Date
June 17, 2025, 6:35 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.780552] ================================================================== [ 19.780627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 19.781361] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.781470] [ 19.781507] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.781609] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.781946] Hardware name: linux,dummy-virt (DT) [ 19.782127] Call trace: [ 19.782183] show_stack+0x20/0x38 (C) [ 19.782344] dump_stack_lvl+0x8c/0xd0 [ 19.782398] print_report+0x118/0x608 [ 19.782448] kasan_report+0xdc/0x128 [ 19.782496] kasan_check_range+0x100/0x1a8 [ 19.782986] __kasan_check_write+0x20/0x30 [ 19.783417] kasan_atomics_helper+0x1058/0x4858 [ 19.783642] kasan_atomics+0x198/0x2e0 [ 19.783715] kunit_try_run_case+0x170/0x3f0 [ 19.783882] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.783976] kthread+0x328/0x630 [ 19.784045] ret_from_fork+0x10/0x20 [ 19.784097] [ 19.784119] Allocated by task 274: [ 19.784148] kasan_save_stack+0x3c/0x68 [ 19.784194] kasan_save_track+0x20/0x40 [ 19.784301] kasan_save_alloc_info+0x40/0x58 [ 19.784353] __kasan_kmalloc+0xd4/0xd8 [ 19.784392] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.784433] kasan_atomics+0xb8/0x2e0 [ 19.784472] kunit_try_run_case+0x170/0x3f0 [ 19.784522] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.784570] kthread+0x328/0x630 [ 19.784612] ret_from_fork+0x10/0x20 [ 19.784651] [ 19.784673] The buggy address belongs to the object at fff00000c5210800 [ 19.784673] which belongs to the cache kmalloc-64 of size 64 [ 19.784746] The buggy address is located 0 bytes to the right of [ 19.784746] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.784830] [ 19.784861] The buggy address belongs to the physical page: [ 19.784912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.784985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.785039] page_type: f5(slab) [ 19.785081] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.785140] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.785185] page dumped because: kasan: bad access detected [ 19.785217] [ 19.785238] Memory state around the buggy address: [ 19.785280] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.785334] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.785388] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.785444] ^ [ 19.785490] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.785551] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.785602] ================================================================== [ 19.909023] ================================================================== [ 19.909079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 19.909131] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.909801] [ 19.909853] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.910248] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.910334] Hardware name: linux,dummy-virt (DT) [ 19.910415] Call trace: [ 19.910506] show_stack+0x20/0x38 (C) [ 19.910602] dump_stack_lvl+0x8c/0xd0 [ 19.910711] print_report+0x118/0x608 [ 19.910849] kasan_report+0xdc/0x128 [ 19.910900] kasan_check_range+0x100/0x1a8 [ 19.910965] __kasan_check_write+0x20/0x30 [ 19.911011] kasan_atomics_helper+0x1644/0x4858 [ 19.911246] kasan_atomics+0x198/0x2e0 [ 19.911706] kunit_try_run_case+0x170/0x3f0 [ 19.911835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.911897] kthread+0x328/0x630 [ 19.911953] ret_from_fork+0x10/0x20 [ 19.912279] [ 19.912427] Allocated by task 274: [ 19.912711] kasan_save_stack+0x3c/0x68 [ 19.912946] kasan_save_track+0x20/0x40 [ 19.913132] kasan_save_alloc_info+0x40/0x58 [ 19.913218] __kasan_kmalloc+0xd4/0xd8 [ 19.913401] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.913628] kasan_atomics+0xb8/0x2e0 [ 19.913840] kunit_try_run_case+0x170/0x3f0 [ 19.914064] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.914155] kthread+0x328/0x630 [ 19.914379] ret_from_fork+0x10/0x20 [ 19.914610] [ 19.914781] The buggy address belongs to the object at fff00000c5210800 [ 19.914781] which belongs to the cache kmalloc-64 of size 64 [ 19.914999] The buggy address is located 0 bytes to the right of [ 19.914999] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.915327] [ 19.915532] The buggy address belongs to the physical page: [ 19.915601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.915678] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.915916] page_type: f5(slab) [ 19.916250] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.916466] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.916585] page dumped because: kasan: bad access detected [ 19.916667] [ 19.916726] Memory state around the buggy address: [ 19.917073] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.917205] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.917293] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.917422] ^ [ 19.917501] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.917743] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.918018] ================================================================== [ 19.705026] ================================================================== [ 19.705171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 19.705342] Read of size 8 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.705604] [ 19.705658] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.705779] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.705903] Hardware name: linux,dummy-virt (DT) [ 19.706111] Call trace: [ 19.706154] show_stack+0x20/0x38 (C) [ 19.706553] dump_stack_lvl+0x8c/0xd0 [ 19.707021] print_report+0x118/0x608 [ 19.707419] kasan_report+0xdc/0x128 [ 19.707525] kasan_check_range+0x100/0x1a8 [ 19.707596] __kasan_check_read+0x20/0x30 [ 19.708155] kasan_atomics_helper+0xdd4/0x4858 [ 19.708315] kasan_atomics+0x198/0x2e0 [ 19.708418] kunit_try_run_case+0x170/0x3f0 [ 19.708604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.708836] kthread+0x328/0x630 [ 19.708913] ret_from_fork+0x10/0x20 [ 19.709280] [ 19.709336] Allocated by task 274: [ 19.709371] kasan_save_stack+0x3c/0x68 [ 19.709542] kasan_save_track+0x20/0x40 [ 19.709866] kasan_save_alloc_info+0x40/0x58 [ 19.709952] __kasan_kmalloc+0xd4/0xd8 [ 19.710006] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.710056] kasan_atomics+0xb8/0x2e0 [ 19.710107] kunit_try_run_case+0x170/0x3f0 [ 19.710149] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.710204] kthread+0x328/0x630 [ 19.710249] ret_from_fork+0x10/0x20 [ 19.710288] [ 19.710321] The buggy address belongs to the object at fff00000c5210800 [ 19.710321] which belongs to the cache kmalloc-64 of size 64 [ 19.710386] The buggy address is located 0 bytes to the right of [ 19.710386] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.710466] [ 19.710498] The buggy address belongs to the physical page: [ 19.710553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.710620] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.710674] page_type: f5(slab) [ 19.710732] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.710796] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.710840] page dumped because: kasan: bad access detected [ 19.710895] [ 19.710919] Memory state around the buggy address: [ 19.710962] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.711711] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.711805] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.711849] ^ [ 19.712357] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.712702] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.712788] ================================================================== [ 19.819425] ================================================================== [ 19.819652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 19.819905] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.820062] [ 