Date
June 16, 2025, 7:07 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 22.730525] ================================================================== [ 22.730604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 22.730684] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.730753] [ 22.730804] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.731236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.731444] Hardware name: linux,dummy-virt (DT) [ 22.731660] Call trace: [ 22.731697] show_stack+0x20/0x38 (C) [ 22.731865] dump_stack_lvl+0x8c/0xd0 [ 22.732114] print_report+0x118/0x608 [ 22.732295] kasan_report+0xdc/0x128 [ 22.732371] kasan_check_range+0x100/0x1a8 [ 22.732437] __kasan_check_write+0x20/0x30 [ 22.732496] kasan_atomics_helper+0xe44/0x4858 [ 22.732552] kasan_atomics+0x198/0x2e0 [ 22.732605] kunit_try_run_case+0x170/0x3f0 [ 22.732659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.732719] kthread+0x328/0x630 [ 22.732768] ret_from_fork+0x10/0x20 [ 22.733248] [ 22.733281] Allocated by task 274: [ 22.733320] kasan_save_stack+0x3c/0x68 [ 22.733506] kasan_save_track+0x20/0x40 [ 22.733561] kasan_save_alloc_info+0x40/0x58 [ 22.733769] __kasan_kmalloc+0xd4/0xd8 [ 22.733843] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.733905] kasan_atomics+0xb8/0x2e0 [ 22.733955] kunit_try_run_case+0x170/0x3f0 [ 22.734005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.734214] kthread+0x328/0x630 [ 22.734436] ret_from_fork+0x10/0x20 [ 22.734503] [ 22.734534] The buggy address belongs to the object at fff00000c63bc080 [ 22.734534] which belongs to the cache kmalloc-64 of size 64 [ 22.734617] The buggy address is located 0 bytes to the right of [ 22.734617] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.734702] [ 22.734732] The buggy address belongs to the physical page: [ 22.734773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.734849] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.734916] page_type: f5(slab) [ 22.734968] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.735384] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.735451] page dumped because: kasan: bad access detected [ 22.735618] [ 22.735648] Memory state around the buggy address: [ 22.735693] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.735985] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.736118] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.736195] ^ [ 22.736460] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.736573] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.736625] ================================================================== [ 22.780148] ================================================================== [ 22.780233] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 22.780417] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.780546] [ 22.780593] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.780913] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.781039] Hardware name: linux,dummy-virt (DT) [ 22.781081] Call trace: [ 22.781114] show_stack+0x20/0x38 (C) [ 22.781172] dump_stack_lvl+0x8c/0xd0 [ 22.781333] print_report+0x118/0x608 [ 22.781436] kasan_report+0xdc/0x128 [ 22.781505] kasan_check_range+0x100/0x1a8 [ 22.781561] __kasan_check_write+0x20/0x30 [ 22.781612] kasan_atomics_helper+0x1190/0x4858 [ 22.781715] kasan_atomics+0x198/0x2e0 [ 22.781807] kunit_try_run_case+0x170/0x3f0 [ 22.781887] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.781951] kthread+0x328/0x630 [ 22.782181] ret_from_fork+0x10/0x20 [ 22.782259] [ 22.782295] Allocated by task 274: [ 22.782333] kasan_save_stack+0x3c/0x68 [ 22.782385] kasan_save_track+0x20/0x40 [ 22.782431] kasan_save_alloc_info+0x40/0x58 [ 22.782548] __kasan_kmalloc+0xd4/0xd8 [ 22.782760] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.782966] kasan_atomics+0xb8/0x2e0 [ 22.783029] kunit_try_run_case+0x170/0x3f0 [ 22.783521] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.783671] kthread+0x328/0x630 [ 22.783785] ret_from_fork+0x10/0x20 [ 22.783858] [ 22.783888] The buggy address belongs to the object at fff00000c63bc080 [ 22.783888] which belongs to the cache kmalloc-64 of size 64 [ 22.783958] The buggy address is located 0 bytes to the right of [ 22.783958] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.784031] [ 22.784059] The buggy address belongs to the physical page: [ 22.784100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.784505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.784753] page_type: f5(slab) [ 22.784904] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.784967] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.785093] page dumped because: kasan: bad access detected [ 22.785287] [ 22.785424] Memory state around the buggy address: [ 22.785624] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.785849] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.786087] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.786168] ^ [ 22.786215] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.786285] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.786425] ================================================================== [ 22.744842] ================================================================== [ 22.744896] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 22.744957] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.745016] [ 22.745061] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.745241] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.745277] Hardware name: linux,dummy-virt (DT) [ 22.745316] Call trace: [ 22.745373] show_stack+0x20/0x38 (C) [ 22.745490] dump_stack_lvl+0x8c/0xd0 [ 22.745545] print_report+0x118/0x608 [ 22.745601] kasan_report+0xdc/0x128 [ 22.745656] kasan_check_range+0x100/0x1a8 [ 22.745717] __kasan_check_write+0x20/0x30 [ 22.745774] kasan_atomics_helper+0xf20/0x4858 [ 22.745856] kasan_atomics+0x198/0x2e0 [ 22.745920] kunit_try_run_case+0x170/0x3f0 [ 22.745981] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.746047] kthread+0x328/0x630 [ 22.746102] ret_from_fork+0x10/0x20 [ 22.746190] [ 22.746217] Allocated by task 274: [ 22.746264] kasan_save_stack+0x3c/0x68 [ 22.746320] kasan_save_track+0x20/0x40 [ 22.746371] kasan_save_alloc_info+0x40/0x58 [ 22.746420] __kasan_kmalloc+0xd4/0xd8 [ 22.746468] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.746520] kasan_atomics+0xb8/0x2e0 [ 22.746565] kunit_try_run_case+0x170/0x3f0 [ 22.746615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.746669] kthread+0x328/0x630 [ 22.746710] ret_from_fork+0x10/0x20 [ 22.746758] [ 22.746788] The buggy address belongs to the object at fff00000c63bc080 [ 22.746788] which belongs to the cache kmalloc-64 of size 64 [ 22.746884] The buggy address is located 0 bytes to the right of [ 22.746884] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.746960] [ 22.746989] The buggy address belongs to the physical page: [ 22.747086] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.747162] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.747361] page_type: f5(slab) [ 22.747417] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.747483] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.747736] page dumped because: kasan: bad access detected [ 22.747821] [ 22.747922] Memory state around the buggy address: [ 22.747977] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.748040] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.748386] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.748456] ^ [ 22.748508] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.748577] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.748766] ================================================================== [ 22.794459] ================================================================== [ 22.794561] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 22.794907] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.795046] [ 22.795127] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.795312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.795373] Hardware name: linux,dummy-virt (DT) [ 22.795450] Call trace: [ 22.795480] show_stack+0x20/0x38 (C) [ 22.795540] dump_stack_lvl+0x8c/0xd0 [ 22.795592] print_report+0x118/0x608 [ 22.795647] kasan_report+0xdc/0x128 [ 22.795701] kasan_check_range+0x100/0x1a8 [ 22.795754] __kasan_check_write+0x20/0x30 [ 22.795806] kasan_atomics_helper+0x126c/0x4858 [ 22.795876] kasan_atomics+0x198/0x2e0 [ 22.795930] kunit_try_run_case+0x170/0x3f0 [ 22.795986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.796047] kthread+0x328/0x630 [ 22.796107] ret_from_fork+0x10/0x20 [ 22.796204] [ 22.796260] Allocated by task 274: [ 22.796297] kasan_save_stack+0x3c/0x68 [ 22.796347] kasan_save_track+0x20/0x40 [ 22.796393] kasan_save_alloc_info+0x40/0x58 [ 22.796438] __kasan_kmalloc+0xd4/0xd8 [ 22.796482] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.796528] kasan_atomics+0xb8/0x2e0 [ 22.796571] kunit_try_run_case+0x170/0x3f0 [ 22.796616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.796666] kthread+0x328/0x630 [ 22.796706] ret_from_fork+0x10/0x20 [ 22.796749] [ 22.796777] The buggy address belongs to the object at fff00000c63bc080 [ 22.796777] which belongs to the cache kmalloc-64 of size 64 [ 22.796852] The buggy address is located 0 bytes to the right of [ 22.796852] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.796928] [ 22.796954] The buggy address belongs to the physical page: [ 22.796993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.797053] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.797153] page_type: f5(slab) [ 22.797391] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.797655] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.797949] page dumped because: kasan: bad access detected [ 22.798075] [ 22.798191] Memory state around the buggy address: [ 22.798300] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.798359] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.798643] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.798731] ^ [ 22.798775] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.798889] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.798954] ================================================================== [ 22.764417] ================================================================== [ 22.764497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 22.764571] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.765029] [ 22.765151] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.765340] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.765461] Hardware name: linux,dummy-virt (DT) [ 22.765509] Call trace: [ 22.765677] show_stack+0x20/0x38 (C) [ 22.765758] dump_stack_lvl+0x8c/0xd0 [ 22.765900] print_report+0x118/0x608 [ 22.765969] kasan_report+0xdc/0x128 [ 22.766031] kasan_check_range+0x100/0x1a8 [ 22.766093] __kasan_check_write+0x20/0x30 [ 22.766150] kasan_atomics_helper+0x1058/0x4858 [ 22.766210] kasan_atomics+0x198/0x2e0 [ 22.766269] kunit_try_run_case+0x170/0x3f0 [ 22.766329] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.766394] kthread+0x328/0x630 [ 22.766445] ret_from_fork+0x10/0x20 [ 22.766506] [ 22.766535] Allocated by task 274: [ 22.766576] kasan_save_stack+0x3c/0x68 [ 22.766634] kasan_save_track+0x20/0x40 [ 22.766684] kasan_save_alloc_info+0x40/0x58 [ 22.766731] __kasan_kmalloc+0xd4/0xd8 [ 22.766779] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.766831] kasan_atomics+0xb8/0x2e0 [ 22.766911] kunit_try_run_case+0x170/0x3f0 [ 22.766963] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.767020] kthread+0x328/0x630 [ 22.767086] ret_from_fork+0x10/0x20 [ 22.767174] [ 22.767237] The buggy address belongs to the object at fff00000c63bc080 [ 22.767237] which belongs to the cache kmalloc-64 of size 64 [ 22.767309] The buggy address is located 0 bytes to the right of [ 22.767309] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.767382] [ 22.767410] The buggy address belongs to the physical page: [ 22.767449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.767507] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.767561] page_type: f5(slab) [ 22.767610] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.767692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.767797] page dumped because: kasan: bad access detected [ 22.767856] [ 22.767887] Memory state around the buggy address: [ 22.767932] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.767998] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.768093] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.768199] ^ [ 22.768259] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.768357] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.768419] ================================================================== [ 22.849915] ================================================================== [ 22.849992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 22.850068] Read of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.850134] [ 22.850183] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.850292] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.850332] Hardware name: linux,dummy-virt (DT) [ 22.850374] Call trace: [ 22.850408] show_stack+0x20/0x38 (C) [ 22.850471] dump_stack_lvl+0x8c/0xd0 [ 22.850531] print_report+0x118/0x608 [ 22.850592] kasan_report+0xdc/0x128 [ 22.850650] __asan_report_load8_noabort+0x20/0x30 [ 22.850712] kasan_atomics_helper+0x3db0/0x4858 [ 22.850775] kasan_atomics+0x198/0x2e0 [ 22.850833] kunit_try_run_case+0x170/0x3f0 [ 22.851622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.852191] kthread+0x328/0x630 [ 22.852307] ret_from_fork+0x10/0x20 [ 22.852630] [ 22.852906] Allocated by task 274: [ 22.852961] kasan_save_stack+0x3c/0x68 [ 22.853020] kasan_save_track+0x20/0x40 [ 22.853163] kasan_save_alloc_info+0x40/0x58 [ 22.853213] __kasan_kmalloc+0xd4/0xd8 [ 22.853261] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.853349] kasan_atomics+0xb8/0x2e0 [ 22.853449] kunit_try_run_case+0x170/0x3f0 [ 22.853695] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.853815] kthread+0x328/0x630 [ 22.853910] ret_from_fork+0x10/0x20 [ 22.853965] [ 22.853996] The buggy address belongs to the object at fff00000c63bc080 [ 22.853996] which belongs to the cache kmalloc-64 of size 64 [ 22.854074] The buggy address is located 0 bytes to the right of [ 22.854074] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.854165] [ 22.854195] The buggy address belongs to the physical page: [ 22.854240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.854309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.854370] page_type: f5(slab) [ 22.854426] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.854490] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.854546] page dumped because: kasan: bad access detected [ 22.854590] [ 22.854617] Memory state around the buggy address: [ 22.854661] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.854729] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.854803] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.854870] ^ [ 22.854936] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.855000] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.855052] ================================================================== [ 22.758637] ================================================================== [ 22.758715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 22.758785] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.758859] [ 22.758903] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.759003] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.759035] Hardware name: linux,dummy-virt (DT) [ 22.759075] Call trace: [ 22.759106] show_stack+0x20/0x38 (C) [ 22.759164] dump_stack_lvl+0x8c/0xd0 [ 22.759216] print_report+0x118/0x608 [ 22.759270] kasan_report+0xdc/0x128 [ 22.759322] kasan_check_range+0x100/0x1a8 [ 22.759379] __kasan_check_write+0x20/0x30 [ 22.759430] kasan_atomics_helper+0xff0/0x4858 [ 22.759485] kasan_atomics+0x198/0x2e0 [ 22.759537] kunit_try_run_case+0x170/0x3f0 [ 22.759592] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.759650] kthread+0x328/0x630 [ 22.759698] ret_from_fork+0x10/0x20 [ 22.759751] [ 22.759778] Allocated by task 274: [ 22.759821] kasan_save_stack+0x3c/0x68 [ 22.760586] kasan_save_track+0x20/0x40 [ 22.760697] kasan_save_alloc_info+0x40/0x58 [ 22.760745] __kasan_kmalloc+0xd4/0xd8 [ 22.760790] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.761129] kasan_atomics+0xb8/0x2e0 [ 22.761206] kunit_try_run_case+0x170/0x3f0 [ 22.761445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.761535] kthread+0x328/0x630 [ 22.761585] ret_from_fork+0x10/0x20 [ 22.761632] [ 22.761681] The buggy address belongs to the object at fff00000c63bc080 [ 22.761681] which belongs to the cache kmalloc-64 of size 64 [ 22.761753] The buggy address is located 0 bytes to the right of [ 22.761753] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.761846] [ 22.761881] The buggy address belongs to the physical page: [ 22.761926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.761993] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.762259] page_type: f5(slab) [ 22.762518] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.762598] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.762659] page dumped because: kasan: bad access detected [ 22.762848] [ 22.763078] Memory state around the buggy address: [ 22.763129] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.763188] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.763290] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.763345] ^ [ 22.763397] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.763615] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.763716] ================================================================== [ 22.749918] ================================================================== [ 22.749998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 22.750074] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.750164] [ 22.750211] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.750530] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.750582] Hardware name: linux,dummy-virt (DT) [ 22.750622] Call trace: [ 22.750692] show_stack+0x20/0x38 (C) [ 22.750811] dump_stack_lvl+0x8c/0xd0 [ 22.751231] print_report+0x118/0x608 [ 22.751294] kasan_report+0xdc/0x128 [ 22.751557] kasan_check_range+0x100/0x1a8 [ 22.751648] __kasan_check_write+0x20/0x30 [ 22.751711] kasan_atomics_helper+0xf88/0x4858 [ 22.751769] kasan_atomics+0x198/0x2e0 [ 22.751823] kunit_try_run_case+0x170/0x3f0 [ 22.751894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.751955] kthread+0x328/0x630 [ 22.752006] ret_from_fork+0x10/0x20 [ 22.752064] [ 22.752090] Allocated by task 274: [ 22.752128] kasan_save_stack+0x3c/0x68 [ 22.752181] kasan_save_track+0x20/0x40 [ 22.752228] kasan_save_alloc_info+0x40/0x58 [ 22.752273] __kasan_kmalloc+0xd4/0xd8 [ 22.752318] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.752364] kasan_atomics+0xb8/0x2e0 [ 22.752408] kunit_try_run_case+0x170/0x3f0 [ 22.752455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.752504] kthread+0x328/0x630 [ 22.752544] ret_from_fork+0x10/0x20 [ 22.752587] [ 22.752613] The buggy address belongs to the object at fff00000c63bc080 [ 22.752613] which belongs to the cache kmalloc-64 of size 64 [ 22.754224] The buggy address is located 0 bytes to the right of [ 22.754224] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.754924] [ 22.754967] The buggy address belongs to the physical page: [ 22.755429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.755515] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.756009] page_type: f5(slab) [ 22.756168] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.756545] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.756603] page dumped because: kasan: bad access detected [ 22.756645] [ 22.756674] Memory state around the buggy address: [ 22.756715] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.756769] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.756822] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.756886] ^ [ 22.756932] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.756985] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.757032] ================================================================== [ 22.787416] ================================================================== [ 22.787489] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 22.787558] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.787618] [ 22.787659] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.787761] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.787796] Hardware name: linux,dummy-virt (DT) [ 22.787845] Call trace: [ 22.787878] show_stack+0x20/0x38 (C) [ 22.787938] dump_stack_lvl+0x8c/0xd0 [ 22.787990] print_report+0x118/0x608 [ 22.788045] kasan_report+0xdc/0x128 [ 22.788100] kasan_check_range+0x100/0x1a8 [ 22.788154] __kasan_check_write+0x20/0x30 [ 22.788206] kasan_atomics_helper+0x11f8/0x4858 [ 22.788263] kasan_atomics+0x198/0x2e0 [ 22.788313] kunit_try_run_case+0x170/0x3f0 [ 22.788368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.789130] kthread+0x328/0x630 [ 22.789376] ret_from_fork+0x10/0x20 [ 22.789476] [ 22.789660] Allocated by task 274: [ 22.789749] kasan_save_stack+0x3c/0x68 [ 22.790000] kasan_save_track+0x20/0x40 [ 22.790299] kasan_save_alloc_info+0x40/0x58 [ 22.790553] __kasan_kmalloc+0xd4/0xd8 [ 22.790897] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.790951] kasan_atomics+0xb8/0x2e0 [ 22.790997] kunit_try_run_case+0x170/0x3f0 [ 22.791707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.791764] kthread+0x328/0x630 [ 22.792024] ret_from_fork+0x10/0x20 [ 22.792075] [ 22.792104] The buggy address belongs to the object at fff00000c63bc080 [ 22.792104] which belongs to the cache kmalloc-64 of size 64 [ 22.792171] The buggy address is located 0 bytes to the right of [ 22.792171] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.792243] [ 22.792268] The buggy address belongs to the physical page: [ 22.792315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.792416] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.792469] page_type: f5(slab) [ 22.792517] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.792609] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.792703] page dumped because: kasan: bad access detected [ 22.792770] [ 22.792795] Memory state around the buggy address: [ 22.792842] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.792901] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.792952] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.792996] ^ [ 22.793035] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.793089] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.793133] ================================================================== [ 22.843941] ================================================================== [ 22.844019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 22.844093] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.844158] [ 22.844206] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.844312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.844349] Hardware name: linux,dummy-virt (DT) [ 22.844389] Call trace: [ 22.844423] show_stack+0x20/0x38 (C) [ 22.844483] dump_stack_lvl+0x8c/0xd0 [ 22.844540] print_report+0x118/0x608 [ 22.844598] kasan_report+0xdc/0x128 [ 22.844649] kasan_check_range+0x100/0x1a8 [ 22.844704] __kasan_check_write+0x20/0x30 [ 22.844757] kasan_atomics_helper+0x15b4/0x4858 [ 22.844832] kasan_atomics+0x198/0x2e0 [ 22.844902] kunit_try_run_case+0x170/0x3f0 [ 22.844958] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.845021] kthread+0x328/0x630 [ 22.845069] ret_from_fork+0x10/0x20 [ 22.845126] [ 22.845154] Allocated by task 274: [ 22.845189] kasan_save_stack+0x3c/0x68 [ 22.845242] kasan_save_track+0x20/0x40 [ 22.845290] kasan_save_alloc_info+0x40/0x58 [ 22.845335] __kasan_kmalloc+0xd4/0xd8 [ 22.845380] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.845428] kasan_atomics+0xb8/0x2e0 [ 22.845474] kunit_try_run_case+0x170/0x3f0 [ 22.845522] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.845577] kthread+0x328/0x630 [ 22.845619] ret_from_fork+0x10/0x20 [ 22.845666] [ 22.845693] The buggy address belongs to the object at fff00000c63bc080 [ 22.845693] which belongs to the cache kmalloc-64 of size 64 [ 22.845764] The buggy address is located 0 bytes to the right of [ 22.845764] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.846556] [ 22.846610] The buggy address belongs to the physical page: [ 22.846668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.846952] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.847200] page_type: f5(slab) [ 22.847256] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.847324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.847377] page dumped because: kasan: bad access detected [ 22.847548] [ 22.847597] Memory state around the buggy address: [ 22.847646] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.847977] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.848226] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.848283] ^ [ 22.848642] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.848898] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.848982] ================================================================== [ 22.894814] ================================================================== [ 22.894882] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 22.894993] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.895097] [ 22.895177] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.895347] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.895407] Hardware name: linux,dummy-virt (DT) [ 22.895457] Call trace: [ 22.895487] show_stack+0x20/0x38 (C) [ 22.895541] dump_stack_lvl+0x8c/0xd0 [ 22.895595] print_report+0x118/0x608 [ 22.895646] kasan_report+0xdc/0x128 [ 22.895697] kasan_check_range+0x100/0x1a8 [ 22.895750] __kasan_check_write+0x20/0x30 [ 22.895802] kasan_atomics_helper+0x17ec/0x4858 [ 22.895865] kasan_atomics+0x198/0x2e0 [ 22.895918] kunit_try_run_case+0x170/0x3f0 [ 22.895971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.896102] kthread+0x328/0x630 [ 22.896161] ret_from_fork+0x10/0x20 [ 22.896217] [ 22.896244] Allocated by task 274: [ 22.896279] kasan_save_stack+0x3c/0x68 [ 22.896328] kasan_save_track+0x20/0x40 [ 22.896374] kasan_save_alloc_info+0x40/0x58 [ 22.896416] __kasan_kmalloc+0xd4/0xd8 [ 22.896474] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.896553] kasan_atomics+0xb8/0x2e0 [ 22.896653] kunit_try_run_case+0x170/0x3f0 [ 22.896784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.897028] kthread+0x328/0x630 [ 22.897070] ret_from_fork+0x10/0x20 [ 22.897113] [ 22.897141] The buggy address belongs to the object at fff00000c63bc080 [ 22.897141] which belongs to the cache kmalloc-64 of size 64 [ 22.897439] The buggy address is located 0 bytes to the right of [ 22.897439] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.897844] [ 22.897893] The buggy address belongs to the physical page: [ 22.897940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.898006] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.898068] page_type: f5(slab) [ 22.898467] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.898636] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.898798] page dumped because: kasan: bad access detected [ 22.898856] [ 22.898895] Memory state around the buggy address: [ 22.899091] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.899364] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.899508] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.899561] ^ [ 22.899607] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.899815] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.899876] ================================================================== [ 22.875210] ================================================================== [ 22.875270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 22.875338] Read of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.875415] [ 22.875488] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.875663] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.875724] Hardware name: linux,dummy-virt (DT) [ 22.875777] Call trace: [ 22.875808] show_stack+0x20/0x38 (C) [ 22.875887] dump_stack_lvl+0x8c/0xd0 [ 22.876000] print_report+0x118/0x608 [ 22.876052] kasan_report+0xdc/0x128 [ 22.876105] __asan_report_load8_noabort+0x20/0x30 [ 22.876159] kasan_atomics_helper+0x3e10/0x4858 [ 22.876211] kasan_atomics+0x198/0x2e0 [ 22.876264] kunit_try_run_case+0x170/0x3f0 [ 22.876318] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.876385] kthread+0x328/0x630 [ 22.876476] ret_from_fork+0x10/0x20 [ 22.876563] [ 22.876589] Allocated by task 274: [ 22.876625] kasan_save_stack+0x3c/0x68 [ 22.876718] kasan_save_track+0x20/0x40 [ 22.876850] kasan_save_alloc_info+0x40/0x58 [ 22.877130] __kasan_kmalloc+0xd4/0xd8 [ 22.877380] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.877441] kasan_atomics+0xb8/0x2e0 [ 22.877484] kunit_try_run_case+0x170/0x3f0 [ 22.877528] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.877578] kthread+0x328/0x630 [ 22.877941] ret_from_fork+0x10/0x20 [ 22.878002] [ 22.878420] The buggy address belongs to the object at fff00000c63bc080 [ 22.878420] which belongs to the cache kmalloc-64 of size 64 [ 22.878548] The buggy address is located 0 bytes to the right of [ 22.878548] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.878644] [ 22.878676] The buggy address belongs to the physical page: [ 22.878715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.878775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.878832] page_type: f5(slab) [ 22.878893] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.878952] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.879423] page dumped because: kasan: bad access detected [ 22.879479] [ 22.879907] Memory state around the buggy address: [ 22.879996] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.880057] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.880308] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.880703] ^ [ 22.880761] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.880859] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.881033] ================================================================== [ 22.698185] ================================================================== [ 22.698262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 22.698344] Read of size 4 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.698413] [ 22.698463] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.698575] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.698614] Hardware name: linux,dummy-virt (DT) [ 22.698658] Call trace: [ 22.698691] show_stack+0x20/0x38 (C) [ 22.698757] dump_stack_lvl+0x8c/0xd0 [ 22.698817] print_report+0x118/0x608 [ 22.700508] kasan_report+0xdc/0x128 [ 22.701056] __asan_report_load4_noabort+0x20/0x30 [ 22.701565] kasan_atomics_helper+0x3e04/0x4858 [ 22.701910] kasan_atomics+0x198/0x2e0 [ 22.702497] kunit_try_run_case+0x170/0x3f0 [ 22.702597] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.702673] kthread+0x328/0x630 [ 22.702729] ret_from_fork+0x10/0x20 [ 22.702794] [ 22.702823] Allocated by task 274: [ 22.702882] kasan_save_stack+0x3c/0x68 [ 22.704295] kasan_save_track+0x20/0x40 [ 22.704368] kasan_save_alloc_info+0x40/0x58 [ 22.704418] __kasan_kmalloc+0xd4/0xd8 [ 22.704466] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.704517] kasan_atomics+0xb8/0x2e0 [ 22.704561] kunit_try_run_case+0x170/0x3f0 [ 22.704604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.704654] kthread+0x328/0x630 [ 22.704695] ret_from_fork+0x10/0x20 [ 22.704736] [ 22.704766] The buggy address belongs to the object at fff00000c63bc080 [ 22.704766] which belongs to the cache kmalloc-64 of size 64 [ 22.706393] The buggy address is located 0 bytes to the right of [ 22.706393] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.707073] [ 22.707193] The buggy address belongs to the physical page: [ 22.707281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.707470] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.707545] page_type: f5(slab) [ 22.707605] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.707674] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.707724] page dumped because: kasan: bad access detected [ 22.707762] [ 22.707790] Memory state around the buggy address: [ 22.707828] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.707897] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.707950] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.707998] ^ [ 22.709560] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.710004] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.710067] ================================================================== [ 22.579748] ================================================================== [ 22.579822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 22.580216] Read of size 4 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.580293] [ 22.580566] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.580691] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.580943] Hardware name: linux,dummy-virt (DT) [ 22.581007] Call trace: [ 22.581039] show_stack+0x20/0x38 (C) [ 22.581144] dump_stack_lvl+0x8c/0xd0 [ 22.581241] print_report+0x118/0x608 [ 22.581401] kasan_report+0xdc/0x128 [ 22.581623] __asan_report_load4_noabort+0x20/0x30 [ 22.581693] kasan_atomics_helper+0x42d8/0x4858 [ 22.581767] kasan_atomics+0x198/0x2e0 [ 22.582024] kunit_try_run_case+0x170/0x3f0 [ 22.582095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.582207] kthread+0x328/0x630 [ 22.582263] ret_from_fork+0x10/0x20 [ 22.582362] [ 22.582396] Allocated by task 274: [ 22.582436] kasan_save_stack+0x3c/0x68 [ 22.582494] kasan_save_track+0x20/0x40 [ 22.582545] kasan_save_alloc_info+0x40/0x58 [ 22.583879] ret_from_fork+0x10/0x20 [ 22.584227] [ 22.584370] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.585165] Memory state around the buggy address: [ 22.585949] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.587807] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.588950] __kasan_check_write+0x20/0x30 [ 22.590333] kasan_save_stack+0x3c/0x68 [ 22.590683] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.590736] kasan_atomics+0xb8/0x2e0 [ 22.590784] kunit_try_run_case+0x170/0x3f0 [ 22.590847] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.590911] kthread+0x328/0x630 [ 22.590956] ret_from_fork+0x10/0x20 [ 22.591028] [ 22.591058] The buggy address belongs to the object at fff00000c63bc080 [ 22.591058] which belongs to the cache kmalloc-64 of size 64 [ 22.591149] The buggy address is located 0 bytes to the right of [ 22.591149] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.591234] [ 22.591275] The buggy address belongs to the physical page: [ 22.591324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.591391] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.591461] page_type: f5(slab) [ 22.591529] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.591594] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.591647] page dumped because: kasan: bad access detected [ 22.591691] [ 22.591725] Memory state around the buggy address: [ 22.591774] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.591830] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.591925] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.591974] ^ [ 22.592019] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.592458] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.592535] ================================================================== [ 22.741423] ================================================================== [ 22.741481] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 22.741548] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.741609] [ 22.741652] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.741759] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.741795] Hardware name: linux,dummy-virt (DT) [ 22.741860] Call trace: [ 22.741896] show_stack+0x20/0x38 (C) [ 22.741959] dump_stack_lvl+0x8c/0xd0 [ 22.742021] print_report+0x118/0x608 [ 22.742081] kasan_report+0xdc/0x128 [ 22.742140] kasan_check_range+0x100/0x1a8 [ 22.742201] __kasan_check_write+0x20/0x30 [ 22.742260] kasan_atomics_helper+0xeb8/0x4858 [ 22.742320] kasan_atomics+0x198/0x2e0 [ 22.742375] kunit_try_run_case+0x170/0x3f0 [ 22.742434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.742498] kthread+0x328/0x630 [ 22.742547] ret_from_fork+0x10/0x20 [ 22.742608] [ 22.742635] Allocated by task 274: [ 22.742674] kasan_save_stack+0x3c/0x68 [ 22.742730] kasan_save_track+0x20/0x40 [ 22.742781] kasan_save_alloc_info+0x40/0x58 [ 22.742832] __kasan_kmalloc+0xd4/0xd8 [ 22.742928] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.742982] kasan_atomics+0xb8/0x2e0 [ 22.743243] kunit_try_run_case+0x170/0x3f0 [ 22.743304] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.743361] kthread+0x328/0x630 [ 22.743405] ret_from_fork+0x10/0x20 [ 22.743452] [ 22.743480] The buggy address belongs to the object at fff00000c63bc080 [ 22.743480] which belongs to the cache kmalloc-64 of size 64 [ 22.743552] The buggy address is located 0 bytes to the right of [ 22.743552] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.743629] [ 22.743657] The buggy address belongs to the physical page: [ 22.743751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.743821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.743896] page_type: f5(slab) [ 22.743948] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.744050] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.744144] page dumped because: kasan: bad access detected [ 22.744219] [ 22.744275] Memory state around the buggy address: [ 22.744342] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.744451] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.744507] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.744557] ^ [ 22.744600] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.744657] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.744706] ================================================================== [ 22.737776] ================================================================== [ 22.737881] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 22.737964] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.738033] [ 22.738082] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.738189] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.738229] Hardware name: linux,dummy-virt (DT) [ 22.738274] Call trace: [ 22.738307] show_stack+0x20/0x38 (C) [ 22.738373] dump_stack_lvl+0x8c/0xd0 [ 22.738435] print_report+0x118/0x608 [ 22.738496] kasan_report+0xdc/0x128 [ 22.738563] __asan_report_store8_noabort+0x20/0x30 [ 22.738678] kasan_atomics_helper+0x3e5c/0x4858 [ 22.738786] kasan_atomics+0x198/0x2e0 [ 22.738919] kunit_try_run_case+0x170/0x3f0 [ 22.738983] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.739049] kthread+0x328/0x630 [ 22.739104] ret_from_fork+0x10/0x20 [ 22.739167] [ 22.739194] Allocated by task 274: [ 22.739237] kasan_save_stack+0x3c/0x68 [ 22.739292] kasan_save_track+0x20/0x40 [ 22.739339] kasan_save_alloc_info+0x40/0x58 [ 22.739384] __kasan_kmalloc+0xd4/0xd8 [ 22.739436] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.739520] kasan_atomics+0xb8/0x2e0 [ 22.739564] kunit_try_run_case+0x170/0x3f0 [ 22.739610] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.739701] kthread+0x328/0x630 [ 22.739777] ret_from_fork+0x10/0x20 [ 22.739859] [ 22.739887] The buggy address belongs to the object at fff00000c63bc080 [ 22.739887] which belongs to the cache kmalloc-64 of size 64 [ 22.739955] The buggy address is located 0 bytes to the right of [ 22.739955] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.740026] [ 22.740052] The buggy address belongs to the physical page: [ 22.740092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.740153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.740213] page_type: f5(slab) [ 22.740311] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.740377] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.740427] page dumped because: kasan: bad access detected [ 22.740467] [ 22.740490] Memory state around the buggy address: [ 22.740532] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.740597] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.740675] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.740722] ^ [ 22.740765] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.740871] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.740922] ================================================================== [ 22.594200] ================================================================== [ 22.594283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 22.594358] Write of size 4 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.594422] [ 22.594467] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.594574] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.594609] Hardware name: linux,dummy-virt (DT) [ 22.594651] Call trace: [ 22.594685] show_stack+0x20/0x38 (C) [ 22.594747] dump_stack_lvl+0x8c/0xd0 [ 22.594805] print_report+0x118/0x608 [ 22.594882] kasan_report+0xdc/0x128 [ 22.596118] kasan_check_range+0x100/0x1a8 [ 22.596230] __kasan_check_write+0x20/0x30 [ 22.596511] kasan_atomics_helper+0x99c/0x4858 [ 22.596611] kasan_atomics+0x198/0x2e0 [ 22.596677] kunit_try_run_case+0x170/0x3f0 [ 22.596955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.597057] kthread+0x328/0x630 [ 22.597144] ret_from_fork+0x10/0x20 [ 22.597211] [ 22.597455] Allocated by task 274: [ 22.597519] kasan_save_stack+0x3c/0x68 [ 22.597589] kasan_save_track+0x20/0x40 [ 22.597652] kasan_save_alloc_info+0x40/0x58 [ 22.597699] __kasan_kmalloc+0xd4/0xd8 [ 22.597754] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.597803] kasan_atomics+0xb8/0x2e0 [ 22.598106] kunit_try_run_case+0x170/0x3f0 [ 22.598208] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.598481] kthread+0x328/0x630 [ 22.598539] ret_from_fork+0x10/0x20 [ 22.598846] [ 22.598975] The buggy address belongs to the object at fff00000c63bc080 [ 22.598975] which belongs to the cache kmalloc-64 of size 64 [ 22.599072] The buggy address is located 0 bytes to the right of [ 22.599072] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.599146] [ 22.599305] The buggy address belongs to the physical page: [ 22.599502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.600441] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.600802] ^ [ 22.601134] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.603470] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.604628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.606851] The buggy address is located 0 bytes to the right of [ 22.606851] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.607000] [ 22.607032] The buggy address belongs to the physical page: [ 22.607614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.608137] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.608276] page_type: