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.543801] __asan_report_load4_noabort+0x18/0x20 [ 14.543822] kasan_atomics_helper+0x49e8/0x5450 [ 14.543845] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.543868] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.543905] ? ret_from_fork_asm+0x1a/0x30 [ 14.543928] ? kasan_atomics+0x152/0x310 [ 14.544027] kasan_atomics+0x1dc/0x310 [ 14.544053] ? __pfx_kasan_atomics+0x10/0x10 [ 14.544079] ? __pfx_read_tsc+0x10/0x10 [ 14.544100] ? ktime_get_ts64+0x86/0x230 [ 14.544125] kunit_try_run_case+0x1a5/0x480 [ 14.544148] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.544168] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.544194] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.544219] ? __kthread_parkme+0x82/0x180 [ 14.544240] ? preempt_count_sub+0x50/0x80 [ 14.544264] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.544286] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.544311] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.544336] kthread+0x337/0x6f0 [ 14.544356] ? trace_preempt_on+0x20/0xc0 [ 14.544379] ? __pfx_kthread+0x10/0x10 [ 14.544401] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.544424] ? calculate_sigpending+0x7b/0xa0 [ 14.544449] ? __pfx_kthread+0x10/0x10 [ 14.544470] ret_from_fork+0x116/0x1d0 [ 14.544489] ? __pfx_kthread+0x10/0x10 [ 14.544509] ret_from_fork_asm+0x1a/0x30 [ 14.544540] </TASK> [ 14.544551] [ 14.558004] Allocated by task 282: [ 14.558375] kasan_save_stack+0x45/0x70 [ 14.558812] kasan_save_track+0x18/0x40 [ 14.558964] kasan_save_alloc_info+0x3b/0x50 [ 14.559136] __kasan_kmalloc+0xb7/0xc0 [ 14.559273] __kmalloc_cache_noprof+0x189/0x420 [ 14.559430] kasan_atomics+0x95/0x310 [ 14.559564] kunit_try_run_case+0x1a5/0x480 [ 14.559872] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.560427] kthread+0x337/0x6f0 [ 14.560753] ret_from_fork+0x116/0x1d0 [ 14.561234] ret_from_fork_asm+0x1a/0x30 [ 14.561685] [ 14.561845] The buggy address belongs to the object at ffff888102b49680 [ 14.561845] which belongs to the cache kmalloc-64 of size 64 [ 14.563236] The buggy address is located 0 bytes to the right of [ 14.563236] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.564496] [ 14.564628] The buggy address belongs to the physical page: [ 14.564803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.565597] flags: 0x200000000000000(node=0|zone=2) [ 14.566049] page_type: f5(slab) [ 14.566354] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.566971] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.567262] page dumped because: kasan: bad access detected [ 14.567729] [ 14.567920] Memory state around the buggy address: [ 14.568433] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.569086] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.569712] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.570106] ^ [ 14.570267] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.570675] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.571364] ================================================================== [ 13.848496] ================================================================== [ 13.848913] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 13.849329] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 13.849651] [ 13.849735] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 13.849796] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.849807] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.849840] Call Trace: [ 13.849854] <TASK> [ 13.849867] dump_stack_lvl+0x73/0xb0 [ 13.849925] print_report+0xd1/0x650 [ 13.850005] ? __virt_addr_valid+0x1db/0x2d0 [ 13.850030] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.850075] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.850097] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.850119] kasan_report+0x141/0x180 [ 13.850142] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.850169] __asan_report_store4_noabort+0x1b/0x30 [ 13.850190] kasan_atomics_helper+0x4ba2/0x5450 [ 13.850213] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.850250] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.850286] ? ret_from_fork_asm+0x1a/0x30 [ 13.850320] ? kasan_atomics+0x152/0x310 [ 13.850346] kasan_atomics+0x1dc/0x310 [ 13.850368] ? __pfx_kasan_atomics+0x10/0x10 [ 13.850392] ? __pfx_read_tsc+0x10/0x10 [ 13.850413] ? ktime_get_ts64+0x86/0x230 [ 13.850437] kunit_try_run_case+0x1a5/0x480 [ 13.850458] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.850478] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.850503] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.850527] ? __kthread_parkme+0x82/0x180 [ 13.850546] ? preempt_count_sub+0x50/0x80 [ 13.850570] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.850593] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.850650] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.850676] kthread+0x337/0x6f0 [ 13.850695] ? trace_preempt_on+0x20/0xc0 [ 13.850717] ? __pfx_kthread+0x10/0x10 [ 13.850754] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.850777] ? calculate_sigpending+0x7b/0xa0 [ 13.850801] ? __pfx_kthread+0x10/0x10 [ 13.850822] ret_from_fork+0x116/0x1d0 [ 13.850841] ? __pfx_kthread+0x10/0x10 [ 13.850861] ret_from_fork_asm+0x1a/0x30 [ 13.850889] </TASK> [ 13.850909] [ 13.859124] Allocated by task 282: [ 13.859300] kasan_save_stack+0x45/0x70 [ 13.859504] kasan_save_track+0x18/0x40 [ 13.859695] kasan_save_alloc_info+0x3b/0x50 [ 13.860183] __kasan_kmalloc+0xb7/0xc0 [ 13.860323] __kmalloc_cache_noprof+0x189/0x420 [ 13.860475] kasan_atomics+0x95/0x310 [ 13.860603] kunit_try_run_case+0x1a5/0x480 [ 13.860800] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.861185] kthread+0x337/0x6f0 [ 13.861374] ret_from_fork+0x116/0x1d0 [ 13.861599] ret_from_fork_asm+0x1a/0x30 [ 13.861829] [ 13.862011] The buggy address belongs to the object at ffff888102b49680 [ 13.862011] which belongs to the cache kmalloc-64 of size 64 [ 13.862550] The buggy address is located 0 bytes to the right of [ 13.862550] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 13.863148] [ 13.863221] The buggy address belongs to the physical page: [ 13.863386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 13.863745] flags: 0x200000000000000(node=0|zone=2) [ 13.864113] page_type: f5(slab) [ 13.864302] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.864679] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.865214] page dumped because: kasan: bad access detected [ 13.865481] [ 13.865575] Memory state around the buggy address: [ 13.865725] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.866109] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.866464] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.866821] ^ [ 13.867117] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.867443] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.867761] ================================================================== [ 14.400096] ================================================================== [ 14.400360] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 14.400665] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.401036] [ 14.401151] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.401196] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.401209] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.401231] Call Trace: [ 14.401244] <TASK> [ 14.401258] dump_stack_lvl+0x73/0xb0 [ 14.401282] print_report+0xd1/0x650 [ 14.401305] ? __virt_addr_valid+0x1db/0x2d0 [ 14.401330] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.401353] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.401377] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.401400] kasan_report+0x141/0x180 [ 14.401422] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.401450] kasan_check_range+0x10c/0x1c0 [ 14.401474] __kasan_check_write+0x18/0x20 [ 14.401495] kasan_atomics_helper+0xfa9/0x5450 [ 14.401518] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.401541] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.401565] ? ret_from_fork_asm+0x1a/0x30 [ 14.401587] ? kasan_atomics+0x152/0x310 [ 14.401632] kasan_atomics+0x1dc/0x310 [ 14.401657] ? __pfx_kasan_atomics+0x10/0x10 [ 14.401682] ? __pfx_read_tsc+0x10/0x10 [ 14.401703] ? ktime_get_ts64+0x86/0x230 [ 14.401727] kunit_try_run_case+0x1a5/0x480 [ 14.401748] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.401770] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.401794] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.401820] ? __kthread_parkme+0x82/0x180 [ 14.401840] ? preempt_count_sub+0x50/0x80 [ 14.401865] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.401887] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.401921] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.401965] kthread+0x337/0x6f0 [ 14.401985] ? trace_preempt_on+0x20/0xc0 [ 14.402008] ? __pfx_kthread+0x10/0x10 [ 14.402028] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.402052] ? calculate_sigpending+0x7b/0xa0 [ 14.402077] ? __pfx_kthread+0x10/0x10 [ 14.402098] ret_from_fork+0x116/0x1d0 [ 14.402117] ? __pfx_kthread+0x10/0x10 [ 14.402138] ret_from_fork_asm+0x1a/0x30 [ 14.402169] </TASK> [ 14.402180] [ 14.410630] Allocated by task 282: [ 14.410794] kasan_save_stack+0x45/0x70 [ 14.410949] kasan_save_track+0x18/0x40 [ 14.411139] kasan_save_alloc_info+0x3b/0x50 [ 14.411438] __kasan_kmalloc+0xb7/0xc0 [ 14.411635] __kmalloc_cache_noprof+0x189/0x420 [ 14.411833] kasan_atomics+0x95/0x310 [ 14.412086] kunit_try_run_case+0x1a5/0x480 [ 14.412290] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.412481] kthread+0x337/0x6f0 [ 14.412675] ret_from_fork+0x116/0x1d0 [ 14.412836] ret_from_fork_asm+0x1a/0x30 [ 14.413064] [ 14.413151] The buggy address belongs to the object at ffff888102b49680 [ 14.413151] which belongs to the cache kmalloc-64 of size 64 [ 14.413533] The buggy address is located 0 bytes to the right of [ 14.413533] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.414240] [ 14.414340] The buggy address belongs to the physical page: [ 14.414592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.414924] flags: 0x200000000000000(node=0|zone=2) [ 14.415168] page_type: f5(slab) [ 14.415290] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.415521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.415900] page dumped because: kasan: bad access detected [ 14.416154] [ 14.416251] Memory state around the buggy address: [ 14.416479] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.416724] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.416952] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.417170] ^ [ 14.417324] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.417539] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.418081] ================================================================== [ 14.456198] ================================================================== [ 14.456476] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 14.456735] Read of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.457074] [ 14.457183] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.457225] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.457237] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.457258] Call Trace: [ 14.457269] <TASK> [ 14.457282] dump_stack_lvl+0x73/0xb0 [ 14.457307] print_report+0xd1/0x650 [ 14.457330] ? __virt_addr_valid+0x1db/0x2d0 [ 14.457354] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.457376] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.457399] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.457423] kasan_report+0x141/0x180 [ 14.457446] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.457474] __asan_report_load4_noabort+0x18/0x20 [ 14.457496] kasan_atomics_helper+0x4a1c/0x5450 [ 14.457520] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.457543] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.457568] ? ret_from_fork_asm+0x1a/0x30 [ 14.457591] ? kasan_atomics+0x152/0x310 [ 14.457637] kasan_atomics+0x1dc/0x310 [ 14.457661] ? __pfx_kasan_atomics+0x10/0x10 [ 14.457686] ? __pfx_read_tsc+0x10/0x10 [ 14.457708] ? ktime_get_ts64+0x86/0x230 [ 14.457732] kunit_try_run_case+0x1a5/0x480 [ 14.457755] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.457776] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.457802] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.457828] ? __kthread_parkme+0x82/0x180 [ 14.457849] ? preempt_count_sub+0x50/0x80 [ 14.457873] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.457905] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.457948] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.457974] kthread+0x337/0x6f0 [ 14.457995] ? trace_preempt_on+0x20/0xc0 [ 14.458018] ? __pfx_kthread+0x10/0x10 [ 14.458041] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.458066] ? calculate_sigpending+0x7b/0xa0 [ 14.458091] ? __pfx_kthread+0x10/0x10 [ 14.458114] ret_from_fork+0x116/0x1d0 [ 14.458134] ? __pfx_kthread+0x10/0x10 [ 14.458156] ret_from_fork_asm+0x1a/0x30 [ 14.458186] </TASK> [ 14.458197] [ 14.465944] Allocated by task 282: [ 14.466076] kasan_save_stack+0x45/0x70 [ 14.466271] kasan_save_track+0x18/0x40 [ 14.466447] kasan_save_alloc_info+0x3b/0x50 [ 14.466677] __kasan_kmalloc+0xb7/0xc0 [ 14.466812] __kmalloc_cache_noprof+0x189/0x420 [ 14.466997] kasan_atomics+0x95/0x310 [ 14.467134] kunit_try_run_case+0x1a5/0x480 [ 14.467277] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.467455] kthread+0x337/0x6f0 [ 14.467576] ret_from_fork+0x116/0x1d0 [ 14.467791] ret_from_fork_asm+0x1a/0x30 [ 14.468006] [ 14.468103] The buggy address belongs to the object at ffff888102b49680 [ 14.468103] which belongs to the cache kmalloc-64 of size 64 [ 14.468943] The buggy address is located 0 bytes to the right of [ 14.468943] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.469426] [ 14.469528] The buggy address belongs to the physical page: [ 14.469764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.470074] flags: 0x200000000000000(node=0|zone=2) [ 14.470448] page_type: f5(slab) [ 14.470644] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.470911] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.471480] page dumped because: kasan: bad access detected [ 14.471701] [ 14.471796] Memory state around the buggy address: [ 14.472070] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.472330] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.472628] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.472913] ^ [ 14.473124] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.473451] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.473707] ================================================================== [ 14.660451] ================================================================== [ 14.660989] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 14.661436] Read of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.661802] [ 14.662040] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.662128] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.662141] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.662164] Call Trace: [ 14.662189] <TASK> [ 14.662205] dump_stack_lvl+0x73/0xb0 [ 14.662232] print_report+0xd1/0x650 [ 14.662266] ? __virt_addr_valid+0x1db/0x2d0 [ 14.662291] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.662313] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.662337] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.662361] kasan_report+0x141/0x180 [ 14.662385] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.662412] __asan_report_load8_noabort+0x18/0x20 [ 14.662435] kasan_atomics_helper+0x4eae/0x5450 [ 14.662467] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.662491] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.662516] ? ret_from_fork_asm+0x1a/0x30 [ 14.662548] ? kasan_atomics+0x152/0x310 [ 14.662575] kasan_atomics+0x1dc/0x310 [ 14.662598] ? __pfx_kasan_atomics+0x10/0x10 [ 14.662623] ? __pfx_read_tsc+0x10/0x10 [ 14.662645] ? ktime_get_ts64+0x86/0x230 [ 14.662678] kunit_try_run_case+0x1a5/0x480 [ 14.662700] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.662721] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.662767] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.662793] ? __kthread_parkme+0x82/0x180 [ 14.662814] ? preempt_count_sub+0x50/0x80 [ 14.662838] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.662860] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.662885] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.662921] kthread+0x337/0x6f0 [ 14.662984] ? trace_preempt_on+0x20/0xc0 [ 14.663009] ? __pfx_kthread+0x10/0x10 [ 14.663031] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.663053] ? calculate_sigpending+0x7b/0xa0 [ 14.663079] ? __pfx_kthread+0x10/0x10 [ 14.663101] ret_from_fork+0x116/0x1d0 [ 14.663120] ? __pfx_kthread+0x10/0x10 [ 14.663141] ret_from_fork_asm+0x1a/0x30 [ 14.663171] </TASK> [ 14.663183] [ 14.678320] Allocated by task 282: [ 14.678647] kasan_save_stack+0x45/0x70 [ 14.678914] kasan_save_track+0x18/0x40 [ 14.679333] kasan_save_alloc_info+0x3b/0x50 [ 14.679595] __kasan_kmalloc+0xb7/0xc0 [ 14.679812] __kmalloc_cache_noprof+0x189/0x420 [ 14.680284] kasan_atomics+0x95/0x310 [ 14.680538] kunit_try_run_case+0x1a5/0x480 [ 14.680805] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.681480] kthread+0x337/0x6f0 [ 14.681801] ret_from_fork+0x116/0x1d0 [ 14.682130] ret_from_fork_asm+0x1a/0x30 [ 14.682378] [ 14.682457] The buggy address belongs to the object at ffff888102b49680 [ 14.682457] which belongs to the cache kmalloc-64 of size 64 [ 14.683175] The buggy address is located 0 bytes to the right of [ 14.683175] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.684407] [ 14.684582] The buggy address belongs to the physical page: [ 14.685129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.685655] flags: 0x200000000000000(node=0|zone=2) [ 14.685927] page_type: f5(slab) [ 14.686442] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.686835] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.687402] page dumped because: kasan: bad access detected [ 14.687990] [ 14.688157] Memory state around the buggy address: [ 14.688606] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.689290] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.689514] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.689969] ^ [ 14.690440] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.691378] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.692125] ================================================================== [ 14.724766] ================================================================== [ 14.725456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 14.726384] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.727337] [ 14.727539] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.727584] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.727607] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.727628] Call Trace: [ 14.727644] <TASK> [ 14.727660] dump_stack_lvl+0x73/0xb0 [ 14.727697] print_report+0xd1/0x650 [ 14.727720] ? __virt_addr_valid+0x1db/0x2d0 [ 14.727753] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.727775] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.727798] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.727821] kasan_report+0x141/0x180 [ 14.727845] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.727872] __asan_report_store8_noabort+0x1b/0x30 [ 14.727904] kasan_atomics_helper+0x50d4/0x5450 [ 14.727928] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.727966] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.727992] ? ret_from_fork_asm+0x1a/0x30 [ 14.728014] ? kasan_atomics+0x152/0x310 [ 14.728041] kasan_atomics+0x1dc/0x310 [ 14.728065] ? __pfx_kasan_atomics+0x10/0x10 [ 14.728090] ? __pfx_read_tsc+0x10/0x10 [ 14.728111] ? ktime_get_ts64+0x86/0x230 [ 14.728136] kunit_try_run_case+0x1a5/0x480 [ 14.728159] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.728180] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.728206] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.728232] ? __kthread_parkme+0x82/0x180 [ 14.728253] ? preempt_count_sub+0x50/0x80 [ 14.728277] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.728300] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.728326] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.728352] kthread+0x337/0x6f0 [ 14.728372] ? trace_preempt_on+0x20/0xc0 [ 14.728396] ? __pfx_kthread+0x10/0x10 [ 14.728417] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.728440] ? calculate_sigpending+0x7b/0xa0 [ 14.728466] ? __pfx_kthread+0x10/0x10 [ 14.728488] ret_from_fork+0x116/0x1d0 [ 14.728508] ? __pfx_kthread+0x10/0x10 [ 14.728529] ret_from_fork_asm+0x1a/0x30 [ 14.728561] </TASK> [ 14.728571] [ 14.741564] Allocated by task 282: [ 14.741856] kasan_save_stack+0x45/0x70 [ 14.742321] kasan_save_track+0x18/0x40 [ 14.742721] kasan_save_alloc_info+0x3b/0x50 [ 14.743141] __kasan_kmalloc+0xb7/0xc0 [ 14.743475] __kmalloc_cache_noprof+0x189/0x420 [ 14.743648] kasan_atomics+0x95/0x310 [ 14.744046] kunit_try_run_case+0x1a5/0x480 [ 14.744484] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.745097] kthread+0x337/0x6f0 [ 14.745239] ret_from_fork+0x116/0x1d0 [ 14.745610] ret_from_fork_asm+0x1a/0x30 [ 14.745843] [ 14.746042] The buggy address belongs to the object at ffff888102b49680 [ 14.746042] which belongs to the cache kmalloc-64 of size 64 [ 14.746984] The buggy address is located 0 bytes to the right of [ 14.746984] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.747977] [ 14.748163] The buggy address belongs to the physical page: [ 14.748513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.748911] flags: 0x200000000000000(node=0|zone=2) [ 14.749416] page_type: f5(slab) [ 14.749733] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.750357] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.751210] page dumped because: kasan: bad access detected [ 14.751390] [ 14.751461] Memory state around the buggy address: [ 14.751617] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.751834] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.752445] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.753198] ^ [ 14.753728] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.754405] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.755146] ================================================================== [ 14.299380] ================================================================== [ 14.299741] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 14.300160] Read of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.300604] [ 14.300759] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.300804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.300816] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.300839] Call Trace: [ 14.300855] <TASK> [ 14.300869] dump_stack_lvl+0x73/0xb0 [ 14.300907] print_report+0xd1/0x650 [ 14.300930] ? __virt_addr_valid+0x1db/0x2d0 [ 14.300955] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.300976] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.300999] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.301022] kasan_report+0x141/0x180 [ 14.301051] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.301078] __asan_report_load4_noabort+0x18/0x20 [ 14.301100] kasan_atomics_helper+0x4a84/0x5450 [ 14.301124] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.301147] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.301172] ? ret_from_fork_asm+0x1a/0x30 [ 14.301194] ? kasan_atomics+0x152/0x310 [ 14.301222] kasan_atomics+0x1dc/0x310 [ 14.301245] ? __pfx_kasan_atomics+0x10/0x10 [ 14.301270] ? __pfx_read_tsc+0x10/0x10 [ 14.301292] ? ktime_get_ts64+0x86/0x230 [ 14.301317] kunit_try_run_case+0x1a5/0x480 [ 14.301339] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.301360] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.301386] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.301411] ? __kthread_parkme+0x82/0x180 [ 