19.820098] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.820214] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.820256] Hardware name: linux,dummy-virt (DT) [ 19.820602] Call trace: [ 19.820660] show_stack+0x20/0x38 (C) [ 19.820826] dump_stack_lvl+0x8c/0xd0 [ 19.820891] print_report+0x118/0x608 [ 19.821204] kasan_report+0xdc/0x128 [ 19.821288] kasan_check_range+0x100/0x1a8 [ 19.821349] __kasan_check_write+0x20/0x30 [ 19.821396] kasan_atomics_helper+0x11f8/0x4858 [ 19.821860] kasan_atomics+0x198/0x2e0 [ 19.822101] kunit_try_run_case+0x170/0x3f0 [ 19.822206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.822265] kthread+0x328/0x630 [ 19.822486] ret_from_fork+0x10/0x20 [ 19.822667] [ 19.822775] Allocated by task 274: [ 19.823024] kasan_save_stack+0x3c/0x68 [ 19.823174] kasan_save_track+0x20/0x40 [ 19.823350] kasan_save_alloc_info+0x40/0x58 [ 19.823586] __kasan_kmalloc+0xd4/0xd8 [ 19.824008] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.824093] kasan_atomics+0xb8/0x2e0 [ 19.824338] kunit_try_run_case+0x170/0x3f0 [ 19.824548] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.824811] kthread+0x328/0x630 [ 19.824908] ret_from_fork+0x10/0x20 [ 19.825354] [ 19.825560] The buggy address belongs to the object at fff00000c5210800 [ 19.825560] which belongs to the cache kmalloc-64 of size 64 [ 19.825673] The buggy address is located 0 bytes to the right of [ 19.825673] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.825753] [ 19.825967] The buggy address belongs to the physical page: [ 19.826015] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.826122] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.826415] page_type: f5(slab) [ 19.826706] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.826944] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.827015] page dumped because: kasan: bad access detected [ 19.827208] [ 19.827403] Memory state around the buggy address: [ 19.827561] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.827640] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.827730] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.828113] ^ [ 19.828190] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.828341] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.828435] ================================================================== [ 19.740535] ================================================================== [ 19.740593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 19.740648] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.740966] [ 19.741142] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.741277] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.741388] Hardware name: linux,dummy-virt (DT) [ 19.741422] Call trace: [ 19.741449] show_stack+0x20/0x38 (C) [ 19.741669] dump_stack_lvl+0x8c/0xd0 [ 19.741821] print_report+0x118/0x608 [ 19.741990] kasan_report+0xdc/0x128 [ 19.742435] kasan_check_range+0x100/0x1a8 [ 19.742595] __kasan_check_write+0x20/0x30 [ 19.742694] kasan_atomics_helper+0xeb8/0x4858 [ 19.742849] kasan_atomics+0x198/0x2e0 [ 19.742960] kunit_try_run_case+0x170/0x3f0 [ 19.743129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.743206] kthread+0x328/0x630 [ 19.743259] ret_from_fork+0x10/0x20 [ 19.743309] [ 19.743331] Allocated by task 274: [ 19.743855] kasan_save_stack+0x3c/0x68 [ 19.744048] kasan_save_track+0x20/0x40 [ 19.744160] kasan_save_alloc_info+0x40/0x58 [ 19.744392] __kasan_kmalloc+0xd4/0xd8 [ 19.744998] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.745066] kasan_atomics+0xb8/0x2e0 [ 19.745294] kunit_try_run_case+0x170/0x3f0 [ 19.745771] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.745991] kthread+0x328/0x630 [ 19.746043] ret_from_fork+0x10/0x20 [ 19.746234] [ 19.746473] The buggy address belongs to the object at fff00000c5210800 [ 19.746473] which belongs to the cache kmalloc-64 of size 64 [ 19.746676] The buggy address is located 0 bytes to the right of [ 19.746676] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.746771] [ 19.747141] The buggy address belongs to the physical page: [ 19.747247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.747525] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.747694] page_type: f5(slab) [ 19.747915] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.748233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.748396] page dumped because: kasan: bad access detected [ 19.748484] [ 19.748595] Memory state around the buggy address: [ 19.748655] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.748713] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.748775] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.748989] ^ [ 19.749459] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.749558] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.749767] ================================================================== [ 19.850337] ================================================================== [ 19.850393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 19.850449] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.850503] [ 19.850537] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.850627] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.850656] Hardware name: linux,dummy-virt (DT) [ 19.850689] Call trace: [ 19.850715] show_stack+0x20/0x38 (C) [ 19.850766] dump_stack_lvl+0x8c/0xd0 [ 19.850816] print_report+0x118/0x608 [ 19.850863] kasan_report+0xdc/0x128 [ 19.850912] kasan_check_range+0x100/0x1a8 [ 19.850978] __kasan_check_write+0x20/0x30 [ 19.851024] kasan_atomics_helper+0x1384/0x4858 [ 19.851085] kasan_atomics+0x198/0x2e0 [ 19.851144] kunit_try_run_case+0x170/0x3f0 [ 19.851203] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.851260] kthread+0x328/0x630 [ 19.851305] ret_from_fork+0x10/0x20 [ 19.851356] [ 19.851378] Allocated by task 274: [ 19.851419] kasan_save_stack+0x3c/0x68 [ 19.851462] kasan_save_track+0x20/0x40 [ 19.851511] kasan_save_alloc_info+0x40/0x58 [ 19.851552] __kasan_kmalloc+0xd4/0xd8 [ 19.851592] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.851634] kasan_atomics+0xb8/0x2e0 [ 19.851673] kunit_try_run_case+0x170/0x3f0 [ 19.851723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.851771] kthread+0x328/0x630 [ 19.851807] ret_from_fork+0x10/0x20 [ 19.851845] [ 19.851866] The buggy address belongs to the object at fff00000c5210800 [ 19.851866] which belongs to the cache kmalloc-64 of size 64 [ 19.851936] The buggy address is located 0 bytes to the right of [ 19.851936] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.852461] [ 19.852873] The buggy address belongs to the physical page: [ 19.852939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.853007] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.853449] page_type: f5(slab) [ 19.853508] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.853646] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.853704] page dumped because: kasan: bad access detected [ 19.853739] [ 19.854021] Memory state around the buggy address: [ 19.854426] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.854713] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.854767] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.854877] ^ [ 19.854992] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.855122] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.855251] ================================================================== [ 19.684084] ================================================================== [ 19.684939] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 19.685190] Write of size 4 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.685274] [ 19.685332] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.685471] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.685520] Hardware name: linux,dummy-virt (DT) [ 19.685555] Call trace: [ 19.685588] show_stack+0x20/0x38 (C) [ 19.685733] dump_stack_lvl+0x8c/0xd0 [ 19.685785] print_report+0x118/0x608 [ 19.685833] kasan_report+0xdc/0x128 [ 19.686166] kasan_check_range+0x100/0x1a8 [ 