f5(slab) [ 22.608441] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.608523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.608576] page dumped because: kasan: bad access detected [ 22.608617] [ 22.608642] Memory state around the buggy address: [ 22.608945] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.609139] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.609223] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.609275] ^ [ 22.609469] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.609530] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.609582] ================================================================== [ 22.723352] ================================================================== [ 22.723429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 22.723499] Read of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.723561] [ 22.723613] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.723712] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.723747] Hardware name: linux,dummy-virt (DT) [ 22.723787] Call trace: [ 22.723818] show_stack+0x20/0x38 (C) [ 22.723898] dump_stack_lvl+0x8c/0xd0 [ 22.723957] print_report+0x118/0x608 [ 22.724013] kasan_report+0xdc/0x128 [ 22.724070] __asan_report_load8_noabort+0x20/0x30 [ 22.724595] kasan_atomics_helper+0x3f58/0x4858 [ 22.724939] kasan_atomics+0x198/0x2e0 [ 22.725016] kunit_try_run_case+0x170/0x3f0 [ 22.725122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.725337] kthread+0x328/0x630 [ 22.725406] ret_from_fork+0x10/0x20 [ 22.725659] [ 22.725695] Allocated by task 274: [ 22.725743] kasan_save_stack+0x3c/0x68 [ 22.725822] kasan_save_track+0x20/0x40 [ 22.725892] kasan_save_alloc_info+0x40/0x58 [ 22.725944] __kasan_kmalloc+0xd4/0xd8 [ 22.726104] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.726207] kasan_atomics+0xb8/0x2e0 [ 22.726475] kunit_try_run_case+0x170/0x3f0 [ 22.726616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.726715] kthread+0x328/0x630 [ 22.726762] ret_from_fork+0x10/0x20 [ 22.726808] [ 22.726889] The buggy address belongs to the object at fff00000c63bc080 [ 22.726889] which belongs to the cache kmalloc-64 of size 64 [ 22.726967] The buggy address is located 0 bytes to the right of [ 22.726967] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.727047] [ 22.727080] The buggy address belongs to the physical page: [ 22.727225] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.727520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.727587] page_type: f5(slab) [ 22.727689] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.727815] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.727922] page dumped because: kasan: bad access detected [ 22.727998] [ 22.728044] Memory state around the buggy address: [ 22.728089] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.728147] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.728204] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.728254] ^ [ 22.728554] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.728633] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.728753] ================================================================== [ 22.863314] ================================================================== [ 22.863384] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 22.863454] Read of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.863515] [ 22.863561] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.863661] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.863695] Hardware name: linux,dummy-virt (DT) [ 22.863736] Call trace: [ 22.863766] show_stack+0x20/0x38 (C) [ 22.863826] dump_stack_lvl+0x8c/0xd0 [ 22.864954] print_report+0x118/0x608 [ 22.865087] kasan_report+0xdc/0x128 [ 22.865149] __asan_report_load8_noabort+0x20/0x30 [ 22.865205] kasan_atomics_helper+0x3df4/0x4858 [ 22.865274] kasan_atomics+0x198/0x2e0 [ 22.865353] kunit_try_run_case+0x170/0x3f0 [ 22.865425] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.865519] kthread+0x328/0x630 [ 22.865592] ret_from_fork+0x10/0x20 [ 22.865654] [ 22.865749] Allocated by task 274: [ 22.865792] kasan_save_stack+0x3c/0x68 [ 22.865872] kasan_save_track+0x20/0x40 [ 22.865936] kasan_save_alloc_info+0x40/0x58 [ 22.866002] __kasan_kmalloc+0xd4/0xd8 [ 22.866059] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.866194] kasan_atomics+0xb8/0x2e0 [ 22.866248] kunit_try_run_case+0x170/0x3f0 [ 22.866298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.866354] kthread+0x328/0x630 [ 22.866398] ret_from_fork+0x10/0x20 [ 22.866444] [ 22.866473] The buggy address belongs to the object at fff00000c63bc080 [ 22.866473] which belongs to the cache kmalloc-64 of size 64 [ 22.867426] The buggy address is located 0 bytes to the right of [ 22.867426] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.867542] [ 22.867722] The buggy address belongs to the physical page: [ 22.867886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.868008] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.868221] page_type: f5(slab) [ 22.868341] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.868819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.868887] page dumped because: kasan: bad access detected [ 22.869014] [ 22.869111] Memory state around the buggy address: [ 22.869326] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.869386] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.869439] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.869485] ^ [ 22.869527] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.869599] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.869644] ================================================================== [ 22.822688] ================================================================== [ 22.822978] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 22.823060] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.823320] [ 22.823580] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.823979] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.824022] Hardware name: linux,dummy-virt (DT) [ 22.824068] Call trace: [ 22.824254] show_stack+0x20/0x38 (C) [ 22.824343] dump_stack_lvl+0x8c/0xd0 [ 22.824492] print_report+0x118/0x608 [ 22.824549] kasan_report+0xdc/0x128 [ 22.824798] kasan_check_range+0x100/0x1a8 [ 22.824969] __kasan_check_write+0x20/0x30 [ 22.825030] kasan_atomics_helper+0x147c/0x4858 [ 22.825376] kasan_atomics+0x198/0x2e0 [ 22.825469] kunit_try_run_case+0x170/0x3f0 [ 22.825530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.825639] kthread+0x328/0x630 [ 22.825709] ret_from_fork+0x10/0x20 [ 22.825771] [ 22.825801] Allocated by task 274: [ 22.825862] kasan_save_stack+0x3c/0x68 [ 22.825929] kasan_save_track+0x20/0x40 [ 22.825982] kasan_save_alloc_info+0x40/0x58 [ 22.826032] __kasan_kmalloc+0xd4/0xd8 [ 22.826083] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.826175] kasan_atomics+0xb8/0x2e0 [ 22.826251] kunit_try_run_case+0x170/0x3f0 [ 22.826317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.826374] kthread+0x328/0x630 [ 22.826417] ret_from_fork+0x10/0x20 [ 22.826463] [ 22.827985] The buggy address belongs to the object at fff00000c63bc080 [ 22.827985] which belongs to the cache kmalloc-64 of size 64 [ 22.828175] The buggy address is located 0 bytes to the right of [ 22.828175] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.828539] [ 22.828873] The buggy address belongs to the physical page: [ 22.829018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.829098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.829356] page_type: f5(slab) [ 22.829513] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.829596] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.829653] page dumped because: kasan: bad access detected [ 22.829698] [ 22.829725] Memory state around the buggy address: [ 22.829769] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.829899] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.830294] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.830442] ^ [ 22.830497] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.830631] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.830696] ================================================================== [ 22.679674] ================================================================== [ 22.679744] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 22.681588] Write of size 4 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.682492] [ 22.682787] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.683415] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.683592] Hardware name: linux,dummy-virt (DT) [ 22.683866] Call trace: [ 22.684172] show_stack+0x20/0x38 (C) [ 22.684311] dump_stack_lvl+0x8c/0xd0 [ 22.684374] print_report+0x118/0x608 [ 22.685318] kasan_report+0xdc/0x128 [ 22.685574] kasan_check_range+0x100/0x1a8 [ 22.685646] __kasan_check_write+0x20/0x30 [ 22.685707] kasan_atomics_helper+0xd3c/0x4858 [ 22.685770] kasan_atomics+0x198/0x2e0 [ 22.686892] kunit_try_run_case+0x170/0x3f0 [ 22.687058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.687130] kthread+0x328/0x630 [ 22.687187] ret_from_fork+0x10/0x20 [ 22.687248] [ 22.687279] Allocated by task 274: [ 22.688413] kasan_save_stack+0x3c/0x68 [ 22.688494] kasan_save_track+0x20/0x40 [ 22.688549] kasan_save_alloc_info+0x40/0x58 [ 22.689245] __kasan_kmalloc+0xd4/0xd8 [ 22.689333] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.689400] kasan_atomics+0xb8/0x2e0 [ 22.690063] kunit_try_run_case+0x170/0x3f0 [ 22.690268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.690329] kthread+0x328/0x630 [ 22.690377] ret_from_fork+0x10/0x20 [ 22.690426] [ 22.691134] The buggy address belongs to the object at fff00000c63bc080 [ 22.691134] which belongs to the cache kmalloc-64 of size 64 [ 22.691382] The buggy address is located 0 bytes to the right of [ 22.691382] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.691950] [ 22.692347] The buggy address belongs to the physical page: [ 22.692455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.692661] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.692973] page_type: f5(slab) [ 22.693236] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.693511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.693705] page dumped because: kasan: bad access detected [ 22.693991] [ 22.694149] Memory state around the buggy address: [ 22.694235] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.694303] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.694689] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.695212] ^ [ 22.695324] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.695386] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.695445] ================================================================== [ 22.711958] ================================================================== [ 22.712042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 22.712116] Read of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.712182] [ 22.712231] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.712342] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.712381] Hardware name: linux,dummy-virt (DT) [ 22.712424] Call trace: [ 22.712458] show_stack+0x20/0x38 (C) [ 22.712523] dump_stack_lvl+0x8c/0xd0 [ 22.712585] print_report+0x118/0x608 [ 22.712642] kasan_report+0xdc/0x128 [ 22.712700] kasan_check_range+0x100/0x1a8 [ 22.712762] __kasan_check_read+0x20/0x30 [ 22.712818] kasan_atomics_helper+0xdd4/0x4858 [ 22.714746] kasan_atomics+0x198/0x2e0 [ 22.714822] kunit_try_run_case+0x170/0x3f0 [ 22.715494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.715974] kthread+0x328/0x630 [ 22.716286] ret_from_fork+0x10/0x20 [ 22.716915] [ 22.717231] Allocated by task 274: [ 22.717711] kasan_save_stack+0x3c/0x68 [ 22.718574] kasan_save_track+0x20/0x40 [ 22.718789] kasan_save_alloc_info+0x40/0x58 [ 22.719273] __kasan_kmalloc+0xd4/0xd8 [ 22.719363] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.719455] kasan_atomics+0xb8/0x2e0 [ 22.719698] kunit_try_run_case+0x170/0x3f0 [ 22.719916] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.719972] kthread+0x328/0x630 [ 22.720135] ret_from_fork+0x10/0x20 [ 22.720267] [ 22.720341] The buggy address belongs to the object at fff00000c63bc080 [ 22.720341] which belongs to the cache kmalloc-64 of size 64 [ 22.720414] The buggy address is located 0 bytes to the right of [ 22.720414] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.720485] [ 22.720513] The buggy address belongs to the physical page: [ 22.720555] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.720616] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.720675] page_type: f5(slab) [ 22.720726] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.720938] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.721004] page dumped because: kasan: bad access detected [ 22.721046] [ 22.721178] Memory state around the buggy address: [ 22.721257] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.721416] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.721473] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.721663] ^ [ 22.721718] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.721932] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.722006] ================================================================== [ 22.807589] ================================================================== [ 22.807664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 22.807735] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.807982] [ 22.808058] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.808186] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.808224] Hardware name: linux,dummy-virt (DT) [ 22.808268] Call trace: [ 22.808301] show_stack+0x20/0x38 (C) [ 22.808374] dump_stack_lvl+0x8c/0xd0 [ 22.808432] print_report+0x118/0x608 [ 22.808491] kasan_report+0xdc/0x128 [ 22.808547] kasan_check_range+0x100/0x1a8 [ 22.808606] __kasan_check_write+0x20/0x30 [ 22.808663] kasan_atomics_helper+0x1384/0x4858 [ 22.808722] kasan_atomics+0x198/0x2e0 [ 22.808782] kunit_try_run_case+0x170/0x3f0 [ 22.808858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.808925] kthread+0x328/0x630 [ 22.808973] ret_from_fork+0x10/0x20 [ 22.809032] [ 22.809061] Allocated by task 274: [ 22.809096] kasan_save_stack+0x3c/0x68 [ 22.809150] kasan_save_track+0x20/0x40 [ 22.809197] kasan_save_alloc_info+0x40/0x58 [ 22.809241] __kasan_kmalloc+0xd4/0xd8 [ 22.809286] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.809333] kasan_atomics+0xb8/0x2e0 [ 22.809379] kunit_try_run_case+0x170/0x3f0 [ 22.809426] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.809477] kthread+0x328/0x630 [ 22.809520] ret_from_fork+0x10/0x20 [ 22.809565] [ 22.809591] The buggy address belongs to the object at fff00000c63bc080 [ 22.809591] which belongs to the cache kmalloc-64 of size 64 [ 22.809660] The buggy address is located 0 bytes to the right of [ 22.809660] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.809739] [ 22.809767] The buggy address belongs to the physical page: [ 22.810324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.810407] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.810591] page_type: f5(slab) [ 22.810657] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.810981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.811048] page dumped because: kasan: bad access detected [ 22.811092] [ 22.811262] Memory state around the buggy address: [ 22.811313] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.811370] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.811423] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.811512] ^ [ 22.811567] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.811618] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.811663] ================================================================== [ 22.817251] ================================================================== [ 22.817457] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 22.817528] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.817609] [ 22.817654] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.817751] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.817782] Hardware name: linux,dummy-virt (DT) [ 22.817844] Call trace: [ 22.817881] show_stack+0x20/0x38 (C) [ 22.818175] dump_stack_lvl+0x8c/0xd0 [ 22.818255] print_report+0x118/0x608 [ 22.818317] kasan_report+0xdc/0x128 [ 22.818752] kasan_check_range+0x100/0x1a8 [ 22.818865] __kasan_check_write+0x20/0x30 [ 22.818936] kasan_atomics_helper+0x1414/0x4858 [ 22.818998] kasan_atomics+0x198/0x2e0 [ 22.819050] kunit_try_run_case+0x170/0x3f0 [ 22.819106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.819165] kthread+0x328/0x630 [ 22.819214] ret_from_fork+0x10/0x20 [ 22.819270] [ 22.819298] Allocated by task 274: [ 22.819333] kasan_save_stack+0x3c/0x68 [ 22.819384] kasan_save_track+0x20/0x40 [ 22.819430] kasan_save_alloc_info+0x40/0x58 [ 22.819474] __kasan_kmalloc+0xd4/0xd8 [ 22.819517] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.819562] kasan_atomics+0xb8/0x2e0 [ 22.819604] kunit_try_run_case+0x170/0x3f0 [ 22.819650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.819701] kthread+0x328/0x630 [ 22.819740] ret_from_fork+0x10/0x20 [ 22.819783] [ 22.819808] The buggy address belongs to the object at fff00000c63bc080 [ 22.819808] which belongs to the cache kmalloc-64 of size 64 [ 22.819886] The buggy address is located 0 bytes to the right of [ 22.819886] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.819960] [ 22.819986] The buggy address belongs to the physical page: [ 22.820026] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.820083] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.820138] page_type: f5(slab) [ 22.820185] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.820247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.820295] page dumped because: kasan: bad access detected [ 22.820334] [ 22.820358] Memory state around the buggy address: [ 22.820398] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.820450] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.820500] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.820545] ^ [ 22.820588] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.820640] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.820686] ================================================================== [ 22.870856] ================================================================== [ 22.870983] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 22.871065] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.871130] [ 22.871175] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.871276] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.871311] Hardware name: linux,dummy-virt (DT) [ 22.871349] Call trace: [ 22.871382] show_stack+0x20/0x38 (C) [ 22.871440] dump_stack_lvl+0x8c/0xd0 [ 22.871495] print_report+0x118/0x608 [ 22.871549] kasan_report+0xdc/0x128 [ 22.871603] kasan_check_range+0x100/0x1a8 [ 22.871660] __kasan_check_write+0x20/0x30 [ 22.871711] kasan_atomics_helper+0x16d0/0x4858 [ 22.871768] kasan_atomics+0x198/0x2e0 [ 22.871824] kunit_try_run_case+0x170/0x3f0 [ 22.871943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.872211] kthread+0x328/0x630 [ 22.872296] ret_from_fork+0x10/0x20 [ 22.872358] [ 22.872386] Allocated by task 274: [ 22.872423] kasan_save_stack+0x3c/0x68 [ 22.872475] kasan_save_track+0x20/0x40 [ 22.872521] kasan_save_alloc_info+0x40/0x58 [ 22.872564] __kasan_kmalloc+0xd4/0xd8 [ 22.872607] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.872653] kasan_atomics+0xb8/0x2e0 [ 22.872695] kunit_try_run_case+0x170/0x3f0 [ 22.872738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.872788] kthread+0x328/0x630 [ 22.872825] ret_from_fork+0x10/0x20 [ 22.872887] [ 22.872913] The buggy address belongs to the object at fff00000c63bc080 [ 22.872913] which belongs to the cache kmalloc-64 of size 64 [ 22.872978] The buggy address is located 0 bytes to the right of [ 22.872978] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.873047] [ 22.873075] The buggy address belongs to the physical page: [ 22.873112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.873171] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.873226] page_type: f5(slab) [ 22.873270] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.873327] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.873375] page dumped because: kasan: bad access detected [ 22.873413] [ 22.873436] Memory state around the buggy address: [ 22.873474] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.873523] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.873692] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.873884] ^ [ 22.873946] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.874004] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.874604] ================================================================== [ 22.836736] ================================================================== [ 22.836866] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 22.836952] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.837017] [ 22.837063] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.837981] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.838023] Hardware name: linux,dummy-virt (DT) [ 22.838066] Call trace: [ 22.838102] show_stack+0x20/0x38 (C) [ 22.838168] dump_stack_lvl+0x8c/0xd0 [ 22.838229] print_report+0x118/0x608 [ 22.838290] kasan_report+0xdc/0x128 [ 22.838348] kasan_check_range+0x100/0x1a8 [ 22.838409] __kasan_check_write+0x20/0x30 [ 22.838468] kasan_atomics_helper+0x154c/0x4858 [ 22.838530] kasan_atomics+0x198/0x2e0 [ 22.838590] kunit_try_run_case+0x170/0x3f0 [ 22.838652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.838720] kthread+0x328/0x630 [ 22.838773] ret_from_fork+0x10/0x20 [ 22.838852] [ 22.838889] Allocated by task 274: [ 22.838930] kasan_save_stack+0x3c/0x68 [ 22.838990] kasan_save_track+0x20/0x40 [ 22.839043] kasan_save_alloc_info+0x40/0x58 [ 22.839162] __kasan_kmalloc+0xd4/0xd8 [ 22.839477] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.839590] kasan_atomics+0xb8/0x2e0 [ 22.839645] kunit_try_run_case+0x170/0x3f0 [ 22.839700] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.839758] kthread+0x328/0x630 [ 22.839805] ret_from_fork+0x10/0x20 [ 22.839868] [ 22.839900] The buggy address belongs to the object at fff00000c63bc080 [ 22.839900] which belongs to the cache kmalloc-64 of size 64 [ 22.839976] The buggy address is located 0 bytes to the right of [ 22.839976] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.840969] [ 22.841013] The buggy address belongs to the physical page: [ 22.841063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.841142] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.841514] page_type: f5(slab) [ 22.841613] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.841877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.841977] page dumped because: kasan: bad access detected [ 22.842035] [ 22.842067] Memory state around the buggy address: [ 22.842151] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.842333] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.842454] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.842506] ^ [ 22.842738] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.842816] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.842883] ================================================================== [ 22.888082] ================================================================== [ 22.888206] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 22.888334] Read of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.888394] [ 22.888435] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.888532] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.888564] Hardware name: linux,dummy-virt (DT) [ 22.888603] Call trace: [ 22.888631] show_stack+0x20/0x38 (C) [ 22.888692] dump_stack_lvl+0x8c/0xd0 [ 22.888742] print_report+0x118/0x608 [ 22.888817] kasan_report+0xdc/0x128 [ 22.888884] __asan_report_load8_noabort+0x20/0x30 [ 22.888941] kasan_atomics_helper+0x3e20/0x4858 [ 22.889227] kasan_atomics+0x198/0x2e0 [ 22.889342] kunit_try_run_case+0x170/0x3f0 [ 22.889414] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.889607] kthread+0x328/0x630 [ 22.889690] ret_from_fork+0x10/0x20 [ 22.889799] [ 22.889891] Allocated by task 274: [ 22.889938] kasan_save_stack+0x3c/0x68 [ 22.889995] kasan_save_track+0x20/0x40 [ 22.890043] kasan_save_alloc_info+0x40/0x58 [ 22.890088] __kasan_kmalloc+0xd4/0xd8 [ 22.890142] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.890189] kasan_atomics+0xb8/0x2e0 [ 22.890460] kunit_try_run_case+0x170/0x3f0 [ 22.890517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.890568] kthread+0x328/0x630 [ 22.890655] ret_from_fork+0x10/0x20 [ 22.890743] [ 22.890772] The buggy address belongs to the object at fff00000c63bc080 [ 22.890772] which belongs to the cache kmalloc-64 of size 64 [ 22.890860] The buggy address is located 0 bytes to the right of [ 22.890860] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.890999] [ 22.891036] The buggy address belongs to the physical page: [ 22.891073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.891348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.891593] page_type: f5(slab) [ 22.891642] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.892169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.892439] page dumped because: kasan: bad access detected [ 22.892489] [ 22.892961] Memory state around the buggy address: [ 22.893175] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.893334] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.893739] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.893948] ^ [ 22.894002] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.894058] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.894109] ================================================================== [ 22.611167] ================================================================== [ 22.611245] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 22.611318] Write of size 4 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.611381] [ 22.611977] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.612312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.612381] Hardware name: linux,dummy-virt (DT) [ 22.612576] Call trace: [ 22.612617] show_stack+0x20/0x38 (C) [ 22.612686] dump_stack_lvl+0x8c/0xd0 [ 22.612746] print_report+0x118/0x608 [ 22.612814] kasan_report+0xdc/0x128 [ 22.612883] kasan_check_range+0x100/0x1a8 [ 22.613213] __kasan_check_write+0x20/0x30 [ 22.613557] kasan_atomics_helper+0xa6c/0x4858 [ 22.613633] kasan_atomics+0x198/0x2e0 [ 22.613757] kunit_try_run_case+0x170/0x3f0 [ 22.613879] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.614018] kthread+0x328/0x630 [ 22.614080] ret_from_fork+0x10/0x20 [ 22.614427] [ 22.614460] Allocated by task 274: [ 22.614511] kasan_save_stack+0x3c/0x68 [ 22.614624] kasan_save_track+0x20/0x40 [ 22.614712] kasan_save_alloc_info+0x40/0x58 [ 22.614767] __kasan_kmalloc+0xd4/0xd8 [ 22.614979] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.615194] kasan_atomics+0xb8/0x2e0 [ 22.615253] kunit_try_run_case+0x170/0x3f0 [ 22.615377] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.615442] kthread+0x328/0x630 [ 22.615769] ret_from_fork+0x10/0x20 [ 22.615862] [ 22.615905] The buggy address belongs to the object at fff00000c63bc080 [ 22.615905] which belongs to the cache kmalloc-64 of size 64 [ 22.615977] The buggy address is located 0 bytes to the right of [ 22.615977] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.616597] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.616661] page_type: f5(slab) [ 22.616726] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.616970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.617180] page dumped because: kasan: bad access detected [ 22.617236] [ 22.618230] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.620681] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.623978] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.624337] page_type: f5(slab) [ 22.624426] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.624489] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.624540] page dumped because: kasan: bad access detected [ 22.624593] [ 22.624643] Memory state around the buggy address: [ 22.624687] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.624741] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.625246] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.626359] [ 22.626510] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.627720] __asan_report_load4_noabort+0x20/0x30 [ 22.628989] __kasan_kmalloc+0xd4/0xd8 [ 22.629580] [ 22.629764] page_type: f5(slab) [ 22.629858] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.630256] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.631602] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 22.632621] Call trace: [ 22.634498] kthread+0x328/0x630 [ 22.636171] The buggy address belongs to the object at fff00000c63bc080 [ 22.636171] which belongs to the cache kmalloc-64 of size 64 [ 22.637790] ^ [ 22.639848] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.641000] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.641973] kthread+0x328/0x630 [ 22.642552] page_type: f5(slab) [ 22.642608] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.642926] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.643119] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.643756] [ 22.644006] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.644388] kasan_report+0xdc/0x128 [ 22.644960] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.645925] ret_from_fork+0x10/0x20 [ 22.646393] page_type: f5(slab) [ 22.646439] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.646499] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.646801] ^ [ 22.647669] ================================================================== [ 22.881792] ================================================================== [ 22.882008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 22.882217] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.882327] [ 22.882540] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.882691] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.882767] Hardware name: linux,dummy-virt (DT) [ 22.882915] Call trace: [ 22.882949] show_stack+0x20/0x38 (C) [ 22.883010] dump_stack_lvl+0x8c/0xd0 [ 22.883142] print_report+0x118/0x608 [ 22.883411] kasan_report+0xdc/0x128 [ 22.883555] kasan_check_range+0x100/0x1a8 [ 22.883638] __kasan_check_write+0x20/0x30 [ 22.883807] kasan_atomics_helper+0x175c/0x4858 [ 22.883880] kasan_atomics+0x198/0x2e0 [ 22.883994] kunit_try_run_case+0x170/0x3f0 [ 22.884154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.884265] kthread+0x328/0x630 [ 22.884313] ret_from_fork+0x10/0x20 [ 22.884369] [ 22.884396] Allocated by task 274: [ 22.884432] kasan_save_stack+0x3c/0x68 [ 22.884483] kasan_save_track+0x20/0x40 [ 22.884528] kasan_save_alloc_info+0x40/0x58 [ 22.884571] __kasan_kmalloc+0xd4/0xd8 [ 22.884612] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.884658] kasan_atomics+0xb8/0x2e0 [ 22.884698] kunit_try_run_case+0x170/0x3f0 [ 22.884983] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.885050] kthread+0x328/0x630 [ 22.885091] ret_from_fork+0x10/0x20 [ 22.885182] [ 22.885209] The buggy address belongs to the object at fff00000c63bc080 [ 22.885209] which belongs to the cache kmalloc-64 of size 64 [ 22.885275] The buggy address is located 0 bytes to the right of [ 22.885275] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.885346] [ 22.885374] The buggy address belongs to the physical page: [ 22.885411] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.885470] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.885592] page_type: f5(slab) [ 22.885645] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.885861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.886161] page dumped because: kasan: bad access detected [ 22.886220] [ 22.886557] Memory state around the buggy address: [ 22.886625] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.886683] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.886737] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.886860] ^ [ 22.887059] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.887225] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.887278] ================================================================== [ 22.666756] ================================================================== [ 22.666847] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 22.666928] Read of size 4 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.666995] [ 22.667042] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.667149] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.667188] Hardware name: linux,dummy-virt (DT) [ 22.667232] Call trace: [ 22.667265] show_stack+0x20/0x38 (C) [ 22.667327] dump_stack_lvl+0x8c/0xd0 [ 22.667388] print_report+0x118/0x608 [ 22.667448] kasan_report+0xdc/0x128 [ 22.667508] __asan_report_load4_noabort+0x20/0x30 [ 22.667566] kasan_atomics_helper+0x3dd8/0x4858 [ 22.667625] kasan_atomics+0x198/0x2e0 [ 22.667677] kunit_try_run_case+0x170/0x3f0 [ 22.667735] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.670692] kthread+0x328/0x630 [ 22.671646] ret_from_fork+0x10/0x20 [ 22.672493] [ 22.672573] Allocated by task 274: [ 22.673092] kasan_save_stack+0x3c/0x68 [ 22.673282] kasan_save_track+0x20/0x40 [ 22.673413] kasan_save_alloc_info+0x40/0x58 [ 22.673462] __kasan_kmalloc+0xd4/0xd8 [ 22.673507] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.673554] kasan_atomics+0xb8/0x2e0 [ 22.674341] kunit_try_run_case+0x170/0x3f0 [ 22.674612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.674682] kthread+0x328/0x630 [ 22.675112] ret_from_fork+0x10/0x20 [ 22.675244] [ 22.675275] The buggy address belongs to the object at fff00000c63bc080 [ 22.675275] which belongs to the cache kmalloc-64 of size 64 [ 22.675345] The buggy address is located 0 bytes to the right of [ 22.675345] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.675422] [ 22.675450] The buggy address belongs to the physical page: [ 22.675488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.675558] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.675617] page_type: f5(slab) [ 22.675666] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.675727] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.675776] page dumped because: kasan: bad access detected [ 22.675817] [ 22.677058] Memory state around the buggy address: [ 22.677486] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.677669] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.678042] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.678498] ^ [ 22.678871] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.678939] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.678993] ================================================================== [ 22.774812] ================================================================== [ 22.774901] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 22.774971] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.775033] [ 22.775230] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.775377] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.775418] Hardware name: linux,dummy-virt (DT) [ 22.775459] Call trace: [ 22.775491] show_stack+0x20/0x38 (C) [ 22.775557] dump_stack_lvl+0x8c/0xd0 [ 22.775612] print_report+0x118/0x608 [ 22.775669] kasan_report+0xdc/0x128 [ 22.775722] kasan_check_range+0x100/0x1a8 [ 22.775780] __kasan_check_write+0x20/0x30 [ 22.775831] kasan_atomics_helper+0x1128/0x4858 [ 22.775901] kasan_atomics+0x198/0x2e0 [ 22.775956] kunit_try_run_case+0x170/0x3f0 [ 22.776012] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.776074] kthread+0x328/0x630 [ 22.776122] ret_from_fork+0x10/0x20 [ 22.776181] [ 22.776209] Allocated by task 274: [ 22.776247] kasan_save_stack+0x3c/0x68 [ 22.776300] kasan_save_track+0x20/0x40 [ 22.776345] kasan_save_alloc_info+0x40/0x58 [ 22.776391] __kasan_kmalloc+0xd4/0xd8 [ 22.776437] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.776484] kasan_atomics+0xb8/0x2e0 [ 22.776527] kunit_try_run_case+0x170/0x3f0 [ 22.776572] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.776624] kthread+0x328/0x630 [ 22.776664] ret_from_fork+0x10/0x20 [ 22.776706] [ 22.776731] The buggy address belongs to the object at fff00000c63bc080 [ 22.776731] which belongs to the cache kmalloc-64 of size 64 [ 22.776796] The buggy address is located 0 bytes to the right of [ 22.776796] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.777511] [ 22.777599] The buggy address belongs to the physical page: [ 22.777644] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.777709] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.777764] page_type: f5(slab) [ 22.777823] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.777903] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.777961] page dumped because: kasan: bad access detected [ 22.778004] [ 22.778032] Memory state around the buggy address: [ 22.778074] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.778204] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.778433] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.778488] ^ [ 22.778826] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.778899] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.779091] ================================================================== [ 22.769697] ================================================================== [ 22.769772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 22.769901] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.769967] [ 22.770010] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.770107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.770139] Hardware name: linux,dummy-virt (DT) [ 22.770177] Call trace: [ 22.770206] show_stack+0x20/0x38 (C) [ 22.770260] dump_stack_lvl+0x8c/0xd0 [ 22.770317] print_report+0x118/0x608 [ 22.770368] kasan_report+0xdc/0x128 [ 22.770417] kasan_check_range+0x100/0x1a8 [ 22.770471] __kasan_check_write+0x20/0x30 [ 22.770522] kasan_atomics_helper+0x10c0/0x4858 [ 22.770577] kasan_atomics+0x198/0x2e0 [ 22.770627] kunit_try_run_case+0x170/0x3f0 [ 22.770682] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.770740] kthread+0x328/0x630 [ 22.770788] ret_from_fork+0x10/0x20 [ 22.770852] [ 22.770879] Allocated by task 274: [ 22.770914] kasan_save_stack+0x3c/0x68 [ 22.770966] kasan_save_track+0x20/0x40 [ 22.771013] kasan_save_alloc_info+0x40/0x58 [ 22.771056] __kasan_kmalloc+0xd4/0xd8 [ 22.771097] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.771144] kasan_atomics+0xb8/0x2e0 [ 22.771186] kunit_try_run_case+0x170/0x3f0 [ 22.771450] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.771719] kthread+0x328/0x630 [ 22.772145] ret_from_fork+0x10/0x20 [ 22.772202] [ 22.772229] The buggy address belongs to the object at fff00000c63bc080 [ 22.772229] which belongs to the cache kmalloc-64 of size 64 [ 22.772304] The buggy address is located 0 bytes to the right of [ 22.772304] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.772511] [ 22.772539] The buggy address belongs to the physical page: [ 22.772578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.772644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.772703] page_type: f5(slab) [ 22.772747] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.772983] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.773190] page dumped because: kasan: bad access detected [ 22.773311] [ 22.773339] Memory state around the buggy address: [ 22.773384] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.773437] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.773486] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.773534] ^ [ 22.773576] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.773626] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.773858] ================================================================== [ 22.799628] ================================================================== [ 22.799772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 22.799856] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.799919] [ 22.799961] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.800162] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.800198] Hardware name: linux,dummy-virt (DT) [ 22.800241] Call trace: [ 22.800270] show_stack+0x20/0x38 (C) [ 22.800328] dump_stack_lvl+0x8c/0xd0 [ 22.800461] print_report+0x118/0x608 [ 22.800528] kasan_report+0xdc/0x128 [ 22.800583] kasan_check_range+0x100/0x1a8 [ 22.800636] __kasan_check_write+0x20/0x30 [ 22.800688] kasan_atomics_helper+0x12d8/0x4858 [ 22.800744] kasan_atomics+0x198/0x2e0 [ 22.801313] kunit_try_run_case+0x170/0x3f0 [ 22.801407] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.801472] kthread+0x328/0x630 [ 22.801522] ret_from_fork+0x10/0x20 [ 22.801746] [ 22.801779] Allocated by task 274: [ 22.801849] kasan_save_stack+0x3c/0x68 [ 22.802356] kasan_save_track+0x20/0x40 [ 22.802606] kasan_save_alloc_info+0x40/0x58 [ 22.802693] __kasan_kmalloc+0xd4/0xd8 [ 22.802899] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.802961] kasan_atomics+0xb8/0x2e0 [ 22.803009] kunit_try_run_case+0x170/0x3f0 [ 22.803058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.803387] kthread+0x328/0x630 [ 22.803802] ret_from_fork+0x10/0x20 [ 22.803903] [ 22.804031] The buggy address belongs to the object at fff00000c63bc080 [ 22.804031] which belongs to the cache kmalloc-64 of size 64 [ 22.804327] The buggy address is located 0 bytes to the right of [ 22.804327] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.804598] [ 22.804632] The buggy address belongs to the physical page: [ 22.804681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.804742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.805005] page_type: f5(slab) [ 22.805091] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.805162] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.805381] page dumped because: kasan: bad access detected [ 22.805429] [ 22.805465] Memory state around the buggy address: [ 22.805702] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.805786] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.806121] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.806299] ^ [ 22.806368] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.806620] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.806692] ================================================================== [ 22.832226] ================================================================== [ 22.832317] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 22.832434] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.832540] [ 22.832594] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.832860] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.832944] Hardware name: linux,dummy-virt (DT) [ 22.832985] Call trace: [ 22.833020] show_stack+0x20/0x38 (C) [ 22.833086] dump_stack_lvl+0x8c/0xd0 [ 22.833147] print_report+0x118/0x608 [ 22.833206] kasan_report+0xdc/0x128 [ 22.833262] kasan_check_range+0x100/0x1a8 [ 