14.301433] ? preempt_count_sub+0x50/0x80 [ 14.301458] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.301480] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.301505] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.301530] kthread+0x337/0x6f0 [ 14.301551] ? trace_preempt_on+0x20/0xc0 [ 14.301576] ? __pfx_kthread+0x10/0x10 [ 14.301597] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.301633] ? calculate_sigpending+0x7b/0xa0 [ 14.301658] ? __pfx_kthread+0x10/0x10 [ 14.301680] ret_from_fork+0x116/0x1d0 [ 14.301698] ? __pfx_kthread+0x10/0x10 [ 14.301720] ret_from_fork_asm+0x1a/0x30 [ 14.301772] </TASK> [ 14.301784] [ 14.310279] Allocated by task 282: [ 14.310412] kasan_save_stack+0x45/0x70 [ 14.310601] kasan_save_track+0x18/0x40 [ 14.310793] kasan_save_alloc_info+0x3b/0x50 [ 14.311020] __kasan_kmalloc+0xb7/0xc0 [ 14.311208] __kmalloc_cache_noprof+0x189/0x420 [ 14.311429] kasan_atomics+0x95/0x310 [ 14.311734] kunit_try_run_case+0x1a5/0x480 [ 14.311882] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.312325] kthread+0x337/0x6f0 [ 14.312511] ret_from_fork+0x116/0x1d0 [ 14.312723] ret_from_fork_asm+0x1a/0x30 [ 14.313055] [ 14.313161] The buggy address belongs to the object at ffff888102b49680 [ 14.313161] which belongs to the cache kmalloc-64 of size 64 [ 14.313718] The buggy address is located 0 bytes to the right of [ 14.313718] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.314289] [ 14.314387] The buggy address belongs to the physical page: [ 14.314659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.315044] flags: 0x200000000000000(node=0|zone=2) [ 14.315321] page_type: f5(slab) [ 14.315443] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.315700] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.315976] page dumped because: kasan: bad access detected [ 14.316270] [ 14.316382] Memory state around the buggy address: [ 14.316776] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.317189] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.317506] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.317904] ^ [ 14.318177] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.318494] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.318837] ================================================================== [ 14.756122] ================================================================== [ 14.756673] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 14.757028] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.757677] [ 14.757764] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.757808] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.757822] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.757843] Call Trace: [ 14.757857] <TASK> [ 14.757870] dump_stack_lvl+0x73/0xb0 [ 14.757907] print_report+0xd1/0x650 [ 14.757930] ? __virt_addr_valid+0x1db/0x2d0 [ 14.757954] ? kasan_atomics_helper+0x151d/0x5450 [ 14.757976] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.758000] ? kasan_atomics_helper+0x151d/0x5450 [ 14.758023] kasan_report+0x141/0x180 [ 14.758046] ? kasan_atomics_helper+0x151d/0x5450 [ 14.758086] kasan_check_range+0x10c/0x1c0 [ 14.758111] __kasan_check_write+0x18/0x20 [ 14.758131] kasan_atomics_helper+0x151d/0x5450 [ 14.758168] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.758192] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.758217] ? ret_from_fork_asm+0x1a/0x30 [ 14.758240] ? kasan_atomics+0x152/0x310 [ 14.758268] kasan_atomics+0x1dc/0x310 [ 14.758293] ? __pfx_kasan_atomics+0x10/0x10 [ 14.758327] ? __pfx_read_tsc+0x10/0x10 [ 14.758349] ? ktime_get_ts64+0x86/0x230 [ 14.758372] kunit_try_run_case+0x1a5/0x480 [ 14.758413] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.758434] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.758460] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.758495] ? __kthread_parkme+0x82/0x180 [ 14.758516] ? preempt_count_sub+0x50/0x80 [ 14.758541] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.758563] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.758589] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.758615] kthread+0x337/0x6f0 [ 14.758644] ? trace_preempt_on+0x20/0xc0 [ 14.758667] ? __pfx_kthread+0x10/0x10 [ 14.758689] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.758712] ? calculate_sigpending+0x7b/0xa0 [ 14.758736] ? __pfx_kthread+0x10/0x10 [ 14.758759] ret_from_fork+0x116/0x1d0 [ 14.758779] ? __pfx_kthread+0x10/0x10 [ 14.758800] ret_from_fork_asm+0x1a/0x30 [ 14.758831] </TASK> [ 14.758842] [ 14.774211] Allocated by task 282: [ 14.774632] kasan_save_stack+0x45/0x70 [ 14.774887] kasan_save_track+0x18/0x40 [ 14.775219] kasan_save_alloc_info+0x3b/0x50 [ 14.775557] __kasan_kmalloc+0xb7/0xc0 [ 14.775990] __kmalloc_cache_noprof+0x189/0x420 [ 14.776404] kasan_atomics+0x95/0x310 [ 14.776796] kunit_try_run_case+0x1a5/0x480 [ 14.777137] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.777321] kthread+0x337/0x6f0 [ 14.777445] ret_from_fork+0x116/0x1d0 [ 14.777579] ret_from_fork_asm+0x1a/0x30 [ 14.777747] [ 14.777927] The buggy address belongs to the object at ffff888102b49680 [ 14.777927] which belongs to the cache kmalloc-64 of size 64 [ 14.779153] The buggy address is located 0 bytes to the right of [ 14.779153] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.780366] [ 14.780539] The buggy address belongs to the physical page: [ 14.781076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.781932] flags: 0x200000000000000(node=0|zone=2) [ 14.782386] page_type: f5(slab) [ 14.782611] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.783058] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.783522] page dumped because: kasan: bad access detected [ 14.783694] [ 14.783765] Memory state around the buggy address: [ 14.784783] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.786112] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.787390] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.787627] ^ [ 14.787789] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.789131] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.790371] ================================================================== [ 15.061394] ================================================================== [ 15.062190] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 15.062709] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 15.063656] [ 15.064063] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 15.064119] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.064134] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.064157] Call Trace: [ 15.064175] <TASK> [ 15.064192] dump_stack_lvl+0x73/0xb0 [ 15.064254] print_report+0xd1/0x650 [ 15.064278] ? __virt_addr_valid+0x1db/0x2d0 [ 15.064302] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.064325] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.064349] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.064371] kasan_report+0x141/0x180 [ 15.064394] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.064421] kasan_check_range+0x10c/0x1c0 [ 15.064446] __kasan_check_write+0x18/0x20 [ 15.064465] kasan_atomics_helper+0x1c18/0x5450 [ 15.064489] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.064512] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.064537] ? ret_from_fork_asm+0x1a/0x30 [ 15.064560] ? kasan_atomics+0x152/0x310 [ 15.064587] kasan_atomics+0x1dc/0x310 [ 15.064610] ? __pfx_kasan_atomics+0x10/0x10 [ 15.064656] ? __pfx_read_tsc+0x10/0x10 [ 15.064678] ? ktime_get_ts64+0x86/0x230 [ 15.064704] kunit_try_run_case+0x1a5/0x480 [ 15.064726] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.064747] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.064773] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.064799] ? __kthread_parkme+0x82/0x180 [ 15.064820] ? preempt_count_sub+0x50/0x80 [ 15.064844] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.064866] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.064899] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.064925] kthread+0x337/0x6f0 [ 15.064963] ? trace_preempt_on+0x20/0xc0 [ 15.064987] ? __pfx_kthread+0x10/0x10 [ 15.065008] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.065030] ? calculate_sigpending+0x7b/0xa0 [ 15.065061] ? __pfx_kthread+0x10/0x10 [ 15.065083] ret_from_fork+0x116/0x1d0 [ 15.065102] ? __pfx_kthread+0x10/0x10 [ 15.065123] ret_from_fork_asm+0x1a/0x30 [ 15.065153] </TASK> [ 15.065164] [ 15.079370] Allocated by task 282: [ 15.079775] kasan_save_stack+0x45/0x70 [ 15.080182] kasan_save_track+0x18/0x40 [ 15.080579] kasan_save_alloc_info+0x3b/0x50 [ 15.081055] __kasan_kmalloc+0xb7/0xc0 [ 15.081473] __kmalloc_cache_noprof+0x189/0x420 [ 15.081785] kasan_atomics+0x95/0x310 [ 15.081959] kunit_try_run_case+0x1a5/0x480 [ 15.082123] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.082592] kthread+0x337/0x6f0 [ 15.082915] ret_from_fork+0x116/0x1d0 [ 15.083141] ret_from_fork_asm+0x1a/0x30 [ 15.083491] [ 15.083610] The buggy address belongs to the object at ffff888102b49680 [ 15.083610] which belongs to the cache kmalloc-64 of size 64 [ 15.083992] The buggy address is located 0 bytes to the right of [ 15.083992] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 15.085286] [ 15.085476] The buggy address belongs to the physical page: [ 15.086039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 15.086765] flags: 0x200000000000000(node=0|zone=2) [ 15.087269] page_type: f5(slab) [ 15.087466] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.087836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.088575] page dumped because: kasan: bad access detected [ 15.089158] [ 15.089328] Memory state around the buggy address: [ 15.089635] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.089921] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.090137] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.090610] ^ [ 15.090789] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.091584] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.092265] ================================================================== [ 15.339023] ================================================================== [ 15.339355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 15.339682] Read of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 15.340100] [ 15.340206] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 15.340245] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.340257] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.340277] Call Trace: [ 15.340290] <TASK> [ 15.340303] dump_stack_lvl+0x73/0xb0 [ 15.340326] print_report+0xd1/0x650 [ 15.340348] ? __virt_addr_valid+0x1db/0x2d0 [ 15.340370] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.340391] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.340414] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.340435] kasan_report+0x141/0x180 [ 15.340458] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.340484] __asan_report_load8_noabort+0x18/0x20 [ 15.340505] kasan_atomics_helper+0x4fa5/0x5450 [ 15.340528] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.340550] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.340574] ? ret_from_fork_asm+0x1a/0x30 [ 15.340596] ? kasan_atomics+0x152/0x310 [ 15.340623] kasan_atomics+0x1dc/0x310 [ 15.340646] ? __pfx_kasan_atomics+0x10/0x10 [ 15.340670] ? __pfx_read_tsc+0x10/0x10 [ 15.340690] ? ktime_get_ts64+0x86/0x230 [ 15.340714] kunit_try_run_case+0x1a5/0x480 [ 15.340735] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.340755] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.340780] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.340804] ? __kthread_parkme+0x82/0x180 [ 15.340824] ? preempt_count_sub+0x50/0x80 [ 15.340848] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.340869] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.340904] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.340929] kthread+0x337/0x6f0 [ 15.340948] ? trace_preempt_on+0x20/0xc0 [ 15.340971] ? __pfx_kthread+0x10/0x10 [ 