19.686553] __kasan_check_write+0x20/0x30 [ 19.686636] kasan_atomics_helper+0xd3c/0x4858 [ 19.686696] kasan_atomics+0x198/0x2e0 [ 19.686984] kunit_try_run_case+0x170/0x3f0 [ 19.687129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.687345] kthread+0x328/0x630 [ 19.687648] ret_from_fork+0x10/0x20 [ 19.688027] [ 19.688120] Allocated by task 274: [ 19.688186] kasan_save_stack+0x3c/0x68 [ 19.688618] kasan_save_track+0x20/0x40 [ 19.688710] kasan_save_alloc_info+0x40/0x58 [ 19.688770] __kasan_kmalloc+0xd4/0xd8 [ 19.689105] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.689240] kasan_atomics+0xb8/0x2e0 [ 19.689284] kunit_try_run_case+0x170/0x3f0 [ 19.689356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.689571] kthread+0x328/0x630 [ 19.689833] ret_from_fork+0x10/0x20 [ 19.689887] [ 19.689911] The buggy address belongs to the object at fff00000c5210800 [ 19.689911] which belongs to the cache kmalloc-64 of size 64 [ 19.689985] The buggy address is located 0 bytes to the right of [ 19.689985] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.690051] [ 19.690344] The buggy address belongs to the physical page: [ 19.690635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.690802] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.690886] page_type: f5(slab) [ 19.691038] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.691114] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.691438] page dumped because: kasan: bad access detected [ 19.691580] [ 19.691652] Memory state around the buggy address: [ 19.691778] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.691838] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.691891] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.692186] ^ [ 19.692310] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.692395] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.692707] ================================================================== [ 19.895693] ================================================================== [ 19.895778] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 19.895900] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.895985] [ 19.896021] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.896161] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.896192] Hardware name: linux,dummy-virt (DT) [ 19.896227] Call trace: [ 19.896251] show_stack+0x20/0x38 (C) [ 19.896562] dump_stack_lvl+0x8c/0xd0 [ 19.896843] print_report+0x118/0x608 [ 19.897069] kasan_report+0xdc/0x128 [ 19.897139] kasan_check_range+0x100/0x1a8 [ 19.897258] __kasan_check_write+0x20/0x30 [ 19.897333] kasan_atomics_helper+0x15b4/0x4858 [ 19.897386] kasan_atomics+0x198/0x2e0 [ 19.897484] kunit_try_run_case+0x170/0x3f0 [ 19.897536] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.897597] kthread+0x328/0x630 [ 19.897641] ret_from_fork+0x10/0x20 [ 19.897692] [ 19.897714] Allocated by task 274: [ 19.897743] kasan_save_stack+0x3c/0x68 [ 19.897788] kasan_save_track+0x20/0x40 [ 19.897830] kasan_save_alloc_info+0x40/0x58 [ 19.897870] __kasan_kmalloc+0xd4/0xd8 [ 19.897911] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.897964] kasan_atomics+0xb8/0x2e0 [ 19.898685] kunit_try_run_case+0x170/0x3f0 [ 19.898789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.898866] kthread+0x328/0x630 [ 19.899037] ret_from_fork+0x10/0x20 [ 19.899160] [ 19.899304] The buggy address belongs to the object at fff00000c5210800 [ 19.899304] which belongs to the cache kmalloc-64 of size 64 [ 19.899598] The buggy address is located 0 bytes to the right of [ 19.899598] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.899738] [ 19.899798] The buggy address belongs to the physical page: [ 19.899845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.899909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.900111] page_type: f5(slab) [ 19.900314] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.900593] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.900670] page dumped because: kasan: bad access detected [ 19.900774] [ 19.900825] Memory state around the buggy address: [ 19.900881] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.900946] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.901467] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.901523] ^ [ 19.901609] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.901733] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.901801] ================================================================== [ 19.584505] ================================================================== [ 19.584559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 19.584616] Write of size 4 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.584669] [ 19.585169] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.585311] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.585647] Hardware name: linux,dummy-virt (DT) [ 19.585889] Call trace: [ 19.586210] show_stack+0x20/0x38 (C) [ 19.586563] dump_stack_lvl+0x8c/0xd0 [ 19.586747] print_report+0x118/0x608 [ 19.586895] kasan_report+0xdc/0x128 [ 19.586984] kasan_check_range+0x100/0x1a8 [ 19.587102] __kasan_check_write+0x20/0x30 [ 19.587189] kasan_atomics_helper+0x99c/0x4858 [ 19.587327] kasan_atomics+0x198/0x2e0 [ 19.587424] kunit_try_run_case+0x170/0x3f0 [ 19.587801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.587984] kthread+0x328/0x630 [ 19.588070] ret_from_fork+0x10/0x20 [ 19.588164] [ 19.588205] Allocated by task 274: [ 19.588263] kasan_save_stack+0x3c/0x68 [ 19.588418] kasan_save_track+0x20/0x40 [ 19.588671] kasan_save_alloc_info+0x40/0x58 [ 19.588850] __kasan_kmalloc+0xd4/0xd8 [ 19.588979] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.589198] kasan_atomics+0xb8/0x2e0 [ 19.589535] kunit_try_run_case+0x170/0x3f0 [ 19.589596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.590075] kthread+0x328/0x630 [ 19.590126] ret_from_fork+0x10/0x20 [ 19.590165] [ 19.590188] The buggy address belongs to the object at fff00000c5210800 [ 19.590188] which belongs to the cache kmalloc-64 of size 64 [ 19.590250] The buggy address is located 0 bytes to the right of [ 19.590250] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.590600] [ 19.590727] The buggy address belongs to the physical page: [ 19.590779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.591084] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.591313] page_type: f5(slab) [ 19.591559] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.591711] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.591988] page dumped because: kasan: bad access detected [ 19.592119] [ 19.592561] Memory state around the buggy address: [ 19.592671] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.593151] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.593311] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.593416] ^ [ 19.593693] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.593957] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.594267] ================================================================== [ 19.919100] ================================================================== [ 19.919323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 19.919388] Read of size 8 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.919905] [ 19.920025] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.920148] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.920460] Hardware name: linux,dummy-virt (DT) [ 19.920518] Call trace: [ 19.920546] show_stack+0x20/0x38 (C) [ 19.920889] dump_stack_lvl+0x8c/0xd0 [ 19.920975] print_report+0x118/0x608 [ 19.921025] kasan_report+0xdc/0x128 [ 19.921197] __asan_report_load8_noabort+0x20/0x30 [ 19.921261] kasan_atomics_helper+0x3df4/0x4858 [ 19.921312] kasan_atomics+0x198/0x2e0 [ 19.921362] kunit_try_run_case+0x170/0x3f0 [ 19.921431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.921488] kthread+0x328/0x630 [ 19.921543] ret_from_fork+0x10/0x20 [ 19.921602] [ 19.921630] Allocated by task 274: [ 19.921661] kasan_save_stack+0x3c/0x68 [ 19.921705] kasan_save_track+0x20/0x40 [ 19.921744] kasan_save_alloc_info+0x40/0x58 [ 19.921783] __kasan_kmalloc+0xd4/0xd8 [ 19.921833] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.921877] kasan_atomics+0xb8/0x2e0 [ 19.921917] kunit_try_run_case+0x170/0x3f0 [ 19.921969] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.922015] kthread+0x328/0x630 [ 19.922566] ret_from_fork+0x10/0x20 [ 19.922651] [ 19.922706] The buggy address belongs to the object at fff00000c5210800 [ 19.922706] which belongs to the cache kmalloc-64 of size 64 [ 19.923089] The buggy address is located 0 bytes to the right of [ 19.923089] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.923787] [ 19.923831] The buggy address belongs to the physical page: [ 19.923886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.923996] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.924050] page_type: f5(slab) [ 19.924677] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.924761] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.925033] page dumped because: kasan: bad access detected [ 19.925122] [ 19.925348] Memory state around the buggy address: [ 19.925590] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.925712] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.925798] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.925902] ^ [ 19.925989] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.926351] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.926514] ================================================================== [ 19.734661] ================================================================== [ 19.734720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 19.734777] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.734841] [ 19.735136] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.735262] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.735296] Hardware name: linux,dummy-virt (DT) [ 19.735336] Call trace: [ 19.735361] show_stack+0x20/0x38 (C) [ 19.735416] dump_stack_lvl+0x8c/0xd0 [ 19.735477] print_report+0x118/0x608 [ 19.735543] kasan_report+0xdc/0x128 [ 19.735593] __asan_report_store8_noabort+0x20/0x30 [ 19.735646] kasan_atomics_helper+0x3e5c/0x4858 [ 19.735707] kasan_atomics+0x198/0x2e0 [ 19.735757] kunit_try_run_case+0x170/0x3f0 [ 19.735807] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.735862] kthread+0x328/0x630 [ 19.735908] ret_from_fork+0x10/0x20 [ 19.735969] [ 19.735990] Allocated by task 274: [ 19.736025] kasan_save_stack+0x3c/0x68 [ 19.736070] kasan_save_track+0x20/0x40 [ 19.736111] kasan_save_alloc_info+0x40/0x58 [ 19.736150] __kasan_kmalloc+0xd4/0xd8 [ 19.736199] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.736243] kasan_atomics+0xb8/0x2e0 [ 19.736281] kunit_try_run_case+0x170/0x3f0 [ 19.736331] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.736379] kthread+0x328/0x630 [ 19.736415] ret_from_fork+0x10/0x20 [ 19.736453] [ 19.736473] The buggy address belongs to the object at fff00000c5210800 [ 19.736473] which belongs to the cache kmalloc-64 of size 64 [ 19.736535] The buggy address is located 0 bytes to the right of [ 19.736535] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.736603] [ 19.736624] The buggy address belongs to the physical page: [ 19.736663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.736718] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.736777] page_type: f5(slab) [ 19.736821] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.736874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.736919] page dumped because: kasan: bad access detected [ 19.737316] [ 19.737723] Memory state around the buggy address: [ 19.737807] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.737859] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.737905] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.738292] ^ [ 19.738411] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.738916] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.739004] ================================================================== [ 19.724047] ================================================================== [ 19.724249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 19.724314] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.724367] [ 19.724417] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.724512] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.724543] Hardware name: linux,dummy-virt (DT) [ 19.724578] Call trace: [ 19.724603] show_stack+0x20/0x38 (C) [ 19.724656] dump_stack_lvl+0x8c/0xd0 [ 19.724729] print_report+0x118/0x608 [ 19.724780] kasan_report+0xdc/0x128 [ 19.724828] kasan_check_range+0x100/0x1a8 [ 19.724880] __kasan_check_write+0x20/0x30 [ 19.724938] kasan_atomics_helper+0xe44/0x4858 [ 19.724998] kasan_atomics+0x198/0x2e0 [ 19.725046] kunit_try_run_case+0x170/0x3f0 [ 19.725339] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.726399] kthread+0x328/0x630 [ 19.726503] ret_from_fork+0x10/0x20 [ 19.726568] [ 19.726590] Allocated by task 274: [ 19.726622] kasan_save_stack+0x3c/0x68 [ 19.726668] kasan_save_track+0x20/0x40 [ 19.726709] kasan_save_alloc_info+0x40/0x58 [ 19.726966] __kasan_kmalloc+0xd4/0xd8 [ 19.727269] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.727616] kasan_atomics+0xb8/0x2e0 [ 19.727959] kunit_try_run_case+0x170/0x3f0 [ 19.728281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.728407] kthread+0x328/0x630 [ 19.728563] ret_from_fork+0x10/0x20 [ 19.728901] [ 19.729016] The buggy address belongs to the object at fff00000c5210800 [ 19.729016] which belongs to the cache kmalloc-64 of size 64 [ 19.729087] The buggy address is located 0 bytes to the right of [ 19.729087] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.729308] [ 19.729364] The buggy address belongs to the physical page: [ 19.729615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.729859] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.730187] page_type: f5(slab) [ 19.730243] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.730299] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.730741] page dumped because: kasan: bad access detected [ 19.730946] [ 19.731040] Memory state around the buggy address: [ 19.731298] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.731754] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.731834] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.732060] ^ [ 19.732121] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.732168] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.732343] ================================================================== [ 19.856064] ================================================================== [ 19.856365] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 19.856486] Read of size 8 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.856562] [ 19.856622] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.856748] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.856776] Hardware name: linux,dummy-virt (DT) [ 19.857073] Call trace: [ 19.857124] show_stack+0x20/0x38 (C) [ 19.857207] dump_stack_lvl+0x8c/0xd0 [ 19.857262] print_report+0x118/0x608 [ 19.857329] kasan_report+0xdc/0x128 [ 19.857501] __asan_report_load8_noabort+0x20/0x30 [ 19.857780] kasan_atomics_helper+0x3f04/0x4858 [ 19.857918] kasan_atomics+0x198/0x2e0 [ 19.857987] kunit_try_run_case+0x170/0x3f0 [ 19.858071] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.858207] kthread+0x328/0x630 [ 19.858256] ret_from_fork+0x10/0x20 [ 19.858319] [ 19.858348] Allocated by task 274: [ 19.858382] kasan_save_stack+0x3c/0x68 [ 19.858543] kasan_save_track+0x20/0x40 [ 19.859060] kasan_save_alloc_info+0x40/0x58 [ 19.859217] __kasan_kmalloc+0xd4/0xd8 [ 19.859307] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.859350] kasan_atomics+0xb8/0x2e0 [ 19.859510] kunit_try_run_case+0x170/0x3f0 [ 19.859713] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.859890] kthread+0x328/0x630 [ 19.860112] ret_from_fork+0x10/0x20 [ 