22.833336] __kasan_check_write+0x20/0x30 [ 22.833403] kasan_atomics_helper+0x14e4/0x4858 [ 22.833511] kasan_atomics+0x198/0x2e0 [ 22.833611] kunit_try_run_case+0x170/0x3f0 [ 22.833670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.833735] kthread+0x328/0x630 [ 22.833787] ret_from_fork+0x10/0x20 [ 22.833875] [ 22.833908] Allocated by task 274: [ 22.833947] kasan_save_stack+0x3c/0x68 [ 22.834006] kasan_save_track+0x20/0x40 [ 22.834057] kasan_save_alloc_info+0x40/0x58 [ 22.834115] __kasan_kmalloc+0xd4/0xd8 [ 22.834197] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.834248] kasan_atomics+0xb8/0x2e0 [ 22.834295] kunit_try_run_case+0x170/0x3f0 [ 22.834344] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.834409] kthread+0x328/0x630 [ 22.834476] ret_from_fork+0x10/0x20 [ 22.834523] [ 22.834551] The buggy address belongs to the object at fff00000c63bc080 [ 22.834551] which belongs to the cache kmalloc-64 of size 64 [ 22.834692] The buggy address is located 0 bytes to the right of [ 22.834692] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.834823] [ 22.834866] The buggy address belongs to the physical page: [ 22.834912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.834976] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.835038] page_type: f5(slab) [ 22.835089] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.835154] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.835206] page dumped because: kasan: bad access detected [ 22.835516] [ 22.835577] Memory state around the buggy address: [ 22.835817] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.835893] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.835953] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.836004] ^ [ 22.836052] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.836108] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.836157] ================================================================== [ 22.855638] ================================================================== [ 22.855706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 22.855776] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.856081] [ 22.856138] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.856252] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.856288] Hardware name: linux,dummy-virt (DT) [ 22.856331] Call trace: [ 22.856362] show_stack+0x20/0x38 (C) [ 22.856656] dump_stack_lvl+0x8c/0xd0 [ 22.856734] print_report+0x118/0x608 [ 22.857036] kasan_report+0xdc/0x128 [ 22.857129] kasan_check_range+0x100/0x1a8 [ 22.857204] __kasan_check_write+0x20/0x30 [ 22.857262] kasan_atomics_helper+0x1644/0x4858 [ 22.857321] kasan_atomics+0x198/0x2e0 [ 22.857375] kunit_try_run_case+0x170/0x3f0 [ 22.857433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.857494] kthread+0x328/0x630 [ 22.857544] ret_from_fork+0x10/0x20 [ 22.857601] [ 22.857630] Allocated by task 274: [ 22.858075] kasan_save_stack+0x3c/0x68 [ 22.858341] kasan_save_track+0x20/0x40 [ 22.858973] kasan_save_alloc_info+0x40/0x58 [ 22.859354] __kasan_kmalloc+0xd4/0xd8 [ 22.859777] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.859968] kasan_atomics+0xb8/0x2e0 [ 22.860026] kunit_try_run_case+0x170/0x3f0 [ 22.860586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.860667] kthread+0x328/0x630 [ 22.860711] ret_from_fork+0x10/0x20 [ 22.860756] [ 22.861040] The buggy address belongs to the object at fff00000c63bc080 [ 22.861040] which belongs to the cache kmalloc-64 of size 64 [ 22.861213] The buggy address is located 0 bytes to the right of [ 22.861213] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.861526] [ 22.861565] The buggy address belongs to the physical page: [ 22.861607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.861701] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.861775] page_type: f5(slab) [ 22.861937] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.862016] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.862253] page dumped because: kasan: bad access detected [ 22.862299] [ 22.862326] Memory state around the buggy address: [ 22.862378] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.862436] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.862489] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.862537] ^ [ 22.862578] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.862632] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.862679] ================================================================== [ 22.812132] ================================================================== [ 22.812229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 22.812319] Read of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274 [ 22.812398] [ 22.812478] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.812607] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.812643] Hardware name: linux,dummy-virt (DT) [ 22.812681] Call trace: [ 22.812712] show_stack+0x20/0x38 (C) [ 22.812769] dump_stack_lvl+0x8c/0xd0 [ 22.812823] print_report+0x118/0x608 [ 22.812894] kasan_report+0xdc/0x128 [ 22.812951] __asan_report_load8_noabort+0x20/0x30 [ 22.813009] kasan_atomics_helper+0x3f04/0x4858 [ 22.813066] kasan_atomics+0x198/0x2e0 [ 22.813117] kunit_try_run_case+0x170/0x3f0 [ 22.813174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.813238] kthread+0x328/0x630 [ 22.813290] ret_from_fork+0x10/0x20 [ 22.813357] [ 22.813412] Allocated by task 274: [ 22.813477] kasan_save_stack+0x3c/0x68 [ 22.813566] kasan_save_track+0x20/0x40 [ 22.813653] kasan_save_alloc_info+0x40/0x58 [ 22.813736] __kasan_kmalloc+0xd4/0xd8 [ 22.813822] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.813945] kasan_atomics+0xb8/0x2e0 [ 22.814176] kunit_try_run_case+0x170/0x3f0 [ 22.814455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.814529] kthread+0x328/0x630 [ 22.814574] ret_from_fork+0x10/0x20 [ 22.814633] [ 22.814680] The buggy address belongs to the object at fff00000c63bc080 [ 22.814680] which belongs to the cache kmalloc-64 of size 64 [ 22.814757] The buggy address is located 0 bytes to the right of [ 22.814757] allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0) [ 22.814922] [ 22.814956] The buggy address belongs to the physical page: [ 22.815018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 22.815139] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.815198] page_type: f5(slab) [ 22.815251] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.815311] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.815444] page dumped because: kasan: bad access detected [ 22.815491] [ 22.815526] Memory state around the buggy address: [ 22.815602] fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.815661] fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.815715] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.815774] ^ [ 22.815856] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.815914] fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.815962] ==================================================================
[ 14.585893] ================================================================== [ 14.586525] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 14.586959] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.587429] [ 14.587536] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.587581] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.587593] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.587613] Call Trace: [ 14.587627] <TASK> [ 14.587642] dump_stack_lvl+0x73/0xb0 [ 14.587667] print_report+0xd1/0x650 [ 14.587689] ? __virt_addr_valid+0x1db/0x2d0 [ 14.587711] ? kasan_atomics_helper+0x1217/0x5450 [ 14.587732] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.587755] ? kasan_atomics_helper+0x1217/0x5450 [ 14.587776] kasan_report+0x141/0x180 [ 14.587798] ? kasan_atomics_helper+0x1217/0x5450 [ 14.587824] kasan_check_range+0x10c/0x1c0 [ 14.587848] __kasan_check_write+0x18/0x20 [ 14.587867] kasan_atomics_helper+0x1217/0x5450 [ 14.587890] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.587970] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.588056] ? kasan_atomics+0x152/0x310 [ 14.588083] kasan_atomics+0x1dc/0x310 [ 14.588106] ? __pfx_kasan_atomics+0x10/0x10 [ 14.588130] ? __pfx_read_tsc+0x10/0x10 [ 14.588151] ? ktime_get_ts64+0x86/0x230 [ 14.588177] kunit_try_run_case+0x1a5/0x480 [ 14.588201] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.588222] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.588244] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.588267] ? __kthread_parkme+0x82/0x180 [ 14.588287] ? preempt_count_sub+0x50/0x80 [ 14.588309] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.588333] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.588356] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.588378] kthread+0x337/0x6f0 [ 14.588400] ? trace_preempt_on+0x20/0xc0 [ 14.588424] ? __pfx_kthread+0x10/0x10 [ 14.588445] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.588466] ? calculate_sigpending+0x7b/0xa0 [ 14.588490] ? __pfx_kthread+0x10/0x10 [ 14.588512] ret_from_fork+0x116/0x1d0 [ 14.588531] ? __pfx_kthread+0x10/0x10 [ 14.588551] ret_from_fork_asm+0x1a/0x30 [ 14.588582] </TASK> [ 14.588593] [ 14.596417] Allocated by task 290: [ 14.596544] kasan_save_stack+0x45/0x70 [ 14.596720] kasan_save_track+0x18/0x40 [ 14.596910] kasan_save_alloc_info+0x3b/0x50 [ 14.597175] __kasan_kmalloc+0xb7/0xc0 [ 14.597360] __kmalloc_cache_noprof+0x189/0x420 [ 14.597578] kasan_atomics+0x95/0x310 [ 14.597766] kunit_try_run_case+0x1a5/0x480 [ 14.597981] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.598196] kthread+0x337/0x6f0 [ 14.598311] ret_from_fork+0x116/0x1d0 [ 14.598563] ret_from_fork_asm+0x1a/0x30 [ 14.598809] [ 14.598900] The buggy address belongs to the object at ffff8881028d8d80 [ 14.598900] which belongs to the cache kmalloc-64 of size 64 [ 14.599492] The buggy address is located 0 bytes to the right of [ 14.599492] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.599852] [ 14.599922] The buggy address belongs to the physical page: [ 14.600099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.600466] flags: 0x200000000000000(node=0|zone=2) [ 14.600750] page_type: f5(slab) [ 14.600916] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.601268] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.601673] page dumped because: kasan: bad access detected [ 14.602047] [ 14.602166] Memory state around the buggy address: [ 14.602457] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.602864] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.603199] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.603555] ^ [ 14.603826] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.604078] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.604341] ================================================================== [ 15.277148] ================================================================== [ 15.277842] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 15.278530] Read of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 15.279172] [ 15.279351] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 15.279422] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.279434] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.279457] Call Trace: [ 15.279476] <TASK> [ 15.279505] dump_stack_lvl+0x73/0xb0 [ 15.279534] print_report+0xd1/0x650 [ 15.279557] ? __virt_addr_valid+0x1db/0x2d0 [ 15.279592] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.279614] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.279636] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.279658] kasan_report+0x141/0x180 [ 15.279680] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.279706] __asan_report_load8_noabort+0x18/0x20 [ 15.279730] kasan_atomics_helper+0x4fb2/0x5450 [ 15.279753] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.279775] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.279799] ? kasan_atomics+0x152/0x310 [ 15.279826] kasan_atomics+0x1dc/0x310 [ 15.279848] ? __pfx_kasan_atomics+0x10/0x10 [ 15.279873] ? __pfx_read_tsc+0x10/0x10 [ 15.279895] ? ktime_get_ts64+0x86/0x230 [ 15.279921] kunit_try_run_case+0x1a5/0x480 [ 15.279954] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.279977] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.280000] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.280023] ? __kthread_parkme+0x82/0x180 [ 15.280044] ? preempt_count_sub+0x50/0x80 [ 15.280068] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.280092] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.280115] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.280138] kthread+0x337/0x6f0 [ 15.280158] ? trace_preempt_on+0x20/0xc0 [ 15.280183] ? __pfx_kthread+0x10/0x10 [ 15.280204] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.280226] ? calculate_sigpending+0x7b/0xa0 [ 15.280250] ? __pfx_kthread+0x10/0x10 [ 15.280272] ret_from_fork+0x116/0x1d0 [ 15.280291] ? __pfx_kthread+0x10/0x10 [ 15.280311] ret_from_fork_asm+0x1a/0x30 [ 15.280343] </TASK> [ 15.280355] [ 15.292051] Allocated by task 290: [ 15.292412] kasan_save_stack+0x45/0x70 [ 15.292719] kasan_save_track+0x18/0x40 [ 15.292854] kasan_save_alloc_info+0x3b/0x50 [ 15.293008] __kasan_kmalloc+0xb7/0xc0 [ 15.293135] __kmalloc_cache_noprof+0x189/0x420 [ 15.293281] kasan_atomics+0x95/0x310 [ 15.293501] kunit_try_run_case+0x1a5/0x480 [ 15.293886] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.294403] kthread+0x337/0x6f0 [ 15.294712] ret_from_fork+0x116/0x1d0 [ 15.295063] ret_from_fork_asm+0x1a/0x30 [ 15.295439] [ 15.295601] The buggy address belongs to the object at ffff8881028d8d80 [ 15.295601] which belongs to the cache kmalloc-64 of size 64 [ 15.296664] The buggy address is located 0 bytes to the right of [ 15.296664] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 15.297580] [ 15.297652] The buggy address belongs to the physical page: [ 15.297826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 15.298072] flags: 0x200000000000000(node=0|zone=2) [ 15.298228] page_type: f5(slab) [ 15.298346] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.299036] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.299699] page dumped because: kasan: bad access detected [ 15.300181] [ 15.300350] Memory state around the buggy address: [ 15.300787] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.301417] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.302044] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.302659] ^ [ 15.302964] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.303174] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.303401] ================================================================== [ 14.407889] ================================================================== [ 14.408149] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 14.408380] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.408659] [ 14.408746] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.408794] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.408807] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.408831] Call Trace: [ 14.408851] <TASK> [ 14.408872] dump_stack_lvl+0x73/0xb0 [ 14.408900] print_report+0xd1/0x650 [ 14.408922] ? __virt_addr_valid+0x1db/0x2d0 [ 14.408956] ? kasan_atomics_helper+0xde0/0x5450 [ 14.408977] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.409000] ? kasan_atomics_helper+0xde0/0x5450 [ 14.409024] kasan_report+0x141/0x180 [ 14.409047] ? kasan_atomics_helper+0xde0/0x5450 [ 14.409075] kasan_check_range+0x10c/0x1c0 [ 14.409098] __kasan_check_write+0x18/0x20 [ 14.409118] kasan_atomics_helper+0xde0/0x5450 [ 14.409140] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.409162] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.409188] ? kasan_atomics+0x152/0x310 [ 14.409215] kasan_atomics+0x1dc/0x310 [ 14.409238] ? __pfx_kasan_atomics+0x10/0x10 [ 14.409263] ? __pfx_read_tsc+0x10/0x10 [ 14.409285] ? ktime_get_ts64+0x86/0x230 [ 14.409312] kunit_try_run_case+0x1a5/0x480 [ 14.409338] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.409360] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.409383] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.409419] ? __kthread_parkme+0x82/0x180 [ 14.409440] ? preempt_count_sub+0x50/0x80 [ 14.409465] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.409500] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.409523] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.409549] kthread+0x337/0x6f0 [ 14.409568] ? trace_preempt_on+0x20/0xc0 [ 14.409603] ? __pfx_kthread+0x10/0x10 [ 14.409624] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.409646] ? calculate_sigpending+0x7b/0xa0 [ 14.409685] ? __pfx_kthread+0x10/0x10 [ 14.409707] ret_from_fork+0x116/0x1d0 [ 14.409726] ? __pfx_kthread+0x10/0x10 [ 14.409747] ret_from_fork_asm+0x1a/0x30 [ 14.409778] </TASK> [ 14.409790] [ 14.417371] Allocated by task 290: [ 14.417500] kasan_save_stack+0x45/0x70 [ 14.417639] kasan_save_track+0x18/0x40 [ 14.417780] kasan_save_alloc_info+0x3b/0x50 [ 14.418030] __kasan_kmalloc+0xb7/0xc0 [ 14.418209] __kmalloc_cache_noprof+0x189/0x420 [ 14.418425] kasan_atomics+0x95/0x310 [ 14.418686] kunit_try_run_case+0x1a5/0x480 [ 14.418898] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.419077] kthread+0x337/0x6f0 [ 14.419192] ret_from_fork+0x116/0x1d0 [ 14.419352] ret_from_fork_asm+0x1a/0x30 [ 14.419557] [ 14.419649] The buggy address belongs to the object at ffff8881028d8d80 [ 14.419649] which belongs to the cache kmalloc-64 of size 64 [ 14.420206] The buggy address is located 0 bytes to the right of [ 14.420206] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.420805] [ 14.420874] The buggy address belongs to the physical page: [ 14.421052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.421286] flags: 0x200000000000000(node=0|zone=2) [ 14.421493] page_type: f5(slab) [ 14.421654] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.422039] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.422354] page dumped because: kasan: bad access detected [ 14.422518] [ 14.422582] Memory state around the buggy address: [ 14.422727] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.422943] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.423199] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.423671] ^ [ 14.423899] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.424784] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.425274] ================================================================== [ 14.509297] ================================================================== [ 14.509820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 14.510153] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.510546] [ 14.510712] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.510757] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.510769] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.510789] Call Trace: [ 14.510803] <TASK> [ 14.510818] dump_stack_lvl+0x73/0xb0 [ 14.510844] print_report+0xd1/0x650 [ 14.510866] ? __virt_addr_valid+0x1db/0x2d0 [ 14.510888] ? kasan_atomics_helper+0x1079/0x5450 [ 14.510909] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.510942] ? kasan_atomics_helper+0x1079/0x5450 [ 14.510965] kasan_report+0x141/0x180 [ 14.510986] ? kasan_atomics_helper+0x1079/0x5450 [ 14.511012] kasan_check_range+0x10c/0x1c0 [ 14.511036] __kasan_check_write+0x18/0x20 [ 14.511055] kasan_atomics_helper+0x1079/0x5450 [ 14.511078] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.511100] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.511125] ? kasan_atomics+0x152/0x310 [ 14.511152] kasan_atomics+0x1dc/0x310 [ 14.511174] ? __pfx_kasan_atomics+0x10/0x10 [ 14.511199] ? __pfx_read_tsc+0x10/0x10 [ 14.511219] ? ktime_get_ts64+0x86/0x230 [ 14.511243] kunit_try_run_case+0x1a5/0x480 [ 14.511267] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.511290] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.511311] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.511335] ? __kthread_parkme+0x82/0x180 [ 14.511355] ? preempt_count_sub+0x50/0x80 [ 14.511378] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.511402] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.511425] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.511448] kthread+0x337/0x6f0 [ 14.511468] ? trace_preempt_on+0x20/0xc0 [ 14.511491] ? __pfx_kthread+0x10/0x10 [ 14.511525] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.511546] ? calculate_sigpending+0x7b/0xa0 [ 14.511570] ? __pfx_kthread+0x10/0x10 [ 14.511591] ret_from_fork+0x116/0x1d0 [ 14.511610] ? __pfx_kthread+0x10/0x10 [ 14.511631] ret_from_fork_asm+0x1a/0x30 [ 14.511663] </TASK> [ 14.511673] [ 14.518807] Allocated by task 290: [ 14.518990] kasan_save_stack+0x45/0x70 [ 14.519187] kasan_save_track+0x18/0x40 [ 14.519371] kasan_save_alloc_info+0x3b/0x50 [ 14.519586] __kasan_kmalloc+0xb7/0xc0 [ 14.519746] __kmalloc_cache_noprof+0x189/0x420 [ 14.519951] kasan_atomics+0x95/0x310 [ 14.520129] kunit_try_run_case+0x1a5/0x480 [ 14.520310] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.520557] kthread+0x337/0x6f0 [ 14.520709] ret_from_fork+0x116/0x1d0 [ 14.520848] ret_from_fork_asm+0x1a/0x30 [ 14.521037] [ 14.521126] The buggy address belongs to the object at ffff8881028d8d80 [ 14.521126] which belongs to the cache kmalloc-64 of size 64 [ 14.521608] The buggy address is located 0 bytes to the right of [ 14.521608] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.521975] [ 14.522042] The buggy address belongs to the physical page: [ 14.522206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.522476] flags: 0x200000000000000(node=0|zone=2) [ 14.522696] page_type: f5(slab) [ 14.522876] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.523214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.523656] page dumped because: kasan: bad access detected [ 14.523893] [ 14.524038] Memory state around the buggy address: [ 14.524202] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.524475] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.524789] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.525113] ^ [ 14.525321] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.525607] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.525852] ================================================================== [ 14.605175] ================================================================== [ 14.605523] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 14.605921] Read of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.606153] [ 14.606234] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.606280] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.606292] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.606313] Call Trace: [ 14.606333] <TASK> [ 14.606351] dump_stack_lvl+0x73/0xb0 [ 14.606379] print_report+0xd1/0x650 [ 14.606402] ? __virt_addr_valid+0x1db/0x2d0 [ 14.606425] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.606456] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.606479] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.606501] kasan_report+0x141/0x180 [ 14.606523] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.606549] __asan_report_load4_noabort+0x18/0x20 [ 14.606573] kasan_atomics_helper+0x49e8/0x5450 [ 14.606596] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.606617] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.606643] ? kasan_atomics+0x152/0x310 [ 14.606669] kasan_atomics+0x1dc/0x310 [ 14.606691] ? __pfx_kasan_atomics+0x10/0x10 [ 14.606715] ? __pfx_read_tsc+0x10/0x10 [ 14.606736] ? ktime_get_ts64+0x86/0x230 [ 14.606762] kunit_try_run_case+0x1a5/0x480 [ 14.606787] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.606809] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.606870] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.606893] ? __kthread_parkme+0x82/0x180 [ 14.606914] ? preempt_count_sub+0x50/0x80 [ 14.606959] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.606983] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.607006] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.607030] kthread+0x337/0x6f0 [ 14.607079] ? trace_preempt_on+0x20/0xc0 [ 14.607105] ? __pfx_kthread+0x10/0x10 [ 14.607126] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.607158] ? calculate_sigpending+0x7b/0xa0 [ 14.607184] ? __pfx_kthread+0x10/0x10 [ 14.607205] ret_from_fork+0x116/0x1d0 [ 14.607224] ? __pfx_kthread+0x10/0x10 [ 14.607245] ret_from_fork_asm+0x1a/0x30 [ 14.607276] </TASK> [ 14.607287] [ 14.615378] Allocated by task 290: [ 14.615642] kasan_save_stack+0x45/0x70 [ 14.615871] kasan_save_track+0x18/0x40 [ 14.616059] kasan_save_alloc_info+0x3b/0x50 [ 14.616206] __kasan_kmalloc+0xb7/0xc0 [ 14.616334] __kmalloc_cache_noprof+0x189/0x420 [ 14.616756] kasan_atomics+0x95/0x310 [ 14.616949] kunit_try_run_case+0x1a5/0x480 [ 14.617189] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.617567] kthread+0x337/0x6f0 [ 14.617791] ret_from_fork+0x116/0x1d0 [ 14.618052] ret_from_fork_asm+0x1a/0x30 [ 14.618268] [ 14.618369] The buggy address belongs to the object at ffff8881028d8d80 [ 14.618369] which belongs to the cache kmalloc-64 of size 64 [ 14.618800] The buggy address is located 0 bytes to the right of [ 14.618800] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.619257] [ 14.619354] The buggy address belongs to the physical page: [ 14.619652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.620082] flags: 0x200000000000000(node=0|zone=2) [ 14.620266] page_type: f5(slab) [ 14.620386] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.620720] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.621033] page dumped because: kasan: bad access detected [ 14.621214] [ 14.621277] Memory state around the buggy address: [ 14.621553] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.621896] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.622216] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.622519] ^ [ 14.622789] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.623153] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.623463] ================================================================== [ 14.965203] ================================================================== [ 14.965856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 14.966510] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.966981] [ 14.967063] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.967108] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.967120] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.967142] Call Trace: [ 14.967158] <TASK> [ 14.967174] dump_stack_lvl+0x73/0xb0 [ 14.967202] print_report+0xd1/0x650 [ 14.967223] ? __virt_addr_valid+0x1db/0x2d0 [ 14.967245] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.967267] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.967289] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.967311] kasan_report+0x141/0x180 [ 14.967333] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.967358] kasan_check_range+0x10c/0x1c0 [ 14.967408] __kasan_check_write+0x18/0x20 [ 14.967429] kasan_atomics_helper+0x1a7f/0x5450 [ 14.967452] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.967473] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.967498] ? kasan_atomics+0x152/0x310 [ 14.967524] kasan_atomics+0x1dc/0x310 [ 14.967548] ? __pfx_kasan_atomics+0x10/0x10 [ 14.967572] ? __pfx_read_tsc+0x10/0x10 [ 14.967593] ? ktime_get_ts64+0x86/0x230 [ 14.967618] kunit_try_run_case+0x1a5/0x480 [ 14.967642] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.967664] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.967686] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.967709] ? __kthread_parkme+0x82/0x180 [ 14.967728] ? preempt_count_sub+0x50/0x80 [ 14.967751] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.967774] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.967797] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.967820] kthread+0x337/0x6f0 [ 14.967841] ? trace_preempt_on+0x20/0xc0 [ 14.967865] ? __pfx_kthread+0x10/0x10 [ 14.967886] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.967907] ? calculate_sigpending+0x7b/0xa0 [ 14.967939] ? __pfx_kthread+0x10/0x10 [ 14.967962] ret_from_fork+0x116/0x1d0 [ 14.967981] ? __pfx_kthread+0x10/0x10 [ 14.968001] ret_from_fork_asm+0x1a/0x30 [ 14.968032] </TASK> [ 14.968044] [ 14.979916] Allocated by task 290: [ 14.980048] kasan_save_stack+0x45/0x70 [ 14.980184] kasan_save_track+0x18/0x40 [ 14.980312] kasan_save_alloc_info+0x3b/0x50 [ 14.980642] __kasan_kmalloc+0xb7/0xc0 [ 14.980983] __kmalloc_cache_noprof+0x189/0x420 [ 14.981365] kasan_atomics+0x95/0x310 [ 14.981735] kunit_try_run_case+0x1a5/0x480 [ 14.982107] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.982590] kthread+0x337/0x6f0 [ 14.982888] ret_from_fork+0x116/0x1d0 [ 14.983229] ret_from_fork_asm+0x1a/0x30 [ 14.983593] [ 14.983750] The buggy address belongs to the object at ffff8881028d8d80 [ 14.983750] which belongs to the cache kmalloc-64 of size 64 [ 14.984788] The buggy address is located 0 bytes to the right of [ 14.984788] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.985237] [ 14.985305] The buggy address belongs to the physical page: [ 14.985478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.985720] flags: 0x200000000000000(node=0|zone=2) [ 14.985875] page_type: f5(slab) [ 14.986107] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.986776] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.987505] page dumped because: kasan: bad access detected [ 14.988028] [ 14.988176] Memory state around the buggy address: [ 14.988572] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.989187] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.990412] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.990763] ^ [ 14.991006] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.991316] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.991637] ================================================================== [ 15.372715] ================================================================== [ 15.373067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 15.373404] Read of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 15.373812] [ 15.373918] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 15.373975] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.373988] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.374009] Call Trace: [ 15.374026] <TASK> [ 15.374044] dump_stack_lvl+0x73/0xb0 [ 15.374073] print_report+0xd1/0x650 [ 15.374096] ? __virt_addr_valid+0x1db/0x2d0 [ 15.374120] ? kasan_atomics_helper+0x5115/0x5450 [ 15.374141] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.374164] ? kasan_atomics_helper+0x5115/0x5450 [ 15.374185] kasan_report+0x141/0x180 [ 15.374208] ? kasan_atomics_helper+0x5115/0x5450 [ 15.374234] __asan_report_load8_noabort+0x18/0x20 [ 15.374259] kasan_atomics_helper+0x5115/0x5450 [ 15.374282] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.374304] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.374328] ? kasan_atomics+0x152/0x310 [ 15.374354] kasan_atomics+0x1dc/0x310 [ 15.374377] ? __pfx_kasan_atomics+0x10/0x10 [ 15.374401] ? __pfx_read_tsc+0x10/0x10 [ 15.374423] ? ktime_get_ts64+0x86/0x230 [ 15.374449] kunit_try_run_case+0x1a5/0x480 [ 15.374473] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.374495] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.374519] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.374542] ? __kthread_parkme+0x82/0x180 [ 15.374563] ? preempt_count_sub+0x50/0x80 [ 15.374587] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.374621] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.374644] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.374668] kthread+0x337/0x6f0 [ 15.374688] ? trace_preempt_on+0x20/0xc0 [ 15.374712] ? __pfx_kthread+0x10/0x10 [ 15.374733] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.374754] ? calculate_sigpending+0x7b/0xa0 [ 15.374779] ? __pfx_kthread+0x10/0x10 [ 15.374801] ret_from_fork+0x116/0x1d0 [ 15.374819] ? __pfx_kthread+0x10/0x10 [ 15.374840] ret_from_fork_asm+0x1a/0x30 [ 15.374871] </TASK> [ 15.374883] [ 15.381744] Allocated by task 290: [ 15.381918] kasan_save_stack+0x45/0x70 [ 15.382118] kasan_save_track+0x18/0x40 [ 15.382304] kasan_save_alloc_info+0x3b/0x50 [ 15.382503] __kasan_kmalloc+0xb7/0xc0 [ 15.382681] __kmalloc_cache_noprof+0x189/0x420 [ 15.383029] kasan_atomics+0x95/0x310 [ 15.383157] kunit_try_run_case+0x1a5/0x480 [ 15.383298] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.383694] kthread+0x337/0x6f0 [ 15.383855] ret_from_fork+0x116/0x1d0 [ 15.384042] ret_from_fork_asm+0x1a/0x30 [ 15.384222] [ 15.384288] The buggy address belongs to the object at ffff8881028d8d80 [ 15.384288] which belongs to the cache kmalloc-64 of size 64 [ 15.384882] The buggy address is located 0 bytes to the right of [ 15.384882] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 15.385245] [ 15.385312] The buggy address belongs to the physical page: [ 15.385476] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 15.385711] flags: 0x200000000000000(node=0|zone=2) [ 15.385863] page_type: f5(slab) [ 15.386006] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.386361] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.386691] page dumped because: kasan: bad access detected [ 15.386942] [ 15.387032] Memory state around the buggy address: [ 15.387252] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.387800] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.388073] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.388278] ^ [ 15.388529] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.388845] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.389170] ================================================================== [ 14.852910] ================================================================== [ 14.853268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 14.853874] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.854112] [ 14.854196] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.854242] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.854255] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.854277] Call Trace: [ 14.854296] <TASK> [ 14.854316] dump_stack_lvl+0x73/0xb0 [ 14.854347] print_report+0xd1/0x650 [ 14.854369] ? __virt_addr_valid+0x1db/0x2d0 [ 14.854403] ? kasan_atomics_helper+0x177f/0x5450 [ 14.854425] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.854448] ? kasan_atomics_helper+0x177f/0x5450 [ 14.854470] kasan_report+0x141/0x180 [ 14.854492] ? kasan_atomics_helper+0x177f/0x5450 [ 14.854518] kasan_check_range+0x10c/0x1c0 [ 14.854543] __kasan_check_write+0x18/0x20 [ 14.854562] kasan_atomics_helper+0x177f/0x5450 [ 14.854585] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.854608] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.854632] ? kasan_atomics+0x152/0x310 [ 14.854659] kasan_atomics+0x1dc/0x310 [ 14.854682] ? __pfx_kasan_atomics+0x10/0x10 [ 14.854707] ? __pfx_read_tsc+0x10/0x10 [ 14.854728] ? ktime_get_ts64+0x86/0x230 [ 14.854755] kunit_try_run_case+0x1a5/0x480 [ 14.854779] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.854802] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.854825] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.854848] ? __kthread_parkme+0x82/0x180 [ 14.854869] ? preempt_count_sub+0x50/0x80 [ 14.854893] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.854917] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.854952] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.854976] kthread+0x337/0x6f0 [ 14.854996] ? trace_preempt_on+0x20/0xc0 [ 14.855021] ? __pfx_kthread+0x10/0x10 [ 14.855044] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.855065] ? calculate_sigpending+0x7b/0xa0 [ 14.855090] ? __pfx_kthread+0x10/0x10 [ 14.855111] ret_from_fork+0x116/0x1d0 [ 14.855130] ? __pfx_kthread+0x10/0x10 [ 14.855150] ret_from_fork_asm+0x1a/0x30 [ 14.855181] </TASK> [ 14.855194] [ 14.862692] Allocated by task 290: [ 14.862837] kasan_save_stack+0x45/0x70 [ 14.862983] kasan_save_track+0x18/0x40 [ 14.863114] kasan_save_alloc_info+0x3b/0x50 [ 14.863255] __kasan_kmalloc+0xb7/0xc0 [ 14.863381] __kmalloc_cache_noprof+0x189/0x420 [ 14.863600] kasan_atomics+0x95/0x310 [ 14.863785] kunit_try_run_case+0x1a5/0x480 [ 14.863996] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.864387] kthread+0x337/0x6f0 [ 14.864553] ret_from_fork+0x116/0x1d0 [ 14.864739] ret_from_fork_asm+0x1a/0x30 [ 14.864923] [ 14.865027] The buggy address belongs to the object at ffff8881028d8d80 [ 14.865027] which belongs to the cache kmalloc-64 of size 64 [ 14.865426] The buggy address is located 0 bytes to the right of [ 14.865426] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.865992] [ 14.866074] The buggy address belongs to the physical page: [ 14.866298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.866613] flags: 0x200000000000000(node=0|zone=2) [ 14.866835] page_type: f5(slab) [ 14.866993] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.867287] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.867614] page dumped because: kasan: bad access detected [ 14.867821] [ 14.867908] Memory state around the buggy address: [ 14.868109] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.868401] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.868664] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.868940] ^ [ 14.869129] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.869335] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.869628] ================================================================== [ 14.526300] ================================================================== [ 14.526702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 14.527021] Read of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.527236] [ 14.527310] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.527350] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.527362] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.527382] Call Trace: [ 14.527403] <TASK> [ 14.527419] dump_stack_lvl+0x73/0xb0 [ 14.527444] print_report+0xd1/0x650 [ 14.527466] ? __virt_addr_valid+0x1db/0x2d0 [ 14.527488] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.527509] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.527531] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.527553] kasan_report+0x141/0x180 [ 14.527575] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.527601] __asan_report_load4_noabort+0x18/0x20 [ 14.527626] kasan_atomics_helper+0x4a1c/0x5450 [ 14.527649] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.527671] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.527695] ? kasan_atomics+0x152/0x310 [ 14.527722] kasan_atomics+0x1dc/0x310 [ 14.527744] ? __pfx_kasan_atomics+0x10/0x10 [ 14.527768] ? __pfx_read_tsc+0x10/0x10 [ 14.527789] ? ktime_get_ts64+0x86/0x230 [ 14.527815] kunit_try_run_case+0x1a5/0x480 [ 14.527838] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.527860] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.527883] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.527906] ? __kthread_parkme+0x82/0x180 [ 14.527926] ? preempt_count_sub+0x50/0x80 [ 14.527959] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.527983] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.528008] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.528031] kthread+0x337/0x6f0 [ 14.528051] ? trace_preempt_on+0x20/0xc0 [ 14.528075] ? __pfx_kthread+0x10/0x10 [ 14.528095] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.528116] ? calculate_sigpending+0x7b/0xa0 [ 14.528140] ? __pfx_kthread+0x10/0x10 [ 14.528162] ret_from_fork+0x116/0x1d0 [ 14.528181] ? __pfx_kthread+0x10/0x10 [ 14.528201] ret_from_fork_asm+0x1a/0x30 [ 14.528232] </TASK> [ 14.528242] [ 14.535284] Allocated by task 290: [ 14.535449] kasan_save_stack+0x45/0x70 [ 14.535666] kasan_save_track+0x18/0x40 [ 14.535859] kasan_save_alloc_info+0x3b/0x50 [ 14.536071] __kasan_kmalloc+0xb7/0xc0 [ 14.536257] __kmalloc_cache_noprof+0x189/0x420 [ 14.536526] kasan_atomics+0x95/0x310 [ 14.536654] kunit_try_run_case+0x1a5/0x480 [ 14.536793] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.537040] kthread+0x337/0x6f0 [ 14.537226] ret_from_fork+0x116/0x1d0 [ 14.537437] ret_from_fork_asm+0x1a/0x30 [ 14.537600] [ 14.537666] The buggy address belongs to the object at ffff8881028d8d80 [ 14.537666] which belongs to the cache kmalloc-64 of size 64 [ 14.538025] The buggy address is located 0 bytes to the right of [ 14.538025] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.538379] [ 14.538475] The buggy address belongs to the physical page: [ 14.538719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.539070] flags: 0x200000000000000(node=0|zone=2) [ 14.539319] page_type: f5(slab) [ 14.539601] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.539941] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.540263] page dumped because: kasan: bad access detected [ 14.540582] [ 14.540648] Memory state around the buggy address: [ 14.540796] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.541018] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.541227] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.541557] ^ [ 14.541786] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.542155] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.542553] ================================================================== [ 14.253562] ================================================================== [ 14.253829] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 14.254429] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.255230] [ 14.255410] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.255481] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.255494] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.255516] Call Trace: [ 14.255547] <TASK> [ 14.255564] dump_stack_lvl+0x73/0xb0 [ 14.255595] print_report+0xd1/0x650 [ 14.255617] ? __virt_addr_valid+0x1db/0x2d0 [ 14.255641] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.255663] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.255698] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.255721] kasan_report+0x141/0x180 [ 14.255743] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.255769] kasan_check_range+0x10c/0x1c0 [ 14.255793] __kasan_check_write+0x18/0x20 [ 14.255813] kasan_atomics_helper+0xa2b/0x5450 [ 14.255836] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.255858] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.255883] ? kasan_atomics+0x152/0x310 [ 14.255910] kasan_atomics+0x1dc/0x310 [ 14.255944] ? __pfx_kasan_atomics+0x10/0x10 [ 14.255968] ? __pfx_read_tsc+0x10/0x10 [ 14.255990] ? ktime_get_ts64+0x86/0x230 [ 14.256017] kunit_try_run_case+0x1a5/0x480 [ 14.256041] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.256063] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.256086] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.256109] ? __kthread_parkme+0x82/0x180 [ 14.256130] ? preempt_count_sub+0x50/0x80 [ 14.256153] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.256179] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.256202] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.256226] kthread+0x337/0x6f0 [ 14.256246] ? trace_preempt_on+0x20/0xc0 [ 14.256270] ? __pfx_kthread+0x10/0x10 [ 