15.340991] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.341015] ? calculate_sigpending+0x7b/0xa0 [ 15.341038] ? __pfx_kthread+0x10/0x10 [ 15.341065] ret_from_fork+0x116/0x1d0 [ 15.341084] ? __pfx_kthread+0x10/0x10 [ 15.341105] ret_from_fork_asm+0x1a/0x30 [ 15.341135] </TASK> [ 15.341145] [ 15.348957] Allocated by task 282: [ 15.349143] kasan_save_stack+0x45/0x70 [ 15.349316] kasan_save_track+0x18/0x40 [ 15.349505] kasan_save_alloc_info+0x3b/0x50 [ 15.349743] __kasan_kmalloc+0xb7/0xc0 [ 15.349917] __kmalloc_cache_noprof+0x189/0x420 [ 15.350117] kasan_atomics+0x95/0x310 [ 15.350250] kunit_try_run_case+0x1a5/0x480 [ 15.350394] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.350569] kthread+0x337/0x6f0 [ 15.350690] ret_from_fork+0x116/0x1d0 [ 15.350821] ret_from_fork_asm+0x1a/0x30 [ 15.351038] [ 15.351134] The buggy address belongs to the object at ffff888102b49680 [ 15.351134] which belongs to the cache kmalloc-64 of size 64 [ 15.351668] The buggy address is located 0 bytes to the right of [ 15.351668] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 15.352535] [ 15.352628] The buggy address belongs to the physical page: [ 15.352882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 15.353302] flags: 0x200000000000000(node=0|zone=2) [ 15.353468] page_type: f5(slab) [ 15.353587] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.354121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.354469] page dumped because: kasan: bad access detected [ 15.354687] [ 15.356268] Memory state around the buggy address: [ 15.356563] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.357695] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.358304] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.359268] ^ [ 15.359949] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.360561] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.361498] ================================================================== [ 15.215742] ================================================================== [ 15.216100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 15.216534] Read of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 15.217113] [ 15.217324] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 15.217373] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.217394] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.217417] Call Trace: [ 15.217432] <TASK> [ 15.217448] dump_stack_lvl+0x73/0xb0 [ 15.217476] print_report+0xd1/0x650 [ 15.217500] ? __virt_addr_valid+0x1db/0x2d0 [ 15.217524] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.217548] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.217572] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.217596] kasan_report+0x141/0x180 [ 15.217744] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.217778] __asan_report_load8_noabort+0x18/0x20 [ 15.217801] kasan_atomics_helper+0x4f71/0x5450 [ 15.217825] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.217851] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.217919] ? ret_from_fork_asm+0x1a/0x30 [ 15.217943] ? kasan_atomics+0x152/0x310 [ 15.217969] kasan_atomics+0x1dc/0x310 [ 15.217993] ? __pfx_kasan_atomics+0x10/0x10 [ 15.218018] ? __pfx_read_tsc+0x10/0x10 [ 15.218040] ? ktime_get_ts64+0x86/0x230 [ 15.218066] kunit_try_run_case+0x1a5/0x480 [ 15.218088] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.218109] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.218136] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.218162] ? __kthread_parkme+0x82/0x180 [ 15.218184] ? preempt_count_sub+0x50/0x80 [ 15.218208] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.218229] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.218254] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.218281] kthread+0x337/0x6f0 [ 15.218301] ? trace_preempt_on+0x20/0xc0 [ 15.218324] ? __pfx_kthread+0x10/0x10 [ 15.218345] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.218369] ? calculate_sigpending+0x7b/0xa0 [ 15.218393] ? __pfx_kthread+0x10/0x10 [ 15.218415] ret_from_fork+0x116/0x1d0 [ 15.218435] ? __pfx_kthread+0x10/0x10 [ 15.218455] ret_from_fork_asm+0x1a/0x30 [ 15.218485] </TASK> [ 15.218497] [ 15.229263] Allocated by task 282: [ 15.229438] kasan_save_stack+0x45/0x70 [ 15.230004] kasan_save_track+0x18/0x40 [ 15.230246] kasan_save_alloc_info+0x3b/0x50 [ 15.230577] __kasan_kmalloc+0xb7/0xc0 [ 15.230945] __kmalloc_cache_noprof+0x189/0x420 [ 15.231258] kasan_atomics+0x95/0x310 [ 15.231617] kunit_try_run_case+0x1a5/0x480 [ 15.231968] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.232333] kthread+0x337/0x6f0 [ 15.232500] ret_from_fork+0x116/0x1d0 [ 15.232919] ret_from_fork_asm+0x1a/0x30 [ 15.233197] [ 15.233418] The buggy address belongs to the object at ffff888102b49680 [ 15.233418] which belongs to the cache kmalloc-64 of size 64 [ 15.234338] The buggy address is located 0 bytes to the right of [ 15.234338] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 15.235098] [ 15.235208] The buggy address belongs to the physical page: [ 15.235429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 15.236064] flags: 0x200000000000000(node=0|zone=2) [ 15.236369] page_type: f5(slab) [ 15.236652] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.237134] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.237442] page dumped because: kasan: bad access detected [ 15.237859] [ 15.238102] Memory state around the buggy address: [ 15.238400] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.238877] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.239356] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.240033] ^ [ 15.240314] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.240610] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.241276] ================================================================== [ 13.888487] ================================================================== [ 13.888873] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 13.889446] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 13.889781] [ 13.889887] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 13.889996] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.890009] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.890029] Call Trace: [ 13.890042] <TASK> [ 13.890055] dump_stack_lvl+0x73/0xb0 [ 13.890080] print_report+0xd1/0x650 [ 13.890103] ? __virt_addr_valid+0x1db/0x2d0 [ 13.890234] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.890257] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.890299] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.890322] kasan_report+0x141/0x180 [ 13.890374] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.890403] __asan_report_store4_noabort+0x1b/0x30 [ 13.890424] kasan_atomics_helper+0x4b6e/0x5450 [ 13.890463] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.890487] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.890512] ? ret_from_fork_asm+0x1a/0x30 [ 13.890535] ? kasan_atomics+0x152/0x310 [ 13.890562] kasan_atomics+0x1dc/0x310 [ 13.890585] ? __pfx_kasan_atomics+0x10/0x10 [ 13.890630] ? __pfx_read_tsc+0x10/0x10 [ 13.890652] ? ktime_get_ts64+0x86/0x230 [ 13.890677] kunit_try_run_case+0x1a5/0x480 [ 13.890699] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.890720] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.890765] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.890790] ? __kthread_parkme+0x82/0x180 [ 13.890810] ? preempt_count_sub+0x50/0x80 [ 13.890834] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.890856] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.890882] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.891025] kthread+0x337/0x6f0 [ 13.891050] ? trace_preempt_on+0x20/0xc0 [ 13.891074] ? __pfx_kthread+0x10/0x10 [ 13.891109] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.891146] ? calculate_sigpending+0x7b/0xa0 [ 13.891172] ? __pfx_kthread+0x10/0x10 [ 13.891194] ret_from_fork+0x116/0x1d0 [ 13.891212] ? __pfx_kthread+0x10/0x10 [ 13.891234] ret_from_fork_asm+0x1a/0x30 [ 13.891265] </TASK> [ 13.891276] [ 13.899298] Allocated by task 282: [ 13.899429] kasan_save_stack+0x45/0x70 [ 13.899712] kasan_save_track+0x18/0x40 [ 13.899955] kasan_save_alloc_info+0x3b/0x50 [ 13.900162] __kasan_kmalloc+0xb7/0xc0 [ 13.900356] __kmalloc_cache_noprof+0x189/0x420 [ 13.900509] kasan_atomics+0x95/0x310 [ 13.900700] kunit_try_run_case+0x1a5/0x480 [ 13.901236] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.901480] kthread+0x337/0x6f0 [ 13.901681] ret_from_fork+0x116/0x1d0 [ 13.901911] ret_from_fork_asm+0x1a/0x30 [ 13.902166] [ 13.902264] The buggy address belongs to the object at ffff888102b49680 [ 13.902264] which belongs to the cache kmalloc-64 of size 64 [ 13.902681] The buggy address is located 0 bytes to the right of [ 13.902681] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 13.903359] [ 13.903478] The buggy address belongs to the physical page: [ 13.903673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 13.904178] flags: 0x200000000000000(node=0|zone=2) [ 13.904369] page_type: f5(slab) [ 13.904555] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.904988] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.905345] page dumped because: kasan: bad access detected [ 13.905605] [ 13.905715] Memory state around the buggy address: [ 13.906111] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.906437] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.906734] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.907167] ^ [ 13.907387] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.907741] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.908126] ================================================================== [ 14.021634] ================================================================== [ 14.022330] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 14.023180] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.023902] [ 14.024153] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.024198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.024210] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.024232] Call Trace: [ 14.024246] <TASK> [ 14.024260] dump_stack_lvl+0x73/0xb0 [ 14.024288] print_report+0xd1/0x650 [ 14.024310] ? __virt_addr_valid+0x1db/0x2d0 [ 14.024334] ? kasan_atomics_helper+0x565/0x5450 [ 14.024356] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.024379] ? kasan_atomics_helper+0x565/0x5450 [ 14.024402] kasan_report+0x141/0x180 [ 14.024425] ? kasan_atomics_helper+0x565/0x5450 [ 14.024452] kasan_check_range+0x10c/0x1c0 [ 14.024476] __kasan_check_write+0x18/0x20 [ 14.024497] kasan_atomics_helper+0x565/0x5450 [ 14.024520] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.024543] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.024569] ? ret_from_fork_asm+0x1a/0x30 [ 14.024592] ? kasan_atomics+0x152/0x310 [ 14.024619] kasan_atomics+0x1dc/0x310 [ 14.024652] ? __pfx_kasan_atomics+0x10/0x10 [ 14.024676] ? __pfx_read_tsc+0x10/0x10 [ 14.024698] ? ktime_get_ts64+0x86/0x230 [ 14.024724] kunit_try_run_case+0x1a5/0x480 [ 14.024746] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.024767] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.024793] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.024818] ? __kthread_parkme+0x82/0x180 [ 14.024839] ? preempt_count_sub+0x50/0x80 [ 14.024864] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.024886] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.024925] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.024961] kthread+0x337/0x6f0 [ 14.024981] ? trace_preempt_on+0x20/0xc0 [ 14.025004] ? __pfx_kthread+0x10/0x10 [ 14.025025] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.025054] ? calculate_sigpending+0x7b/0xa0 [ 14.025079] ? __pfx_kthread+0x10/0x10 [ 14.025100] ret_from_fork+0x116/0x1d0 [ 14.025120] ? __pfx_kthread+0x10/0x10 [ 14.025142] ret_from_fork_asm+0x1a/0x30 [ 14.025173] </TASK> [ 14.025184] [ 14.038972] Allocated by task 282: [ 14.039181] kasan_save_stack+0x45/0x70 [ 14.039390] kasan_save_track+0x18/0x40 [ 