19.860182] [ 19.860285] The buggy address belongs to the object at fff00000c5210800 [ 19.860285] which belongs to the cache kmalloc-64 of size 64 [ 19.860359] The buggy address is located 0 bytes to the right of [ 19.860359] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.860700] [ 19.861056] The buggy address belongs to the physical page: [ 19.861217] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.861336] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.861481] page_type: f5(slab) [ 19.861527] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.861748] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.861943] page dumped because: kasan: bad access detected [ 19.862009] [ 19.862052] Memory state around the buggy address: [ 19.862199] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.862254] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.862583] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.862982] ^ [ 19.863081] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.863216] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.863294] ================================================================== [ 19.864176] ================================================================== [ 19.864490] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 19.864567] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.864668] [ 19.864705] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.864796] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.864845] Hardware name: linux,dummy-virt (DT) [ 19.864880] Call trace: [ 19.864907] show_stack+0x20/0x38 (C) [ 19.864969] dump_stack_lvl+0x8c/0xd0 [ 19.865019] print_report+0x118/0x608 [ 19.865067] kasan_report+0xdc/0x128 [ 19.865249] kasan_check_range+0x100/0x1a8 [ 19.865663] __kasan_check_write+0x20/0x30 [ 19.865829] kasan_atomics_helper+0x1414/0x4858 [ 19.865913] kasan_atomics+0x198/0x2e0 [ 19.866006] kunit_try_run_case+0x170/0x3f0 [ 19.866106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.866319] kthread+0x328/0x630 [ 19.866554] ret_from_fork+0x10/0x20 [ 19.866813] [ 19.866873] Allocated by task 274: [ 19.867049] kasan_save_stack+0x3c/0x68 [ 19.867184] kasan_save_track+0x20/0x40 [ 19.867226] kasan_save_alloc_info+0x40/0x58 [ 19.867282] __kasan_kmalloc+0xd4/0xd8 [ 19.867575] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.867828] kasan_atomics+0xb8/0x2e0 [ 19.867965] kunit_try_run_case+0x170/0x3f0 [ 19.868304] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.868539] kthread+0x328/0x630 [ 19.868623] ret_from_fork+0x10/0x20 [ 19.868664] [ 19.868832] The buggy address belongs to the object at fff00000c5210800 [ 19.868832] which belongs to the cache kmalloc-64 of size 64 [ 19.869282] The buggy address is located 0 bytes to the right of [ 19.869282] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.869387] [ 19.869510] The buggy address belongs to the physical page: [ 19.869562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.869779] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.870035] page_type: f5(slab) [ 19.870213] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.870270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.870373] page dumped because: kasan: bad access detected [ 19.870570] [ 19.870869] Memory state around the buggy address: [ 19.871079] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.871164] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.871300] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.871388] ^ [ 19.871562] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.871609] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.871729] ================================================================== [ 19.693524] ================================================================== [ 19.693589] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 19.693646] Read of size 4 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.693699] [ 19.693735] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.693823] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.693853] Hardware name: linux,dummy-virt (DT) [ 19.693887] Call trace: [ 19.693911] show_stack+0x20/0x38 (C) [ 19.694596] dump_stack_lvl+0x8c/0xd0 [ 19.694872] print_report+0x118/0x608 [ 19.695304] kasan_report+0xdc/0x128 [ 19.695812] __asan_report_load4_noabort+0x20/0x30 [ 19.696295] kasan_atomics_helper+0x3e04/0x4858 [ 19.696507] kasan_atomics+0x198/0x2e0 [ 19.696873] kunit_try_run_case+0x170/0x3f0 [ 19.697307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.697424] kthread+0x328/0x630 [ 19.697804] ret_from_fork+0x10/0x20 [ 19.697953] [ 19.698011] Allocated by task 274: [ 19.698191] kasan_save_stack+0x3c/0x68 [ 19.698341] kasan_save_track+0x20/0x40 [ 19.698656] kasan_save_alloc_info+0x40/0x58 [ 19.698772] __kasan_kmalloc+0xd4/0xd8 [ 19.698898] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.699085] kasan_atomics+0xb8/0x2e0 [ 19.699283] kunit_try_run_case+0x170/0x3f0 [ 19.699527] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.699613] kthread+0x328/0x630 [ 19.699828] ret_from_fork+0x10/0x20 [ 19.699920] [ 19.700249] The buggy address belongs to the object at fff00000c5210800 [ 19.700249] which belongs to the cache kmalloc-64 of size 64 [ 19.700462] The buggy address is located 0 bytes to the right of [ 19.700462] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.700695] [ 19.700826] The buggy address belongs to the physical page: [ 19.700891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.701337] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.701458] page_type: f5(slab) [ 19.701583] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.701954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.702096] page dumped because: kasan: bad access detected [ 19.702172] [ 19.702216] Memory state around the buggy address: [ 19.702332] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.702382] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.702434] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.702474] ^ [ 19.702510] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.702729] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.702893] ================================================================== [ 19.570819] ================================================================== [ 19.570877] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 19.571263] Read of size 4 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.571335] [ 19.571373] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.571462] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.571490] Hardware name: linux,dummy-virt (DT) [ 19.571523] Call trace: [ 19.571547] show_stack+0x20/0x38 (C) [ 19.571614] dump_stack_lvl+0x8c/0xd0 [ 19.571667] print_report+0x118/0x608 [ 19.571724] kasan_report+0xdc/0x128 [ 19.571775] __asan_report_load4_noabort+0x20/0x30 [ 19.571837] kasan_atomics_helper+0x42d8/0x4858 [ 19.571890] kasan_atomics+0x198/0x2e0 [ 19.571958] kunit_try_run_case+0x170/0x3f0 [ 19.572011] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.572065] kthread+0x328/0x630 [ 19.572108] ret_from_fork+0x10/0x20 [ 19.572160] [ 19.572181] Allocated by task 274: [ 19.572217] kasan_save_stack+0x3c/0x68 [ 19.572262] kasan_save_track+0x20/0x40 [ 19.572303] kasan_save_alloc_info+0x40/0x58 [ 19.572351] __kasan_kmalloc+0xd4/0xd8 [ 19.572391] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.572434] kasan_atomics+0xb8/0x2e0 [ 19.572472] kunit_try_run_case+0x170/0x3f0 [ 19.572512] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.572559] kthread+0x328/0x630 [ 19.572595] ret_from_fork+0x10/0x20 [ 19.572632] [ 19.572662] The buggy address belongs to the object at fff00000c5210800 [ 19.572662] which belongs to the cache kmalloc-64 of size 64 [ 19.572725] The buggy address is located 0 bytes to the right of [ 19.572725] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.572916] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.574367] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.575640] Write