14.256291] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.256312] ? calculate_sigpending+0x7b/0xa0 [ 14.256337] ? __pfx_kthread+0x10/0x10 [ 14.256359] ret_from_fork+0x116/0x1d0 [ 14.256378] ? __pfx_kthread+0x10/0x10 [ 14.256469] ret_from_fork_asm+0x1a/0x30 [ 14.256503] </TASK> [ 14.256514] [ 14.267301] Allocated by task 290: [ 14.267468] kasan_save_stack+0x45/0x70 [ 14.267692] kasan_save_track+0x18/0x40 [ 14.268039] kasan_save_alloc_info+0x3b/0x50 [ 14.268309] __kasan_kmalloc+0xb7/0xc0 [ 14.268483] __kmalloc_cache_noprof+0x189/0x420 [ 14.268730] kasan_atomics+0x95/0x310 [ 14.268899] kunit_try_run_case+0x1a5/0x480 [ 14.269142] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.269521] kthread+0x337/0x6f0 [ 14.269841] ret_from_fork+0x116/0x1d0 [ 14.270095] ret_from_fork_asm+0x1a/0x30 [ 14.270291] [ 14.270382] The buggy address belongs to the object at ffff8881028d8d80 [ 14.270382] which belongs to the cache kmalloc-64 of size 64 [ 14.270910] The buggy address is located 0 bytes to the right of [ 14.270910] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.271379] [ 14.271451] The buggy address belongs to the physical page: [ 14.271618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.272094] flags: 0x200000000000000(node=0|zone=2) [ 14.272377] page_type: f5(slab) [ 14.272617] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.272969] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.273225] page dumped because: kasan: bad access detected [ 14.273676] [ 14.273784] Memory state around the buggy address: [ 14.274065] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.274391] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.274714] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.275067] ^ [ 14.275277] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.275774] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.276280] ================================================================== [ 14.344882] ================================================================== [ 14.345668] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 14.346104] Read of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.346330] [ 14.346641] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.346698] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.346711] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.346733] Call Trace: [ 14.346749] <TASK> [ 14.346765] dump_stack_lvl+0x73/0xb0 [ 14.346793] print_report+0xd1/0x650 [ 14.346815] ? __virt_addr_valid+0x1db/0x2d0 [ 14.346838] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.346859] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.346882] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.346903] kasan_report+0x141/0x180 [ 14.346925] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.347227] __asan_report_load4_noabort+0x18/0x20 [ 14.347254] kasan_atomics_helper+0x4a84/0x5450 [ 14.347290] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.347313] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.347394] ? kasan_atomics+0x152/0x310 [ 14.347422] kasan_atomics+0x1dc/0x310 [ 14.347445] ? __pfx_kasan_atomics+0x10/0x10 [ 14.347468] ? __pfx_read_tsc+0x10/0x10 [ 14.347490] ? ktime_get_ts64+0x86/0x230 [ 14.347515] kunit_try_run_case+0x1a5/0x480 [ 14.347539] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.347561] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.347584] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.347606] ? __kthread_parkme+0x82/0x180 [ 14.347626] ? preempt_count_sub+0x50/0x80 [ 14.347649] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.347673] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.347695] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.347719] kthread+0x337/0x6f0 [ 14.347739] ? trace_preempt_on+0x20/0xc0 [ 14.347762] ? __pfx_kthread+0x10/0x10 [ 14.347783] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.347803] ? calculate_sigpending+0x7b/0xa0 [ 14.347826] ? __pfx_kthread+0x10/0x10 [ 14.347848] ret_from_fork+0x116/0x1d0 [ 14.347867] ? __pfx_kthread+0x10/0x10 [ 14.347888] ret_from_fork_asm+0x1a/0x30 [ 14.347919] </TASK> [ 14.347941] [ 14.363905] Allocated by task 290: [ 14.364406] kasan_save_stack+0x45/0x70 [ 14.364771] kasan_save_track+0x18/0x40 [ 14.364915] kasan_save_alloc_info+0x3b/0x50 [ 14.365071] __kasan_kmalloc+0xb7/0xc0 [ 14.365200] __kmalloc_cache_noprof+0x189/0x420 [ 14.365349] kasan_atomics+0x95/0x310 [ 14.366181] kunit_try_run_case+0x1a5/0x480 [ 14.366785] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.367493] kthread+0x337/0x6f0 [ 14.367948] ret_from_fork+0x116/0x1d0 [ 14.368506] ret_from_fork_asm+0x1a/0x30 [ 14.369018] [ 14.369322] The buggy address belongs to the object at ffff8881028d8d80 [ 14.369322] which belongs to the cache kmalloc-64 of size 64 [ 14.370831] The buggy address is located 0 bytes to the right of [ 14.370831] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.372406] [ 14.372798] The buggy address belongs to the physical page: [ 14.373231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.373993] flags: 0x200000000000000(node=0|zone=2) [ 14.374563] page_type: f5(slab) [ 14.374693] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.374920] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.375172] page dumped because: kasan: bad access detected [ 14.375531] [ 14.375696] Memory state around the buggy address: [ 14.376014] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.376355] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.376990] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.377432] ^ [ 14.377810] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.378214] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.378549] ================================================================== [ 14.870366] ================================================================== [ 14.870703] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 14.870993] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.871318] [ 14.871406] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.871453] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.871465] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.871487] Call Trace: [ 14.871505] <TASK> [ 14.871524] dump_stack_lvl+0x73/0xb0 [ 14.871553] print_report+0xd1/0x650 [ 14.871575] ? __virt_addr_valid+0x1db/0x2d0 [ 14.871598] ? kasan_atomics_helper+0x1818/0x5450 [ 14.871619] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.871641] ? kasan_atomics_helper+0x1818/0x5450 [ 14.871663] kasan_report+0x141/0x180 [ 14.871685] ? kasan_atomics_helper+0x1818/0x5450 [ 14.871712] kasan_check_range+0x10c/0x1c0 [ 14.871735] __kasan_check_write+0x18/0x20 [ 14.871755] kasan_atomics_helper+0x1818/0x5450 [ 14.871777] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.871799] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.871823] ? kasan_atomics+0x152/0x310 [ 14.871849] kasan_atomics+0x1dc/0x310 [ 14.871872] ? __pfx_kasan_atomics+0x10/0x10 [ 14.871896] ? __pfx_read_tsc+0x10/0x10 [ 14.871917] ? ktime_get_ts64+0x86/0x230 [ 14.871955] kunit_try_run_case+0x1a5/0x480 [ 14.871980] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.872002] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.872025] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.872048] ? __kthread_parkme+0x82/0x180 [ 14.872069] ? preempt_count_sub+0x50/0x80 [ 14.872093] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.872116] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.872139] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.872163] kthread+0x337/0x6f0 [ 14.872182] ? trace_preempt_on+0x20/0xc0 [ 14.872207] ? __pfx_kthread+0x10/0x10 [ 14.872227] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.872248] ? calculate_sigpending+0x7b/0xa0 [ 14.872273] ? __pfx_kthread+0x10/0x10 [ 14.872295] ret_from_fork+0x116/0x1d0 [ 14.872314] ? __pfx_kthread+0x10/0x10 [ 14.872334] ret_from_fork_asm+0x1a/0x30 [ 14.872365] </TASK> [ 14.872377] [ 14.879617] Allocated by task 290: [ 14.879742] kasan_save_stack+0x45/0x70 [ 14.879880] kasan_save_track+0x18/0x40 [ 14.880021] kasan_save_alloc_info+0x3b/0x50 [ 14.880167] __kasan_kmalloc+0xb7/0xc0 [ 14.880292] __kmalloc_cache_noprof+0x189/0x420 [ 14.880479] kasan_atomics+0x95/0x310 [ 14.880665] kunit_try_run_case+0x1a5/0x480 [ 14.880863] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.881114] kthread+0x337/0x6f0 [ 14.881277] ret_from_fork+0x116/0x1d0 [ 14.881455] ret_from_fork_asm+0x1a/0x30 [ 14.881643] [ 14.881738] The buggy address belongs to the object at ffff8881028d8d80 [ 14.881738] which belongs to the cache kmalloc-64 of size 64 [ 14.882184] The buggy address is located 0 bytes to the right of [ 14.882184] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.882539] [ 14.882606] The buggy address belongs to the physical page: [ 14.882769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.883900] flags: 0x200000000000000(node=0|zone=2) [ 14.884156] page_type: f5(slab) [ 14.884318] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.884983] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.885320] page dumped because: kasan: bad access detected [ 14.885847] [ 14.886095] Memory state around the buggy address: [ 14.886332] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.886893] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.887210] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.887662] ^ [ 14.888106] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.888597] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.888880] ================================================================== [ 14.796874] ================================================================== [ 14.797195] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 14.797518] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.797823] [ 14.797905] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.797961] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.797973] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.797995] Call Trace: [ 14.798013] <TASK> [ 14.798030] dump_stack_lvl+0x73/0xb0 [ 14.798058] print_report+0xd1/0x650 [ 14.798079] ? __virt_addr_valid+0x1db/0x2d0 [ 14.798102] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.798123] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.798146] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.798168] kasan_report+0x141/0x180 [ 14.798190] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.798217] kasan_check_range+0x10c/0x1c0 [ 14.798240] __kasan_check_write+0x18/0x20 [ 14.798260] kasan_atomics_helper+0x15b6/0x5450 [ 14.798282] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.798304] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.798330] ? kasan_atomics+0x152/0x310 [ 14.798356] kasan_atomics+0x1dc/0x310 [ 14.798379] ? __pfx_kasan_atomics+0x10/0x10 [ 14.798404] ? __pfx_read_tsc+0x10/0x10 [ 14.798427] ? ktime_get_ts64+0x86/0x230 [ 14.798453] kunit_try_run_case+0x1a5/0x480 [ 14.798478] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.798501] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.798524] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.798558] ? __kthread_parkme+0x82/0x180 [ 14.798579] ? preempt_count_sub+0x50/0x80 [ 14.798603] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.798627] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.798650] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.798673] kthread+0x337/0x6f0 [ 14.798693] ? trace_preempt_on+0x20/0xc0 [ 14.798718] ? __pfx_kthread+0x10/0x10 [ 14.798739] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.798760] ? calculate_sigpending+0x7b/0xa0 [ 14.798785] ? __pfx_kthread+0x10/0x10 [ 14.798806] ret_from_fork+0x116/0x1d0 [ 14.798826] ? __pfx_kthread+0x10/0x10 [ 14.798847] ret_from_fork_asm+0x1a/0x30 [ 14.798878] </TASK> [ 14.798889] [ 14.805878] Allocated by task 290: [ 14.806016] kasan_save_stack+0x45/0x70 [ 14.806152] kasan_save_track+0x18/0x40 [ 14.806334] kasan_save_alloc_info+0x3b/0x50 [ 14.806528] __kasan_kmalloc+0xb7/0xc0 [ 14.806705] __kmalloc_cache_noprof+0x189/0x420 [ 14.806914] kasan_atomics+0x95/0x310 [ 14.807293] kunit_try_run_case+0x1a5/0x480 [ 14.807494] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.807732] kthread+0x337/0x6f0 [ 14.807864] ret_from_fork+0x116/0x1d0 [ 14.807998] ret_from_fork_asm+0x1a/0x30 [ 14.808127] [ 14.808193] The buggy address belongs to the object at ffff8881028d8d80 [ 14.808193] which belongs to the cache kmalloc-64 of size 64 [ 14.808620] The buggy address is located 0 bytes to the right of [ 14.808620] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.809174] [ 14.809270] The buggy address belongs to the physical page: [ 14.809523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.809836] flags: 0x200000000000000(node=0|zone=2) [ 14.810051] page_type: f5(slab) [ 14.810200] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.810509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.810800] page dumped because: kasan: bad access detected [ 14.810969] [ 14.811033] Memory state around the buggy address: [ 14.811178] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.811380] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.811681] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.811989] ^ [ 14.812206] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.812682] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.812916] ================================================================== [ 15.134119] ================================================================== [ 15.134893] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 15.135316] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 15.135693] [ 15.135873] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 15.136052] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.136068] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.136091] Call Trace: [ 15.136161] <TASK> [ 15.136182] dump_stack_lvl+0x73/0xb0 [ 15.136214] print_report+0xd1/0x650 [ 15.136237] ? __virt_addr_valid+0x1db/0x2d0 [ 15.136261] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.136282] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.136305] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.136327] kasan_report+0x141/0x180 [ 15.136349] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.136375] kasan_check_range+0x10c/0x1c0 [ 15.136399] __kasan_check_write+0x18/0x20 [ 15.136419] kasan_atomics_helper+0x1eaa/0x5450 [ 15.136441] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.136463] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.136487] ? kasan_atomics+0x152/0x310 [ 15.136513] kasan_atomics+0x1dc/0x310 [ 15.136535] ? __pfx_kasan_atomics+0x10/0x10 [ 15.136559] ? __pfx_read_tsc+0x10/0x10 [ 15.136581] ? ktime_get_ts64+0x86/0x230 [ 15.136608] kunit_try_run_case+0x1a5/0x480 [ 15.136632] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.136654] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.136677] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.136699] ? __kthread_parkme+0x82/0x180 [ 15.136719] ? preempt_count_sub+0x50/0x80 [ 15.136743] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.136766] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.136789] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.136812] kthread+0x337/0x6f0 [ 15.136833] ? trace_preempt_on+0x20/0xc0 [ 15.136858] ? __pfx_kthread+0x10/0x10 [ 15.136879] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.136900] ? calculate_sigpending+0x7b/0xa0 [ 15.136924] ? __pfx_kthread+0x10/0x10 [ 15.136957] ret_from_fork+0x116/0x1d0 [ 15.136976] ? __pfx_kthread+0x10/0x10 [ 15.136998] ret_from_fork_asm+0x1a/0x30 [ 15.137028] </TASK> [ 15.137040] [ 15.146452] Allocated by task 290: [ 15.146644] kasan_save_stack+0x45/0x70 [ 15.146830] kasan_save_track+0x18/0x40 [ 15.146993] kasan_save_alloc_info+0x3b/0x50 [ 15.147206] __kasan_kmalloc+0xb7/0xc0 [ 15.147378] __kmalloc_cache_noprof+0x189/0x420 [ 15.147565] kasan_atomics+0x95/0x310 [ 15.147748] kunit_try_run_case+0x1a5/0x480 [ 15.148631] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.148867] kthread+0x337/0x6f0 [ 15.149011] ret_from_fork+0x116/0x1d0 [ 15.149330] ret_from_fork_asm+0x1a/0x30 [ 15.149560] [ 15.149740] The buggy address belongs to the object at ffff8881028d8d80 [ 15.149740] which belongs to the cache kmalloc-64 of size 64 [ 15.150345] The buggy address is located 0 bytes to the right of [ 15.150345] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 15.151054] [ 15.151220] The buggy address belongs to the physical page: [ 15.151533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 15.152001] flags: 0x200000000000000(node=0|zone=2) [ 15.152286] page_type: f5(slab) [ 15.152419] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.152982] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.153355] page dumped because: kasan: bad access detected [ 15.153642] [ 15.153940] Memory state around the buggy address: [ 15.154137] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.154565] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.154868] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.155279] ^ [ 15.155583] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.155836] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.156247] ================================================================== [ 14.057940] ================================================================== [ 14.058298] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 14.058733] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.059214] [ 14.059325] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.059458] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.059476] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.059498] Call Trace: [ 14.059520] <TASK> [ 14.059542] dump_stack_lvl+0x73/0xb0 [ 14.059598] print_report+0xd1/0x650 [ 14.059624] ? __virt_addr_valid+0x1db/0x2d0 [ 14.059647] ? kasan_atomics_helper+0x565/0x5450 [ 14.059668] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.059691] ? kasan_atomics_helper+0x565/0x5450 [ 14.059712] kasan_report+0x141/0x180 [ 14.059735] ? kasan_atomics_helper+0x565/0x5450 [ 14.059760] kasan_check_range+0x10c/0x1c0 [ 14.059785] __kasan_check_write+0x18/0x20 [ 14.059805] kasan_atomics_helper+0x565/0x5450 [ 14.059827] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.059851] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.059877] ? kasan_atomics+0x152/0x310 [ 14.059903] kasan_atomics+0x1dc/0x310 [ 14.059940] ? __pfx_kasan_atomics+0x10/0x10 [ 14.059965] ? __pfx_read_tsc+0x10/0x10 [ 14.059987] ? ktime_get_ts64+0x86/0x230 [ 14.060013] kunit_try_run_case+0x1a5/0x480 [ 14.060038] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.060062] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.060084] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.060107] ? __kthread_parkme+0x82/0x180 [ 14.060129] ? preempt_count_sub+0x50/0x80 [ 14.060173] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.060197] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.060220] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.060244] kthread+0x337/0x6f0 [ 14.060264] ? trace_preempt_on+0x20/0xc0 [ 14.060289] ? __pfx_kthread+0x10/0x10 [ 14.060310] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.060331] ? calculate_sigpending+0x7b/0xa0 [ 14.060355] ? __pfx_kthread+0x10/0x10 [ 14.060593] ret_from_fork+0x116/0x1d0 [ 14.060626] ? __pfx_kthread+0x10/0x10 [ 14.060649] ret_from_fork_asm+0x1a/0x30 [ 14.060681] </TASK> [ 14.060693] [ 14.074259] Allocated by task 290: [ 14.074661] kasan_save_stack+0x45/0x70 [ 14.075036] kasan_save_track+0x18/0x40 [ 14.075367] kasan_save_alloc_info+0x3b/0x50 [ 14.075824] __kasan_kmalloc+0xb7/0xc0 [ 14.076172] __kmalloc_cache_noprof+0x189/0x420 [ 14.076413] kasan_atomics+0x95/0x310 [ 14.076542] kunit_try_run_case+0x1a5/0x480 [ 14.077252] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.077803] kthread+0x337/0x6f0 [ 14.078127] ret_from_fork+0x116/0x1d0 [ 14.078432] ret_from_fork_asm+0x1a/0x30 [ 14.078738] [ 14.078810] The buggy address belongs to the object at ffff8881028d8d80 [ 14.078810] which belongs to the cache kmalloc-64 of size 64 [ 14.079170] The buggy address is located 0 bytes to the right of [ 14.079170] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.079865] [ 14.080036] The buggy address belongs to the physical page: [ 14.080709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.081398] flags: 0x200000000000000(node=0|zone=2) [ 14.081877] page_type: f5(slab) [ 14.082297] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.083021] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.083747] page dumped because: kasan: bad access detected [ 14.084226] [ 14.084385] Memory state around the buggy address: [ 14.084882] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.085218] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.085660] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.086278] ^ [ 14.086717] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.087461] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.087835] ================================================================== [ 14.665897] ================================================================== [ 14.666559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 14.667184] Read of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.667793] [ 14.667970] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.668017] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.668029] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.668051] Call Trace: [ 14.668069] <TASK> [ 14.668087] dump_stack_lvl+0x73/0xb0 [ 14.668118] print_report+0xd1/0x650 [ 14.668140] ? __virt_addr_valid+0x1db/0x2d0 [ 14.668163] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.668184] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.668206] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.668228] kasan_report+0x141/0x180 [ 14.668250] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.668276] kasan_check_range+0x10c/0x1c0 [ 14.668301] __kasan_check_read+0x15/0x20 [ 14.668320] kasan_atomics_helper+0x13b5/0x5450 [ 14.668343] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.668364] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.668411] ? kasan_atomics+0x152/0x310 [ 14.668438] kasan_atomics+0x1dc/0x310 [ 14.668460] ? __pfx_kasan_atomics+0x10/0x10 [ 14.668484] ? __pfx_read_tsc+0x10/0x10 [ 14.668506] ? ktime_get_ts64+0x86/0x230 [ 14.668531] kunit_try_run_case+0x1a5/0x480 [ 14.668555] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.668577] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.668600] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.668622] ? __kthread_parkme+0x82/0x180 [ 14.668643] ? preempt_count_sub+0x50/0x80 [ 14.668666] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.668690] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.668713] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.668737] kthread+0x337/0x6f0 [ 14.668756] ? trace_preempt_on+0x20/0xc0 [ 14.668781] ? __pfx_kthread+0x10/0x10 [ 14.668803] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.668824] ? calculate_sigpending+0x7b/0xa0 [ 14.668848] ? __pfx_kthread+0x10/0x10 [ 14.668870] ret_from_fork+0x116/0x1d0 [ 14.668890] ? __pfx_kthread+0x10/0x10 [ 14.668910] ret_from_fork_asm+0x1a/0x30 [ 14.668952] </TASK> [ 14.668963] [ 14.681190] Allocated by task 290: [ 14.681527] kasan_save_stack+0x45/0x70 [ 14.681894] kasan_save_track+0x18/0x40 [ 14.682247] kasan_save_alloc_info+0x3b/0x50 [ 14.682545] __kasan_kmalloc+0xb7/0xc0 [ 14.682676] __kmalloc_cache_noprof+0x189/0x420 [ 14.682825] kasan_atomics+0x95/0x310 [ 14.682963] kunit_try_run_case+0x1a5/0x480 [ 14.683107] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.683275] kthread+0x337/0x6f0 [ 14.683450] ret_from_fork+0x116/0x1d0 [ 14.683778] ret_from_fork_asm+0x1a/0x30 [ 14.684127] [ 14.684279] The buggy address belongs to the object at ffff8881028d8d80 [ 14.684279] which belongs to the cache kmalloc-64 of size 64 [ 14.685323] The buggy address is located 0 bytes to the right of [ 14.685323] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.686427] [ 14.686583] The buggy address belongs to the physical page: [ 14.687064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.687741] flags: 0x200000000000000(node=0|zone=2) [ 14.688179] page_type: f5(slab) [ 14.688488] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.689129] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.689356] page dumped because: kasan: bad access detected [ 14.689860] [ 14.690017] Memory state around the buggy address: [ 14.690448] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.690816] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.691256] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.691856] ^ [ 14.692267] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.692577] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.692789] ================================================================== [ 15.223344] ================================================================== [ 15.223623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 15.223899] Read of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 15.224386] [ 15.224516] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 15.224565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.224578] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.224600] Call Trace: [ 15.224621] <TASK> [ 15.224642] dump_stack_lvl+0x73/0xb0 [ 15.224671] print_report+0xd1/0x650 [ 15.224693] ? __virt_addr_valid+0x1db/0x2d0 [ 15.224716] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.224737] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.224759] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.224781] kasan_report+0x141/0x180 [ 15.224803] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.224830] __asan_report_load8_noabort+0x18/0x20 [ 15.224854] kasan_atomics_helper+0x4f98/0x5450 [ 15.224876] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.224899] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.224924] ? kasan_atomics+0x152/0x310 [ 15.224961] kasan_atomics+0x1dc/0x310 [ 15.224984] ? __pfx_kasan_atomics+0x10/0x10 [ 15.225008] ? __pfx_read_tsc+0x10/0x10 [ 15.225030] ? ktime_get_ts64+0x86/0x230 [ 15.225123] kunit_try_run_case+0x1a5/0x480 [ 15.225160] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.225182] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.225205] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.225228] ? __kthread_parkme+0x82/0x180 [ 15.225249] ? preempt_count_sub+0x50/0x80 [ 15.225273] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.225297] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.225321] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.225344] kthread+0x337/0x6f0 [ 15.225424] ? trace_preempt_on+0x20/0xc0 [ 15.225462] ? __pfx_kthread+0x10/0x10 [ 15.225484] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.225505] ? calculate_sigpending+0x7b/0xa0 [ 15.225578] ? __pfx_kthread+0x10/0x10 [ 15.225600] ret_from_fork+0x116/0x1d0 [ 15.225629] ? __pfx_kthread+0x10/0x10 [ 15.225651] ret_from_fork_asm+0x1a/0x30 [ 15.225686] </TASK> [ 15.225698] [ 15.234606] Allocated by task 290: [ 15.235262] kasan_save_stack+0x45/0x70 [ 15.236043] kasan_save_track+0x18/0x40 [ 15.236200] kasan_save_alloc_info+0x3b/0x50 [ 15.236506] __kasan_kmalloc+0xb7/0xc0 [ 15.236971] __kmalloc_cache_noprof+0x189/0x420 [ 15.237182] kasan_atomics+0x95/0x310 [ 15.237489] kunit_try_run_case+0x1a5/0x480 [ 15.237722] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.238185] kthread+0x337/0x6f0 [ 15.238457] ret_from_fork+0x116/0x1d0 [ 15.238735] ret_from_fork_asm+0x1a/0x30 [ 15.239029] [ 15.239241] The buggy address belongs to the object at ffff8881028d8d80 [ 15.239241] which belongs to the cache kmalloc-64 of size 64 [ 15.240082] The buggy address is located 0 bytes to the right of [ 15.240082] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 15.240822] [ 15.240943] The buggy address belongs to the physical page: [ 15.241359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 15.241807] flags: 0x200000000000000(node=0|zone=2) [ 15.242119] page_type: f5(slab) [ 15.242319] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.242866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.243312] page dumped because: kasan: bad access detected [ 15.243773] [ 15.243859] Memory state around the buggy address: [ 15.244242] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.244780] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.245188] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.245650] ^ [ 15.245888] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.246297] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.246682] ================================================================== [ 15.247317] ================================================================== [ 15.247610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 15.248505] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 15.248879] [ 15.249110] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 15.249160] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.249173] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.249294] Call Trace: [ 15.249313] <TASK> [ 15.249330] dump_stack_lvl+0x73/0xb0 [ 15.249360] print_report+0xd1/0x650 [ 15.249384] ? __virt_addr_valid+0x1db/0x2d0 [ 15.249407] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.249428] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.249450] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.249472] kasan_report+0x141/0x180 [ 15.249494] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.249520] kasan_check_range+0x10c/0x1c0 [ 15.249544] __kasan_check_write+0x18/0x20 [ 15.249564] kasan_atomics_helper+0x20c8/0x5450 [ 15.249586] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.249608] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.249633] ? kasan_atomics+0x152/0x310 [ 15.249662] kasan_atomics+0x1dc/0x310 [ 15.249693] ? __pfx_kasan_atomics+0x10/0x10 [ 15.249718] ? __pfx_read_tsc+0x10/0x10 [ 15.249739] ? ktime_get_ts64+0x86/0x230 [ 15.249765] kunit_try_run_case+0x1a5/0x480 [ 15.249790] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.249812] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.249835] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.249858] ? __kthread_parkme+0x82/0x180 [ 15.249879] ? preempt_count_sub+0x50/0x80 [ 15.249903] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.249926] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.249960] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.249984] kthread+0x337/0x6f0 [ 15.250004] ? trace_preempt_on+0x20/0xc0 [ 15.250028] ? __pfx_kthread+0x10/0x10 [ 15.250049] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.250070] ? calculate_sigpending+0x7b/0xa0 [ 15.250095] ? __pfx_kthread+0x10/0x10 [ 15.250117] ret_from_fork+0x116/0x1d0 [ 15.250135] ? __pfx_kthread+0x10/0x10 [ 15.250156] ret_from_fork_asm+0x1a/0x30 [ 15.250187] </TASK> [ 15.250197] [ 15.263827] Allocated by task 290: [ 15.264369] kasan_save_stack+0x45/0x70 [ 15.264904] kasan_save_track+0x18/0x40 [ 15.265440] kasan_save_alloc_info+0x3b/0x50 [ 15.265996] __kasan_kmalloc+0xb7/0xc0 [ 15.266483] __kmalloc_cache_noprof+0x189/0x420 [ 15.266648] kasan_atomics+0x95/0x310 [ 15.266776] kunit_try_run_case+0x1a5/0x480 [ 15.266913] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.267087] kthread+0x337/0x6f0 [ 15.267201] ret_from_fork+0x116/0x1d0 [ 15.267322] ret_from_fork_asm+0x1a/0x30 [ 15.267792] [ 15.267961] The buggy address belongs to the object at ffff8881028d8d80 [ 15.267961] which belongs to the cache kmalloc-64 of size 64 [ 15.269107] The buggy address is located 0 bytes to the right of [ 15.269107] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 15.270209] [ 15.270411] The buggy address belongs to the physical page: [ 15.270891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 15.271508] flags: 0x200000000000000(node=0|zone=2) [ 15.271798] page_type: f5(slab) [ 15.272108] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.272332] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.272985] page dumped because: kasan: bad access detected [ 15.273490] [ 15.273666] Memory state around the buggy address: [ 15.273997] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.274559] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.274898] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.275546] ^ [ 15.275877] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.276088] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.276287] ================================================================== [ 13.921563] ================================================================== [ 13.921792] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 13.922042] Read of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 13.922602] [ 13.922789] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 13.922832] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.922843] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.922862] Call Trace: [ 13.922876] <TASK> [ 13.922890] dump_stack_lvl+0x73/0xb0 [ 13.922927] print_report+0xd1/0x650 [ 13.922959] ? __virt_addr_valid+0x1db/0x2d0 [ 13.922980] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.923000] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.923021] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.923043] kasan_report+0x141/0x180 [ 13.923075] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.923100] __asan_report_load4_noabort+0x18/0x20 [ 13.923135] kasan_atomics_helper+0x4b88/0x5450 [ 13.923157] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.923178] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.923201] ? kasan_atomics+0x152/0x310 [ 13.923226] kasan_atomics+0x1dc/0x310 [ 13.923248] ? __pfx_kasan_atomics+0x10/0x10 [ 13.923271] ? __pfx_read_tsc+0x10/0x10 [ 13.923290] ? ktime_get_ts64+0x86/0x230 [ 13.923315] kunit_try_run_case+0x1a5/0x480 [ 13.923337] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.923359] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.923380] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.923410] ? __kthread_parkme+0x82/0x180 [ 13.923440] ? preempt_count_sub+0x50/0x80 [ 13.923463] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.923486] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.923519] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.923542] kthread+0x337/0x6f0 [ 13.923560] ? trace_preempt_on+0x20/0xc0 [ 13.923583] ? __pfx_kthread+0x10/0x10 [ 13.923603] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.923623] ? calculate_sigpending+0x7b/0xa0 [ 13.923645] ? __pfx_kthread+0x10/0x10 [ 13.923666] ret_from_fork+0x116/0x1d0 [ 13.923685] ? __pfx_kthread+0x10/0x10 [ 13.923810] ret_from_fork_asm+0x1a/0x30 [ 13.923842] </TASK> [ 13.923889] [ 13.931951] Allocated by task 290: [ 13.932126] kasan_save_stack+0x45/0x70 [ 13.932264] kasan_save_track+0x18/0x40 [ 13.932394] kasan_save_alloc_info+0x3b/0x50 [ 13.932803] __kasan_kmalloc+0xb7/0xc0 [ 13.932942] __kmalloc_cache_noprof+0x189/0x420 [ 13.933202] kasan_atomics+0x95/0x310 [ 13.933555] kunit_try_run_case+0x1a5/0x480 [ 13.933755] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.934000] kthread+0x337/0x6f0 [ 13.934164] ret_from_fork+0x116/0x1d0 [ 13.934313] ret_from_fork_asm+0x1a/0x30 [ 13.934652] [ 13.934754] The buggy address belongs to the object at ffff8881028d8d80 [ 13.934754] which belongs to the cache kmalloc-64 of size 64 [ 13.935236] The buggy address is located 0 bytes to the right of [ 13.935236] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 13.935784] [ 13.935876] The buggy address belongs to the physical page: [ 13.936136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 13.936551] flags: 0x200000000000000(node=0|zone=2) [ 13.936754] page_type: f5(slab) [ 13.936911] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.937227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.937594] page dumped because: kasan: bad access detected [ 13.937901] [ 13.937976] Memory state around the buggy address: [ 13.938192] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.938539] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.938750] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.938964] ^ [ 13.939112] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.939319] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.939523] ================================================================== [ 14.721479] ================================================================== [ 14.722299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 14.722948] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.723621] [ 14.723794] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.723839] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.723851] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.723872] Call Trace: [ 14.723889] <TASK> [ 14.723905] dump_stack_lvl+0x73/0xb0 [ 14.723979] print_report+0xd1/0x650 [ 14.724002] ? __virt_addr_valid+0x1db/0x2d0 [ 14.724024] ? kasan_atomics_helper+0x1467/0x5450 [ 14.724045] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.724067] ? kasan_atomics_helper+0x1467/0x5450 [ 14.724089] kasan_report+0x141/0x180 [ 14.724111] ? kasan_atomics_helper+0x1467/0x5450 [ 14.724138] kasan_check_range+0x10c/0x1c0 [ 14.724162] __kasan_check_write+0x18/0x20 [ 14.724181] kasan_atomics_helper+0x1467/0x5450 [ 14.724204] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.724227] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.724252] ? kasan_atomics+0x152/0x310 [ 14.724278] kasan_atomics+0x1dc/0x310 [ 14.724300] ? __pfx_kasan_atomics+0x10/0x10 [ 14.724325] ? __pfx_read_tsc+0x10/0x10 [ 14.724345] ? ktime_get_ts64+0x86/0x230 [ 14.724370] kunit_try_run_case+0x1a5/0x480 [ 14.724415] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.724437] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.724459] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.724482] ? __kthread_parkme+0x82/0x180 [ 14.724502] ? preempt_count_sub+0x50/0x80 [ 14.724526] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.724549] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.724572] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.724596] kthread+0x337/0x6f0 [ 14.724616] ? trace_preempt_on+0x20/0xc0 [ 14.724640] ? __pfx_kthread+0x10/0x10 [ 14.724661] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.724682] ? calculate_sigpending+0x7b/0xa0 [ 14.724706] ? __pfx_kthread+0x10/0x10 [ 14.724729] ret_from_fork+0x116/0x1d0 [ 14.724748] ? __pfx_kthread+0x10/0x10 [ 14.724769] ret_from_fork_asm+0x1a/0x30 [ 14.724800] </TASK> [ 14.724811] [ 14.740086] Allocated by task 290: [ 14.740222] kasan_save_stack+0x45/0x70 [ 14.740370] kasan_save_track+0x18/0x40 [ 14.740510] kasan_save_alloc_info+0x3b/0x50 [ 14.740652] __kasan_kmalloc+0xb7/0xc0 [ 14.740779] __kmalloc_cache_noprof+0x189/0x420 [ 14.740927] kasan_atomics+0x95/0x310 [ 14.741510] kunit_try_run_case+0x1a5/0x480 [ 14.741879] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.742461] kthread+0x337/0x6f0 [ 14.742822] ret_from_fork+0x116/0x1d0 [ 14.743218] ret_from_fork_asm+0x1a/0x30 [ 14.743644] [ 14.743803] The buggy address belongs to the object at ffff8881028d8d80 [ 14.743803] which belongs to the cache kmalloc-64 of size 64 [ 14.744995] The buggy address is located 0 bytes to the right of [ 14.744995] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.746096] [ 14.746173] The buggy address belongs to the physical page: [ 14.746344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.746893] flags: 0x200000000000000(node=0|zone=2) [ 14.747377] page_type: f5(slab) [ 14.747764] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.748487] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.749166] page dumped because: kasan: bad access detected [ 14.749355] [ 14.749435] Memory state around the buggy address: [ 14.749728] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.750199] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.750428] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.750836] ^ [ 14.751193] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.751679] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.751889] ================================================================== [ 15.156924] ================================================================== [ 15.157296] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 15.157945] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 15.158308] [ 15.158397] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 15.158442] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.158455] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.158476] Call Trace: [ 15.158492] <TASK> [ 15.158509] dump_stack_lvl+0x73/0xb0 [ 15.158538] print_report+0xd1/0x650 [ 15.158561] ? __virt_addr_valid+0x1db/0x2d0 [ 15.158586] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.158607] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.158630] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.158652] kasan_report+0x141/0x180 [ 15.158675] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.158702] kasan_check_range+0x10c/0x1c0 [ 15.158726] __kasan_check_write+0x18/0x20 [ 15.158746] kasan_atomics_helper+0x1f43/0x5450 [ 15.158769] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.158791] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.158816] ? kasan_atomics+0x152/0x310 [ 15.158843] kasan_atomics+0x1dc/0x310 [ 15.158865] ? __pfx_kasan_atomics+0x10/0x10 [ 15.158889] ? __pfx_read_tsc+0x10/0x10 [ 15.158910] ? ktime_get_ts64+0x86/0x230 [ 15.158947] kunit_try_run_case+0x1a5/0x480 [ 15.158971] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.158993] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.159016] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.159038] ? __kthread_parkme+0x82/0x180 [ 15.159059] ? preempt_count_sub+0x50/0x80 [ 15.159083] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.159106] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.159129] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.159152] kthread+0x337/0x6f0 [ 15.159172] ? trace_preempt_on+0x20/0xc0 [ 15.159198] ? __pfx_kthread+0x10/0x10 [ 15.159220] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.159240] ? calculate_sigpending+0x7b/0xa0 [ 15.159264] ? __pfx_kthread+0x10/0x10 [ 15.159285] ret_from_fork+0x116/0x1d0 [ 15.159304] ? __pfx_kthread+0x10/0x10 [ 15.159324] ret_from_fork_asm+0x1a/0x30 [ 15.159356] </TASK> [ 15.159366] [ 15.166758] Allocated by task 290: [ 15.166917] kasan_save_stack+0x45/0x70 [ 15.167065] kasan_save_track+0x18/0x40 [ 15.167193] kasan_save_alloc_info+0x3b/0x50 [ 15.167387] __kasan_kmalloc+0xb7/0xc0 [ 15.167578] __kmalloc_cache_noprof+0x189/0x420 [ 15.167793] kasan_atomics+0x95/0x310 [ 15.167983] kunit_try_run_case+0x1a5/0x480 [ 15.168185] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.168449] kthread+0x337/0x6f0 [ 15.168568] ret_from_fork+0x116/0x1d0 [ 15.168695] ret_from_fork_asm+0x1a/0x30 [ 15.168826] [ 15.168892] The buggy address belongs to the object at ffff8881028d8d80 [ 15.168892] which belongs to the cache kmalloc-64 of size 64 [ 15.170316] The buggy address is located 0 bytes to the right of [ 15.170316] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 15.171714] [ 15.171812] The buggy