14.039580] kasan_save_alloc_info+0x3b/0x50 [ 14.039755] __kasan_kmalloc+0xb7/0xc0 [ 14.039919] __kmalloc_cache_noprof+0x189/0x420 [ 14.040194] kasan_atomics+0x95/0x310 [ 14.040392] kunit_try_run_case+0x1a5/0x480 [ 14.040548] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.040752] kthread+0x337/0x6f0 [ 14.041049] ret_from_fork+0x116/0x1d0 [ 14.041276] ret_from_fork_asm+0x1a/0x30 [ 14.041460] [ 14.041559] The buggy address belongs to the object at ffff888102b49680 [ 14.041559] which belongs to the cache kmalloc-64 of size 64 [ 14.041993] The buggy address is located 0 bytes to the right of [ 14.041993] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.042817] [ 14.042925] The buggy address belongs to the physical page: [ 14.043193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.043549] flags: 0x200000000000000(node=0|zone=2) [ 14.043885] page_type: f5(slab) [ 14.044051] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.044286] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.044764] page dumped because: kasan: bad access detected [ 14.044963] [ 14.045063] Memory state around the buggy address: [ 14.045290] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.045531] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.045924] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.046276] ^ [ 14.046436] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.046926] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.047207] ================================================================== [ 14.511122] ================================================================== [ 14.511587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 14.511921] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.512330] [ 14.512417] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.512461] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.512474] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.512495] Call Trace: [ 14.512509] <TASK> [ 14.512523] dump_stack_lvl+0x73/0xb0 [ 14.512548] print_report+0xd1/0x650 [ 14.512571] ? __virt_addr_valid+0x1db/0x2d0 [ 14.512594] ? kasan_atomics_helper+0x1217/0x5450 [ 14.512639] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.512663] ? kasan_atomics_helper+0x1217/0x5450 [ 14.512686] kasan_report+0x141/0x180 [ 14.512709] ? kasan_atomics_helper+0x1217/0x5450 [ 14.512738] kasan_check_range+0x10c/0x1c0 [ 14.512762] __kasan_check_write+0x18/0x20 [ 14.512783] kasan_atomics_helper+0x1217/0x5450 [ 14.512806] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.512830] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.512855] ? ret_from_fork_asm+0x1a/0x30 [ 14.512878] ? kasan_atomics+0x152/0x310 [ 14.512914] kasan_atomics+0x1dc/0x310 [ 14.512938] ? __pfx_kasan_atomics+0x10/0x10 [ 14.512963] ? __pfx_read_tsc+0x10/0x10 [ 14.512986] ? ktime_get_ts64+0x86/0x230 [ 14.513010] kunit_try_run_case+0x1a5/0x480 [ 14.513032] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.513056] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.513082] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.513108] ? __kthread_parkme+0x82/0x180 [ 14.513128] ? preempt_count_sub+0x50/0x80 [ 14.513153] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.513175] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.513200] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.513226] kthread+0x337/0x6f0 [ 14.513246] ? trace_preempt_on+0x20/0xc0 [ 14.513270] ? __pfx_kthread+0x10/0x10 [ 14.513291] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.513315] ? calculate_sigpending+0x7b/0xa0 [ 14.513339] ? __pfx_kthread+0x10/0x10 [ 14.513361] ret_from_fork+0x116/0x1d0 [ 14.513381] ? __pfx_kthread+0x10/0x10 [ 14.513403] ret_from_fork_asm+0x1a/0x30 [ 14.513432] </TASK> [ 14.513444] [ 14.524817] Allocated by task 282: [ 14.526942] kasan_save_stack+0x45/0x70 [ 14.527181] kasan_save_track+0x18/0x40 [ 14.527753] kasan_save_alloc_info+0x3b/0x50 [ 14.527955] __kasan_kmalloc+0xb7/0xc0 [ 14.528089] __kmalloc_cache_noprof+0x189/0x420 [ 14.528242] kasan_atomics+0x95/0x310 [ 14.528372] kunit_try_run_case+0x1a5/0x480 [ 14.528578] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.528774] kthread+0x337/0x6f0 [ 14.530292] ret_from_fork+0x116/0x1d0 [ 14.530500] ret_from_fork_asm+0x1a/0x30 [ 14.531112] [ 14.531220] The buggy address belongs to the object at ffff888102b49680 [ 14.531220] which belongs to the cache kmalloc-64 of size 64 [ 14.531744] The buggy address is located 0 bytes to the right of [ 14.531744] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.532281] [ 14.532383] The buggy address belongs to the physical page: [ 14.532588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.533651] flags: 0x200000000000000(node=0|zone=2) [ 14.533863] page_type: f5(slab) [ 14.534073] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.534673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.535189] page dumped because: kasan: bad access detected [ 14.535830] [ 14.536095] Memory state around the buggy address: [ 14.536597] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.537368] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.537890] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.538653] ^ [ 14.539096] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.539481] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.539917] ================================================================== [ 14.904586] ================================================================== [ 14.904847] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 14.905539] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.906040] [ 14.906154] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.906198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.906211] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.906232] Call Trace: [ 14.906268] <TASK> [ 14.906282] dump_stack_lvl+0x73/0xb0 [ 14.906306] print_report+0xd1/0x650 [ 14.906329] ? __virt_addr_valid+0x1db/0x2d0 [ 14.906354] ? kasan_atomics_helper+0x1818/0x5450 [ 14.906376] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.906400] ? kasan_atomics_helper+0x1818/0x5450 [ 14.906440] kasan_report+0x141/0x180 [ 14.906464] ? kasan_atomics_helper+0x1818/0x5450 [ 14.906492] kasan_check_range+0x10c/0x1c0 [ 14.906517] __kasan_check_write+0x18/0x20 [ 14.906538] kasan_atomics_helper+0x1818/0x5450 [ 14.906562] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.906586] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.906624] ? ret_from_fork_asm+0x1a/0x30 [ 14.906647] ? kasan_atomics+0x152/0x310 [ 14.906674] kasan_atomics+0x1dc/0x310 [ 14.906697] ? __pfx_kasan_atomics+0x10/0x10 [ 14.906723] ? __pfx_read_tsc+0x10/0x10 [ 14.906745] ? ktime_get_ts64+0x86/0x230 [ 14.906770] kunit_try_run_case+0x1a5/0x480 [ 14.906792] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.906812] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.906838] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.906863] ? __kthread_parkme+0x82/0x180 [ 14.906883] ? preempt_count_sub+0x50/0x80 [ 14.906916] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.906956] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.906981] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.907007] kthread+0x337/0x6f0 [ 14.907027] ? trace_preempt_on+0x20/0xc0 [ 14.907050] ? __pfx_kthread+0x10/0x10 [ 14.907071] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.907094] ? calculate_sigpending+0x7b/0xa0 [ 14.907118] ? __pfx_kthread+0x10/0x10 [ 14.907140] ret_from_fork+0x116/0x1d0 [ 14.907160] ? __pfx_kthread+0x10/0x10 [ 14.907181] ret_from_fork_asm+0x1a/0x30 [ 14.907211] </TASK> [ 14.907222] [ 14.915642] Allocated by task 282: [ 14.915887] kasan_save_stack+0x45/0x70 [ 14.916195] kasan_save_track+0x18/0x40 [ 14.916375] kasan_save_alloc_info+0x3b/0x50 [ 14.916593] __kasan_kmalloc+0xb7/0xc0 [ 14.916767] __kmalloc_cache_noprof+0x189/0x420 [ 14.917091] kasan_atomics+0x95/0x310 [ 14.917258] kunit_try_run_case+0x1a5/0x480 [ 14.917467] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.917668] kthread+0x337/0x6f0 [ 14.917791] ret_from_fork+0x116/0x1d0 [ 14.917972] ret_from_fork_asm+0x1a/0x30 [ 14.918173] [ 14.918270] The buggy address belongs to the object at ffff888102b49680 [ 14.918270] which belongs to the cache kmalloc-64 of size 64 [ 14.918813] The buggy address is located 0 bytes to the right of [ 14.918813] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.919230] [ 14.919309] The buggy address belongs to the physical page: [ 14.919719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.920097] flags: 0x200000000000000(node=0|zone=2) [ 14.920313] page_type: f5(slab) [ 14.920462] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.920803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.921219] page dumped because: kasan: bad access detected [ 14.921459] [ 14.921548] Memory state around the buggy address: [ 14.921761] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.922078] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.922412] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.922728] ^ [ 14.922939] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.923294] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.923656] ================================================================== [ 14.946663] ================================================================== [ 14.947368] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 14.948066] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.948780] [ 14.949014] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.949061] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.949073] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.949094] Call Trace: [ 14.949110] <TASK> [ 14.949124] dump_stack_lvl+0x73/0xb0 [ 14.949149] print_report+0xd1/0x650 [ 14.949173] ? __virt_addr_valid+0x1db/0x2d0 [ 14.949197] ? kasan_atomics_helper+0x194a/0x5450 [ 14.949220] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.949244] ? kasan_atomics_helper+0x194a/0x5450 [ 14.949268] kasan_report+0x141/0x180 [ 14.949291] ? kasan_atomics_helper+0x194a/0x5450 [ 14.949318] kasan_check_range+0x10c/0x1c0 [ 14.949343] __kasan_check_write+0x18/0x20 [ 14.949364] kasan_atomics_helper+0x194a/0x5450 [ 14.949388] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.949411] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.949437] ? ret_from_fork_asm+0x1a/0x30 [ 14.949459] ? kasan_atomics+0x152/0x310 [ 14.949487] kasan_atomics+0x1dc/0x310 [ 14.949510] ? __pfx_kasan_atomics+0x10/0x10 [ 14.949535] ? __pfx_read_tsc+0x10/0x10 [ 14.949557] ? ktime_get_ts64+0x86/0x230 [ 14.949582] kunit_try_run_case+0x1a5/0x480 [ 14.949605] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.949634] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.949660] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.949686] ? __kthread_parkme+0x82/0x180 [ 14.949707] ? preempt_count_sub+0x50/0x80 [ 14.949731] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.949753] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.949777] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.949803] kthread+0x337/0x6f0 [ 14.949824] ? trace_preempt_on+0x20/0xc0 [ 14.949846] ? __pfx_kthread+0x10/0x10 [ 14.949868] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.949899] ? calculate_sigpending+0x7b/0xa0 [ 14.949934] ? __pfx_kthread+0x10/0x10 [ 14.949965] ret_from_fork+0x116/0x1d0 [ 14.949985] ? __pfx_kthread+0x10/0x10 [ 14.950005] ret_from_fork_asm+0x1a/0x30 [ 14.950036] </TASK> [ 14.950048] [ 14.964533] Allocated by task 282: [ 14.964689] kasan_save_stack+0x45/0x70 [ 14.964835] kasan_save_track+0x18/0x40 [ 14.964984] kasan_save_alloc_info+0x3b/0x50 [ 14.965147] __kasan_kmalloc+0xb7/0xc0 [ 14.965309] __kmalloc_cache_noprof+0x189/0x420 [ 14.965573] kasan_atomics+0x95/0x310 [ 14.965976] kunit_try_run_case+0x1a5/0x480 [ 14.966356] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.966959] kthread+0x337/0x6f0 [ 14.967294] ret_from_fork+0x116/0x1d0 [ 14.967692] ret_from_fork_asm+0x1a/0x30 [ 14.967972] [ 14.968147] The buggy address belongs