of size 4 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.578984] __kasan_kmalloc+0xd4/0xd8 [ 19.579234] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.579465] kasan_atomics+0xb8/0x2e0 [ 19.579639] kunit_try_run_case+0x170/0x3f0 [ 19.579729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.579873] kthread+0x328/0x630 [ 19.579911] ret_from_fork+0x10/0x20 [ 19.580004] [ 19.580171] The buggy address belongs to the object at fff00000c5210800 [ 19.580171] which belongs to the cache kmalloc-64 of size 64 [ 19.580392] The buggy address is located 0 bytes to the right of [ 19.580392] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.580679] [ 19.580889] The buggy address belongs to the physical page: [ 19.581106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.581211] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.581419] page_type: f5(slab) [ 19.581555] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.581900] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.581996] page dumped because: kasan: bad access detected [ 19.582118] [ 19.582164] Memory state around the buggy address: [ 19.582222] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.582275] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.582320] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.582668] ^ [ 19.582799] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.582981] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.583089] ================================================================== [ 19.872614] ================================================================== [ 19.872671] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 19.872725] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.872785] [ 19.872818] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.872908] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.872983] Hardware name: linux,dummy-virt (DT) [ 19.873021] Call trace: [ 19.873055] show_stack+0x20/0x38 (C) [ 19.873125] dump_stack_lvl+0x8c/0xd0 [ 19.873175] print_report+0x118/0x608 [ 19.873234] kasan_report+0xdc/0x128 [ 19.873293] kasan_check_range+0x100/0x1a8 [ 19.873348] __kasan_check_write+0x20/0x30 [ 19.873395] kasan_atomics_helper+0x147c/0x4858 [ 19.873446] kasan_atomics+0x198/0x2e0 [ 19.873494] kunit_try_run_case+0x170/0x3f0 [ 19.873545] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.873612] kthread+0x328/0x630 [ 19.873668] ret_from_fork+0x10/0x20 [ 19.873720] [ 19.873747] Allocated by task 274: [ 19.873778] kasan_save_stack+0x3c/0x68 [ 19.873823] kasan_save_track+0x20/0x40 [ 19.873863] kasan_save_alloc_info+0x40/0x58 [ 19.873904] __kasan_kmalloc+0xd4/0xd8 [ 19.873956] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.873999] kasan_atomics+0xb8/0x2e0 [ 19.874038] kunit_try_run_case+0x170/0x3f0 [ 19.874079] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.874126] kthread+0x328/0x630 [ 19.874161] ret_from_fork+0x10/0x20 [ 19.874200] [ 19.874230] The buggy address belongs to the object at fff00000c5210800 [ 19.874230] which belongs to the cache kmalloc-64 of size 64 [ 19.874292] The buggy address is located 0 bytes to the right of [ 19.874292] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.874363] [ 19.874385] The buggy address belongs to the physical page: [ 19.874428] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.874488] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.874536] page_type: f5(slab) [ 19.874577] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.874628] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.874672] page dumped because: kasan: bad access detected [ 19.874705] [ 19.874725] Memory state around the buggy address: [ 19.874759] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.874805] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.874850] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.874889] ^ [ 19.874924] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.876255] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.876325] ================================================================== [ 19.771839] ================================================================== [ 19.771901] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 19.772094] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.772157] [ 19.772192] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.772283] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.772310] Hardware name: linux,dummy-virt (DT) [ 19.772342] Call trace: [ 19.772367] show_stack+0x20/0x38 (C) [ 19.772420] dump_stack_lvl+0x8c/0xd0 [ 19.772472] print_report+0x118/0x608 [ 19.772519] kasan_report+0xdc/0x128 [ 19.772566] kasan_check_range+0x100/0x1a8 [ 19.772616] __kasan_check_write+0x20/0x30 [ 19.772663] kasan_atomics_helper+0xff0/0x4858 [ 19.772712] kasan_atomics+0x198/0x2e0 [ 19.772760] kunit_try_run_case+0x170/0x3f0 [ 19.772809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.772864] kthread+0x328/0x630 [ 19.772917] ret_from_fork+0x10/0x20 [ 19.773521] [ 19.773556] Allocated by task 274: [ 19.773605] kasan_save_stack+0x3c/0x68 [ 19.773675] kasan_save_track+0x20/0x40 [ 19.773719] kasan_save_alloc_info+0x40/0x58 [ 19.773966] __kasan_kmalloc+0xd4/0xd8 [ 19.774023] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.774106] kasan_atomics+0xb8/0x2e0 [ 19.774188] kunit_try_run_case+0x170/0x3f0 [ 19.774370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.774422] kthread+0x328/0x630 [ 19.774457] ret_from_fork+0x10/0x20 [ 19.774839] [ 19.775286] The buggy address belongs to the object at fff00000c5210800 [ 19.775286] which belongs to the cache kmalloc-64 of size 64 [ 19.775474] The buggy address is located 0 bytes to the right of [ 19.775474] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.775898] [ 19.776118] The buggy address belongs to the physical page: [ 19.776170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.777080] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.777353] page_type: f5(slab) [ 19.777651] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.777740] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.777900] page dumped because: kasan: bad access detected [ 19.777952] [ 19.777974] Memory state around the buggy address: [ 19.778593] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.778670] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.778735] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.778782] ^ [ 19.778819] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.779101] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.779282] ================================================================== [ 19.796659] ================================================================== [ 19.797007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 19.797190] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.797336] [ 19.797371] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.797944] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.798091] Hardware name: linux,dummy-virt (DT) [ 19.798249] Call trace: [ 19.798295] show_stack+0x20/0x38 (C) [ 19.798452] dump_stack_lvl+0x8c/0xd0 [ 19.798588] print_report+0x118/0x608 [ 19.798637] kasan_report+0xdc/0x128 [ 19.798693] kasan_check_range+0x100/0x1a8 [ 19.799166] __kasan_check_write+0x20/0x30 [ 19.799897] kasan_atomics_helper+0x1128/0x4858 [ 19.800034] kasan_atomics+0x198/0x2e0 [ 19.800297] kunit_try_run_case+0x170/0x3f0 [ 19.800380] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.800732] kthread+0x328/0x630 [ 19.801110] ret_from_fork+0x10/0x20 [ 19.801575] [ 19.801801] Allocated by task 274: [ 19.801879] kasan_save_stack+0x3c/0x68 [ 19.802091] kasan_save_track+0x20/0x40 [ 19.802441] kasan_save_alloc_info+0x40/0x58 [ 19.802728] __kasan_kmalloc+0xd4/0xd8 [ 19.802920] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.803176] kasan_atomics+0xb8/0x2e0 [ 19.803370] kunit_try_run_case+0x170/0x3f0 [ 19.803479] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.803545] kthread+0x328/0x630 [ 