address belongs to the physical page: [ 15.171993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 15.172450] flags: 0x200000000000000(node=0|zone=2) [ 15.172721] page_type: f5(slab) [ 15.172842] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.173072] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.173285] page dumped because: kasan: bad access detected [ 15.173452] [ 15.173516] Memory state around the buggy address: [ 15.173660] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.173870] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.174621] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.175376] ^ [ 15.175812] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.176434] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.177100] ================================================================== [ 14.890264] ================================================================== [ 14.890651] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 14.891496] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.891730] [ 14.891811] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.891856] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.891870] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.891890] Call Trace: [ 14.891907] <TASK> [ 14.891923] dump_stack_lvl+0x73/0xb0 [ 14.891965] print_report+0xd1/0x650 [ 14.891988] ? __virt_addr_valid+0x1db/0x2d0 [ 14.892011] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.892033] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.892054] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.892076] kasan_report+0x141/0x180 [ 14.892098] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.892124] kasan_check_range+0x10c/0x1c0 [ 14.892147] __kasan_check_write+0x18/0x20 [ 14.892166] kasan_atomics_helper+0x18b1/0x5450 [ 14.892189] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.892211] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.892235] ? kasan_atomics+0x152/0x310 [ 14.892262] kasan_atomics+0x1dc/0x310 [ 14.892284] ? __pfx_kasan_atomics+0x10/0x10 [ 14.892307] ? __pfx_read_tsc+0x10/0x10 [ 14.892328] ? ktime_get_ts64+0x86/0x230 [ 14.892355] kunit_try_run_case+0x1a5/0x480 [ 14.892408] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.892431] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.892454] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.892537] ? __kthread_parkme+0x82/0x180 [ 14.892560] ? preempt_count_sub+0x50/0x80 [ 14.892585] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.892609] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.892632] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.892655] kthread+0x337/0x6f0 [ 14.892675] ? trace_preempt_on+0x20/0xc0 [ 14.892700] ? __pfx_kthread+0x10/0x10 [ 14.892721] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.892742] ? calculate_sigpending+0x7b/0xa0 [ 14.892767] ? __pfx_kthread+0x10/0x10 [ 14.892788] ret_from_fork+0x116/0x1d0 [ 14.892807] ? __pfx_kthread+0x10/0x10 [ 14.892829] ret_from_fork_asm+0x1a/0x30 [ 14.892861] </TASK> [ 14.892874] [ 14.905709] Allocated by task 290: [ 14.906079] kasan_save_stack+0x45/0x70 [ 14.906491] kasan_save_track+0x18/0x40 [ 14.906869] kasan_save_alloc_info+0x3b/0x50 [ 14.907280] __kasan_kmalloc+0xb7/0xc0 [ 14.907663] __kmalloc_cache_noprof+0x189/0x420 [ 14.908103] kasan_atomics+0x95/0x310 [ 14.908282] kunit_try_run_case+0x1a5/0x480 [ 14.908579] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.909095] kthread+0x337/0x6f0 [ 14.909374] ret_from_fork+0x116/0x1d0 [ 14.909517] ret_from_fork_asm+0x1a/0x30 [ 14.909888] [ 14.910090] The buggy address belongs to the object at ffff8881028d8d80 [ 14.910090] which belongs to the cache kmalloc-64 of size 64 [ 14.910700] The buggy address is located 0 bytes to the right of [ 14.910700] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.911308] [ 14.911482] The buggy address belongs to the physical page: [ 14.911999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.912815] flags: 0x200000000000000(node=0|zone=2) [ 14.913228] page_type: f5(slab) [ 14.913347] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.913617] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.914300] page dumped because: kasan: bad access detected [ 14.914837] [ 14.915064] Memory state around the buggy address: [ 14.915522] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.916154] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.916619] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.916831] ^ [ 14.916991] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.917196] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.917413] ================================================================== [ 13.903784] ================================================================== [ 13.904144] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 13.904404] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 13.904740] [ 13.904820] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 13.904873] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.904884] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.904904] Call Trace: [ 13.904939] <TASK> [ 13.904954] dump_stack_lvl+0x73/0xb0 [ 13.904980] print_report+0xd1/0x650 [ 13.905001] ? __virt_addr_valid+0x1db/0x2d0 [ 13.905023] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.905043] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.905064] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.905084] kasan_report+0x141/0x180 [ 13.905125] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.905152] __asan_report_store4_noabort+0x1b/0x30 [ 13.905175] kasan_atomics_helper+0x4ba2/0x5450 [ 13.905197] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.905218] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.905242] ? kasan_atomics+0x152/0x310 [ 13.905267] kasan_atomics+0x1dc/0x310 [ 13.905289] ? __pfx_kasan_atomics+0x10/0x10 [ 13.905312] ? __pfx_read_tsc+0x10/0x10 [ 13.905332] ? ktime_get_ts64+0x86/0x230 [ 13.905356] kunit_try_run_case+0x1a5/0x480 [ 13.905379] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.905400] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.905422] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.905444] ? __kthread_parkme+0x82/0x180 [ 13.905463] ? preempt_count_sub+0x50/0x80 [ 13.905486] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.905518] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.905541] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.905564] kthread+0x337/0x6f0 [ 13.905594] ? trace_preempt_on+0x20/0xc0 [ 13.905618] ? __pfx_kthread+0x10/0x10 [ 13.905638] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.905667] ? calculate_sigpending+0x7b/0xa0 [ 13.905696] ? __pfx_kthread+0x10/0x10 [ 13.905718] ret_from_fork+0x116/0x1d0 [ 13.905746] ? __pfx_kthread+0x10/0x10 [ 13.905766] ret_from_fork_asm+0x1a/0x30 [ 13.905795] </TASK> [ 13.905806] [ 13.913617] Allocated by task 290: [ 13.913743] kasan_save_stack+0x45/0x70 [ 13.913877] kasan_save_track+0x18/0x40 [ 13.914016] kasan_save_alloc_info+0x3b/0x50 [ 13.914159] __kasan_kmalloc+0xb7/0xc0 [ 13.914346] __kmalloc_cache_noprof+0x189/0x420 [ 13.914578] kasan_atomics+0x95/0x310 [ 13.914756] kunit_try_run_case+0x1a5/0x480 [ 13.914958] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.915196] kthread+0x337/0x6f0 [ 13.915353] ret_from_fork+0x116/0x1d0 [ 13.915562] ret_from_fork_asm+0x1a/0x30 [ 13.915750] [ 13.915837] The buggy address belongs to the object at ffff8881028d8d80 [ 13.915837] which belongs to the cache kmalloc-64 of size 64 [ 13.916192] The buggy address is located 0 bytes to the right of [ 13.916192] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 13.917142] [ 13.917269] The buggy address belongs to the physical page: [ 13.917562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 13.917833] flags: 0x200000000000000(node=0|zone=2) [ 13.918114] page_type: f5(slab) [ 13.918286] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.918709] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.918976] page dumped because: kasan: bad access detected [ 13.919223] [ 13.919309] Memory state around the buggy address: [ 13.919653] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.919883] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.920101] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.920304] ^ [ 13.920483] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.920810] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.921120] ================================================================== [ 13.970155] ================================================================== [ 13.971150] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 13.972073] Read of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 13.972898] [ 13.973119] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 13.973180] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.973193] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.973215] Call Trace: [ 13.973236] <TASK> [ 13.973254] dump_stack_lvl+0x73/0xb0 [ 13.973285] print_report+0xd1/0x650 [ 13.973309] ? __virt_addr_valid+0x1db/0x2d0 [ 13.973333] ? kasan_atomics_helper+0x3df/0x5450 [ 13.973354] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.973376] ? kasan_atomics_helper+0x3df/0x5450 [ 13.973399] kasan_report+0x141/0x180 [ 13.973422] ? kasan_atomics_helper+0x3df/0x5450 [ 13.973447] kasan_check_range+0x10c/0x1c0 [ 13.973471] __kasan_check_read+0x15/0x20 [ 13.973490] kasan_atomics_helper+0x3df/0x5450 [ 13.973512] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.973572] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.973598] ? kasan_atomics+0x152/0x310 [ 13.973635] kasan_atomics+0x1dc/0x310 [ 13.973658] ? __pfx_kasan_atomics+0x10/0x10 [ 13.973688] ? __pfx_read_tsc+0x10/0x10 [ 13.973710] ? ktime_get_ts64+0x86/0x230 [ 13.973737] kunit_try_run_case+0x1a5/0x480 [ 13.973761] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.973783] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.973806] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.973829] ? __kthread_parkme+0x82/0x180 [ 13.973849] ? preempt_count_sub+0x50/0x80 [ 13.973873] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.973897] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.973920] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.973953] kthread+0x337/0x6f0 [ 13.973973] ? trace_preempt_on+0x20/0xc0 [ 13.973998] ? __pfx_kthread+0x10/0x10 [ 13.974019] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.974040] ? calculate_sigpending+0x7b/0xa0 [ 13.974065] ? __pfx_kthread+0x10/0x10 [ 13.974086] ret_from_fork+0x116/0x1d0 [ 13.974105] ? __pfx_kthread+0x10/0x10 [ 13.974126] ret_from_fork_asm+0x1a/0x30 [ 13.974158] </TASK> [ 13.974169] [ 13.988419] Allocated by task 290: [ 13.988854] kasan_save_stack+0x45/0x70 [ 13.989099] kasan_save_track+0x18/0x40 [ 13.989230] kasan_save_alloc_info+0x3b/0x50 [ 13.989370] __kasan_kmalloc+0xb7/0xc0 [ 13.989998] __kmalloc_cache_noprof+0x189/0x420 [ 13.990432] kasan_atomics+0x95/0x310 [ 13.990859] kunit_try_run_case+0x1a5/0x480 [ 13.991303] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.991891] kthread+0x337/0x6f0 [ 13.992094] ret_from_fork+0x116/0x1d0 [ 13.992224] ret_from_fork_asm+0x1a/0x30 [ 13.992358] [ 13.992512] The buggy address belongs to the object at ffff8881028d8d80 [ 13.992512] which belongs to the cache kmalloc-64 of size 64 [ 13.993851] The buggy address is located 0 bytes to the right of [ 13.993851] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 13.994952] [ 13.995024] The buggy address belongs to the physical page: [ 13.995186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 13.995423] flags: 0x200000000000000(node=0|zone=2) [ 13.995625] page_type: f5(slab) [ 13.995811] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.996156] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.996403] page dumped because: kasan: bad access detected [ 13.996664] [ 13.996753] Memory state around the buggy address: [ 13.997071] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.997292] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.997828] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.998318] ^ [ 13.998512] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.998792] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.999237] ================================================================== [ 14.992796] ================================================================== [ 14.993583] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 14.994660] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.995361] [ 14.995564] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.995613] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.995627] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.995647] Call Trace: [ 14.995665] <TASK> [ 14.995682] dump_stack_lvl+0x73/0xb0 [ 14.995713] print_report+0xd1/0x650 [ 14.995737] ? __virt_addr_valid+0x1db/0x2d0 [ 14.995760] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.995781] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.995804] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.995825] kasan_report+0x141/0x180 [ 14.995848] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.995874] kasan_check_range+0x10c/0x1c0 [ 14.995897] __kasan_check_write+0x18/0x20 [ 14.995917] kasan_atomics_helper+0x1b22/0x5450 [ 14.995958] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.995980] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.996005] ? kasan_atomics+0x152/0x310 [ 14.996032] kasan_atomics+0x1dc/0x310 [ 14.996054] ? __pfx_kasan_atomics+0x10/0x10 [ 14.996079] ? __pfx_read_tsc+0x10/0x10 [ 14.996100] ? ktime_get_ts64+0x86/0x230 [ 14.996126] kunit_try_run_case+0x1a5/0x480 [ 14.996151] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.996172] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.996195] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.996217] ? __kthread_parkme+0x82/0x180 [ 14.996238] ? preempt_count_sub+0x50/0x80 [ 14.996263] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.996287] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.996309] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.996333] kthread+0x337/0x6f0 [ 14.996352] ? trace_preempt_on+0x20/0xc0 [ 14.996376] ? __pfx_kthread+0x10/0x10 [ 14.996397] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.996419] ? calculate_sigpending+0x7b/0xa0 [ 14.996443] ? __pfx_kthread+0x10/0x10 [ 14.996465] ret_from_fork+0x116/0x1d0 [ 14.996483] ? __pfx_kthread+0x10/0x10 [ 14.996504] ret_from_fork_asm+0x1a/0x30 [ 14.996534] </TASK> [ 14.996545] [ 15.008913] Allocated by task 290: [ 15.009066] kasan_save_stack+0x45/0x70 [ 15.009214] kasan_save_track+0x18/0x40 [ 15.009396] kasan_save_alloc_info+0x3b/0x50 [ 15.009671] __kasan_kmalloc+0xb7/0xc0 [ 15.009859] __kmalloc_cache_noprof+0x189/0x420 [ 15.010065] kasan_atomics+0x95/0x310 [ 15.010193] kunit_try_run_case+0x1a5/0x480 [ 15.010369] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.010744] kthread+0x337/0x6f0 [ 15.010872] ret_from_fork+0x116/0x1d0 [ 15.011010] ret_from_fork_asm+0x1a/0x30 [ 15.011180] [ 15.011272] The buggy address belongs to the object at ffff8881028d8d80 [ 15.011272] which belongs to the cache kmalloc-64 of size 64 [ 15.011777] The buggy address is located 0 bytes to the right of [ 15.011777] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 15.012420] [ 15.012517] The buggy address belongs to the physical page: [ 15.012729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 15.012984] flags: 0x200000000000000(node=0|zone=2) [ 15.013214] page_type: f5(slab) [ 15.013387] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.013729] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.014820] page dumped because: kasan: bad access detected [ 15.015159] [ 15.015252] Memory state around the buggy address: [ 15.015488] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.015805] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.016111] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.016385] ^ [ 15.016829] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.017178] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.017609] ================================================================== [ 15.202399] ================================================================== [ 15.203091] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 15.203533] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 15.203790] [ 15.204100] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 15.204150] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.204249] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.204273] Call Trace: [ 15.204288] <TASK> [ 15.204304] dump_stack_lvl+0x73/0xb0 [ 15.204335] print_report+0xd1/0x650 [ 15.204357] ? __virt_addr_valid+0x1db/0x2d0 [ 15.204379] ? kasan_atomics_helper+0x2006/0x5450 [ 15.204420] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.204442] ? kasan_atomics_helper+0x2006/0x5450 [ 15.204464] kasan_report+0x141/0x180 [ 15.204487] ? kasan_atomics_helper+0x2006/0x5450 [ 15.204514] kasan_check_range+0x10c/0x1c0 [ 15.204538] __kasan_check_write+0x18/0x20 [ 15.204558] kasan_atomics_helper+0x2006/0x5450 [ 15.204581] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.204603] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.204628] ? kasan_atomics+0x152/0x310 [ 15.204654] kasan_atomics+0x1dc/0x310 [ 15.204677] ? __pfx_kasan_atomics+0x10/0x10 [ 15.204701] ? __pfx_read_tsc+0x10/0x10 [ 15.204722] ? ktime_get_ts64+0x86/0x230 [ 15.204748] kunit_try_run_case+0x1a5/0x480 [ 15.204771] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.204794] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.204817] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.204840] ? __kthread_parkme+0x82/0x180 [ 15.204860] ? preempt_count_sub+0x50/0x80 [ 15.204882] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.204906] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.204940] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.204963] kthread+0x337/0x6f0 [ 15.204983] ? trace_preempt_on+0x20/0xc0 [ 15.205007] ? __pfx_kthread+0x10/0x10 [ 15.205029] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.205051] ? calculate_sigpending+0x7b/0xa0 [ 15.205075] ? __pfx_kthread+0x10/0x10 [ 15.205096] ret_from_fork+0x116/0x1d0 [ 15.205115] ? __pfx_kthread+0x10/0x10 [ 15.205135] ret_from_fork_asm+0x1a/0x30 [ 15.205165] </TASK> [ 15.205176] [ 15.214106] Allocated by task 290: [ 15.214250] kasan_save_stack+0x45/0x70 [ 15.214444] kasan_save_track+0x18/0x40 [ 15.214634] kasan_save_alloc_info+0x3b/0x50 [ 15.214800] __kasan_kmalloc+0xb7/0xc0 [ 15.214978] __kmalloc_cache_noprof+0x189/0x420 [ 15.215174] kasan_atomics+0x95/0x310 [ 15.215357] kunit_try_run_case+0x1a5/0x480 [ 15.216138] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.216340] kthread+0x337/0x6f0 [ 15.216466] ret_from_fork+0x116/0x1d0 [ 15.216597] ret_from_fork_asm+0x1a/0x30 [ 15.216731] [ 15.216799] The buggy address belongs to the object at ffff8881028d8d80 [ 15.216799] which belongs to the cache kmalloc-64 of size 64 [ 15.217207] The buggy address is located 0 bytes to the right of [ 15.217207] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 15.218113] [ 15.218205] The buggy address belongs to the physical page: [ 15.218417] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 15.218855] flags: 0x200000000000000(node=0|zone=2) [ 15.219086] page_type: f5(slab) [ 15.219298] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.219705] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.220025] page dumped because: kasan: bad access detected [ 15.220261] [ 15.220351] Memory state around the buggy address: [ 15.220726] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.221050] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.221326] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.221828] ^ [ 15.222027] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.222341] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.222743] ================================================================== [ 15.332278] ================================================================== [ 15.332799] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 15.333589] Read of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 15.334287] [ 15.334455] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 15.334500] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.334512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.334534] Call Trace: [ 15.334552] <TASK> [ 15.334569] dump_stack_lvl+0x73/0xb0 [ 15.334597] print_report+0xd1/0x650 [ 15.334620] ? __virt_addr_valid+0x1db/0x2d0 [ 15.334643] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.334665] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.334687] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.334709] kasan_report+0x141/0x180 [ 15.334732] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.334758] __asan_report_load8_noabort+0x18/0x20 [ 15.334782] kasan_atomics_helper+0x4fa5/0x5450 [ 15.334805] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.334828] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.334853] ? kasan_atomics+0x152/0x310 [ 15.334880] kasan_atomics+0x1dc/0x310 [ 15.334902] ? __pfx_kasan_atomics+0x10/0x10 [ 15.334926] ? __pfx_read_tsc+0x10/0x10 [ 15.334960] ? ktime_get_ts64+0x86/0x230 [ 15.334986] kunit_try_run_case+0x1a5/0x480 [ 15.335010] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.335033] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.335056] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.335079] ? __kthread_parkme+0x82/0x180 [ 15.335100] ? preempt_count_sub+0x50/0x80 [ 15.335125] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.335149] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.335172] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.335195] kthread+0x337/0x6f0 [ 15.335215] ? trace_preempt_on+0x20/0xc0 [ 15.335240] ? __pfx_kthread+0x10/0x10 [ 15.335261] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.335283] ? calculate_sigpending+0x7b/0xa0 [ 15.335307] ? __pfx_kthread+0x10/0x10 [ 15.335329] ret_from_fork+0x116/0x1d0 [ 15.335348] ? __pfx_kthread+0x10/0x10 [ 15.335369] ret_from_fork_asm+0x1a/0x30 [ 15.335410] </TASK> [ 15.335421] [ 15.344890] Allocated by task 290: [ 15.345024] kasan_save_stack+0x45/0x70 [ 15.345164] kasan_save_track+0x18/0x40 [ 15.345293] kasan_save_alloc_info+0x3b/0x50 [ 15.345434] __kasan_kmalloc+0xb7/0xc0 [ 15.345560] __kmalloc_cache_noprof+0x189/0x420 [ 15.345887] kasan_atomics+0x95/0x310 [ 15.346217] kunit_try_run_case+0x1a5/0x480 [ 15.346639] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.347093] kthread+0x337/0x6f0 [ 15.347380] ret_from_fork+0x116/0x1d0 [ 15.347835] ret_from_fork_asm+0x1a/0x30 [ 15.348182] [ 15.348336] The buggy address belongs to the object at ffff8881028d8d80 [ 15.348336] which belongs to the cache kmalloc-64 of size 64 [ 15.349461] The buggy address is located 0 bytes to the right of [ 15.349461] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 15.350558] [ 15.350713] The buggy address belongs to the physical page: [ 15.351188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 15.351857] flags: 0x200000000000000(node=0|zone=2) [ 15.352290] page_type: f5(slab) [ 15.352600] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.353240] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.353605] page dumped because: kasan: bad access detected [ 15.353777] [ 15.353841] Memory state around the buggy address: [ 15.354001] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.354211] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.354427] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.354643] ^ [ 15.354833] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.355146] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.355350] ================================================================== [ 14.492089] ================================================================== [ 14.492360] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 14.492705] Read of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.493745] [ 14.493874] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.493941] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.493956] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.493978] Call Trace: [ 14.493996] <TASK> [ 14.494013] dump_stack_lvl+0x73/0xb0 [ 14.494044] print_report+0xd1/0x650 [ 14.494067] ? __virt_addr_valid+0x1db/0x2d0 [ 14.494090] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.494111] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.494134] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.494155] kasan_report+0x141/0x180 [ 14.494178] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.494204] __asan_report_load4_noabort+0x18/0x20 [ 14.494229] kasan_atomics_helper+0x4a36/0x5450 [ 14.494252] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.494274] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.494299] ? kasan_atomics+0x152/0x310 [ 14.494325] kasan_atomics+0x1dc/0x310 [ 14.494347] ? __pfx_kasan_atomics+0x10/0x10 [ 14.494372] ? __pfx_read_tsc+0x10/0x10 [ 14.494497] ? ktime_get_ts64+0x86/0x230 [ 14.494532] kunit_try_run_case+0x1a5/0x480 [ 14.494557] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.494580] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.494603] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.494626] ? __kthread_parkme+0x82/0x180 [ 14.494655] ? preempt_count_sub+0x50/0x80 [ 14.494680] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.494703] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.494726] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.494750] kthread+0x337/0x6f0 [ 14.494770] ? trace_preempt_on+0x20/0xc0 [ 14.494795] ? __pfx_kthread+0x10/0x10 [ 14.494817] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.494838] ? calculate_sigpending+0x7b/0xa0 [ 14.494863] ? __pfx_kthread+0x10/0x10 [ 14.494885] ret_from_fork+0x116/0x1d0 [ 14.494904] ? __pfx_kthread+0x10/0x10 [ 14.494926] ret_from_fork_asm+0x1a/0x30 [ 14.494969] </TASK> [ 14.494980] [ 14.501763] Allocated by task 290: [ 14.501906] kasan_save_stack+0x45/0x70 [ 14.502079] kasan_save_track+0x18/0x40 [ 14.502209] kasan_save_alloc_info+0x3b/0x50 [ 14.502350] __kasan_kmalloc+0xb7/0xc0 [ 14.502503] __kmalloc_cache_noprof+0x189/0x420 [ 14.502721] kasan_atomics+0x95/0x310 [ 14.502904] kunit_try_run_case+0x1a5/0x480 [ 14.503172] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.503470] kthread+0x337/0x6f0 [ 14.503630] ret_from_fork+0x116/0x1d0 [ 14.503808] ret_from_fork_asm+0x1a/0x30 [ 14.503982] [ 14.504059] The buggy address belongs to the object at ffff8881028d8d80 [ 14.504059] which belongs to the cache kmalloc-64 of size 64 [ 14.504510] The buggy address is located 0 bytes to the right of [ 14.504510] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.505015] [ 14.505106] The buggy address belongs to the physical page: [ 14.505317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.505641] flags: 0x200000000000000(node=0|zone=2) [ 14.505835] page_type: f5(slab) [ 14.505958] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.506180] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.506405] page dumped because: kasan: bad access detected [ 14.506703] [ 14.506791] Memory state around the buggy address: [ 14.507014] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.507310] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.507519] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.507724] ^ [ 14.507871] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.508442] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.508754] ================================================================== [ 14.116205] ================================================================== [ 14.116541] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 14.117151] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.117483] [ 14.117564] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.117612] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.117625] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.117646] Call Trace: [ 14.117662] <TASK> [ 14.117679] dump_stack_lvl+0x73/0xb0 [ 14.117716] print_report+0xd1/0x650 [ 14.117738] ? __virt_addr_valid+0x1db/0x2d0 [ 14.117762] ? kasan_atomics_helper+0x697/0x5450 [ 14.117782] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.117807] ? kasan_atomics_helper+0x697/0x5450 [ 14.117829] kasan_report+0x141/0x180 [ 14.117850] ? kasan_atomics_helper+0x697/0x5450 [ 14.117876] kasan_check_range+0x10c/0x1c0 [ 14.117899] __kasan_check_write+0x18/0x20 [ 14.117919] kasan_atomics_helper+0x697/0x5450 [ 14.117951] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.117974] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.117999] ? kasan_atomics+0x152/0x310 [ 14.118025] kasan_atomics+0x1dc/0x310 [ 14.118048] ? __pfx_kasan_atomics+0x10/0x10 [ 14.118073] ? __pfx_read_tsc+0x10/0x10 [ 14.118094] ? ktime_get_ts64+0x86/0x230 [ 14.118120] kunit_try_run_case+0x1a5/0x480 [ 14.118143] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.118166] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.118188] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.118211] ? __kthread_parkme+0x82/0x180 [ 14.118232] ? preempt_count_sub+0x50/0x80 [ 14.118255] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.118278] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.118302] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.118325] kthread+0x337/0x6f0 [ 14.118344] ? trace_preempt_on+0x20/0xc0 [ 14.118369] ? __pfx_kthread+0x10/0x10 [ 14.118404] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.118425] ? calculate_sigpending+0x7b/0xa0 [ 14.118450] ? __pfx_kthread+0x10/0x10 [ 14.118472] ret_from_fork+0x116/0x1d0 [ 14.118491] ? __pfx_kthread+0x10/0x10 [ 14.118512] ret_from_fork_asm+0x1a/0x30 [ 14.118543] </TASK> [ 14.118554] [ 14.126141] Allocated by task 290: [ 14.126272] kasan_save_stack+0x45/0x70 [ 14.126484] kasan_save_track+0x18/0x40 [ 14.126714] kasan_save_alloc_info+0x3b/0x50 [ 14.126924] __kasan_kmalloc+0xb7/0xc0 [ 14.127117] __kmalloc_cache_noprof+0x189/0x420 [ 14.127336] kasan_atomics+0x95/0x310 [ 14.127520] kunit_try_run_case+0x1a5/0x480 [ 14.127818] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.128165] kthread+0x337/0x6f0 [ 14.128305] ret_from_fork+0x116/0x1d0 [ 14.128546] ret_from_fork_asm+0x1a/0x30 [ 14.128680] [ 14.128773] The buggy address belongs to the object at ffff8881028d8d80 [ 14.128773] which belongs to the cache kmalloc-64 of size 64 [ 14.129267] The buggy address is located 0 bytes to the right of [ 14.129267] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.129728] [ 14.129814] The buggy address belongs to the physical page: [ 14.129987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.130265] flags: 0x200000000000000(node=0|zone=2) [ 14.130635] page_type: f5(slab) [ 14.130880] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.131214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.131426] page dumped because: kasan: bad access detected [ 14.131586] [ 14.131647] Memory state around the buggy address: [ 14.131790] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.132063] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.132576] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.132936] ^ [ 14.133092] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.133387] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.133640] ================================================================== [ 14.448654] ================================================================== [ 14.449019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 14.449359] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.449877] [ 14.450016] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.450065] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.450078] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.450099] Call Trace: [ 14.450115] <TASK> [ 14.450133] dump_stack_lvl+0x73/0xb0 [ 14.450163] print_report+0xd1/0x650 [ 14.450187] ? __virt_addr_valid+0x1db/0x2d0 [ 14.450210] ? kasan_atomics_helper+0xf10/0x5450 [ 14.450231] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.450253] ? kasan_atomics_helper+0xf10/0x5450 [ 14.450275] kasan_report+0x141/0x180 [ 14.450297] ? kasan_atomics_helper+0xf10/0x5450 [ 14.450323] kasan_check_range+0x10c/0x1c0 [ 14.450347] __kasan_check_write+0x18/0x20 [ 14.450379] kasan_atomics_helper+0xf10/0x5450 [ 14.450412] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.450446] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.450471] ? kasan_atomics+0x152/0x310 [ 14.450506] kasan_atomics+0x1dc/0x310 [ 14.450529] ? __pfx_kasan_atomics+0x10/0x10 [ 14.450554] ? __pfx_read_tsc+0x10/0x10 [ 14.450586] ? ktime_get_ts64+0x86/0x230 [ 14.450612] kunit_try_run_case+0x1a5/0x480 [ 14.450636] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.450659] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.450681] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.450704] ? __kthread_parkme+0x82/0x180 [ 14.450724] ? preempt_count_sub+0x50/0x80 [ 14.450748] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.450772] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.450796] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.450820] kthread+0x337/0x6f0 [ 14.450840] ? trace_preempt_on+0x20/0xc0 [ 14.450864] ? __pfx_kthread+0x10/0x10 [ 14.450886] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.450907] ? calculate_sigpending+0x7b/0xa0 [ 14.450942] ? __pfx_kthread+0x10/0x10 [ 14.450964] ret_from_fork+0x116/0x1d0 [ 14.450992] ? __pfx_kthread+0x10/0x10 [ 14.451012] ret_from_fork_asm+0x1a/0x30 [ 14.451054] </TASK> [ 14.451065] [ 14.458828] Allocated by task 290: [ 14.458965] kasan_save_stack+0x45/0x70 [ 14.459166] kasan_save_track+0x18/0x40 [ 14.459354] kasan_save_alloc_info+0x3b/0x50 [ 14.459599] __kasan_kmalloc+0xb7/0xc0 [ 14.459809] __kmalloc_cache_noprof+0x189/0x420 [ 14.460002] kasan_atomics+0x95/0x310 [ 14.460173] kunit_try_run_case+0x1a5/0x480 [ 14.460365] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.460612] kthread+0x337/0x6f0 [ 14.460783] ret_from_fork+0x116/0x1d0 [ 14.460971] ret_from_fork_asm+0x1a/0x30 [ 14.461153] [ 14.461245] The buggy address belongs to the object at ffff8881028d8d80 [ 14.461245] which belongs to the cache kmalloc-64 of size 64 [ 14.461790] The buggy address is located 0 bytes to the right of [ 14.461790] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.462307] [ 14.462436] The buggy address belongs to the physical page: [ 14.462617] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.462853] flags: 0x200000000000000(node=0|zone=2) [ 14.463065] page_type: f5(slab) [ 14.463250] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.463576] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.463899] page dumped because: kasan: bad access detected [ 14.464170] [ 14.464235] Memory state around the buggy address: [ 14.464407] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.464746] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.465056] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.465344] ^ [ 14.465579] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.465886] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.466192] ================================================================== [ 14.181027] ================================================================== [ 14.181673] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 14.182410] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.182741] [ 14.183121] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.183175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.183188] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.183209] Call Trace: [ 14.183227] <TASK> [ 14.183243] dump_stack_lvl+0x73/0xb0 [ 14.183273] print_report+0xd1/0x650 [ 14.183295] ? __virt_addr_valid+0x1db/0x2d0 [ 14.183319] ? kasan_atomics_helper+0x860/0x5450 [ 14.183340] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.183362] ? kasan_atomics_helper+0x860/0x5450 [ 14.183384] kasan_report+0x141/0x180 [ 14.183422] ? kasan_atomics_helper+0x860/0x5450 [ 14.183449] kasan_check_range+0x10c/0x1c0 [ 14.183473] __kasan_check_write+0x18/0x20 [ 14.183492] kasan_atomics_helper+0x860/0x5450 [ 14.183515] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.183537] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.183562] ? kasan_atomics+0x152/0x310 [ 14.183587] kasan_atomics+0x1dc/0x310 [ 14.183610] ? __pfx_kasan_atomics+0x10/0x10 [ 14.183633] ? __pfx_read_tsc+0x10/0x10 [ 14.183655] ? ktime_get_ts64+0x86/0x230 [ 14.183682] kunit_try_run_case+0x1a5/0x480 [ 14.183707] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.183729] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.183751] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.183774] ? __kthread_parkme+0x82/0x180 [ 14.183794] ? preempt_count_sub+0x50/0x80 [ 14.183818] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.183843] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.183866] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.183890] kthread+0x337/0x6f0 [ 14.183909] ? trace_preempt_on+0x20/0xc0 [ 14.183945] ? __pfx_kthread+0x10/0x10 [ 14.183966] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.183987] ? calculate_sigpending+0x7b/0xa0 [ 14.184011] ? __pfx_kthread+0x10/0x10 [ 14.184033] ret_from_fork+0x116/0x1d0 [ 14.184052] ? __pfx_kthread+0x10/0x10 [ 14.184072] ret_from_fork_asm+0x1a/0x30 [ 14.184103] </TASK> [ 14.184114] [ 14.192395] Allocated by task 290: [ 14.192608] kasan_save_stack+0x45/0x70 [ 14.193046] kasan_save_track+0x18/0x40 [ 14.193248] kasan_save_alloc_info+0x3b/0x50 [ 14.193690] __kasan_kmalloc+0xb7/0xc0 [ 14.193906] __kmalloc_cache_noprof+0x189/0x420 [ 14.194149] kasan_atomics+0x95/0x310 [ 14.194334] kunit_try_run_case+0x1a5/0x480 [ 14.194609] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.194914] kthread+0x337/0x6f0 [ 14.195087] ret_from_fork+0x116/0x1d0 [ 14.195214] ret_from_fork_asm+0x1a/0x30 [ 14.195347] [ 14.195524] The buggy address belongs to the object at ffff8881028d8d80 [ 14.195524] which belongs to the cache kmalloc-64 of size 64 [ 14.196068] The buggy address is located 0 bytes to the right of [ 14.196068] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.196724] [ 14.196799] The buggy address belongs to the physical page: [ 14.196983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.197332] flags: 0x200000000000000(node=0|zone=2) [ 14.197730] page_type: f5(slab) [ 14.197846] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.198719] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.198996] page dumped because: kasan: bad access detected [ 14.199166] [ 14.199231] Memory state around the buggy address: [ 14.199380] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.199689] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.200010] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.200783] ^ [ 14.201030] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.201365] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.201782] ================================================================== [ 14.779664] ================================================================== [ 14.780201] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 14.780598] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.780881] [ 14.780999] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.781050] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.781063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.781085] Call Trace: [ 14.781108] <TASK> [ 14.781130] dump_stack_lvl+0x73/0xb0 [ 14.781160] print_report+0xd1/0x650 [ 14.781184] ? __virt_addr_valid+0x1db/0x2d0 [ 14.781207] ? kasan_atomics_helper+0x151d/0x5450 [ 14.781230] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.781252] ? kasan_atomics_helper+0x151d/0x5450 [ 14.781274] kasan_report+0x141/0x180 [ 14.781296] ? kasan_atomics_helper+0x151d/0x5450 [ 14.781322] kasan_check_range+0x10c/0x1c0 [ 14.781346] __kasan_check_write+0x18/0x20 [ 14.781365] kasan_atomics_helper+0x151d/0x5450 [ 14.781388] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.781411] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.781437] ? kasan_atomics+0x152/0x310 [ 14.781463] kasan_atomics+0x1dc/0x310 [ 14.781486] ? __pfx_kasan_atomics+0x10/0x10 [ 14.781511] ? __pfx_read_tsc+0x10/0x10 [ 14.781534] ? ktime_get_ts64+0x86/0x230 [ 14.781561] kunit_try_run_case+0x1a5/0x480 [ 14.781586] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.781608] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.781632] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.781654] ? __kthread_parkme+0x82/0x180 [ 14.781675] ? preempt_count_sub+0x50/0x80 [ 14.781705] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.781728] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.781751] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.781774] kthread+0x337/0x6f0 [ 14.781793] ? trace_preempt_on+0x20/0xc0 [ 14.781819] ? __pfx_kthread+0x10/0x10 [ 14.781840] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.781861] ? calculate_sigpending+0x7b/0xa0 [ 14.781885] ? __pfx_kthread+0x10/0x10 [ 14.781907] ret_from_fork+0x116/0x1d0 [ 14.781925] ? __pfx_kthread+0x10/0x10 [ 14.781956] ret_from_fork_asm+0x1a/0x30 [ 14.781989] </TASK> [ 14.782003] [ 14.788990] Allocated by task 290: [ 14.789113] kasan_save_stack+0x45/0x70 [ 14.789246] kasan_save_track+0x18/0x40 [ 14.789620] kasan_save_alloc_info+0x3b/0x50 [ 14.789834] __kasan_kmalloc+0xb7/0xc0 [ 14.789997] __kmalloc_cache_noprof+0x189/0x420 [ 14.790213] kasan_atomics+0x95/0x310 [ 14.790393] kunit_try_run_case+0x1a5/0x480 [ 14.790602] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.790860] kthread+0x337/0x6f0 [ 14.791003] ret_from_fork+0x116/0x1d0 [ 14.791126] ret_from_fork_asm+0x1a/0x30 [ 14.791291] [ 14.791381] The buggy address belongs to the object at ffff8881028d8d80 [ 14.791381] which belongs to the cache kmalloc-64 of size 64 [ 14.791875] The buggy address is located 0 bytes to the right of [ 14.791875] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.792346] [ 14.792477] The buggy address belongs to the physical page: [ 14.792678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.792950] flags: 0x200000000000000(node=0|zone=2) [ 14.793102] page_type: f5(slab) [ 14.793212] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.793425] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.793713] page dumped because: kasan: bad access detected [ 14.793960] [ 14.794047] Memory state around the buggy address: [ 14.794261] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.794712] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.794975] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.795174] ^ [ 14.795316] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.795838] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.796160] ================================================================== [ 15.063995] ================================================================== [ 15.064275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 15.064522] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 15.065368] [ 15.065492] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 15.065538] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.065551] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.065573] Call