to the object at ffff888102b49680 [ 14.968147] which belongs to the cache kmalloc-64 of size 64 [ 14.969204] The buggy address is located 0 bytes to the right of [ 14.969204] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.970299] [ 14.970474] The buggy address belongs to the physical page: [ 14.970765] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.971114] flags: 0x200000000000000(node=0|zone=2) [ 14.971542] page_type: f5(slab) [ 14.971867] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.972448] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.972700] page dumped because: kasan: bad access detected [ 14.973217] [ 14.973403] Memory state around the buggy address: [ 14.973875] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.974523] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.975243] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.975927] ^ [ 14.976330] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.976712] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.976935] ================================================================== [ 15.264413] ================================================================== [ 15.265079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 15.265841] Read of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 15.266264] [ 15.266352] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 15.266396] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.266408] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.266429] Call Trace: [ 15.266444] <TASK> [ 15.266458] dump_stack_lvl+0x73/0xb0 [ 15.266482] print_report+0xd1/0x650 [ 15.266504] ? __virt_addr_valid+0x1db/0x2d0 [ 15.266528] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.266551] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.266574] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.266598] kasan_report+0x141/0x180 [ 15.266621] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.266660] __asan_report_load8_noabort+0x18/0x20 [ 15.266682] kasan_atomics_helper+0x4f98/0x5450 [ 15.266706] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.266729] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.266754] ? ret_from_fork_asm+0x1a/0x30 [ 15.266776] ? kasan_atomics+0x152/0x310 [ 15.266803] kasan_atomics+0x1dc/0x310 [ 15.266826] ? __pfx_kasan_atomics+0x10/0x10 [ 15.266852] ? __pfx_read_tsc+0x10/0x10 [ 15.266874] ? ktime_get_ts64+0x86/0x230 [ 15.266909] kunit_try_run_case+0x1a5/0x480 [ 15.266931] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.266951] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.266976] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.267002] ? __kthread_parkme+0x82/0x180 [ 15.267023] ? preempt_count_sub+0x50/0x80 [ 15.267047] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.267071] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.267096] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.267122] kthread+0x337/0x6f0 [ 15.267144] ? trace_preempt_on+0x20/0xc0 [ 15.267167] ? __pfx_kthread+0x10/0x10 [ 15.267188] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.267212] ? calculate_sigpending+0x7b/0xa0 [ 15.267236] ? __pfx_kthread+0x10/0x10 [ 15.267258] ret_from_fork+0x116/0x1d0 [ 15.267277] ? __pfx_kthread+0x10/0x10 [ 15.267299] ret_from_fork_asm+0x1a/0x30 [ 15.267329] </TASK> [ 15.267340] [ 15.276234] Allocated by task 282: [ 15.276372] kasan_save_stack+0x45/0x70 [ 15.276573] kasan_save_track+0x18/0x40 [ 15.276759] kasan_save_alloc_info+0x3b/0x50 [ 15.276980] __kasan_kmalloc+0xb7/0xc0 [ 15.277252] __kmalloc_cache_noprof+0x189/0x420 [ 15.277442] kasan_atomics+0x95/0x310 [ 15.277609] kunit_try_run_case+0x1a5/0x480 [ 15.277801] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.278044] kthread+0x337/0x6f0 [ 15.278211] ret_from_fork+0x116/0x1d0 [ 15.278345] ret_from_fork_asm+0x1a/0x30 [ 15.278485] [ 15.278556] The buggy address belongs to the object at ffff888102b49680 [ 15.278556] which belongs to the cache kmalloc-64 of size 64 [ 15.279108] The buggy address is located 0 bytes to the right of [ 15.279108] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 15.279781] [ 15.279873] The buggy address belongs to the physical page: [ 15.280099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 15.280416] flags: 0x200000000000000(node=0|zone=2) [ 15.280644] page_type: f5(slab) [ 15.280794] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.281063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.281292] page dumped because: kasan: bad access detected [ 15.281541] [ 15.281641] Memory state around the buggy address: [ 15.281867] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.282208] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.282486] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.282886] ^ [ 15.283103] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.283375] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.283689] ================================================================== [ 15.363602] ================================================================== [ 15.363977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 15.364937] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 15.365284] [ 15.365372] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 15.365416] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.365429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.365449] Call Trace: [ 15.365465] <TASK> [ 15.365481] dump_stack_lvl+0x73/0xb0 [ 15.365507] print_report+0xd1/0x650 [ 15.365531] ? __virt_addr_valid+0x1db/0x2d0 [ 15.365555] ? kasan_atomics_helper+0x224c/0x5450 [ 15.365578] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.365602] ? kasan_atomics_helper+0x224c/0x5450 [ 15.365624] kasan_report+0x141/0x180 [ 15.365648] ? kasan_atomics_helper+0x224c/0x5450 [ 15.365675] kasan_check_range+0x10c/0x1c0 [ 15.365699] __kasan_check_write+0x18/0x20 [ 15.365719] kasan_atomics_helper+0x224c/0x5450 [ 15.365742] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.365765] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.365929] ? ret_from_fork_asm+0x1a/0x30 [ 15.365953] ? kasan_atomics+0x152/0x310 [ 15.365981] kasan_atomics+0x1dc/0x310 [ 15.366004] ? __pfx_kasan_atomics+0x10/0x10 [ 15.366030] ? __pfx_read_tsc+0x10/0x10 [ 15.366052] ? ktime_get_ts64+0x86/0x230 [ 15.366077] kunit_try_run_case+0x1a5/0x480 [ 15.366099] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.366120] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.366146] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.366171] ? __kthread_parkme+0x82/0x180 [ 15.366193] ? preempt_count_sub+0x50/0x80 [ 15.366217] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.366238] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.366264] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.366290] kthread+0x337/0x6f0 [ 15.366309] ? trace_preempt_on+0x20/0xc0 [ 15.366332] ? __pfx_kthread+0x10/0x10 [ 15.366353] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.366377] ? calculate_sigpending+0x7b/0xa0 [ 15.366401] ? __pfx_kthread+0x10/0x10 [ 15.366423] ret_from_fork+0x116/0x1d0 [ 15.366443] ? __pfx_kthread+0x10/0x10 [ 15.366464] ret_from_fork_asm+0x1a/0x30 [ 15.366494] </TASK> [ 15.366505] [ 15.377014] Allocated by task 282: [ 15.377388] kasan_save_stack+0x45/0x70 [ 15.377704] kasan_save_track+0x18/0x40 [ 15.377850] kasan_save_alloc_info+0x3b/0x50 [ 15.378186] __kasan_kmalloc+0xb7/0xc0 [ 15.378498] __kmalloc_cache_noprof+0x189/0x420 [ 15.378702] kasan_atomics+0x95/0x310 [ 15.379003] kunit_try_run_case+0x1a5/0x480 [ 15.379195] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.379439] kthread+0x337/0x6f0 [ 15.379600] ret_from_fork+0x116/0x1d0 [ 15.380041] ret_from_fork_asm+0x1a/0x30 [ 15.380221] [ 15.380293] The buggy address belongs to the object at ffff888102b49680 [ 15.380293] which belongs to the cache kmalloc-64 of size 64 [ 15.380954] The buggy address is located 0 bytes to the right of [ 15.380954] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 15.381591] [ 15.381855] The buggy address belongs to the physical page: [ 15.382077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 15.382525] flags: 0x200000000000000(node=0|zone=2) [ 15.382871] page_type: f5(slab) [ 15.383021] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.383335] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.383878] page dumped because: kasan: bad access detected [ 15.384140] [ 15.384217] Memory state around the buggy address: [ 15.384544] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.385022] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.385396] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.385790] ^ [ 15.385979] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.386287] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.386595] ================================================================== [ 15.303534] ================================================================== [ 15.303789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 15.304039] Read of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 15.304329] [ 15.304415] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 15.304458] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.304470] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.304490] Call Trace: [ 15.304505] <TASK> [ 15.304518] dump_stack_lvl+0x73/0xb0 [ 15.304543] print_report+0xd1/0x650 [ 15.304566] ? __virt_addr_valid+0x1db/0x2d0 [ 15.304589] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.304611] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.304635] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.304658] kasan_report+0x141/0x180 [ 15.304680] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.304709] __asan_report_load8_noabort+0x18/0x20 [ 15.304730] kasan_atomics_helper+0x4fb2/0x5450 [ 15.304753] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.304776] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.304800] ? ret_from_fork_asm+0x1a/0x30 [ 15.304823] ? kasan_atomics+0x152/0x310 [ 15.304850] kasan_atomics+0x1dc/0x310 [ 15.304874] ? __pfx_kasan_atomics+0x10/0x10 [ 15.304928] ? __pfx_read_tsc+0x10/0x10 [ 15.304951] ? ktime_get_ts64+0x86/0x230 [ 15.304975] kunit_try_run_case+0x1a5/0x480 [ 15.304998] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.305018] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.306979] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.307010] ? __kthread_parkme+0x82/0x180 [ 15.307034] ? preempt_count_sub+0x50/0x80 [ 15.307061] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.307086] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.307112] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.307138] kthread+0x337/0x6f0 [ 15.307159] ? trace_preempt_on+0x20/0xc0 [ 15.307183] ? __pfx_kthread+0x10/0x10 [ 15.307204] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.307228] ? calculate_sigpending+0x7b/0xa0 [ 15.307253] ? __pfx_kthread+0x10/0x10 [ 15.307276] ret_from_fork+0x116/0x1d0 [ 15.307295] ? __pfx_kthread+0x10/0x10 [ 15.307316] ret_from_fork_asm+0x1a/0x30 [ 15.307346] </TASK> [ 15.307358] [ 15.314142] Allocated by task 282: [ 15.314324] kasan_save_stack+0x45/0x70 [ 15.314518] kasan_save_track+0x18/0x40 [ 15.314712] kasan_save_alloc_info+0x3b/0x50 [ 15.314935] __kasan_kmalloc+0xb7/0xc0 [ 15.315097] __kmalloc_cache_noprof+0x189/0x420 [ 15.315272] kasan_atomics+0x95/0x310 [ 15.315465] kunit_try_run_case+0x1a5/0x480 [ 15.315677] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.315855] kthread+0x337/0x6f0 [ 15.316024] ret_from_fork+0x116/0x1d0 [ 15.316216] ret_from_fork_asm+0x1a/0x30 [ 15.316390] [ 15.316462] The buggy address belongs to the object at ffff888102b49680 [ 15.316462] which belongs to the cache kmalloc-64 of size 64 [ 15.317029] The buggy address is located 0 bytes to the right of [ 15.317029] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 15.317521] [ 15.317619] The buggy address belongs to the physical page: [ 15.317844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 15.318163] flags: 