19.803582] ret_from_fork+0x10/0x20 [ 19.803797] [ 19.804535] The buggy address belongs to the object at fff00000c5210800 [ 19.804535] which belongs to the cache kmalloc-64 of size 64 [ 19.804625] The buggy address is located 0 bytes to the right of [ 19.804625] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.804894] [ 19.805033] The buggy address belongs to the physical page: [ 19.805092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.805633] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.805759] page_type: f5(slab) [ 19.805808] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.805974] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.806110] page dumped because: kasan: bad access detected [ 19.806149] [ 19.806169] Memory state around the buggy address: [ 19.806223] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.806270] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.806332] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.806373] ^ [ 19.806408] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.806469] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.806520] ================================================================== [ 19.876633] ================================================================== [ 19.876861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 19.876956] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.877175] [ 19.877265] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.877365] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.877787] Hardware name: linux,dummy-virt (DT) [ 19.877850] Call trace: [ 19.877891] show_stack+0x20/0x38 (C) [ 19.878092] dump_stack_lvl+0x8c/0xd0 [ 19.878387] print_report+0x118/0x608 [ 19.878515] kasan_report+0xdc/0x128 [ 19.878591] kasan_check_range+0x100/0x1a8 [ 19.878747] __kasan_check_write+0x20/0x30 [ 19.878795] kasan_atomics_helper+0x14e4/0x4858 [ 19.878846] kasan_atomics+0x198/0x2e0 [ 19.879210] kunit_try_run_case+0x170/0x3f0 [ 19.879308] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.879501] kthread+0x328/0x630 [ 19.879706] ret_from_fork+0x10/0x20 [ 19.880070] [ 19.880112] Allocated by task 274: [ 19.880216] kasan_save_stack+0x3c/0x68 [ 19.880498] kasan_save_track+0x20/0x40 [ 19.880636] kasan_save_alloc_info+0x40/0x58 [ 19.880705] __kasan_kmalloc+0xd4/0xd8 [ 19.880754] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.881217] kasan_atomics+0xb8/0x2e0 [ 19.881508] kunit_try_run_case+0x170/0x3f0 [ 19.881764] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.881859] kthread+0x328/0x630 [ 19.881904] ret_from_fork+0x10/0x20 [ 19.882419] [ 19.882564] The buggy address belongs to the object at fff00000c5210800 [ 19.882564] which belongs to the cache kmalloc-64 of size 64 [ 19.882789] The buggy address is located 0 bytes to the right of [ 19.882789] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.882892] [ 19.882915] The buggy address belongs to the physical page: [ 19.883222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.883394] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.883779] page_type: f5(slab) [ 19.884123] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.884296] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.884621] page dumped because: kasan: bad access detected [ 19.884807] [ 19.884892] Memory state around the buggy address: [ 19.885010] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.885327] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.885491] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.885583] ^ [ 19.885749] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.885798] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.885878] ================================================================== [ 19.759397] ================================================================== [ 19.759453] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 19.759507] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.759560] [ 19.760171] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.760281] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.760819] Hardware name: linux,dummy-virt (DT) [ 19.760952] Call trace: [ 19.760998] show_stack+0x20/0x38 (C) [ 19.761056] dump_stack_lvl+0x8c/0xd0 [ 19.761127] print_report+0x118/0x608 [ 19.761371] kasan_report+0xdc/0x128 [ 19.761434] kasan_check_range+0x100/0x1a8 [ 19.761487] __kasan_check_write+0x20/0x30 [ 19.762067] kasan_atomics_helper+0xf88/0x4858 [ 19.762162] kasan_atomics+0x198/0x2e0 [ 19.762339] kunit_try_run_case+0x170/0x3f0 [ 19.762538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.763058] kthread+0x328/0x630 [ 19.763283] ret_from_fork+0x10/0x20 [ 19.763493] [ 19.763559] Allocated by task 274: [ 19.763747] kasan_save_stack+0x3c/0x68 [ 19.763979] kasan_save_track+0x20/0x40 [ 19.764131] kasan_save_alloc_info+0x40/0x58 [ 19.764188] __kasan_kmalloc+0xd4/0xd8 [ 19.764254] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.764315] kasan_atomics+0xb8/0x2e0 [ 19.764586] kunit_try_run_case+0x170/0x3f0 [ 19.764671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.764980] kthread+0x328/0x630 [ 19.765267] ret_from_fork+0x10/0x20 [ 19.765600] [ 19.765774] The buggy address belongs to the object at fff00000c5210800 [ 19.765774] which belongs to the cache kmalloc-64 of size 64 [ 19.765843] The buggy address is located 0 bytes to the right of [ 19.765843] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.766511] [ 19.766566] The buggy address belongs to the physical page: [ 19.766857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.766920] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.766983] page_type: f5(slab) [ 19.767044] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.767316] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.767514] page dumped because: kasan: bad access detected [ 19.767555] [ 19.767575] Memory state around the buggy address: [ 19.768015] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.768338] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.768820] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.769130] ^ [ 19.769294] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.769360] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.769601] ================================================================== [ 19.935879] ================================================================== [ 19.935946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 19.936011] Read of size 8 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.936065] [ 19.936097] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.936192] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.936220] Hardware name: linux,dummy-virt (DT) [ 19.936265] Call trace: [ 19.936297] show_stack+0x20/0x38 (C) [ 19.936352] dump_stack_lvl+0x8c/0xd0 [ 19.936407] print_report+0x118/0x608 [ 19.936457] kasan_report+0xdc/0x128 [ 19.936505] __asan_report_load8_noabort+0x20/0x30 [ 19.936557] kasan_atomics_helper+0x3e10/0x4858 [ 19.936614] kasan_atomics+0x198/0x2e0 [ 19.936662] kunit_try_run_case+0x170/0x3f0 [ 19.936712] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.936768] kthread+0x328/0x630 [ 19.936813] ret_from_fork+0x10/0x20 [ 19.936870] [ 19.936892] Allocated by task 274: [ 19.936941] kasan_save_stack+0x3c/0x68 [ 19.936985] kasan_save_track+0x20/0x40 [ 19.937026] kasan_save_alloc_info+0x40/0x58 [ 19.937066] __kasan_kmalloc+0xd4/0xd8 [ 19.937454] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.937524] kasan_atomics+0xb8/0x2e0 [ 19.938399] kunit_try_run_case+0x170/0x3f0 [ 19.938483] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.938554] kthread+0x328/0x630 [ 19.938609] ret_from_fork+0x10/0x20 [ 19.938670] [ 19.938715] The buggy address belongs to the object at fff00000c5210800 [ 19.938715] which belongs to the cache kmalloc-64 of size 64 [ 19.938791] The buggy address is located 0 bytes to the right of [ 19.938791] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.939598] [ 19.939648] The buggy address belongs to the physical page: [ 