Trace: [ 15.065591] <TASK> [ 15.065606] dump_stack_lvl+0x73/0xb0 [ 15.065837] print_report+0xd1/0x650 [ 15.065862] ? __virt_addr_valid+0x1db/0x2d0 [ 15.065886] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.065907] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.065943] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.065965] kasan_report+0x141/0x180 [ 15.065987] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.066013] kasan_check_range+0x10c/0x1c0 [ 15.066037] __kasan_check_write+0x18/0x20 [ 15.066058] kasan_atomics_helper+0x1ce1/0x5450 [ 15.066080] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.066103] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.066127] ? kasan_atomics+0x152/0x310 [ 15.066153] kasan_atomics+0x1dc/0x310 [ 15.066176] ? __pfx_kasan_atomics+0x10/0x10 [ 15.066200] ? __pfx_read_tsc+0x10/0x10 [ 15.066221] ? ktime_get_ts64+0x86/0x230 [ 15.066247] kunit_try_run_case+0x1a5/0x480 [ 15.066270] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.066292] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.066315] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.066338] ? __kthread_parkme+0x82/0x180 [ 15.066358] ? preempt_count_sub+0x50/0x80 [ 15.066381] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.066420] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.066443] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.066467] kthread+0x337/0x6f0 [ 15.066486] ? trace_preempt_on+0x20/0xc0 [ 15.066510] ? __pfx_kthread+0x10/0x10 [ 15.066531] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.066551] ? calculate_sigpending+0x7b/0xa0 [ 15.066576] ? __pfx_kthread+0x10/0x10 [ 15.066597] ret_from_fork+0x116/0x1d0 [ 15.066615] ? __pfx_kthread+0x10/0x10 [ 15.066636] ret_from_fork_asm+0x1a/0x30 [ 15.066666] </TASK> [ 15.066678] [ 15.077008] Allocated by task 290: [ 15.077374] kasan_save_stack+0x45/0x70 [ 15.077698] kasan_save_track+0x18/0x40 [ 15.077879] kasan_save_alloc_info+0x3b/0x50 [ 15.078091] __kasan_kmalloc+0xb7/0xc0 [ 15.078268] __kmalloc_cache_noprof+0x189/0x420 [ 15.078688] kasan_atomics+0x95/0x310 [ 15.078973] kunit_try_run_case+0x1a5/0x480 [ 15.079189] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.079580] kthread+0x337/0x6f0 [ 15.079827] ret_from_fork+0x116/0x1d0 [ 15.079980] ret_from_fork_asm+0x1a/0x30 [ 15.080176] [ 15.080267] The buggy address belongs to the object at ffff8881028d8d80 [ 15.080267] which belongs to the cache kmalloc-64 of size 64 [ 15.081090] The buggy address is located 0 bytes to the right of [ 15.081090] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 15.081798] [ 15.081896] The buggy address belongs to the physical page: [ 15.082140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 15.082659] flags: 0x200000000000000(node=0|zone=2) [ 15.082871] page_type: f5(slab) [ 15.083027] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.083341] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.083939] page dumped because: kasan: bad access detected [ 15.084246] [ 15.084346] Memory state around the buggy address: [ 15.084738] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.085045] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.085445] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.085800] ^ [ 15.086166] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.086502] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.086852] ================================================================== [ 14.020480] ================================================================== [ 14.020887] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 14.021168] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.021581] [ 14.021678] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.021733] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.021745] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.021768] Call Trace: [ 14.021789] <TASK> [ 14.021810] dump_stack_lvl+0x73/0xb0 [ 14.021839] print_report+0xd1/0x650 [ 14.021863] ? __virt_addr_valid+0x1db/0x2d0 [ 14.021887] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.021907] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.021942] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.021967] kasan_report+0x141/0x180 [ 14.021990] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.022017] kasan_check_range+0x10c/0x1c0 [ 14.022041] __kasan_check_write+0x18/0x20 [ 14.022061] kasan_atomics_helper+0x4a0/0x5450 [ 14.022083] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.022104] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.022130] ? kasan_atomics+0x152/0x310 [ 14.022156] kasan_atomics+0x1dc/0x310 [ 14.022178] ? __pfx_kasan_atomics+0x10/0x10 [ 14.022203] ? __pfx_read_tsc+0x10/0x10 [ 14.022227] ? ktime_get_ts64+0x86/0x230 [ 14.022253] kunit_try_run_case+0x1a5/0x480 [ 14.022280] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.022303] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.022326] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.022349] ? __kthread_parkme+0x82/0x180 [ 14.022370] ? preempt_count_sub+0x50/0x80 [ 14.022394] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.022418] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.022441] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.022464] kthread+0x337/0x6f0 [ 14.022484] ? trace_preempt_on+0x20/0xc0 [ 14.022509] ? __pfx_kthread+0x10/0x10 [ 14.022530] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.022551] ? calculate_sigpending+0x7b/0xa0 [ 14.022576] ? __pfx_kthread+0x10/0x10 [ 14.022598] ret_from_fork+0x116/0x1d0 [ 14.022617] ? __pfx_kthread+0x10/0x10 [ 14.022638] ret_from_fork_asm+0x1a/0x30 [ 14.022669] </TASK> [ 14.022681] [ 14.030278] Allocated by task 290: [ 14.030540] kasan_save_stack+0x45/0x70 [ 14.030750] kasan_save_track+0x18/0x40 [ 14.030940] kasan_save_alloc_info+0x3b/0x50 [ 14.031124] __kasan_kmalloc+0xb7/0xc0 [ 14.031251] __kmalloc_cache_noprof+0x189/0x420 [ 14.031639] kasan_atomics+0x95/0x310 [ 14.031838] kunit_try_run_case+0x1a5/0x480 [ 14.032052] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.032293] kthread+0x337/0x6f0 [ 14.032410] ret_from_fork+0x116/0x1d0 [ 14.032616] ret_from_fork_asm+0x1a/0x30 [ 14.032779] [ 14.032873] The buggy address belongs to the object at ffff8881028d8d80 [ 14.032873] which belongs to the cache kmalloc-64 of size 64 [ 14.033398] The buggy address is located 0 bytes to the right of [ 14.033398] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.034034] [ 14.034117] The buggy address belongs to the physical page: [ 14.034329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.034725] flags: 0x200000000000000(node=0|zone=2) [ 14.034927] page_type: f5(slab) [ 14.035095] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.035320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.035813] page dumped because: kasan: bad access detected [ 14.036099] [ 14.036192] Memory state around the buggy address: [ 14.036423] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.036818] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.037044] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.037285] ^ [ 14.037569] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.037901] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.038219] ================================================================== [ 15.040451] ================================================================== [ 15.040706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 15.041006] Read of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 15.041828] [ 15.042023] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 15.042074] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.042087] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.042108] Call Trace: [ 15.042126] <TASK> [ 15.042143] dump_stack_lvl+0x73/0xb0 [ 15.042172] print_report+0xd1/0x650 [ 15.042343] ? __virt_addr_valid+0x1db/0x2d0 [ 15.042368] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.042401] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.042424] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.042447] kasan_report+0x141/0x180 [ 15.042469] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.042495] __asan_report_load8_noabort+0x18/0x20 [ 15.042519] kasan_atomics_helper+0x4f30/0x5450 [ 15.042541] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.042564] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.042589] ? kasan_atomics+0x152/0x310 [ 15.042615] kasan_atomics+0x1dc/0x310 [ 15.042638] ? __pfx_kasan_atomics+0x10/0x10 [ 15.042661] ? __pfx_read_tsc+0x10/0x10 [ 15.042683] ? ktime_get_ts64+0x86/0x230 [ 15.042710] kunit_try_run_case+0x1a5/0x480 [ 15.042734] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.042756] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.042779] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.042801] ? __kthread_parkme+0x82/0x180 [ 15.042822] ? preempt_count_sub+0x50/0x80 [ 15.042846] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.042870] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.042893] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.042916] kthread+0x337/0x6f0 [ 15.042948] ? trace_preempt_on+0x20/0xc0 [ 15.042973] ? __pfx_kthread+0x10/0x10 [ 15.042994] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.043015] ? calculate_sigpending+0x7b/0xa0 [ 15.043038] ? __pfx_kthread+0x10/0x10 [ 15.043060] ret_from_fork+0x116/0x1d0 [ 15.043079] ? __pfx_kthread+0x10/0x10 [ 15.043099] ret_from_fork_asm+0x1a/0x30 [ 15.043130] </TASK> [ 15.043142] [ 15.053119] Allocated by task 290: [ 15.053277] kasan_save_stack+0x45/0x70 [ 15.053719] kasan_save_track+0x18/0x40 [ 15.053909] kasan_save_alloc_info+0x3b/0x50 [ 15.054263] __kasan_kmalloc+0xb7/0xc0 [ 15.054578] __kmalloc_cache_noprof+0x189/0x420 [ 15.054841] kasan_atomics+0x95/0x310 [ 15.055021] kunit_try_run_case+0x1a5/0x480 [ 15.055210] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.055658] kthread+0x337/0x6f0 [ 15.055910] ret_from_fork+0x116/0x1d0 [ 15.056079] ret_from_fork_asm+0x1a/0x30 [ 15.056405] [ 15.056507] The buggy address belongs to the object at ffff8881028d8d80 [ 15.056507] which belongs to the cache kmalloc-64 of size 64 [ 15.057223] The buggy address is located 0 bytes to the right of [ 15.057223] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 15.057942] [ 15.058031] The buggy address belongs to the physical page: [ 15.058361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 15.058688] flags: 0x200000000000000(node=0|zone=2) [ 15.058911] page_type: f5(slab) [ 15.059076] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.059711] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.060014] page dumped because: kasan: bad access detected [ 15.060346] [ 15.060433] Memory state around the buggy address: [ 15.060841] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.061277] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.061697] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.062083] ^ [ 15.062316] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.062801] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.063225] ================================================================== [ 14.752551] ================================================================== [ 14.753216] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 14.753888] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.754570] [ 14.754756] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.754802] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.754821] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.754841] Call Trace: [ 14.754859] <TASK> [ 14.754876] dump_stack_lvl+0x73/0xb0 [ 14.754904] print_report+0xd1/0x650 [ 14.754926] ? __virt_addr_valid+0x1db/0x2d0 [ 14.754957] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.754980] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.755002] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.755024] kasan_report+0x141/0x180 [ 14.755047] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.755074] __asan_report_store8_noabort+0x1b/0x30 [ 14.755099] kasan_atomics_helper+0x50d4/0x5450 [ 14.755122] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.755143] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.755168] ? kasan_atomics+0x152/0x310 [ 14.755195] kasan_atomics+0x1dc/0x310 [ 14.755217] ? __pfx_kasan_atomics+0x10/0x10 [ 14.755241] ? __pfx_read_tsc+0x10/0x10 [ 14.755262] ? ktime_get_ts64+0x86/0x230 [ 14.755289] kunit_try_run_case+0x1a5/0x480 [ 14.755313] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.755335] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.755358] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.755381] ? __kthread_parkme+0x82/0x180 [ 14.755421] ? preempt_count_sub+0x50/0x80 [ 14.755445] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.755468] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.755492] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.755515] kthread+0x337/0x6f0 [ 14.755535] ? trace_preempt_on+0x20/0xc0 [ 14.755559] ? __pfx_kthread+0x10/0x10 [ 14.755580] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.755601] ? calculate_sigpending+0x7b/0xa0 [ 14.755625] ? __pfx_kthread+0x10/0x10 [ 14.755646] ret_from_fork+0x116/0x1d0 [ 14.755665] ? __pfx_kthread+0x10/0x10 [ 14.755685] ret_from_fork_asm+0x1a/0x30 [ 14.755716] </TASK> [ 14.755728] [ 14.768149] Allocated by task 290: [ 14.768492] kasan_save_stack+0x45/0x70 [ 14.768849] kasan_save_track+0x18/0x40 [ 14.769206] kasan_save_alloc_info+0x3b/0x50 [ 14.769619] __kasan_kmalloc+0xb7/0xc0 [ 14.769976] __kmalloc_cache_noprof+0x189/0x420 [ 14.770384] kasan_atomics+0x95/0x310 [ 14.770575] kunit_try_run_case+0x1a5/0x480 [ 14.770710] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.770871] kthread+0x337/0x6f0 [ 14.770993] ret_from_fork+0x116/0x1d0 [ 14.771119] ret_from_fork_asm+0x1a/0x30 [ 14.771250] [ 14.771314] The buggy address belongs to the object at ffff8881028d8d80 [ 14.771314] which belongs to the cache kmalloc-64 of size 64 [ 14.772250] The buggy address is located 0 bytes to the right of [ 14.772250] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.773492] [ 14.773650] The buggy address belongs to the physical page: [ 14.774134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.774993] flags: 0x200000000000000(node=0|zone=2) [ 14.775414] page_type: f5(slab) [ 14.775734] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.776376] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.776944] page dumped because: kasan: bad access detected [ 14.777106] [ 14.777169] Memory state around the buggy address: [ 14.777314] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.777592] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.777943] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.778198] ^ [ 14.778360] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.778689] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.778968] ================================================================== [ 14.038653] ================================================================== [ 14.039017] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 14.039363] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.039679] [ 14.039785] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.039834] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.039845] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.039867] Call Trace: [ 14.040105] <TASK> [ 14.040135] dump_stack_lvl+0x73/0xb0 [ 14.040169] print_report+0xd1/0x650 [ 14.040192] ? __virt_addr_valid+0x1db/0x2d0 [ 14.040216] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.040236] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.040259] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.040280] kasan_report+0x141/0x180 [ 14.040302] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.040328] __asan_report_store4_noabort+0x1b/0x30 [ 14.040353] kasan_atomics_helper+0x4b3a/0x5450 [ 14.040447] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.040473] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.040500] ? kasan_atomics+0x152/0x310 [ 14.040526] kasan_atomics+0x1dc/0x310 [ 14.040549] ? __pfx_kasan_atomics+0x10/0x10 [ 14.040574] ? __pfx_read_tsc+0x10/0x10 [ 14.040595] ? ktime_get_ts64+0x86/0x230 [ 14.040622] kunit_try_run_case+0x1a5/0x480 [ 14.040646] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.040669] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.040692] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.040715] ? __kthread_parkme+0x82/0x180 [ 14.040737] ? preempt_count_sub+0x50/0x80 [ 14.040760] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.040784] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.040808] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.040831] kthread+0x337/0x6f0 [ 14.040850] ? trace_preempt_on+0x20/0xc0 [ 14.040875] ? __pfx_kthread+0x10/0x10 [ 14.040897] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.040918] ? calculate_sigpending+0x7b/0xa0 [ 14.040955] ? __pfx_kthread+0x10/0x10 [ 14.040978] ret_from_fork+0x116/0x1d0 [ 14.040997] ? __pfx_kthread+0x10/0x10 [ 14.041018] ret_from_fork_asm+0x1a/0x30 [ 14.041050] </TASK> [ 14.041062] [ 14.048882] Allocated by task 290: [ 14.049041] kasan_save_stack+0x45/0x70 [ 14.049252] kasan_save_track+0x18/0x40 [ 14.049460] kasan_save_alloc_info+0x3b/0x50 [ 14.049726] __kasan_kmalloc+0xb7/0xc0 [ 14.049953] __kmalloc_cache_noprof+0x189/0x420 [ 14.050134] kasan_atomics+0x95/0x310 [ 14.050312] kunit_try_run_case+0x1a5/0x480 [ 14.050528] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.050725] kthread+0x337/0x6f0 [ 14.050916] ret_from_fork+0x116/0x1d0 [ 14.051108] ret_from_fork_asm+0x1a/0x30 [ 14.051303] [ 14.051396] The buggy address belongs to the object at ffff8881028d8d80 [ 14.051396] which belongs to the cache kmalloc-64 of size 64 [ 14.052032] The buggy address is located 0 bytes to the right of [ 14.052032] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.052684] [ 14.052796] The buggy address belongs to the physical page: [ 14.053082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.053555] flags: 0x200000000000000(node=0|zone=2) [ 14.053830] page_type: f5(slab) [ 14.054006] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.054379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.054705] page dumped because: kasan: bad access detected [ 14.054962] [ 14.055071] Memory state around the buggy address: [ 14.055281] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.055564] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.055826] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.056170] ^ [ 14.056397] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.057055] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.057305] ================================================================== [ 14.276801] ================================================================== [ 14.277152] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 14.277479] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.277763] [ 14.277843] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.278219] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.278240] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.278262] Call Trace: [ 14.278281] <TASK> [ 14.278298] dump_stack_lvl+0x73/0xb0 [ 14.278329] print_report+0xd1/0x650 [ 14.278352] ? __virt_addr_valid+0x1db/0x2d0 [ 14.278375] ? kasan_atomics_helper+0xac7/0x5450 [ 14.278396] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.278419] ? kasan_atomics_helper+0xac7/0x5450 [ 14.278441] kasan_report+0x141/0x180 [ 14.278485] ? kasan_atomics_helper+0xac7/0x5450 [ 14.278526] kasan_check_range+0x10c/0x1c0 [ 14.278563] __kasan_check_write+0x18/0x20 [ 14.278596] kasan_atomics_helper+0xac7/0x5450 [ 14.278619] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.278641] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.278680] ? kasan_atomics+0x152/0x310 [ 14.278721] kasan_atomics+0x1dc/0x310 [ 14.278805] ? __pfx_kasan_atomics+0x10/0x10 [ 14.278831] ? __pfx_read_tsc+0x10/0x10 [ 14.278853] ? ktime_get_ts64+0x86/0x230 [ 14.278880] kunit_try_run_case+0x1a5/0x480 [ 14.278904] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.278926] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.278965] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.278990] ? __kthread_parkme+0x82/0x180 [ 14.279011] ? preempt_count_sub+0x50/0x80 [ 14.279035] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.279060] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.279084] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.279108] kthread+0x337/0x6f0 [ 14.279128] ? trace_preempt_on+0x20/0xc0 [ 14.279152] ? __pfx_kthread+0x10/0x10 [ 14.279173] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.279194] ? calculate_sigpending+0x7b/0xa0 [ 14.279218] ? __pfx_kthread+0x10/0x10 [ 14.279240] ret_from_fork+0x116/0x1d0 [ 14.279259] ? __pfx_kthread+0x10/0x10 [ 14.279280] ret_from_fork_asm+0x1a/0x30 [ 14.279312] </TASK> [ 14.279324] [ 14.287942] Allocated by task 290: [ 14.288069] kasan_save_stack+0x45/0x70 [ 14.288224] kasan_save_track+0x18/0x40 [ 14.288461] kasan_save_alloc_info+0x3b/0x50 [ 14.288717] __kasan_kmalloc+0xb7/0xc0 [ 14.288924] __kmalloc_cache_noprof+0x189/0x420 [ 14.289190] kasan_atomics+0x95/0x310 [ 14.289389] kunit_try_run_case+0x1a5/0x480 [ 14.289599] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.289853] kthread+0x337/0x6f0 [ 14.289978] ret_from_fork+0x116/0x1d0 [ 14.290106] ret_from_fork_asm+0x1a/0x30 [ 14.290264] [ 14.290352] The buggy address belongs to the object at ffff8881028d8d80 [ 14.290352] which belongs to the cache kmalloc-64 of size 64 [ 14.291025] The buggy address is located 0 bytes to the right of [ 14.291025] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.291787] [ 14.291865] The buggy address belongs to the physical page: [ 14.292044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.292342] flags: 0x200000000000000(node=0|zone=2) [ 14.292594] page_type: f5(slab) [ 14.292777] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.293206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.293640] page dumped because: kasan: bad access detected [ 14.293813] [ 14.293879] Memory state around the buggy address: [ 14.294129] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.294494] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.294998] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.295297] ^ [ 14.295624] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.296002] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.296435] ================================================================== [ 14.939586] ================================================================== [ 14.940179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 14.940545] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.940867] [ 14.940980] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.941025] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.941037] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.941057] Call Trace: [ 14.941072] <TASK> [ 14.941088] dump_stack_lvl+0x73/0xb0 [ 14.941133] print_report+0xd1/0x650 [ 14.941156] ? __virt_addr_valid+0x1db/0x2d0 [ 14.941178] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.941199] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.941222] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.941254] kasan_report+0x141/0x180 [ 14.941276] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.941302] kasan_check_range+0x10c/0x1c0 [ 14.941326] __kasan_check_write+0x18/0x20 [ 14.941345] kasan_atomics_helper+0x19e3/0x5450 [ 14.941367] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.941389] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.941414] ? kasan_atomics+0x152/0x310 [ 14.941441] kasan_atomics+0x1dc/0x310 [ 14.941463] ? __pfx_kasan_atomics+0x10/0x10 [ 14.941487] ? __pfx_read_tsc+0x10/0x10 [ 14.941509] ? ktime_get_ts64+0x86/0x230 [ 14.941535] kunit_try_run_case+0x1a5/0x480 [ 14.941558] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.941581] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.941603] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.941626] ? __kthread_parkme+0x82/0x180 [ 14.941646] ? preempt_count_sub+0x50/0x80 [ 14.941669] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.941697] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.941720] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.941744] kthread+0x337/0x6f0 [ 14.941763] ? trace_preempt_on+0x20/0xc0 [ 14.941788] ? __pfx_kthread+0x10/0x10 [ 14.941809] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.941830] ? calculate_sigpending+0x7b/0xa0 [ 14.941854] ? __pfx_kthread+0x10/0x10 [ 14.941876] ret_from_fork+0x116/0x1d0 [ 14.941894] ? __pfx_kthread+0x10/0x10 [ 14.941915] ret_from_fork_asm+0x1a/0x30 [ 14.941968] </TASK> [ 14.941979] [ 14.949796] Allocated by task 290: [ 14.950651] kasan_save_stack+0x45/0x70 [ 14.951543] kasan_save_track+0x18/0x40 [ 14.951693] kasan_save_alloc_info+0x3b/0x50 [ 14.951839] __kasan_kmalloc+0xb7/0xc0 [ 14.952206] __kmalloc_cache_noprof+0x189/0x420 [ 14.952766] kasan_atomics+0x95/0x310 [ 14.953244] kunit_try_run_case+0x1a5/0x480 [ 14.953727] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.953922] kthread+0x337/0x6f0 [ 14.954425] ret_from_fork+0x116/0x1d0 [ 14.954907] ret_from_fork_asm+0x1a/0x30 [ 14.955365] [ 14.955679] The buggy address belongs to the object at ffff8881028d8d80 [ 14.955679] which belongs to the cache kmalloc-64 of size 64 [ 14.956047] The buggy address is located 0 bytes to the right of [ 14.956047] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.956719] [ 14.957137] The buggy address belongs to the physical page: [ 14.957818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.958708] flags: 0x200000000000000(node=0|zone=2) [ 14.959327] page_type: f5(slab) [ 14.959784] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.960306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.961105] page dumped because: kasan: bad access detected [ 14.961581] [ 14.961657] Memory state around the buggy address: [ 14.961814] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.962039] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.962250] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.962653] ^ [ 14.963076] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.963691] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.964273] ================================================================== [ 13.939902] ================================================================== [ 13.940528] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 13.940893] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 13.941221] [ 13.941321] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 13.941364] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.941376] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.941397] Call Trace: [ 13.941412] <TASK> [ 13.941427] dump_stack_lvl+0x73/0xb0 [ 13.941454] print_report+0xd1/0x650 [ 13.941476] ? __virt_addr_valid+0x1db/0x2d0 [ 13.941498] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.941520] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.941543] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.941565] kasan_report+0x141/0x180 [ 13.941587] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.941613] __asan_report_store4_noabort+0x1b/0x30 [ 13.941638] kasan_atomics_helper+0x4b6e/0x5450 [ 13.941661] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.941688] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.941713] ? kasan_atomics+0x152/0x310 [ 13.941739] kasan_atomics+0x1dc/0x310 [ 13.941762] ? __pfx_kasan_atomics+0x10/0x10 [ 13.941786] ? __pfx_read_tsc+0x10/0x10 [ 13.941807] ? ktime_get_ts64+0x86/0x230 [ 13.941833] kunit_try_run_case+0x1a5/0x480 [ 13.941857] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.941879] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.941902] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.941925] ? __kthread_parkme+0x82/0x180 [ 13.941957] ? preempt_count_sub+0x50/0x80 [ 13.941980] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.942004] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.942029] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.942052] kthread+0x337/0x6f0 [ 13.942072] ? trace_preempt_on+0x20/0xc0 [ 13.942096] ? __pfx_kthread+0x10/0x10 [ 13.942117] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.942138] ? calculate_sigpending+0x7b/0xa0 [ 13.942162] ? __pfx_kthread+0x10/0x10 [ 13.942185] ret_from_fork+0x116/0x1d0 [ 13.942204] ? __pfx_kthread+0x10/0x10 [ 13.942226] ret_from_fork_asm+0x1a/0x30 [ 13.942259] </TASK> [ 13.942270] [ 13.950772] Allocated by task 290: [ 13.950900] kasan_save_stack+0x45/0x70 [ 13.951049] kasan_save_track+0x18/0x40 [ 13.953201] kasan_save_alloc_info+0x3b/0x50 [ 13.954515] __kasan_kmalloc+0xb7/0xc0 [ 13.955672] __kmalloc_cache_noprof+0x189/0x420 [ 13.956515] kasan_atomics+0x95/0x310 [ 13.956744] kunit_try_run_case+0x1a5/0x480 [ 13.956884] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.957851] kthread+0x337/0x6f0 [ 13.959113] ret_from_fork+0x116/0x1d0 [ 13.959289] ret_from_fork_asm+0x1a/0x30 [ 13.959877] [ 13.960099] The buggy address belongs to the object at ffff8881028d8d80 [ 13.960099] which belongs to the cache kmalloc-64 of size 64 [ 13.961752] The buggy address is located 0 bytes to the right of [ 13.961752] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 13.962222] [ 13.962320] The buggy address belongs to the physical page: [ 13.962647] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 13.963041] flags: 0x200000000000000(node=0|zone=2) [ 13.963548] page_type: f5(slab) [ 13.963760] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.964120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.964691] page dumped because: kasan: bad access detected [ 13.964961] [ 13.965057] Memory state around the buggy address: [ 13.965354] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.965763] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.966134] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.967013] ^ [ 13.967623] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.968302] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.969169] ================================================================== [ 14.813726] ================================================================== [ 14.814093] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 14.814475] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.814783] [ 14.814879] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.814939] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.814952] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.814975] Call Trace: [ 14.814996] <TASK> [ 14.815016] dump_stack_lvl+0x73/0xb0 [ 14.815045] print_report+0xd1/0x650 [ 14.815069] ? __virt_addr_valid+0x1db/0x2d0 [ 14.815093] ? kasan_atomics_helper+0x164f/0x5450 [ 14.815114] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.815136] ? kasan_atomics_helper+0x164f/0x5450 [ 14.815158] kasan_report+0x141/0x180 [ 14.815180] ? kasan_atomics_helper+0x164f/0x5450 [ 14.815207] kasan_check_range+0x10c/0x1c0 [ 14.815231] __kasan_check_write+0x18/0x20 [ 14.815252] kasan_atomics_helper+0x164f/0x5450 [ 14.815274] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.815296] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.815322] ? kasan_atomics+0x152/0x310 [ 14.815348] kasan_atomics+0x1dc/0x310 [ 14.815371] ? __pfx_kasan_atomics+0x10/0x10 [ 14.815395] ? __pfx_read_tsc+0x10/0x10 [ 14.815417] ? ktime_get_ts64+0x86/0x230 [ 14.815445] kunit_try_run_case+0x1a5/0x480 [ 14.815470] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.815492] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.815516] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.815539] ? __kthread_parkme+0x82/0x180 [ 14.815561] ? preempt_count_sub+0x50/0x80 [ 14.815586] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.815610] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.815633] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.815657] kthread+0x337/0x6f0 [ 14.815677] ? trace_preempt_on+0x20/0xc0 [ 14.815702] ? __pfx_kthread+0x10/0x10 [ 14.815724] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.815746] ? calculate_sigpending+0x7b/0xa0 [ 14.815770] ? __pfx_kthread+0x10/0x10 [ 14.815792] ret_from_fork+0x116/0x1d0 [ 14.815811] ? __pfx_kthread+0x10/0x10 [ 14.815833] ret_from_fork_asm+0x1a/0x30 [ 14.815863] </TASK> [ 14.815875] [ 14.824007] Allocated by task 290: [ 14.824385] kasan_save_stack+0x45/0x70 [ 14.824690] kasan_save_track+0x18/0x40 [ 14.825031] kasan_save_alloc_info+0x3b/0x50 [ 14.825224] __kasan_kmalloc+0xb7/0xc0 [ 14.825538] __kmalloc_cache_noprof+0x189/0x420 [ 14.826309] kasan_atomics+0x95/0x310 [ 14.826504] kunit_try_run_case+0x1a5/0x480 [ 14.826721] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.826961] kthread+0x337/0x6f0 [ 14.827099] ret_from_fork+0x116/0x1d0 [ 14.827281] ret_from_fork_asm+0x1a/0x30 [ 14.827948] [ 14.828041] The buggy address belongs to the object at ffff8881028d8d80 [ 14.828041] which belongs to the cache kmalloc-64 of size 64 [ 14.828756] The buggy address is located 0 bytes to the right of [ 14.828756] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.829359] [ 14.829544] The buggy address belongs to the physical page: [ 14.829889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.830249] flags: 0x200000000000000(node=0|zone=2) [ 14.830614] page_type: f5(slab) [ 14.830746] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.831153] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.831622] page dumped because: kasan: bad access detected [ 14.831835] [ 14.832004] Memory state around the buggy address: [ 14.832340] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.832715] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.833067] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.833420] ^ [ 14.833581] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.833900] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.834193] ================================================================== [ 14.088282] ================================================================== [ 14.088921] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 14.089627] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.090252] [ 14.090424] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.090473] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.090486] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.090508] Call Trace: [ 14.090528] <TASK> [ 14.090548] dump_stack_lvl+0x73/0xb0 [ 14.090590] print_report+0xd1/0x650 [ 14.090613] ? __virt_addr_valid+0x1db/0x2d0 [ 14.090636] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.090657] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.090680] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.090701] kasan_report+0x141/0x180 [ 14.090724] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.090749] kasan_check_range+0x10c/0x1c0 [ 14.090773] __kasan_check_write+0x18/0x20 [ 14.090792] kasan_atomics_helper+0x5fe/0x5450 [ 14.090814] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.090837] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.090863] ? kasan_atomics+0x152/0x310 [ 14.090888] kasan_atomics+0x1dc/0x310 [ 14.090911] ? __pfx_kasan_atomics+0x10/0x10 [ 14.090943] ? __pfx_read_tsc+0x10/0x10 [ 14.090966] ? ktime_get_ts64+0x86/0x230 [ 14.090992] kunit_try_run_case+0x1a5/0x480 [ 14.091017] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.091039] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.091062] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.091085] ? __kthread_parkme+0x82/0x180 [ 14.091105] ? preempt_count_sub+0x50/0x80 [ 14.091129] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.091153] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.091175] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.091198] kthread+0x337/0x6f0 [ 14.091218] ? trace_preempt_on+0x20/0xc0 [ 14.091243] ? __pfx_kthread+0x10/0x10 [ 14.091264] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.091285] ? calculate_sigpending+0x7b/0xa0 [ 14.091309] ? __pfx_kthread+0x10/0x10 [ 14.091331] ret_from_fork+0x116/0x1d0 [ 14.091350] ? __pfx_kthread+0x10/0x10 [ 14.091370] ret_from_fork_asm+0x1a/0x30 [ 14.091456] </TASK> [ 14.091471] [ 14.104681] Allocated by task 290: [ 14.105021] kasan_save_stack+0x45/0x70 [ 14.105377] kasan_save_track+0x18/0x40 [ 14.105792] kasan_save_alloc_info+0x3b/0x50 [ 14.106176] __kasan_kmalloc+0xb7/0xc0 [ 14.106525] __kmalloc_cache_noprof+0x189/0x420 [ 14.106993] kasan_atomics+0x95/0x310 [ 14.107329] kunit_try_run_case+0x1a5/0x480 [ 14.107758] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.108046] kthread+0x337/0x6f0 [ 14.108164] ret_from_fork+0x116/0x1d0 [ 14.108291] ret_from_fork_asm+0x1a/0x30 [ 14.108671] [ 14.108897] The buggy address belongs to the object at ffff8881028d8d80 [ 14.108897] which belongs to the cache kmalloc-64 of size 64 [ 14.110057] The buggy address is located 0 bytes to the right of [ 14.110057] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.111323] [ 14.111588] The buggy address belongs to the physical page: [ 14.111764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.112010] flags: 0x200000000000000(node=0|zone=2) [ 14.112169] page_type: f5(slab) [ 14.112283] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.112515] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.113186] page dumped because: kasan: bad access detected [ 14.113434] [ 14.113508] Memory state around the buggy address: [ 14.113654] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.114058] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.114362] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.114902] ^ [ 14.115070] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.115388] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.115757] ================================================================== [ 14.565333] ================================================================== [ 14.565861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 14.566237] Read of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.566589] [ 14.566793] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.566874] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.566887] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.566907] Call Trace: [ 14.566922] <TASK> [ 14.566947] dump_stack_lvl+0x73/0xb0 [ 14.566976] print_report+0xd1/0x650 [ 14.567000] ? __virt_addr_valid+0x1db/0x2d0 [ 14.567023] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.567044] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.567067] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.567089] kasan_report+0x141/0x180 [ 14.567111] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.567180] __asan_report_load4_noabort+0x18/0x20 [ 14.567206] kasan_atomics_helper+0x4a02/0x5450 [ 14.567248] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.567312] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.567410] ? kasan_atomics+0x152/0x310 [ 14.567440] kasan_atomics+0x1dc/0x310 [ 14.567508] ? __pfx_kasan_atomics+0x10/0x10 [ 14.567535] ? __pfx_read_tsc+0x10/0x10 [ 14.567557] ? ktime_get_ts64+0x86/0x230 [ 14.567595] kunit_try_run_case+0x1a5/0x480 [ 14.567619] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.567641] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.567664] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.567687] ? __kthread_parkme+0x82/0x180 [ 14.567707] ? preempt_count_sub+0x50/0x80 [ 14.567730] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.567755] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.567778] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.567801] kthread+0x337/0x6f0 [ 14.567821] ? trace_preempt_on+0x20/0xc0 [ 14.567845] ? __pfx_kthread+0x10/0x10 [ 14.567866] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.567887] ? calculate_sigpending+0x7b/0xa0 [ 14.567911] ? __pfx_kthread+0x10/0x10 [ 14.567940] ret_from_fork+0x116/0x1d0 [ 14.567959] ? __pfx_kthread+0x10/0x10 [ 14.567979] ret_from_fork_asm+0x1a/0x30 [ 14.568011] </TASK> [ 14.568022] [ 14.576339] Allocated by task 290: [ 14.576572] kasan_save_stack+0x45/0x70 [ 14.576851] kasan_save_track+0x18/0x40 [ 14.577050] kasan_save_alloc_info+0x3b/0x50 [ 14.577254] __kasan_kmalloc+0xb7/0xc0 [ 14.577384] __kmalloc_cache_noprof+0x189/0x420 [ 14.577671] kasan_atomics+0x95/0x310 [ 14.577803] kunit_try_run_case+0x1a5/0x480 [ 14.577996] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.578321] kthread+0x337/0x6f0 [ 14.578610] ret_from_fork+0x116/0x1d0 [ 14.578965] ret_from_fork_asm+0x1a/0x30 [ 14.579142] [ 14.579264] The buggy address belongs to the object at ffff8881028d8d80 [ 14.579264] which belongs to the cache kmalloc-64 of size 64 [ 14.579939] The buggy address is located 0 bytes to the right of [ 14.579939] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.580563] [ 14.580650] The buggy address belongs to the physical page: [ 14.580972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.581368] flags: 0x200000000000000(node=0|zone=2) [ 14.581604] page_type: f5(slab) [ 14.581728] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.581970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.582312] page dumped because: kasan: bad access detected [ 14.582807] [ 14.582878] Memory state around the buggy address: [ 14.583110] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.583573] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.583921] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.584275] ^ [ 14.584525] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.584881] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.585198] ================================================================== [ 14.693356] ================================================================== [ 14.694105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 14.694850] Read of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.695498] [ 14.695673] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.695726] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.695740] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.695761] Call Trace: [ 14.695779] <TASK> [ 14.695798] dump_stack_lvl+0x73/0xb0 [ 14.695828] print_report+0xd1/0x650 [ 14.695850] ? __virt_addr_valid+0x1db/0x2d0 [ 14.695872] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.695893] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.695916] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.695946] kasan_report+0x141/0x180 [ 14.695967] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.695994] __asan_report_load8_noabort+0x18/0x20 [ 14.696017] kasan_atomics_helper+0x4eae/0x5450 [ 14.696040] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.696063] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.696088] ? kasan_atomics+0x152/0x310 [ 14.696114] kasan_atomics+0x1dc/0x310 [ 14.696138] ? __pfx_kasan_atomics+0x10/0x10 [ 14.696162] ? __pfx_read_tsc+0x10/0x10 [ 14.696184] ? ktime_get_ts64+0x86/0x230 [ 14.696210] kunit_try_run_case+0x1a5/0x480 [ 14.696234] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.696260] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.696283] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.696306] ? __kthread_parkme+0x82/0x180 [ 