0x200000000000000(node=0|zone=2) [ 15.318371] page_type: f5(slab) [ 15.318511] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.318853] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.319168] page dumped because: kasan: bad access detected [ 15.319390] [ 15.319480] Memory state around the buggy address: [ 15.319668] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.320046] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.320331] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.320603] ^ [ 15.320810] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.321118] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.321463] ================================================================== [ 13.908533] ================================================================== [ 13.908919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 13.909314] Read of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 13.909648] [ 13.909776] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 13.909818] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.909831] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.909872] Call Trace: [ 13.909885] <TASK> [ 13.909907] dump_stack_lvl+0x73/0xb0 [ 13.909998] print_report+0xd1/0x650 [ 13.910046] ? __virt_addr_valid+0x1db/0x2d0 [ 13.910071] ? kasan_atomics_helper+0x3df/0x5450 [ 13.910094] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.910118] ? kasan_atomics_helper+0x3df/0x5450 [ 13.910141] kasan_report+0x141/0x180 [ 13.910164] ? kasan_atomics_helper+0x3df/0x5450 [ 13.910208] kasan_check_range+0x10c/0x1c0 [ 13.910233] __kasan_check_read+0x15/0x20 [ 13.910254] kasan_atomics_helper+0x3df/0x5450 [ 13.910277] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.910301] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.910324] ? ret_from_fork_asm+0x1a/0x30 [ 13.910363] ? kasan_atomics+0x152/0x310 [ 13.910392] kasan_atomics+0x1dc/0x310 [ 13.910415] ? __pfx_kasan_atomics+0x10/0x10 [ 13.910441] ? __pfx_read_tsc+0x10/0x10 [ 13.910463] ? ktime_get_ts64+0x86/0x230 [ 13.910488] kunit_try_run_case+0x1a5/0x480 [ 13.910510] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.910531] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.910557] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.910583] ? __kthread_parkme+0x82/0x180 [ 13.910604] ? preempt_count_sub+0x50/0x80 [ 13.910628] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.910668] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.910694] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.910720] kthread+0x337/0x6f0 [ 13.910756] ? trace_preempt_on+0x20/0xc0 [ 13.910780] ? __pfx_kthread+0x10/0x10 [ 13.910802] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.910825] ? calculate_sigpending+0x7b/0xa0 [ 13.910850] ? __pfx_kthread+0x10/0x10 [ 13.910873] ret_from_fork+0x116/0x1d0 [ 13.910900] ? __pfx_kthread+0x10/0x10 [ 13.911023] ret_from_fork_asm+0x1a/0x30 [ 13.911057] </TASK> [ 13.911070] [ 13.919733] Allocated by task 282: [ 13.919974] kasan_save_stack+0x45/0x70 [ 13.920238] kasan_save_track+0x18/0x40 [ 13.920437] kasan_save_alloc_info+0x3b/0x50 [ 13.920730] __kasan_kmalloc+0xb7/0xc0 [ 13.920979] __kmalloc_cache_noprof+0x189/0x420 [ 13.921225] kasan_atomics+0x95/0x310 [ 13.921409] kunit_try_run_case+0x1a5/0x480 [ 13.921628] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.921856] kthread+0x337/0x6f0 [ 13.922088] ret_from_fork+0x116/0x1d0 [ 13.922276] ret_from_fork_asm+0x1a/0x30 [ 13.922458] [ 13.922569] The buggy address belongs to the object at ffff888102b49680 [ 13.922569] which belongs to the cache kmalloc-64 of size 64 [ 13.923211] The buggy address is located 0 bytes to the right of [ 13.923211] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 13.923644] [ 13.923715] The buggy address belongs to the physical page: [ 13.923923] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 13.924485] flags: 0x200000000000000(node=0|zone=2) [ 13.924738] page_type: f5(slab) [ 13.924914] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.925254] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.925534] page dumped because: kasan: bad access detected [ 13.925789] [ 13.925884] Memory state around the buggy address: [ 13.926213] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.926514] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.926757] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.927107] ^ [ 13.927330] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.927691] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.928121] ================================================================== [ 14.319443] ================================================================== [ 14.319817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 14.320153] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.320469] [ 14.320554] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.320598] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.320611] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.320650] Call Trace: [ 14.320663] <TASK> [ 14.320678] dump_stack_lvl+0x73/0xb0 [ 14.320702] print_report+0xd1/0x650 [ 14.320725] ? __virt_addr_valid+0x1db/0x2d0 [ 14.320749] ? kasan_atomics_helper+0xd47/0x5450 [ 14.320771] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.320795] ? kasan_atomics_helper+0xd47/0x5450 [ 14.320818] kasan_report+0x141/0x180 [ 14.320840] ? kasan_atomics_helper+0xd47/0x5450 [ 14.320867] kasan_check_range+0x10c/0x1c0 [ 14.320901] __kasan_check_write+0x18/0x20 [ 14.320923] kasan_atomics_helper+0xd47/0x5450 [ 14.320946] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.320988] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.321013] ? ret_from_fork_asm+0x1a/0x30 [ 14.321034] ? kasan_atomics+0x152/0x310 [ 14.321065] kasan_atomics+0x1dc/0x310 [ 14.321089] ? __pfx_kasan_atomics+0x10/0x10 [ 14.321114] ? __pfx_read_tsc+0x10/0x10 [ 14.321136] ? ktime_get_ts64+0x86/0x230 [ 14.321161] kunit_try_run_case+0x1a5/0x480 [ 14.321183] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.321204] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.321231] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.321255] ? __kthread_parkme+0x82/0x180 [ 14.321276] ? preempt_count_sub+0x50/0x80 [ 14.321301] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.321323] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.321348] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.321374] kthread+0x337/0x6f0 [ 14.321394] ? trace_preempt_on+0x20/0xc0 [ 14.321417] ? __pfx_kthread+0x10/0x10 [ 14.321439] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.321462] ? calculate_sigpending+0x7b/0xa0 [ 14.321487] ? __pfx_kthread+0x10/0x10 [ 14.321509] ret_from_fork+0x116/0x1d0 [ 14.321528] ? __pfx_kthread+0x10/0x10 [ 14.321550] ret_from_fork_asm+0x1a/0x30 [ 14.321581] </TASK> [ 14.321591] [ 14.331552] Allocated by task 282: [ 14.331727] kasan_save_stack+0x45/0x70 [ 14.331933] kasan_save_track+0x18/0x40 [ 14.332200] kasan_save_alloc_info+0x3b/0x50 [ 14.332437] __kasan_kmalloc+0xb7/0xc0 [ 14.332636] __kmalloc_cache_noprof+0x189/0x420 [ 14.332854] kasan_atomics+0x95/0x310 [ 14.333057] kunit_try_run_case+0x1a5/0x480 [ 14.333268] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.333514] kthread+0x337/0x6f0 [ 14.333748] ret_from_fork+0x116/0x1d0 [ 14.333918] ret_from_fork_asm+0x1a/0x30 [ 14.334238] [ 14.334309] The buggy address belongs to the object at ffff888102b49680 [ 14.334309] which belongs to the cache kmalloc-64 of size 64 [ 14.334683] The buggy address is located 0 bytes to the right of [ 14.334683] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.335062] [ 14.335178] The buggy address belongs to the physical page: [ 14.335434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.335884] flags: 0x200000000000000(node=0|zone=2) [ 14.336424] page_type: f5(slab) [ 14.336622] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.337004] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.337514] page dumped because: kasan: bad access detected [ 14.337795] [ 14.337916] Memory state around the buggy address: [ 14.338172] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.338462] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.338714] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.338953] ^ [ 14.339202] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.339610] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.340007] ================================================================== [ 15.164005] ================================================================== [ 15.164317] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 15.164545] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 15.164907] [ 15.165045] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 15.165089] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.165101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.165123] Call Trace: [ 15.165135] <TASK> [ 15.165148] dump_stack_lvl+0x73/0xb0 [ 15.165173] print_report+0xd1/0x650 [ 15.165197] ? __virt_addr_valid+0x1db/0x2d0 [ 15.165219] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.165242] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.165265] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.165288] kasan_report+0x141/0x180 [ 15.165311] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.165338] kasan_check_range+0x10c/0x1c0 [ 15.165363] __kasan_check_write+0x18/0x20 [ 15.165383] kasan_atomics_helper+0x1eaa/0x5450 [ 15.165406] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.165430] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.165454] ? ret_from_fork_asm+0x1a/0x30 [ 15.165476] ? kasan_atomics+0x152/0x310 [ 15.165503] kasan_atomics+0x1dc/0x310 [ 15.165527] ? __pfx_kasan_atomics+0x10/0x10 [ 15.165552] ? __pfx_read_tsc+0x10/0x10 [ 15.165573] ? ktime_get_ts64+0x86/0x230 [ 15.165597] kunit_try_run_case+0x1a5/0x480 [ 15.165640] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.165661] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.165685] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.165710] ? __kthread_parkme+0x82/0x180 [ 15.165731] ? preempt_count_sub+0x50/0x80 [ 15.165755] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.165777] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.165803] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.165828] kthread+0x337/0x6f0 [ 15.165848] ? trace_preempt_on+0x20/0xc0 [ 15.165870] ? __pfx_kthread+0x10/0x10 [ 15.165901] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.165924] ? calculate_sigpending+0x7b/0xa0 [ 15.165950] ? __pfx_kthread+0x10/0x10 [ 15.165973] ret_from_fork+0x116/0x1d0 [ 15.165992] ? __pfx_kthread+0x10/0x10 [ 15.166014] ret_from_fork_asm+0x1a/0x30 [ 15.166044] </TASK> [ 15.166056] [ 15.177118] Allocated by task 282: [ 15.177285] kasan_save_stack+0x45/0x70 [ 15.177481] kasan_save_track+0x18/0x40 [ 15.177928] kasan_save_alloc_info+0x3b/0x50 [ 15.178240] __kasan_kmalloc+0xb7/0xc0 [ 15.178608] __kmalloc_cache_noprof+0x189/0x420 [ 15.178980] kasan_atomics+0x95/0x310 [ 15.179168] kunit_try_run_case+0x1a5/0x480 [ 15.179365] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.179595] kthread+0x337/0x6f0 [ 15.179761] ret_from_fork+0x116/0x1d0 [ 15.179943] ret_from_fork_asm+0x1a/0x30 [ 15.180127] [ 15.180219] The buggy address belongs to the object at ffff888102b49680 [ 15.180219] which belongs to the cache kmalloc-64 of size 64 [ 15.180698] The buggy address is located 0 bytes to the right of [ 15.180698] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 15.181839] [ 15.182084] The buggy address belongs to the physical page: [ 15.182547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 15.183044] flags: 0x200000000000000(node=0|zone=2) [ 15.183445] page_type: f5(slab) [ 15.183672] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.184133] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.184579] page dumped because: kasan: bad access detected [ 15.185008] [ 15.185253] Memory state around the buggy address: [ 15.185459] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.185942] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.186238] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.186521] ^ [ 15.187099] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.187541] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.188058] ================================================================== [ 14.277964] ================================================================== [ 14.278530] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 14.279209] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.279599] [ 14.279797] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.279863] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.279884] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.279930] Call Trace: [ 14.279949] <TASK> [ 14.279967] dump_stack_lvl+0x73/0xb0 [ 14.280014] print_report+0xd1/0x650 [ 14.280037] ? __virt_addr_valid+0x1db/0x2d0 [ 14.280061] ? kasan_atomics_helper+0xc70/0x5450 [ 14.280082] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.280106] ? kasan_atomics_helper+0xc70/0x5450 [ 14.280128] kasan_report+0x141/0x180 [ 14.280151] ? kasan_atomics_helper+0xc70/0x5450 [ 14.280178] kasan_check_range+0x10c/0x1c0 [ 14.280203] __kasan_check_write+0x18/0x20 [ 14.280223] kasan_atomics_helper+0xc70/0x5450 [ 14.280247] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.280269] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.280294] ? ret_from_fork_asm+0x1a/0x30 [ 14.280317] ? kasan_atomics+0x152/0x310 [ 14.280344] kasan_atomics+0x1dc/0x310 [ 14.280368] ? __pfx_kasan_atomics+0x10/0x10 [ 14.280393] ? __pfx_read_tsc+0x10/0x10 [ 14.280415] ? ktime_get_ts64+0x86/0x230 [ 14.280440] kunit_try_run_case+0x1a5/0x480 [ 14.280462] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.280500] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.280527] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.280553] ? __kthread_parkme+0x82/0x180 [ 14.280574] ? preempt_count_sub+0x50/0x80 [ 14.280599] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.280637] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.280673] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.280699] kthread+0x337/0x6f0 [ 14.280719] ? trace_preempt_on+0x20/0xc0 [ 14.280743] ? __pfx_kthread+0x10/0x10 [ 14.280781] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.280811] ? calculate_sigpending+0x7b/0xa0 [ 14.280836] ? __pfx_kthread+0x10/0x10 [ 14.280871] ret_from_fork+0x116/0x1d0 [ 14.280890] ? __pfx_kthread+0x10/0x10 [ 14.280934] ret_from_fork_asm+0x1a/0x30 [ 14.280976] </TASK> [ 14.280987] [ 14.289818] Allocated by task 282: [ 14.290064] kasan_save_stack+0x45/0x70 [ 14.290274] kasan_save_track+0x18/0x40 [ 14.290471] kasan_save_alloc_info+0x3b/0x50 [ 14.290707] __kasan_kmalloc+0xb7/0xc0 [ 14.290972] __kmalloc_cache_noprof+0x189/0x420 [ 14.291220] kasan_atomics+0x95/0x310 [ 14.291432] kunit_try_run_case+0x1a5/0x480 [ 14.291745] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.291965] kthread+0x337/0x6f0 [ 14.292137] ret_from_fork+0x116/0x1d0 [ 14.292341] ret_from_fork_asm+0x1a/0x30 [ 14.292483] [ 14.292557] The buggy address belongs to the object at ffff888102b49680 [ 14.292557] which belongs to the cache kmalloc-64 of size 64 [ 14.292970] The buggy address is located 0 bytes to the right of [ 14.292970] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.293558] [ 14.293658] The buggy address belongs to the physical page: [ 14.294014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.294256] flags: 0x200000000000000(node=0|zone=2) [ 14.294424] page_type: f5(slab) [ 14.294550] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.294782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.295443] page dumped because: kasan: bad access detected [ 14.296013] [ 14.296111] Memory state around the buggy address: [ 14.296335] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.296660] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.297021] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.297590] ^ [ 14.298055] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.298470] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.298776] ================================================================== [ 13.868197] ================================================================== [ 13.868529] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 13.868970] Read of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 13.869331] [ 13.869443] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 13.869485] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.869496] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.869515] Call Trace: [ 13.869527] <TASK> [ 13.869539] dump_stack_lvl+0x73/0xb0 [ 13.869564] print_report+0xd1/0x650 [ 13.869606] ? __virt_addr_valid+0x1db/0x2d0 [ 13.869648] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.869669] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.869691] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.869713] kasan_report+0x141/0x180 [ 13.869735] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.869779] __asan_report_load4_noabort+0x18/0x20 [ 13.869799] kasan_atomics_helper+0x4b88/0x5450 [ 13.869821] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.869858] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.869882] ? ret_from_fork_asm+0x1a/0x30 [ 13.869913] ? kasan_atomics+0x152/0x310 [ 13.869992] kasan_atomics+0x1dc/0x310 [ 13.870017] ? __pfx_kasan_atomics+0x10/0x10 [ 13.870041] ? __pfx_read_tsc+0x10/0x10 [ 13.870062] ? ktime_get_ts64+0x86/0x230 [ 13.870086] kunit_try_run_case+0x1a5/0x480 [ 13.870128] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.870147] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.870186] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.870225] ? __kthread_parkme+0x82/0x180 [ 13.870245] ? preempt_count_sub+0x50/0x80 [ 13.870268] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.870289] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.870313] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.870337] kthread+0x337/0x6f0 [ 13.870357] ? trace_preempt_on+0x20/0xc0 [ 13.870378] ? __pfx_kthread+0x10/0x10 [ 13.870399] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.870421] ? calculate_sigpending+0x7b/0xa0 [ 13.870445] ? __pfx_kthread+0x10/0x10 [ 13.870466] ret_from_fork+0x116/0x1d0 [ 13.870484] ? __pfx_kthread+0x10/0x10 [ 13.870504] ret_from_fork_asm+0x1a/0x30 [ 13.870533] </TASK> [ 13.870559] [ 13.879166] Allocated by task 282: [ 13.879354] kasan_save_stack+0x45/0x70 [ 13.879583] kasan_save_track+0x18/0x40 [ 13.879783] kasan_save_alloc_info+0x3b/0x50 [ 13.880006] __kasan_kmalloc+0xb7/0xc0 [ 13.880173] __kmalloc_cache_noprof+0x189/0x420 [ 13.880381] kasan_atomics+0x95/0x310 [ 13.880653] kunit_try_run_case+0x1a5/0x480 [ 13.880861] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.881212] kthread+0x337/0x6f0 [ 13.881387] ret_from_fork+0x116/0x1d0 [ 13.881550] ret_from_fork_asm+0x1a/0x30 [ 13.881786] [ 13.881907] The buggy address belongs to the object at ffff888102b49680 [ 13.881907] which belongs to the cache kmalloc-64 of size 64 [ 13.882454] The buggy address is located 0 bytes to the right of [ 13.882454] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 13.883115] [ 13.883215] The buggy address belongs to the physical page: [ 13.883453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 13.883818] flags: 0x200000000000000(node=0|zone=2) [ 13.884315] page_type: f5(slab) [ 13.884535] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.885018] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.885359] page dumped because: kasan: bad access detected [ 13.885604] [ 13.885691] Memory state around the buggy address: [ 13.885840] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.886173] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.886519] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.886913] ^ [ 13.887228] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.887541] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.887870] ================================================================== [ 14.977751] ================================================================== [ 14.978231] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 14.978885] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282 [ 14.979431] [ 14.979518] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 14.979562] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.979575] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.979596] Call Trace: [ 14.979613] <TASK> [ 14.979630] dump_stack_lvl+0x73/0xb0 [ 14.979654] print_report+0xd1/0x650 [ 14.979677] ? __virt_addr_valid+0x1db/0x2d0 [ 14.979701] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.979723] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.979747] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.979770] kasan_report+0x141/0x180 [ 14.979793] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.979820] kasan_check_range+0x10c/0x1c0 [ 14.979845] __kasan_check_write+0x18/0x20 [ 14.979866] kasan_atomics_helper+0x19e3/0x5450 [ 14.979890] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.979924] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.979960] ? ret_from_fork_asm+0x1a/0x30 [ 14.979983] ? kasan_atomics+0x152/0x310 [ 14.980010] kasan_atomics+0x1dc/0x310 [ 14.980035] ? __pfx_kasan_atomics+0x10/0x10 [ 14.980060] ? __pfx_read_tsc+0x10/0x10 [ 14.980083] ? ktime_get_ts64+0x86/0x230 [ 14.980108] kunit_try_run_case+0x1a5/0x480 [ 14.980130] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.980151] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.980177] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.980203] ? __kthread_parkme+0x82/0x180 [ 14.980224] ? preempt_count_sub+0x50/0x80 [ 14.980249] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.980270] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.980295] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.980320] kthread+0x337/0x6f0 [ 14.980341] ? trace_preempt_on+0x20/0xc0 [ 14.980364] ? __pfx_kthread+0x10/0x10 [ 14.980385] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.980408] ? calculate_sigpending+0x7b/0xa0 [ 14.980433] ? __pfx_kthread+0x10/0x10 [ 14.980456] ret_from_fork+0x116/0x1d0 [ 14.980475] ? __pfx_kthread+0x10/0x10 [ 14.980496] ret_from_fork_asm+0x1a/0x30 [ 14.980527] </TASK> [ 14.980538] [ 14.988988] Allocated by task 282: [ 14.989134] kasan_save_stack+0x45/0x70 [ 14.989302] kasan_save_track+0x18/0x40 [ 14.989439] kasan_save_alloc_info+0x3b/0x50 [ 14.989588] __kasan_kmalloc+0xb7/0xc0 [ 14.989722] __kmalloc_cache_noprof+0x189/0x420 [ 14.990153] kasan_atomics+0x95/0x310 [ 14.990331] kunit_try_run_case+0x1a5/0x480 [ 14.990496] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.990751] kthread+0x337/0x6f0 [ 14.990911] ret_from_fork+0x116/0x1d0 [ 14.991617] ret_from_fork_asm+0x1a/0x30 [ 14.991782] [ 14.991880] The buggy address belongs to the object at ffff888102b49680 [ 14.991880] which belongs to the cache kmalloc-64 of size 64 [ 14.992418] The buggy address is located 0 bytes to the right of [ 14.992418] allocated 48-byte region [ffff888102b49680, ffff888102b496b0) [ 14.993771] [ 14.994187] The buggy address belongs to the physical page: [ 14.995063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49 [ 14.996137] flags: 0x200000000000000(node=0|zone=2) [ 14.996445] page_type: f5(slab) [ 14.996598] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.996947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.997318] page dumped because: kasan: bad access detected [ 14.997572] [ 14.997716] Memory state around the buggy address: [ 14.997935] ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.998348] ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.998655] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.999012] ^ [ 14.999202] ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.999456] ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.999863] ==================================================================