14.696327] ? preempt_count_sub+0x50/0x80 [ 14.696351] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.696395] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.696419] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.696443] kthread+0x337/0x6f0 [ 14.696463] ? trace_preempt_on+0x20/0xc0 [ 14.696488] ? __pfx_kthread+0x10/0x10 [ 14.696510] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.696531] ? calculate_sigpending+0x7b/0xa0 [ 14.696556] ? __pfx_kthread+0x10/0x10 [ 14.696578] ret_from_fork+0x116/0x1d0 [ 14.696596] ? __pfx_kthread+0x10/0x10 [ 14.696617] ret_from_fork_asm+0x1a/0x30 [ 14.696649] </TASK> [ 14.696660] [ 14.709008] Allocated by task 290: [ 14.709315] kasan_save_stack+0x45/0x70 [ 14.709711] kasan_save_track+0x18/0x40 [ 14.710064] kasan_save_alloc_info+0x3b/0x50 [ 14.710215] __kasan_kmalloc+0xb7/0xc0 [ 14.710343] __kmalloc_cache_noprof+0x189/0x420 [ 14.710762] kasan_atomics+0x95/0x310 [ 14.711097] kunit_try_run_case+0x1a5/0x480 [ 14.711489] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.711972] kthread+0x337/0x6f0 [ 14.712135] ret_from_fork+0x116/0x1d0 [ 14.712262] ret_from_fork_asm+0x1a/0x30 [ 14.712458] [ 14.712610] The buggy address belongs to the object at ffff8881028d8d80 [ 14.712610] which belongs to the cache kmalloc-64 of size 64 [ 14.713652] The buggy address is located 0 bytes to the right of [ 14.713652] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.714498] [ 14.714652] The buggy address belongs to the physical page: [ 14.715050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.715280] flags: 0x200000000000000(node=0|zone=2) [ 14.715591] page_type: f5(slab) [ 14.715875] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.716522] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.717159] page dumped because: kasan: bad access detected [ 14.717646] [ 14.717734] Memory state around the buggy address: [ 14.717885] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.718104] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.718313] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.718848] ^ [ 14.719277] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.719890] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.720498] ================================================================== [ 14.835592] ================================================================== [ 14.835904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 14.836242] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.837020] [ 14.837142] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.837193] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.837206] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.837228] Call Trace: [ 14.837247] <TASK> [ 14.837265] dump_stack_lvl+0x73/0xb0 [ 14.837299] print_report+0xd1/0x650 [ 14.837322] ? __virt_addr_valid+0x1db/0x2d0 [ 14.837346] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.837368] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.837391] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.837413] kasan_report+0x141/0x180 [ 14.837435] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.837462] kasan_check_range+0x10c/0x1c0 [ 14.837494] __kasan_check_write+0x18/0x20 [ 14.837514] kasan_atomics_helper+0x16e7/0x5450 [ 14.837537] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.837559] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.837584] ? kasan_atomics+0x152/0x310 [ 14.837611] kasan_atomics+0x1dc/0x310 [ 14.837634] ? __pfx_kasan_atomics+0x10/0x10 [ 14.837658] ? __pfx_read_tsc+0x10/0x10 [ 14.837685] ? ktime_get_ts64+0x86/0x230 [ 14.837711] kunit_try_run_case+0x1a5/0x480 [ 14.837735] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.837758] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.837781] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.837804] ? __kthread_parkme+0x82/0x180 [ 14.837825] ? preempt_count_sub+0x50/0x80 [ 14.837849] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.837873] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.837896] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.837919] kthread+0x337/0x6f0 [ 14.837950] ? trace_preempt_on+0x20/0xc0 [ 14.837977] ? __pfx_kthread+0x10/0x10 [ 14.837998] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.838019] ? calculate_sigpending+0x7b/0xa0 [ 14.838044] ? __pfx_kthread+0x10/0x10 [ 14.838066] ret_from_fork+0x116/0x1d0 [ 14.838086] ? __pfx_kthread+0x10/0x10 [ 14.838107] ret_from_fork_asm+0x1a/0x30 [ 14.838139] </TASK> [ 14.838150] [ 14.845069] Allocated by task 290: [ 14.845255] kasan_save_stack+0x45/0x70 [ 14.845401] kasan_save_track+0x18/0x40 [ 14.845589] kasan_save_alloc_info+0x3b/0x50 [ 14.845789] __kasan_kmalloc+0xb7/0xc0 [ 14.845916] __kmalloc_cache_noprof+0x189/0x420 [ 14.846075] kasan_atomics+0x95/0x310 [ 14.846248] kunit_try_run_case+0x1a5/0x480 [ 14.846447] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.846690] kthread+0x337/0x6f0 [ 14.847027] ret_from_fork+0x116/0x1d0 [ 14.847186] ret_from_fork_asm+0x1a/0x30 [ 14.847319] [ 14.847387] The buggy address belongs to the object at ffff8881028d8d80 [ 14.847387] which belongs to the cache kmalloc-64 of size 64 [ 14.847899] The buggy address is located 0 bytes to the right of [ 14.847899] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.848315] [ 14.848385] The buggy address belongs to the physical page: [ 14.848554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.848790] flags: 0x200000000000000(node=0|zone=2) [ 14.849035] page_type: f5(slab) [ 14.849202] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.849567] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.849910] page dumped because: kasan: bad access detected [ 14.850154] [ 14.850228] Memory state around the buggy address: [ 14.850466] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.850750] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.851036] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.851306] ^ [ 14.851453] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.851662] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.852226] ================================================================== [ 13.999760] ================================================================== [ 14.000172] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 14.000536] Read of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.000902] [ 14.001026] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.001104] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.001116] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.001139] Call Trace: [ 14.001173] <TASK> [ 14.001194] dump_stack_lvl+0x73/0xb0 [ 14.001223] print_report+0xd1/0x650 [ 14.001245] ? __virt_addr_valid+0x1db/0x2d0 [ 14.001269] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.001290] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.001340] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.001363] kasan_report+0x141/0x180 [ 14.001385] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.001435] __asan_report_load4_noabort+0x18/0x20 [ 14.001486] kasan_atomics_helper+0x4b54/0x5450 [ 14.001511] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.001533] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.001570] ? kasan_atomics+0x152/0x310 [ 14.001597] kasan_atomics+0x1dc/0x310 [ 14.001619] ? __pfx_kasan_atomics+0x10/0x10 [ 14.001643] ? __pfx_read_tsc+0x10/0x10 [ 14.001665] ? ktime_get_ts64+0x86/0x230 [ 14.001700] kunit_try_run_case+0x1a5/0x480 [ 14.001752] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.001774] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.001825] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.001848] ? __kthread_parkme+0x82/0x180 [ 14.001870] ? preempt_count_sub+0x50/0x80 [ 14.001895] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.001919] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.001952] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.001975] kthread+0x337/0x6f0 [ 14.001995] ? trace_preempt_on+0x20/0xc0 [ 14.002019] ? __pfx_kthread+0x10/0x10 [ 14.002040] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.002061] ? calculate_sigpending+0x7b/0xa0 [ 14.002086] ? __pfx_kthread+0x10/0x10 [ 14.002107] ret_from_fork+0x116/0x1d0 [ 14.002126] ? __pfx_kthread+0x10/0x10 [ 14.002147] ret_from_fork_asm+0x1a/0x30 [ 14.002178] </TASK> [ 14.002190] [ 14.010833] Allocated by task 290: [ 14.010985] kasan_save_stack+0x45/0x70 [ 14.011131] kasan_save_track+0x18/0x40 [ 14.011260] kasan_save_alloc_info+0x3b/0x50 [ 14.011413] __kasan_kmalloc+0xb7/0xc0 [ 14.011592] __kmalloc_cache_noprof+0x189/0x420 [ 14.012018] kasan_atomics+0x95/0x310 [ 14.012203] kunit_try_run_case+0x1a5/0x480 [ 14.012405] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.012649] kthread+0x337/0x6f0 [ 14.012779] ret_from_fork+0x116/0x1d0 [ 14.013053] ret_from_fork_asm+0x1a/0x30 [ 14.013190] [ 14.013258] The buggy address belongs to the object at ffff8881028d8d80 [ 14.013258] which belongs to the cache kmalloc-64 of size 64 [ 14.013901] The buggy address is located 0 bytes to the right of [ 14.013901] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.014639] [ 14.014724] The buggy address belongs to the physical page: [ 14.015501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.015885] flags: 0x200000000000000(node=0|zone=2) [ 14.016857] page_type: f5(slab) [ 14.017010] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.017239] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.017602] page dumped because: kasan: bad access detected [ 14.017780] [ 14.017846] Memory state around the buggy address: [ 14.018009] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.018251] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.018492] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.018806] ^ [ 14.019091] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.019590] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.019924] ================================================================== [ 15.018811] ================================================================== [ 15.019094] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 15.019326] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 15.019583] [ 15.019891] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 15.019954] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.019967] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.019988] Call Trace: [ 15.020006] <TASK> [ 15.020024] dump_stack_lvl+0x73/0xb0 [ 15.020054] print_report+0xd1/0x650 [ 15.020077] ? __virt_addr_valid+0x1db/0x2d0 [ 15.020100] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.020122] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.020144] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.020166] kasan_report+0x141/0x180 [ 15.020188] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.020214] kasan_check_range+0x10c/0x1c0 [ 15.020238] __kasan_check_write+0x18/0x20 [ 15.020259] kasan_atomics_helper+0x1c18/0x5450 [ 15.020282] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.020304] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.020329] ? kasan_atomics+0x152/0x310 [ 15.020355] kasan_atomics+0x1dc/0x310 [ 15.020377] ? __pfx_kasan_atomics+0x10/0x10 [ 15.020552] ? __pfx_read_tsc+0x10/0x10 [ 15.020575] ? ktime_get_ts64+0x86/0x230 [ 15.020602] kunit_try_run_case+0x1a5/0x480 [ 15.020626] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.020648] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.020671] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.020694] ? __kthread_parkme+0x82/0x180 [ 15.020714] ? preempt_count_sub+0x50/0x80 [ 15.020738] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.020762] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.020785] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.020808] kthread+0x337/0x6f0 [ 15.020828] ? trace_preempt_on+0x20/0xc0 [ 15.020854] ? __pfx_kthread+0x10/0x10 [ 15.020875] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.020895] ? calculate_sigpending+0x7b/0xa0 [ 15.020919] ? __pfx_kthread+0x10/0x10 [ 15.020953] ret_from_fork+0x116/0x1d0 [ 15.020972] ? __pfx_kthread+0x10/0x10 [ 15.020993] ret_from_fork_asm+0x1a/0x30 [ 15.021024] </TASK> [ 15.021035] [ 15.030136] Allocated by task 290: [ 15.030320] kasan_save_stack+0x45/0x70 [ 15.030507] kasan_save_track+0x18/0x40 [ 15.031161] kasan_save_alloc_info+0x3b/0x50 [ 15.031371] __kasan_kmalloc+0xb7/0xc0 [ 15.031533] __kmalloc_cache_noprof+0x189/0x420 [ 15.031866] kasan_atomics+0x95/0x310 [ 15.032074] kunit_try_run_case+0x1a5/0x480 [ 15.032371] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.032619] kthread+0x337/0x6f0 [ 15.032902] ret_from_fork+0x116/0x1d0 [ 15.033104] ret_from_fork_asm+0x1a/0x30 [ 15.033409] [ 15.033484] The buggy address belongs to the object at ffff8881028d8d80 [ 15.033484] which belongs to the cache kmalloc-64 of size 64 [ 15.033973] The buggy address is located 0 bytes to the right of [ 15.033973] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 15.034499] [ 15.034579] The buggy address belongs to the physical page: [ 15.034810] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 15.035526] flags: 0x200000000000000(node=0|zone=2) [ 15.035766] page_type: f5(slab) [ 15.036060] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.036501] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.036875] page dumped because: kasan: bad access detected [ 15.037232] [ 15.037328] Memory state around the buggy address: [ 15.037627] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.037990] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.038351] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.038767] ^ [ 15.039104] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.039563] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.039858] ================================================================== [ 15.178254] ================================================================== [ 15.179472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 15.180247] Read of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 15.180968] [ 15.181162] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 15.181210] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.181223] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.181244] Call Trace: [ 15.181263] <TASK> [ 15.181281] dump_stack_lvl+0x73/0xb0 [ 15.181330] print_report+0xd1/0x650 [ 15.181353] ? __virt_addr_valid+0x1db/0x2d0 [ 15.181376] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.181408] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.181431] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.181454] kasan_report+0x141/0x180 [ 15.181476] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.181502] __asan_report_load8_noabort+0x18/0x20 [ 15.181526] kasan_atomics_helper+0x4f71/0x5450 [ 15.181549] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.181571] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.181596] ? kasan_atomics+0x152/0x310 [ 15.181623] kasan_atomics+0x1dc/0x310 [ 15.181645] ? __pfx_kasan_atomics+0x10/0x10 [ 15.181670] ? __pfx_read_tsc+0x10/0x10 [ 15.181697] ? ktime_get_ts64+0x86/0x230 [ 15.181724] kunit_try_run_case+0x1a5/0x480 [ 15.181749] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.181770] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.181793] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.181816] ? __kthread_parkme+0x82/0x180 [ 15.181836] ? preempt_count_sub+0x50/0x80 [ 15.181860] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.181883] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.181906] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.181941] kthread+0x337/0x6f0 [ 15.181961] ? trace_preempt_on+0x20/0xc0 [ 15.181985] ? __pfx_kthread+0x10/0x10 [ 15.182006] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.182026] ? calculate_sigpending+0x7b/0xa0 [ 15.182051] ? __pfx_kthread+0x10/0x10 [ 15.182072] ret_from_fork+0x116/0x1d0 [ 15.182091] ? __pfx_kthread+0x10/0x10 [ 15.182112] ret_from_fork_asm+0x1a/0x30 [ 15.182142] </TASK> [ 15.182153] [ 15.192578] Allocated by task 290: [ 15.192761] kasan_save_stack+0x45/0x70 [ 15.193154] kasan_save_track+0x18/0x40 [ 15.193299] kasan_save_alloc_info+0x3b/0x50 [ 15.193644] __kasan_kmalloc+0xb7/0xc0 [ 15.193821] __kmalloc_cache_noprof+0x189/0x420 [ 15.194014] kasan_atomics+0x95/0x310 [ 15.194172] kunit_try_run_case+0x1a5/0x480 [ 15.194346] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.194577] kthread+0x337/0x6f0 [ 15.195057] ret_from_fork+0x116/0x1d0 [ 15.195211] ret_from_fork_asm+0x1a/0x30 [ 15.195412] [ 15.195583] The buggy address belongs to the object at ffff8881028d8d80 [ 15.195583] which belongs to the cache kmalloc-64 of size 64 [ 15.196209] The buggy address is located 0 bytes to the right of [ 15.196209] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 15.196891] [ 15.197121] The buggy address belongs to the physical page: [ 15.197347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 15.197839] flags: 0x200000000000000(node=0|zone=2) [ 15.198124] page_type: f5(slab) [ 15.198284] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.198762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.199138] page dumped because: kasan: bad access detected [ 15.199369] [ 15.199548] Memory state around the buggy address: [ 15.199860] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.200213] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.200611] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.200965] ^ [ 15.201181] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.201590] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.201837] ================================================================== [ 15.087634] ================================================================== [ 15.087985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 15.088294] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 15.089055] [ 15.089159] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 15.089347] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.089363] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.089386] Call Trace: [ 15.089413] <TASK> [ 15.089430] dump_stack_lvl+0x73/0xb0 [ 15.089460] print_report+0xd1/0x650 [ 15.089482] ? __virt_addr_valid+0x1db/0x2d0 [ 15.089505] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.089527] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.089549] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.089573] kasan_report+0x141/0x180 [ 15.089594] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.089621] kasan_check_range+0x10c/0x1c0 [ 15.089647] __kasan_check_write+0x18/0x20 [ 15.089666] kasan_atomics_helper+0x1d7a/0x5450 [ 15.089695] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.089718] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.089742] ? kasan_atomics+0x152/0x310 [ 15.089768] kasan_atomics+0x1dc/0x310 [ 15.089791] ? __pfx_kasan_atomics+0x10/0x10 [ 15.089814] ? __pfx_read_tsc+0x10/0x10 [ 15.089836] ? ktime_get_ts64+0x86/0x230 [ 15.089861] kunit_try_run_case+0x1a5/0x480 [ 15.089885] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.089908] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.089942] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.089965] ? __kthread_parkme+0x82/0x180 [ 15.089985] ? preempt_count_sub+0x50/0x80 [ 15.090008] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.090032] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.090055] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.090078] kthread+0x337/0x6f0 [ 15.090097] ? trace_preempt_on+0x20/0xc0 [ 15.090121] ? __pfx_kthread+0x10/0x10 [ 15.090142] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.090163] ? calculate_sigpending+0x7b/0xa0 [ 15.090187] ? __pfx_kthread+0x10/0x10 [ 15.090208] ret_from_fork+0x116/0x1d0 [ 15.090226] ? __pfx_kthread+0x10/0x10 [ 15.090247] ret_from_fork_asm+0x1a/0x30 [ 15.090277] </TASK> [ 15.090289] [ 15.100103] Allocated by task 290: [ 15.100238] kasan_save_stack+0x45/0x70 [ 15.100685] kasan_save_track+0x18/0x40 [ 15.100964] kasan_save_alloc_info+0x3b/0x50 [ 15.101146] __kasan_kmalloc+0xb7/0xc0 [ 15.101454] __kmalloc_cache_noprof+0x189/0x420 [ 15.101747] kasan_atomics+0x95/0x310 [ 15.101940] kunit_try_run_case+0x1a5/0x480 [ 15.102268] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.102643] kthread+0x337/0x6f0 [ 15.102806] ret_from_fork+0x116/0x1d0 [ 15.103132] ret_from_fork_asm+0x1a/0x30 [ 15.103400] [ 15.103502] The buggy address belongs to the object at ffff8881028d8d80 [ 15.103502] which belongs to the cache kmalloc-64 of size 64 [ 15.104206] The buggy address is located 0 bytes to the right of [ 15.104206] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 15.104958] [ 15.105058] The buggy address belongs to the physical page: [ 15.105428] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 15.105918] flags: 0x200000000000000(node=0|zone=2) [ 15.106219] page_type: f5(slab) [ 15.106355] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.106873] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.107284] page dumped because: kasan: bad access detected [ 15.107624] [ 15.107720] Memory state around the buggy address: [ 15.107942] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.108254] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.108796] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.109055] ^ [ 15.109386] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.109833] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.110247] ================================================================== [ 15.356181] ================================================================== [ 15.356555] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 15.356794] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 15.357129] [ 15.357231] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 15.357277] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.357288] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.357310] Call Trace: [ 15.357327] <TASK> [ 15.357343] dump_stack_lvl+0x73/0xb0 [ 15.357371] print_report+0xd1/0x650 [ 15.357393] ? __virt_addr_valid+0x1db/0x2d0 [ 15.357415] ? kasan_atomics_helper+0x224c/0x5450 [ 15.357436] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.357459] ? kasan_atomics_helper+0x224c/0x5450 [ 15.357491] kasan_report+0x141/0x180 [ 15.357513] ? kasan_atomics_helper+0x224c/0x5450 [ 15.357540] kasan_check_range+0x10c/0x1c0 [ 15.357563] __kasan_check_write+0x18/0x20 [ 15.357584] kasan_atomics_helper+0x224c/0x5450 [ 15.357606] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.357628] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.357653] ? kasan_atomics+0x152/0x310 [ 15.357679] kasan_atomics+0x1dc/0x310 [ 15.357707] ? __pfx_kasan_atomics+0x10/0x10 [ 15.357731] ? __pfx_read_tsc+0x10/0x10 [ 15.357753] ? ktime_get_ts64+0x86/0x230 [ 15.357780] kunit_try_run_case+0x1a5/0x480 [ 15.357804] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.357827] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.357851] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.357874] ? __kthread_parkme+0x82/0x180 [ 15.357895] ? preempt_count_sub+0x50/0x80 [ 15.357919] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.357954] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.357978] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.358001] kthread+0x337/0x6f0 [ 15.358021] ? trace_preempt_on+0x20/0xc0 [ 15.358046] ? __pfx_kthread+0x10/0x10 [ 15.358067] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.358088] ? calculate_sigpending+0x7b/0xa0 [ 15.358113] ? __pfx_kthread+0x10/0x10 [ 15.358134] ret_from_fork+0x116/0x1d0 [ 15.358153] ? __pfx_kthread+0x10/0x10 [ 15.358174] ret_from_fork_asm+0x1a/0x30 [ 15.358205] </TASK> [ 15.358216] [ 15.365126] Allocated by task 290: [ 15.365253] kasan_save_stack+0x45/0x70 [ 15.365390] kasan_save_track+0x18/0x40 [ 15.365585] kasan_save_alloc_info+0x3b/0x50 [ 15.365798] __kasan_kmalloc+0xb7/0xc0 [ 15.365990] __kmalloc_cache_noprof+0x189/0x420 [ 15.366205] kasan_atomics+0x95/0x310 [ 15.366331] kunit_try_run_case+0x1a5/0x480 [ 15.366469] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.366635] kthread+0x337/0x6f0 [ 15.366749] ret_from_fork+0x116/0x1d0 [ 15.367076] ret_from_fork_asm+0x1a/0x30 [ 15.367419] [ 15.367510] The buggy address belongs to the object at ffff8881028d8d80 [ 15.367510] which belongs to the cache kmalloc-64 of size 64 [ 15.368053] The buggy address is located 0 bytes to the right of [ 15.368053] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 15.368496] [ 15.368596] The buggy address belongs to the physical page: [ 15.368809] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 15.369063] flags: 0x200000000000000(node=0|zone=2) [ 15.369295] page_type: f5(slab) [ 15.369462] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.369880] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.370141] page dumped because: kasan: bad access detected [ 15.370385] [ 15.370489] Memory state around the buggy address: [ 15.370685] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.371031] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.371249] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.371490] ^ [ 15.371705] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.372024] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.372290] ================================================================== [ 13.874520] ================================================================== [ 13.875380] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 13.876619] Read of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 13.877139] [ 13.877239] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 13.877291] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.877303] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.877324] Call Trace: [ 13.877338] <TASK> [ 13.877356] dump_stack_lvl+0x73/0xb0 [ 13.877388] print_report+0xd1/0x650 [ 13.877565] ? __virt_addr_valid+0x1db/0x2d0 [ 13.877846] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.877871] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.877893] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.877915] kasan_report+0x141/0x180 [ 13.877949] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.877974] __asan_report_load4_noabort+0x18/0x20 [ 13.877998] kasan_atomics_helper+0x4bbc/0x5450 [ 13.878019] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.878040] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.878064] ? kasan_atomics+0x152/0x310 [ 13.878090] kasan_atomics+0x1dc/0x310 [ 13.878111] ? __pfx_kasan_atomics+0x10/0x10 [ 13.878134] ? __pfx_read_tsc+0x10/0x10 [ 13.878155] ? ktime_get_ts64+0x86/0x230 [ 13.878181] kunit_try_run_case+0x1a5/0x480 [ 13.878204] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.878225] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.878248] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.878269] ? __kthread_parkme+0x82/0x180 [ 13.878289] ? preempt_count_sub+0x50/0x80 [ 13.878312] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.878335] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.878357] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.878380] kthread+0x337/0x6f0 [ 13.878414] ? trace_preempt_on+0x20/0xc0 [ 13.878439] ? __pfx_kthread+0x10/0x10 [ 13.878460] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.878479] ? calculate_sigpending+0x7b/0xa0 [ 13.878503] ? __pfx_kthread+0x10/0x10 [ 13.878524] ret_from_fork+0x116/0x1d0 [ 13.878541] ? __pfx_kthread+0x10/0x10 [ 13.878561] ret_from_fork_asm+0x1a/0x30 [ 13.878593] </TASK> [ 13.878605] [ 13.892120] Allocated by task 290: [ 13.892529] kasan_save_stack+0x45/0x70 [ 13.892961] kasan_save_track+0x18/0x40 [ 13.893322] kasan_save_alloc_info+0x3b/0x50 [ 13.893792] __kasan_kmalloc+0xb7/0xc0 [ 13.894198] __kmalloc_cache_noprof+0x189/0x420 [ 13.894637] kasan_atomics+0x95/0x310 [ 13.895102] kunit_try_run_case+0x1a5/0x480 [ 13.895573] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.895861] kthread+0x337/0x6f0 [ 13.896185] ret_from_fork+0x116/0x1d0 [ 13.896578] ret_from_fork_asm+0x1a/0x30 [ 13.896965] [ 13.897145] The buggy address belongs to the object at ffff8881028d8d80 [ 13.897145] which belongs to the cache kmalloc-64 of size 64 [ 13.897730] The buggy address is located 0 bytes to the right of [ 13.897730] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 13.898536] [ 13.898740] The buggy address belongs to the physical page: [ 13.899265] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 13.899938] flags: 0x200000000000000(node=0|zone=2) [ 13.900103] page_type: f5(slab) [ 13.900221] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.900498] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.901078] page dumped because: kasan: bad access detected [ 13.901245] [ 13.901307] Memory state around the buggy address: [ 13.901475] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.901700] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.901906] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.902164] ^ [ 13.902310] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.902788] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.903060] ================================================================== [ 14.202224] ================================================================== [ 14.202685] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 14.203218] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.203513] [ 14.203594] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.203640] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.203652] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.203673] Call Trace: [ 14.203691] <TASK> [ 14.203707] dump_stack_lvl+0x73/0xb0 [ 14.203736] print_report+0xd1/0x650 [ 14.203759] ? __virt_addr_valid+0x1db/0x2d0 [ 14.203781] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.203802] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.203825] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.203849] kasan_report+0x141/0x180 [ 14.203872] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.203898] kasan_check_range+0x10c/0x1c0 [ 14.203922] __kasan_check_write+0x18/0x20 [ 14.204058] kasan_atomics_helper+0x8f9/0x5450 [ 14.204082] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.204105] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.204160] ? kasan_atomics+0x152/0x310 [ 14.204211] kasan_atomics+0x1dc/0x310 [ 14.204235] ? __pfx_kasan_atomics+0x10/0x10 [ 14.204259] ? __pfx_read_tsc+0x10/0x10 [ 14.204281] ? ktime_get_ts64+0x86/0x230 [ 14.204308] kunit_try_run_case+0x1a5/0x480 [ 14.204331] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.204353] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.204376] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.204610] ? __kthread_parkme+0x82/0x180 [ 14.204637] ? preempt_count_sub+0x50/0x80 [ 14.204661] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.204685] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.204741] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.204766] kthread+0x337/0x6f0 [ 14.204786] ? trace_preempt_on+0x20/0xc0 [ 14.204812] ? __pfx_kthread+0x10/0x10 [ 14.204834] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.204855] ? calculate_sigpending+0x7b/0xa0 [ 14.204879] ? __pfx_kthread+0x10/0x10 [ 14.204901] ret_from_fork+0x116/0x1d0 [ 14.204919] ? __pfx_kthread+0x10/0x10 [ 14.204951] ret_from_fork_asm+0x1a/0x30 [ 14.204983] </TASK> [ 14.204995] [ 14.215570] Allocated by task 290: [ 14.215704] kasan_save_stack+0x45/0x70 [ 14.215845] kasan_save_track+0x18/0x40 [ 14.216634] kasan_save_alloc_info+0x3b/0x50 [ 14.216800] __kasan_kmalloc+0xb7/0xc0 [ 14.217844] __kmalloc_cache_noprof+0x189/0x420 [ 14.218681] kasan_atomics+0x95/0x310 [ 14.219543] kunit_try_run_case+0x1a5/0x480 [ 14.220156] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.220351] kthread+0x337/0x6f0 [ 14.221269] ret_from_fork+0x116/0x1d0 [ 14.222086] ret_from_fork_asm+0x1a/0x30 [ 14.222258] [ 14.222563] The buggy address belongs to the object at ffff8881028d8d80 [ 14.222563] which belongs to the cache kmalloc-64 of size 64 [ 14.223106] The buggy address is located 0 bytes to the right of [ 14.223106] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.223768] [ 14.223870] The buggy address belongs to the physical page: [ 14.224084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.224436] flags: 0x200000000000000(node=0|zone=2) [ 14.224793] page_type: f5(slab) [ 14.224986] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.225324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.225874] page dumped because: kasan: bad access detected [ 14.226137] [ 14.226231] Memory state around the buggy address: [ 14.226561] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.226826] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.227165] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.227551] ^ [ 14.227783] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.228089] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.228438] ================================================================== [ 14.379591] ================================================================== [ 14.379994] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 14.380996] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.381542] [ 14.381728] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.381794] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.381807] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.381828] Call Trace: [ 14.381848] <TASK> [ 14.381866] dump_stack_lvl+0x73/0xb0 [ 14.381904] print_report+0xd1/0x650 [ 14.381942] ? __virt_addr_valid+0x1db/0x2d0 [ 14.381966] ? kasan_atomics_helper+0xd47/0x5450 [ 14.381987] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.382009] ? kasan_atomics_helper+0xd47/0x5450 [ 14.382030] kasan_report+0x141/0x180 [ 14.382052] ? kasan_atomics_helper+0xd47/0x5450 [ 14.382079] kasan_check_range+0x10c/0x1c0 [ 14.382103] __kasan_check_write+0x18/0x20 [ 14.382122] kasan_atomics_helper+0xd47/0x5450 [ 14.382146] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.382168] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.382193] ? kasan_atomics+0x152/0x310 [ 14.382220] kasan_atomics+0x1dc/0x310 [ 14.382243] ? __pfx_kasan_atomics+0x10/0x10 [ 14.382267] ? __pfx_read_tsc+0x10/0x10 [ 14.382288] ? ktime_get_ts64+0x86/0x230 [ 14.382314] kunit_try_run_case+0x1a5/0x480 [ 14.382337] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.382359] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.382403] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.382426] ? __kthread_parkme+0x82/0x180 [ 14.382446] ? preempt_count_sub+0x50/0x80 [ 14.382470] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.382494] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.382517] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.382540] kthread+0x337/0x6f0 [ 14.382559] ? trace_preempt_on+0x20/0xc0 [ 14.382584] ? __pfx_kthread+0x10/0x10 [ 14.382605] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.382625] ? calculate_sigpending+0x7b/0xa0 [ 14.382650] ? __pfx_kthread+0x10/0x10 [ 14.382671] ret_from_fork+0x116/0x1d0 [ 14.382690] ? __pfx_kthread+0x10/0x10 [ 14.382710] ret_from_fork_asm+0x1a/0x30 [ 14.382743] </TASK> [ 14.382754] [ 14.393904] Allocated by task 290: [ 14.394264] kasan_save_stack+0x45/0x70 [ 14.394661] kasan_save_track+0x18/0x40 [ 14.395017] kasan_save_alloc_info+0x3b/0x50 [ 14.395425] __kasan_kmalloc+0xb7/0xc0 [ 14.395777] __kmalloc_cache_noprof+0x189/0x420 [ 14.396193] kasan_atomics+0x95/0x310 [ 14.396541] kunit_try_run_case+0x1a5/0x480 [ 14.397014] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.397500] kthread+0x337/0x6f0 [ 14.397804] ret_from_fork+0x116/0x1d0 [ 14.398170] ret_from_fork_asm+0x1a/0x30 [ 14.398547] [ 14.398711] The buggy address belongs to the object at ffff8881028d8d80 [ 14.398711] which belongs to the cache kmalloc-64 of size 64 [ 14.399257] The buggy address is located 0 bytes to the right of [ 14.399257] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.399894] [ 14.400066] The buggy address belongs to the physical page: [ 14.400662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.401468] flags: 0x200000000000000(node=0|zone=2) [ 14.401908] page_type: f5(slab) [ 14.402228] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.402727] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.402961] page dumped because: kasan: bad access detected [ 14.403126] [ 14.403190] Memory state around the buggy address: [ 14.403338] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.403903] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.404545] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.405188] ^ [ 14.405699] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.406335] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.407027] ================================================================== [ 14.642069] ================================================================== [ 14.642432] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 14.642757] Read of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.643087] [ 14.643180] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.643226] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.643238] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.643260] Call Trace: [ 14.643277] <TASK> [ 14.643294] dump_stack_lvl+0x73/0xb0 [ 14.643321] print_report+0xd1/0x650 [ 14.643345] ? __virt_addr_valid+0x1db/0x2d0 [ 14.643368] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.643389] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.643426] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.643448] kasan_report+0x141/0x180 [ 14.643470] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.643496] __asan_report_load4_noabort+0x18/0x20 [ 14.643521] kasan_atomics_helper+0x49ce/0x5450 [ 14.643545] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.643567] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.643602] ? kasan_atomics+0x152/0x310 [ 14.643628] kasan_atomics+0x1dc/0x310 [ 14.643652] ? __pfx_kasan_atomics+0x10/0x10 [ 14.643687] ? __pfx_read_tsc+0x10/0x10 [ 14.643709] ? ktime_get_ts64+0x86/0x230 [ 14.643734] kunit_try_run_case+0x1a5/0x480 [ 14.643759] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.643780] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.643804] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.643827] ? __kthread_parkme+0x82/0x180 [ 14.643847] ? preempt_count_sub+0x50/0x80 [ 14.643871] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.643895] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.643918] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.643950] kthread+0x337/0x6f0 [ 14.643970] ? trace_preempt_on+0x20/0xc0 [ 14.643995] ? __pfx_kthread+0x10/0x10 [ 14.644017] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.644038] ? calculate_sigpending+0x7b/0xa0 [ 14.644062] ? __pfx_kthread+0x10/0x10 [ 14.644084] ret_from_fork+0x116/0x1d0 [ 14.644103] ? __pfx_kthread+0x10/0x10 [ 14.644134] ret_from_fork_asm+0x1a/0x30 [ 14.644164] </TASK> [ 14.644176] [ 14.652196] Allocated by task 290: [ 14.652324] kasan_save_stack+0x45/0x70 [ 14.653311] kasan_save_track+0x18/0x40 [ 14.654068] kasan_save_alloc_info+0x3b/0x50 [ 14.654871] __kasan_kmalloc+0xb7/0xc0 [ 14.655677] __kmalloc_cache_noprof+0x189/0x420 [ 14.655862] kasan_atomics+0x95/0x310 [ 14.656011] kunit_try_run_case+0x1a5/0x480 [ 14.656156] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.656326] kthread+0x337/0x6f0 [ 14.656455] ret_from_fork+0x116/0x1d0 [ 14.656583] ret_from_fork_asm+0x1a/0x30 [ 14.656717] [ 14.656787] The buggy address belongs to the object at ffff8881028d8d80 [ 14.656787] which belongs to the cache kmalloc-64 of size 64 [ 14.657144] The buggy address is located 0 bytes to the right of [ 14.657144] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.657500] [ 14.657569] The buggy address belongs to the physical page: [ 14.657740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.658152] flags: 0x200000000000000(node=0|zone=2) [ 14.658704] page_type: f5(slab) [ 14.659011] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.659694] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.660313] page dumped because: kasan: bad access detected [ 14.660886] [ 14.661065] Memory state around the buggy address: [ 14.661504] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.662133] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.662755] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.663364] ^ [ 14.663781] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.664366] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.664979] ================================================================== [ 14.543074] ================================================================== [ 14.543521] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 14.543842] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.544115] [ 14.544195] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.544238] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.544251] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.544272] Call Trace: [ 14.544288] <TASK> [ 14.544303] dump_stack_lvl+0x73/0xb0 [ 14.544329] print_report+0xd1/0x650 [ 14.544350] ? __virt_addr_valid+0x1db/0x2d0 [ 14.544373] ? kasan_atomics_helper+0x1148/0x5450 [ 14.544393] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.544416] ? kasan_atomics_helper+0x1148/0x5450 [ 14.544437] kasan_report+0x141/0x180 [ 14.544460] ? kasan_atomics_helper+0x1148/0x5450 [ 14.544486] kasan_check_range+0x10c/0x1c0 [ 14.544510] __kasan_check_write+0x18/0x20 [ 14.544530] kasan_atomics_helper+0x1148/0x5450 [ 14.544553] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.544575] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.544599] ? kasan_atomics+0x152/0x310 [ 14.544625] kasan_atomics+0x1dc/0x310 [ 14.544648] ? __pfx_kasan_atomics+0x10/0x10 [ 14.544673] ? __pfx_read_tsc+0x10/0x10 [ 14.544693] ? ktime_get_ts64+0x86/0x230 [ 14.544718] kunit_try_run_case+0x1a5/0x480 [ 14.544742] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.544764] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.544786] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.544808] ? __kthread_parkme+0x82/0x180 [ 14.544829] ? preempt_count_sub+0x50/0x80 [ 14.544852] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.544876] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.544899] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.544923] kthread+0x337/0x6f0 [ 14.544954] ? trace_preempt_on+0x20/0xc0 [ 14.544978] ? __pfx_kthread+0x10/0x10 [ 14.544999] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.545020] ? calculate_sigpending+0x7b/0xa0 [ 14.545044] ? __pfx_kthread+0x10/0x10 [ 14.545065] ret_from_fork+0x116/0x1d0 [ 14.545084] ? __pfx_kthread+0x10/0x10 [ 14.545116] ret_from_fork_asm+0x1a/0x30 [ 14.545168] </TASK> [ 14.545179] [ 14.552518] Allocated by task 290: [ 14.552650] kasan_save_stack+0x45/0x70 [ 14.552787] kasan_save_track+0x18/0x40 [ 14.552915] kasan_save_alloc_info+0x3b/0x50 [ 14.553078] __kasan_kmalloc+0xb7/0xc0 [ 14.553284] __kmalloc_cache_noprof+0x189/0x420 [ 14.553662] kasan_atomics+0x95/0x310 [ 14.553854] kunit_try_run_case+0x1a5/0x480 [ 14.554067] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.554257] kthread+0x337/0x6f0 [ 14.554372] ret_from_fork+0x116/0x1d0 [ 14.554570] ret_from_fork_asm+0x1a/0x30 [ 14.554779] [ 14.554868] The buggy address belongs to the object at ffff8881028d8d80 [ 14.554868] which belongs to the cache kmalloc-64 of size 64 [ 14.555248] The buggy address is located 0 bytes to the right of [ 14.555248] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.556142] [ 14.556245] The buggy address belongs to the physical page: [ 14.556627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.558220] flags: 0x200000000000000(node=0|zone=2) [ 14.558812] page_type: f5(slab) [ 14.559064] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.560066] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.560784] page dumped because: kasan: bad access detected [ 14.561403] [ 14.561591] Memory state around the buggy address: [ 14.561943] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.562235] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.562950] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.563438] ^ [ 14.563906] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.564586] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.564872] ================================================================== [ 14.296912] ================================================================== [ 14.297268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 14.297665] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.297947] [ 14.298048] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.298113] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.298126] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.298146] Call Trace: [ 14.298180] <TASK> [ 14.298195] dump_stack_lvl+0x73/0xb0 [ 14.298224] print_report+0xd1/0x650 [ 14.298246] ? __virt_addr_valid+0x1db/0x2d0 [ 14.298268] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.298289] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.298312] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.298349] kasan_report+0x141/0x180 [ 14.298386] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.298561] kasan_check_range+0x10c/0x1c0 [ 14.298585] __kasan_check_write+0x18/0x20 [ 14.298605] kasan_atomics_helper+0xb6a/0x5450 [ 14.298628] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.298649] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.298674] ? kasan_atomics+0x152/0x310 [ 14.298701] kasan_atomics+0x1dc/0x310 [ 14.298723] ? __pfx_kasan_atomics+0x10/0x10 [ 14.298777] ? __pfx_read_tsc+0x10/0x10 [ 14.298799] ? ktime_get_ts64+0x86/0x230 [ 14.298825] kunit_try_run_case+0x1a5/0x480 [ 14.298867] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.298891] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.298913] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.298947] ? __kthread_parkme+0x82/0x180 [ 14.298968] ? preempt_count_sub+0x50/0x80 [ 14.298992] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.299015] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.299038] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.299062] kthread+0x337/0x6f0 [ 14.299082] ? trace_preempt_on+0x20/0xc0 [ 14.299106] ? __pfx_kthread+0x10/0x10 [ 14.299128] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.299149] ? calculate_sigpending+0x7b/0xa0 [ 14.299191] ? __pfx_kthread+0x10/0x10 [ 14.299213] ret_from_fork+0x116/0x1d0 [ 14.299232] ? __pfx_kthread+0x10/0x10 [ 14.299253] ret_from_fork_asm+0x1a/0x30 [ 14.299284] </TASK> [ 14.299295] [ 14.307678] Allocated by task 290: [ 14.307837] kasan_save_stack+0x45/0x70 [ 14.308086] kasan_save_track+0x18/0x40 [ 14.308320] kasan_save_alloc_info+0x3b/0x50 [ 14.308533] __kasan_kmalloc+0xb7/0xc0 [ 14.308717] __kmalloc_cache_noprof+0x189/0x420 [ 14.308938] kasan_atomics+0x95/0x310 [ 14.309095] kunit_try_run_case+0x1a5/0x480 [ 14.309336] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.309498] kthread+0x337/0x6f0 [ 14.309687] ret_from_fork+0x116/0x1d0 [ 14.309916] ret_from_fork_asm+0x1a/0x30 [ 14.310144] [ 14.310256] The buggy address belongs to the object at ffff8881028d8d80 [ 14.310256] which belongs to the cache kmalloc-64 of size 64 [ 14.310918] The buggy address is located 0 bytes to the right of [ 14.310918] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.311543] [ 14.311620] The buggy address belongs to the physical page: [ 14.311805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.312060] flags: 0x200000000000000(node=0|zone=2) [ 14.312307] page_type: f5(slab) [ 14.312489] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.313085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.313486] page dumped because: kasan: bad access detected [ 14.313749] [ 14.313836] Memory state around the buggy address: [ 14.314067] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.314401] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.314711] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.315028] ^ [ 14.315300] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.315500] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.315697] ================================================================== [ 14.157949] ================================================================== [ 14.158196] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 14.158421] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.158742] [ 14.158848] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.158895] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.158907] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.158939] Call Trace: [ 14.158958] <TASK> [ 14.158975] dump_stack_lvl+0x73/0xb0 [ 14.159003] print_report+0xd1/0x650 [ 14.159025] ? __virt_addr_valid+0x1db/0x2d0 [ 14.159048] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.159069] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.159090] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.159111] kasan_report+0x141/0x180 [ 14.159133] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.159158] kasan_check_range+0x10c/0x1c0 [ 14.159182] __kasan_check_write+0x18/0x20 [ 14.159201] kasan_atomics_helper+0x7c7/0x5450 [ 14.159223] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.159244] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.159292] ? kasan_atomics+0x152/0x310 [ 14.159318] kasan_atomics+0x1dc/0x310 [ 14.159340] ? __pfx_kasan_atomics+0x10/0x10 [ 14.159365] ? __pfx_read_tsc+0x10/0x10 [ 14.159386] ? ktime_get_ts64+0x86/0x230 [ 14.159413] kunit_try_run_case+0x1a5/0x480 [ 14.159437] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.159470] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.159493] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.159515] ? __kthread_parkme+0x82/0x180 [ 14.159536] ? preempt_count_sub+0x50/0x80 [ 14.159560] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.159584] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.159607] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.159630] kthread+0x337/0x6f0 [ 14.159650] ? trace_preempt_on+0x20/0xc0 [ 14.159674] ? __pfx_kthread+0x10/0x10 [ 14.159695] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.159716] ? calculate_sigpending+0x7b/0xa0 [ 14.159741] ? __pfx_kthread+0x10/0x10 [ 14.159762] ret_from_fork+0x116/0x1d0 [ 14.159780] ? __pfx_kthread+0x10/0x10 [ 14.159800] ret_from_fork_asm+0x1a/0x30 [ 14.159833] </TASK> [ 14.159844] [ 14.170065] Allocated by task 290: [ 14.170248] kasan_save_stack+0x45/0x70 [ 14.170780] kasan_save_track+0x18/0x40 [ 14.170927] kasan_save_alloc_info+0x3b/0x50 [ 14.171082] __kasan_kmalloc+0xb7/0xc0 [ 14.171208] __kmalloc_cache_noprof+0x189/0x420 [ 14.171525] kasan_atomics+0x95/0x310 [ 14.171727] kunit_try_run_case+0x1a5/0x480 [ 14.171943] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.172191] kthread+0x337/0x6f0 [ 14.172348] ret_from_fork+0x116/0x1d0 [ 14.172536] ret_from_fork_asm+0x1a/0x30 [ 14.172731] [ 14.172824] The buggy address belongs to the object at ffff8881028d8d80 [ 14.172824] which belongs to the cache kmalloc-64 of size 64 [ 14.173967] The buggy address is located 0 bytes to the right of [ 14.173967] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.174652] [ 14.174761] The buggy address belongs to the physical page: [ 14.175168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.175703] flags: 0x200000000000000(node=0|zone=2) [ 14.176113] page_type: f5(slab) [ 14.176516] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.177119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.177347] page dumped because: kasan: bad access detected [ 14.177514] [ 14.177598] Memory state around the buggy address: [ 14.178238] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.178690] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.179001] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.179337] ^ [ 14.179690] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.180190] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.180558] ================================================================== [ 14.318115] ================================================================== [ 14.318503] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 14.318809] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.319118] [ 14.319222] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.319265] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.319277] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.319319] Call Trace: [ 14.319333] <TASK> [ 14.319349] dump_stack_lvl+0x73/0xb0 [ 14.319376] print_report+0xd1/0x650 [ 14.319420] ? __virt_addr_valid+0x1db/0x2d0 [ 14.319443] ? kasan_atomics_helper+0xc70/0x5450 [ 14.319465] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.319487] ? kasan_atomics_helper+0xc70/0x5450 [ 14.319509] kasan_report+0x141/0x180 [ 14.319531] ? kasan_atomics_helper+0xc70/0x5450 [ 14.319558] kasan_check_range+0x10c/0x1c0 [ 14.319582] __kasan_check_write+0x18/0x20 [ 14.319601] kasan_atomics_helper+0xc70/0x5450 [ 14.319624] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.319646] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.319670] ? kasan_atomics+0x152/0x310 [ 14.319697] kasan_atomics+0x1dc/0x310 [ 14.319720] ? __pfx_kasan_atomics+0x10/0x10 [ 14.319744] ? __pfx_read_tsc+0x10/0x10 [ 14.319765] ? ktime_get_ts64+0x86/0x230 [ 14.319809] kunit_try_run_case+0x1a5/0x480 [ 14.319834] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.319856] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.319879] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.319901] ? __kthread_parkme+0x82/0x180 [ 14.319922] ? preempt_count_sub+0x50/0x80 [ 14.319957] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.319980] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.320022] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.320045] kthread+0x337/0x6f0 [ 14.320065] ? trace_preempt_on+0x20/0xc0 [ 14.320089] ? __pfx_kthread+0x10/0x10 [ 14.320110] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.320130] ? calculate_sigpending+0x7b/0xa0 [ 14.320154] ? __pfx_kthread+0x10/0x10 [ 14.320177] ret_from_fork+0x116/0x1d0 [ 14.320195] ? __pfx_kthread+0x10/0x10 [ 14.320216] ret_from_fork_asm+0x1a/0x30 [ 14.320247] </TASK> [ 14.320276] [ 14.327820] Allocated by task 290: [ 14.327950] kasan_save_stack+0x45/0x70 [ 14.328145] kasan_save_track+0x18/0x40 [ 14.328326] kasan_save_alloc_info+0x3b/0x50 [ 14.328555] __kasan_kmalloc+0xb7/0xc0 [ 14.328771] __kmalloc_cache_noprof+0x189/0x420 [ 14.329490] kasan_atomics+0x95/0x310 [ 14.329945] kunit_try_run_case+0x1a5/0x480 [ 14.330120] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.330318] kthread+0x337/0x6f0 [ 14.331057] ret_from_fork+0x116/0x1d0 [ 14.331223] ret_from_fork_asm+0x1a/0x30 [ 14.331363] [ 14.331841] The buggy address belongs to the object at ffff8881028d8d80 [ 14.331841] which belongs to the cache kmalloc-64 of size 64 [ 14.333211] The buggy address is located 0 bytes to the right of [ 14.333211] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.334027] [ 14.334108] The buggy address belongs to the physical page: [ 14.334279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.334523] flags: 0x200000000000000(node=0|zone=2) [ 14.334681] page_type: f5(slab) [ 14.334796] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.335741] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.336868] page dumped because: kasan: bad access detected [ 14.337515] [ 14.337894] Memory state around the buggy address: [ 14.338740] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.339579] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.340492] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.341304] ^ [ 14.342050] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.342308] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.343161] ================================================================== [ 14.134016] ================================================================== [ 14.134247] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 14.134464] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.134859] [ 14.134986] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.135048] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.135060] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.135081] Call Trace: [ 14.135100] <TASK> [ 14.135117] dump_stack_lvl+0x73/0xb0 [ 14.135146] print_report+0xd1/0x650 [ 14.135168] ? __virt_addr_valid+0x1db/0x2d0 [ 14.135192] ? kasan_atomics_helper+0x72f/0x5450 [ 14.135213] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.135236] ? kasan_atomics_helper+0x72f/0x5450 [ 14.135257] kasan_report+0x141/0x180 [ 14.135279] ? kasan_atomics_helper+0x72f/0x5450 [ 14.135306] kasan_check_range+0x10c/0x1c0 [ 14.135329] __kasan_check_write+0x18/0x20 [ 14.135348] kasan_atomics_helper+0x72f/0x5450 [ 14.135373] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.135395] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.135853] ? kasan_atomics+0x152/0x310 [ 14.135887] kasan_atomics+0x1dc/0x310 [ 14.135912] ? __pfx_kasan_atomics+0x10/0x10 [ 14.135951] ? __pfx_read_tsc+0x10/0x10 [ 14.135973] ? ktime_get_ts64+0x86/0x230 [ 14.136001] kunit_try_run_case+0x1a5/0x480 [ 14.136025] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.136047] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.136071] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.136094] ? __kthread_parkme+0x82/0x180 [ 14.136115] ? preempt_count_sub+0x50/0x80 [ 14.136140] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.136164] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.136187] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.136210] kthread+0x337/0x6f0 [ 14.136230] ? trace_preempt_on+0x20/0xc0 [ 14.136255] ? __pfx_kthread+0x10/0x10 [ 14.136276] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.136296] ? calculate_sigpending+0x7b/0xa0 [ 14.136321] ? __pfx_kthread+0x10/0x10 [ 14.136343] ret_from_fork+0x116/0x1d0 [ 14.136362] ? __pfx_kthread+0x10/0x10 [ 14.136383] ret_from_fork_asm+0x1a/0x30 [ 14.136830] </TASK> [ 14.136845] [ 14.149460] Allocated by task 290: [ 14.149693] kasan_save_stack+0x45/0x70 [ 14.149994] kasan_save_track+0x18/0x40 [ 14.150217] kasan_save_alloc_info+0x3b/0x50 [ 14.150365] __kasan_kmalloc+0xb7/0xc0 [ 14.150571] __kmalloc_cache_noprof+0x189/0x420 [ 14.150882] kasan_atomics+0x95/0x310 [ 14.151062] kunit_try_run_case+0x1a5/0x480 [ 14.151206] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.151374] kthread+0x337/0x6f0 [ 14.151535] ret_from_fork+0x116/0x1d0 [ 14.151775] ret_from_fork_asm+0x1a/0x30 [ 14.152007] [ 14.152111] The buggy address belongs to the object at ffff8881028d8d80 [ 14.152111] which belongs to the cache kmalloc-64 of size 64 [ 14.152491] The buggy address is located 0 bytes to the right of [ 14.152491] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.153329] [ 14.153428] The buggy address belongs to the physical page: [ 14.153625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.153949] flags: 0x200000000000000(node=0|zone=2) [ 14.154164] page_type: f5(slab) [ 14.154282] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.154507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.155143] page dumped because: kasan: bad access detected [ 14.155380] [ 14.155484] Memory state around the buggy address: [ 14.155639] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.155848] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.156143] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.156458] ^ [ 14.156742] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.157064] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.157339] ================================================================== [ 15.304512] ================================================================== [ 15.305301] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 15.305999] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 15.306856] [ 15.306963] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 15.307023] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.307037] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.307059] Call Trace: [ 15.307089] <TASK> [ 15.307107] dump_stack_lvl+0x73/0xb0 [ 15.307137] print_report+0xd1/0x650 [ 15.307160] ? __virt_addr_valid+0x1db/0x2d0 [ 15.307206] ? kasan_atomics_helper+0x218a/0x5450 [ 15.307228] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.307250] ? kasan_atomics_helper+0x218a/0x5450 [ 15.307272] kasan_report+0x141/0x180 [ 15.307295] ? kasan_atomics_helper+0x218a/0x5450 [ 15.307321] kasan_check_range+0x10c/0x1c0 [ 15.307345] __kasan_check_write+0x18/0x20 [ 15.307365] kasan_atomics_helper+0x218a/0x5450 [ 15.307413] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.307436] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.307473] ? kasan_atomics+0x152/0x310 [ 15.307500] kasan_atomics+0x1dc/0x310 [ 15.307522] ? __pfx_kasan_atomics+0x10/0x10 [ 15.307558] ? __pfx_read_tsc+0x10/0x10 [ 15.307580] ? ktime_get_ts64+0x86/0x230 [ 15.307606] kunit_try_run_case+0x1a5/0x480 [ 15.307629] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.307652] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.307675] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.307698] ? __kthread_parkme+0x82/0x180 [ 15.307719] ? preempt_count_sub+0x50/0x80 [ 15.307743] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.307767] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.307790] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.307814] kthread+0x337/0x6f0 [ 15.307834] ? trace_preempt_on+0x20/0xc0 [ 15.307858] ? __pfx_kthread+0x10/0x10 [ 15.307879] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.307900] ? calculate_sigpending+0x7b/0xa0 [ 15.307925] ? __pfx_kthread+0x10/0x10 [ 15.307959] ret_from_fork+0x116/0x1d0 [ 15.307978] ? __pfx_kthread+0x10/0x10 [ 15.307999] ret_from_fork_asm+0x1a/0x30 [ 15.308030] </TASK> [ 15.308042] [ 15.320483] Allocated by task 290: [ 15.320657] kasan_save_stack+0x45/0x70 [ 15.321122] kasan_save_track+0x18/0x40 [ 15.321347] kasan_save_alloc_info+0x3b/0x50 [ 15.321816] __kasan_kmalloc+0xb7/0xc0 [ 15.321988] __kmalloc_cache_noprof+0x189/0x420 [ 15.322140] kasan_atomics+0x95/0x310 [ 15.322267] kunit_try_run_case+0x1a5/0x480 [ 15.322450] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.322908] kthread+0x337/0x6f0 [ 15.323222] ret_from_fork+0x116/0x1d0 [ 15.323632] ret_from_fork_asm+0x1a/0x30 [ 15.324042] [ 15.324195] The buggy address belongs to the object at ffff8881028d8d80 [ 15.324195] which belongs to the cache kmalloc-64 of size 64 [ 15.325228] The buggy address is located 0 bytes to the right of [ 15.325228] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 15.325762] [ 15.325831] The buggy address belongs to the physical page: [ 15.326008] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 15.326243] flags: 0x200000000000000(node=0|zone=2) [ 15.326425] page_type: f5(slab) [ 15.326705] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.327328] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.327993] page dumped because: kasan: bad access detected [ 15.328464] [ 15.328624] Memory state around the buggy address: [ 15.329042] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.329662] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.330285] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.330958] ^ [ 15.331383] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.331634] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.331839] ================================================================== [ 15.110856] ================================================================== [ 15.111186] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 15.111864] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 15.112390] [ 15.112652] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 15.112704] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.112717] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.112738] Call Trace: [ 15.112754] <TASK> [ 15.112770] dump_stack_lvl+0x73/0xb0 [ 15.112801] print_report+0xd1/0x650 [ 15.112824] ? __virt_addr_valid+0x1db/0x2d0 [ 15.112848] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.112869] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.112892] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.112914] kasan_report+0x141/0x180 [ 15.112951] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.112976] kasan_check_range+0x10c/0x1c0 [ 15.113000] __kasan_check_write+0x18/0x20 [ 15.113019] kasan_atomics_helper+0x1e12/0x5450 [ 15.113041] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.113064] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.113089] ? kasan_atomics+0x152/0x310 [ 15.113114] kasan_atomics+0x1dc/0x310 [ 15.113137] ? __pfx_kasan_atomics+0x10/0x10 [ 15.113162] ? __pfx_read_tsc+0x10/0x10 [ 15.113183] ? ktime_get_ts64+0x86/0x230 [ 15.113210] kunit_try_run_case+0x1a5/0x480 [ 15.113234] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.113255] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.113279] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.113302] ? __kthread_parkme+0x82/0x180 [ 15.113322] ? preempt_count_sub+0x50/0x80 [ 15.113346] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.113370] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.113394] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.113416] kthread+0x337/0x6f0 [ 15.113436] ? trace_preempt_on+0x20/0xc0 [ 15.113460] ? __pfx_kthread+0x10/0x10 [ 15.113481] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.113502] ? calculate_sigpending+0x7b/0xa0 [ 15.113526] ? __pfx_kthread+0x10/0x10 [ 15.113548] ret_from_fork+0x116/0x1d0 [ 15.113566] ? __pfx_kthread+0x10/0x10 [ 15.113587] ret_from_fork_asm+0x1a/0x30 [ 15.113618] </TASK> [ 15.113629] [ 15.124006] Allocated by task 290: [ 15.124186] kasan_save_stack+0x45/0x70 [ 15.124333] kasan_save_track+0x18/0x40 [ 15.124662] kasan_save_alloc_info+0x3b/0x50 [ 15.124970] __kasan_kmalloc+0xb7/0xc0 [ 15.125156] __kmalloc_cache_noprof+0x189/0x420 [ 15.125515] kasan_atomics+0x95/0x310 [ 15.125794] kunit_try_run_case+0x1a5/0x480 [ 15.125993] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.126367] kthread+0x337/0x6f0 [ 15.126620] ret_from_fork+0x116/0x1d0 [ 15.126770] ret_from_fork_asm+0x1a/0x30 [ 15.126983] [ 15.127076] The buggy address belongs to the object at ffff8881028d8d80 [ 15.127076] which belongs to the cache kmalloc-64 of size 64 [ 15.127578] The buggy address is located 0 bytes to the right of [ 15.127578] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 15.128467] [ 15.128652] The buggy address belongs to the physical page: [ 15.128963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 15.129360] flags: 0x200000000000000(node=0|zone=2) [ 15.129585] page_type: f5(slab) [ 15.129874] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.130281] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.130720] page dumped because: kasan: bad access detected [ 15.131069] [ 15.131170] Memory state around the buggy address: [ 15.131376] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.131828] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.132222] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.132532] ^ [ 15.132859] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.133177] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.133483] ================================================================== [ 14.228960] ================================================================== [ 14.229231] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 14.229687] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.230043] [ 14.230150] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.230196] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.230209] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.230229] Call Trace: [ 14.230246] <TASK> [ 14.230264] dump_stack_lvl+0x73/0xb0 [ 14.230293] print_report+0xd1/0x650 [ 14.230316] ? __virt_addr_valid+0x1db/0x2d0 [ 14.230340] ? kasan_atomics_helper+0x992/0x5450 [ 14.230361] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.230408] ? kasan_atomics_helper+0x992/0x5450 [ 14.230431] kasan_report+0x141/0x180 [ 14.230455] ? kasan_atomics_helper+0x992/0x5450 [ 14.230481] kasan_check_range+0x10c/0x1c0 [ 14.230505] __kasan_check_write+0x18/0x20 [ 14.230524] kasan_atomics_helper+0x992/0x5450 [ 14.230547] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.230568] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.230594] ? kasan_atomics+0x152/0x310 [ 14.230620] kasan_atomics+0x1dc/0x310 [ 14.230642] ? __pfx_kasan_atomics+0x10/0x10 [ 14.230667] ? __pfx_read_tsc+0x10/0x10 [ 14.230689] ? ktime_get_ts64+0x86/0x230 [ 14.230717] kunit_try_run_case+0x1a5/0x480 [ 14.230741] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.230763] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.230786] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.230809] ? __kthread_parkme+0x82/0x180 [ 14.230830] ? preempt_count_sub+0x50/0x80 [ 14.230854] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.230878] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.230901] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.230926] kthread+0x337/0x6f0 [ 14.230957] ? trace_preempt_on+0x20/0xc0 [ 14.230982] ? __pfx_kthread+0x10/0x10 [ 14.231003] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.231024] ? calculate_sigpending+0x7b/0xa0 [ 14.231048] ? __pfx_kthread+0x10/0x10 [ 14.231070] ret_from_fork+0x116/0x1d0 [ 14.231089] ? __pfx_kthread+0x10/0x10 [ 14.231110] ret_from_fork_asm+0x1a/0x30 [ 14.231142] </TASK> [ 14.231153] [ 14.243096] Allocated by task 290: [ 14.243292] kasan_save_stack+0x45/0x70 [ 14.243552] kasan_save_track+0x18/0x40 [ 14.243732] kasan_save_alloc_info+0x3b/0x50 [ 14.243918] __kasan_kmalloc+0xb7/0xc0 [ 14.244058] __kmalloc_cache_noprof+0x189/0x420 [ 14.244207] kasan_atomics+0x95/0x310 [ 14.244397] kunit_try_run_case+0x1a5/0x480 [ 14.244690] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.244857] kthread+0x337/0x6f0 [ 14.245183] ret_from_fork+0x116/0x1d0 [ 14.245387] ret_from_fork_asm+0x1a/0x30 [ 14.245562] [ 14.246039] The buggy address belongs to the object at ffff8881028d8d80 [ 14.246039] which belongs to the cache kmalloc-64 of size 64 [ 14.246926] The buggy address is located 0 bytes to the right of [ 14.246926] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.247542] [ 14.247638] The buggy address belongs to the physical page: [ 14.247851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.248194] flags: 0x200000000000000(node=0|zone=2) [ 14.248410] page_type: f5(slab) [ 14.248996] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.249295] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.249995] page dumped because: kasan: bad access detected [ 14.250322] [ 14.250432] Memory state around the buggy address: [ 14.251030] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.251322] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.251881] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.252168] ^ [ 14.252460] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.252697] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.253016] ================================================================== [ 14.426300] ================================================================== [ 14.427100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 14.427525] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.427897] [ 14.427997] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.428263] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.428278] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.428299] Call Trace: [ 14.428318] <TASK> [ 14.428335] dump_stack_lvl+0x73/0xb0 [ 14.428365] print_report+0xd1/0x650 [ 14.428399] ? __virt_addr_valid+0x1db/0x2d0 [ 14.428422] ? kasan_atomics_helper+0xe78/0x5450 [ 14.428443] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.428468] ? kasan_atomics_helper+0xe78/0x5450 [ 14.428489] kasan_report+0x141/0x180 [ 14.428511] ? kasan_atomics_helper+0xe78/0x5450 [ 14.428537] kasan_check_range+0x10c/0x1c0 [ 14.428561] __kasan_check_write+0x18/0x20 [ 14.428581] kasan_atomics_helper+0xe78/0x5450 [ 14.428603] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.428625] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.428650] ? kasan_atomics+0x152/0x310 [ 14.428676] kasan_atomics+0x1dc/0x310 [ 14.428699] ? __pfx_kasan_atomics+0x10/0x10 [ 14.428722] ? __pfx_read_tsc+0x10/0x10 [ 14.428744] ? ktime_get_ts64+0x86/0x230 [ 14.428770] kunit_try_run_case+0x1a5/0x480 [ 14.428795] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.428817] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.428839] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.428877] ? __kthread_parkme+0x82/0x180 [ 14.428898] ? preempt_count_sub+0x50/0x80 [ 14.428922] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.428965] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.428989] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.429013] kthread+0x337/0x6f0 [ 14.429044] ? trace_preempt_on+0x20/0xc0 [ 14.429069] ? __pfx_kthread+0x10/0x10 [ 14.429090] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.429122] ? calculate_sigpending+0x7b/0xa0 [ 14.429146] ? __pfx_kthread+0x10/0x10 [ 14.429168] ret_from_fork+0x116/0x1d0 [ 14.429198] ? __pfx_kthread+0x10/0x10 [ 14.429218] ret_from_fork_asm+0x1a/0x30 [ 14.429273] </TASK> [ 14.429285] [ 14.440356] Allocated by task 290: [ 14.440559] kasan_save_stack+0x45/0x70 [ 14.440777] kasan_save_track+0x18/0x40 [ 14.441008] kasan_save_alloc_info+0x3b/0x50 [ 14.441170] __kasan_kmalloc+0xb7/0xc0 [ 14.441299] __kmalloc_cache_noprof+0x189/0x420 [ 14.441636] kasan_atomics+0x95/0x310 [ 14.441837] kunit_try_run_case+0x1a5/0x480 [ 14.442090] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.442364] kthread+0x337/0x6f0 [ 14.442522] ret_from_fork+0x116/0x1d0 [ 14.442682] ret_from_fork_asm+0x1a/0x30 [ 14.442851] [ 14.442952] The buggy address belongs to the object at ffff8881028d8d80 [ 14.442952] which belongs to the cache kmalloc-64 of size 64 [ 14.443441] The buggy address is located 0 bytes to the right of [ 14.443441] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.443981] [ 14.444058] The buggy address belongs to the physical page: [ 14.444304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.444663] flags: 0x200000000000000(node=0|zone=2) [ 14.444891] page_type: f5(slab) [ 14.445069] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.445316] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.445535] page dumped because: kasan: bad access detected [ 14.445758] [ 14.445858] Memory state around the buggy address: [ 14.446080] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.446365] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.446573] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.446778] ^ [ 14.447125] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.447497] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.447817] ================================================================== [ 14.918024] ================================================================== [ 14.918621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 14.918876] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.919107] [ 14.919190] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.919236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.919248] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.919270] Call Trace: [ 14.919289] <TASK> [ 14.919308] dump_stack_lvl+0x73/0xb0 [ 14.919335] print_report+0xd1/0x650 [ 14.919357] ? __virt_addr_valid+0x1db/0x2d0 [ 14.919380] ? kasan_atomics_helper+0x194a/0x5450 [ 14.919412] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.919434] ? kasan_atomics_helper+0x194a/0x5450 [ 14.919456] kasan_report+0x141/0x180 [ 14.919478] ? kasan_atomics_helper+0x194a/0x5450 [ 14.919504] kasan_check_range+0x10c/0x1c0 [ 14.919527] __kasan_check_write+0x18/0x20 [ 14.919547] kasan_atomics_helper+0x194a/0x5450 [ 14.919569] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.919591] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.919616] ? kasan_atomics+0x152/0x310 [ 14.919642] kasan_atomics+0x1dc/0x310 [ 14.919665] ? __pfx_kasan_atomics+0x10/0x10 [ 14.919690] ? __pfx_read_tsc+0x10/0x10 [ 14.919712] ? ktime_get_ts64+0x86/0x230 [ 14.919737] kunit_try_run_case+0x1a5/0x480 [ 14.919761] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.919784] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.919807] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.919829] ? __kthread_parkme+0x82/0x180 [ 14.919850] ? preempt_count_sub+0x50/0x80 [ 14.919874] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.919897] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.919922] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.919957] kthread+0x337/0x6f0 [ 14.919977] ? trace_preempt_on+0x20/0xc0 [ 14.920002] ? __pfx_kthread+0x10/0x10 [ 14.920023] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.920044] ? calculate_sigpending+0x7b/0xa0 [ 14.920068] ? __pfx_kthread+0x10/0x10 [ 14.920090] ret_from_fork+0x116/0x1d0 [ 14.920108] ? __pfx_kthread+0x10/0x10 [ 14.920129] ret_from_fork_asm+0x1a/0x30 [ 14.920161] </TASK> [ 14.920172] [ 14.932148] Allocated by task 290: [ 14.932303] kasan_save_stack+0x45/0x70 [ 14.932533] kasan_save_track+0x18/0x40 [ 14.932661] kasan_save_alloc_info+0x3b/0x50 [ 14.932802] __kasan_kmalloc+0xb7/0xc0 [ 14.933001] __kmalloc_cache_noprof+0x189/0x420 [ 14.933220] kasan_atomics+0x95/0x310 [ 14.933367] kunit_try_run_case+0x1a5/0x480 [ 14.933557] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.933731] kthread+0x337/0x6f0 [ 14.933845] ret_from_fork+0x116/0x1d0 [ 14.934037] ret_from_fork_asm+0x1a/0x30 [ 14.934237] [ 14.934330] The buggy address belongs to the object at ffff8881028d8d80 [ 14.934330] which belongs to the cache kmalloc-64 of size 64 [ 14.934991] The buggy address is located 0 bytes to the right of [ 14.934991] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.935380] [ 14.935448] The buggy address belongs to the physical page: [ 14.935692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.936045] flags: 0x200000000000000(node=0|zone=2) [ 14.936247] page_type: f5(slab) [ 14.936376] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.936647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.936913] page dumped because: kasan: bad access detected [ 14.937172] [ 14.937261] Memory state around the buggy address: [ 14.937484] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.937752] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.938058] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.938315] ^ [ 14.938567] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.938836] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.939089] ================================================================== [ 14.624068] ================================================================== [ 14.624652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 14.625017] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.625345] [ 14.625449] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.625497] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.625509] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.625531] Call Trace: [ 14.625551] <TASK> [ 14.625570] dump_stack_lvl+0x73/0xb0 [ 14.625599] print_report+0xd1/0x650 [ 14.625622] ? __virt_addr_valid+0x1db/0x2d0 [ 14.625645] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.625666] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.625694] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.625716] kasan_report+0x141/0x180 [ 14.625739] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.625765] kasan_check_range+0x10c/0x1c0 [ 14.625789] __kasan_check_write+0x18/0x20 [ 14.625808] kasan_atomics_helper+0x12e6/0x5450 [ 14.625830] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.625853] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.625877] ? kasan_atomics+0x152/0x310 [ 14.625903] kasan_atomics+0x1dc/0x310 [ 14.625926] ? __pfx_kasan_atomics+0x10/0x10 [ 14.625960] ? __pfx_read_tsc+0x10/0x10 [ 14.625981] ? ktime_get_ts64+0x86/0x230 [ 14.626007] kunit_try_run_case+0x1a5/0x480 [ 14.626032] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.626066] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.626089] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.626111] ? __kthread_parkme+0x82/0x180 [ 14.626143] ? preempt_count_sub+0x50/0x80 [ 14.626167] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.626191] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.626214] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.626237] kthread+0x337/0x6f0 [ 14.626258] ? trace_preempt_on+0x20/0xc0 [ 14.626282] ? __pfx_kthread+0x10/0x10 [ 14.626303] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.626323] ? calculate_sigpending+0x7b/0xa0 [ 14.626348] ? __pfx_kthread+0x10/0x10 [ 14.626369] ret_from_fork+0x116/0x1d0 [ 14.626398] ? __pfx_kthread+0x10/0x10 [ 14.626420] ret_from_fork_asm+0x1a/0x30 [ 14.626451] </TASK> [ 14.626462] [ 14.634030] Allocated by task 290: [ 14.634178] kasan_save_stack+0x45/0x70 [ 14.634318] kasan_save_track+0x18/0x40 [ 14.634538] kasan_save_alloc_info+0x3b/0x50 [ 14.634798] __kasan_kmalloc+0xb7/0xc0 [ 14.634965] __kmalloc_cache_noprof+0x189/0x420 [ 14.635116] kasan_atomics+0x95/0x310 [ 14.635254] kunit_try_run_case+0x1a5/0x480 [ 14.635573] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.635871] kthread+0x337/0x6f0 [ 14.636068] ret_from_fork+0x116/0x1d0 [ 14.636276] ret_from_fork_asm+0x1a/0x30 [ 14.636496] [ 14.636564] The buggy address belongs to the object at ffff8881028d8d80 [ 14.636564] which belongs to the cache kmalloc-64 of size 64 [ 14.637069] The buggy address is located 0 bytes to the right of [ 14.637069] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.637629] [ 14.637726] The buggy address belongs to the physical page: [ 14.637926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.638258] flags: 0x200000000000000(node=0|zone=2) [ 14.638523] page_type: f5(slab) [ 14.638682] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.639023] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.639337] page dumped because: kasan: bad access detected [ 14.639580] [ 14.639645] Memory state around the buggy address: [ 14.639794] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.640016] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.640225] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.640487] ^ [ 14.640742] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.641113] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.641465] ================================================================== [ 14.466959] ================================================================== [ 14.467308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 14.467651] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290 [ 14.467942] [ 14.468067] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 14.468113] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.468126] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.468148] Call Trace: [ 14.468165] <TASK> [ 14.468182] dump_stack_lvl+0x73/0xb0 [ 14.468210] print_report+0xd1/0x650 [ 14.468232] ? __virt_addr_valid+0x1db/0x2d0 [ 14.468256] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.468277] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.468299] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.468321] kasan_report+0x141/0x180 [ 14.468343] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.468369] kasan_check_range+0x10c/0x1c0 [ 14.468404] __kasan_check_write+0x18/0x20 [ 14.468424] kasan_atomics_helper+0xfa9/0x5450 [ 14.468447] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.468469] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.468494] ? kasan_atomics+0x152/0x310 [ 14.468521] kasan_atomics+0x1dc/0x310 [ 14.468544] ? __pfx_kasan_atomics+0x10/0x10 [ 14.468579] ? __pfx_read_tsc+0x10/0x10 [ 14.468601] ? ktime_get_ts64+0x86/0x230 [ 14.468627] kunit_try_run_case+0x1a5/0x480 [ 14.468663] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.468685] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.468708] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.468731] ? __kthread_parkme+0x82/0x180 [ 14.468752] ? preempt_count_sub+0x50/0x80 [ 14.468776] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.468800] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.468823] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.468847] kthread+0x337/0x6f0 [ 14.468867] ? trace_preempt_on+0x20/0xc0 [ 14.468892] ? __pfx_kthread+0x10/0x10 [ 14.468921] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.468952] ? calculate_sigpending+0x7b/0xa0 [ 14.468976] ? __pfx_kthread+0x10/0x10 [ 14.469009] ret_from_fork+0x116/0x1d0 [ 14.469028] ? __pfx_kthread+0x10/0x10 [ 14.469049] ret_from_fork_asm+0x1a/0x30 [ 14.469080] </TASK> [ 14.469092] [ 14.477836] Allocated by task 290: [ 14.479724] kasan_save_stack+0x45/0x70 [ 14.480592] kasan_save_track+0x18/0x40 [ 14.481295] kasan_save_alloc_info+0x3b/0x50 [ 14.482003] __kasan_kmalloc+0xb7/0xc0 [ 14.482741] __kmalloc_cache_noprof+0x189/0x420 [ 14.483156] kasan_atomics+0x95/0x310 [ 14.483359] kunit_try_run_case+0x1a5/0x480 [ 14.483557] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.484002] kthread+0x337/0x6f0 [ 14.484158] ret_from_fork+0x116/0x1d0 [ 14.484465] ret_from_fork_asm+0x1a/0x30 [ 14.484662] [ 14.484825] The buggy address belongs to the object at ffff8881028d8d80 [ 14.484825] which belongs to the cache kmalloc-64 of size 64 [ 14.485450] The buggy address is located 0 bytes to the right of [ 14.485450] allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0) [ 14.486219] [ 14.486299] The buggy address belongs to the physical page: [ 14.486654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8 [ 14.487325] flags: 0x200000000000000(node=0|zone=2) [ 14.487800] page_type: f5(slab) [ 14.488099] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.488370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.489016] page dumped because: kasan: bad access detected [ 14.489497] [ 14.489615] Memory state around the buggy address: [ 14.489771] ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.489990] ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.490199] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.490410] ^ [ 14.490559] ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.491028] ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.491276] ==================================================================