19.939761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.939823] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.940021] page_type: f5(slab) [ 19.940228] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.940303] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.940477] page dumped because: kasan: bad access detected [ 19.940702] [ 19.940777] Memory state around the buggy address: [ 19.940862] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.940987] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.941052] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.941375] ^ [ 19.941545] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.941622] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.941735] ================================================================== [ 19.942765] ================================================================== [ 19.942923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 19.943007] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.943114] [ 19.943147] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.943237] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.943404] Hardware name: linux,dummy-virt (DT) [ 19.943593] Call trace: [ 19.943815] show_stack+0x20/0x38 (C) [ 19.944015] dump_stack_lvl+0x8c/0xd0 [ 19.944077] print_report+0x118/0x608 [ 19.944252] kasan_report+0xdc/0x128 [ 19.944350] kasan_check_range+0x100/0x1a8 [ 19.944404] __kasan_check_write+0x20/0x30 [ 19.944453] kasan_atomics_helper+0x175c/0x4858 [ 19.944883] kasan_atomics+0x198/0x2e0 [ 19.945339] kunit_try_run_case+0x170/0x3f0 [ 19.945434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.945774] kthread+0x328/0x630 [ 19.945836] ret_from_fork+0x10/0x20 [ 19.946012] [ 19.946058] Allocated by task 274: [ 19.946370] kasan_save_stack+0x3c/0x68 [ 19.946777] kasan_save_track+0x20/0x40 [ 19.946881] kasan_save_alloc_info+0x40/0x58 [ 19.946934] __kasan_kmalloc+0xd4/0xd8 [ 19.946975] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.947017] kasan_atomics+0xb8/0x2e0 [ 19.947056] kunit_try_run_case+0x170/0x3f0 [ 19.947420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.947537] kthread+0x328/0x630 [ 19.947833] ret_from_fork+0x10/0x20 [ 19.947968] [ 19.947995] The buggy address belongs to the object at fff00000c5210800 [ 19.947995] which belongs to the cache kmalloc-64 of size 64 [ 19.948379] The buggy address is located 0 bytes to the right of [ 19.948379] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.948833] [ 19.948862] The buggy address belongs to the physical page: [ 19.949128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.949538] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.949678] page_type: f5(slab) [ 19.949774] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.949837] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.950024] page dumped because: kasan: bad access detected [ 19.950081] [ 19.950529] Memory state around the buggy address: [ 19.950595] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.950712] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.950808] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.950969] ^ [ 19.951156] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.951404] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.951556] ================================================================== [ 19.751537] ================================================================== [ 19.751645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 19.751721] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.751775] [ 19.751875] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.751979] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.752023] Hardware name: linux,dummy-virt (DT) [ 19.752058] Call trace: [ 19.752384] show_stack+0x20/0x38 (C) [ 19.752463] dump_stack_lvl+0x8c/0xd0 [ 19.752631] print_report+0x118/0x608 [ 19.752693] kasan_report+0xdc/0x128 [ 19.752856] kasan_check_range+0x100/0x1a8 [ 19.752918] __kasan_check_write+0x20/0x30 [ 19.753198] kasan_atomics_helper+0xf20/0x4858 [ 19.753416] kasan_atomics+0x198/0x2e0 [ 19.753660] kunit_try_run_case+0x170/0x3f0 [ 19.753796] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.754131] kthread+0x328/0x630 [ 19.754327] ret_from_fork+0x10/0x20 [ 19.754596] [ 19.754694] Allocated by task 274: [ 19.754839] kasan_save_stack+0x3c/0x68 [ 19.754893] kasan_save_track+0x20/0x40 [ 19.755133] kasan_save_alloc_info+0x40/0x58 [ 19.755331] __kasan_kmalloc+0xd4/0xd8 [ 19.755582] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.755819] kasan_atomics+0xb8/0x2e0 [ 19.755916] kunit_try_run_case+0x170/0x3f0 [ 19.756087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.756135] kthread+0x328/0x630 [ 19.756218] ret_from_fork+0x10/0x20 [ 19.756569] [ 19.756729] The buggy address belongs to the object at fff00000c5210800 [ 19.756729] which belongs to the cache kmalloc-64 of size 64 [ 19.757184] The buggy address is located 0 bytes to the right of [ 19.757184] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.757270] [ 19.757464] The buggy address belongs to the physical page: [ 19.757523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.757592] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.757650] page_type: f5(slab) [ 19.757715] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.757785] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.757829] page dumped because: kasan: bad access detected [ 19.757872] [ 19.757893] Memory state around the buggy address: [ 19.757944] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.757989] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.758042] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.758085] ^ [ 19.758143] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.758191] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.758232] ================================================================== [ 19.603589] ================================================================== [ 19.604174] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 19.604375] Write of size 4 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.604499] [ 19.604547] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.604801] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.604846] Hardware name: linux,dummy-virt (DT) [ 19.604892] Call trace: [ 19.604920] show_stack+0x20/0x38 (C) [ 19.605172] dump_stack_lvl+0x8c/0xd0 [ 19.605240] print_report+0x118/0x608 [ 19.605293] kasan_report+0xdc/0x128 [ 19.605668] kasan_check_range+0x100/0x1a8 [ 19.605753] __kasan_check_write+0x20/0x30 [ 19.605954] kasan_atomics_helper+0xa6c/0x4858 [ 19.606008] kasan_atomics+0x198/0x2e0 [ 19.606132] kunit_try_run_case+0x170/0x3f0 [ 19.606567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.606668] kthread+0x328/0x630 [ 19.606989] ret_from_fork+0x10/0x20 [ 19.607186] [ 19.607259] Allocated by task 274: [ 19.607469] kasan_save_stack+0x3c/0x68 [ 19.607697] kasan_save_track+0x20/0x40 [ 19.607814] kasan_save_alloc_info+0x40/0x58 [ 19.607984] __kasan_kmalloc+0xd4/0xd8 [ 19.608032] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.608201] kasan_atomics+0xb8/0x2e0 [ 19.608481] kunit_try_run_case+0x170/0x3f0 [ 19.608580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.608866] kthread+0x328/0x630 [ 19.609039] ret_from_fork+0x10/0x20 [ 19.609234] [ 19.609334] The buggy address belongs to the object at fff00000c5210800 [ 19.609334] which belongs to the cache kmalloc-64 of size 64 [ 19.609638] The buggy address is located 0 bytes to the right of [ 19.609638] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.609753] [ 19.609780] The buggy address belongs to the physical page: [ 19.610191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.610405] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.610492] page_type: f5(slab) [ 19.610868] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.611020] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.611097] page dumped because: kasan: bad access detected [ 19.611235] [ 19.611306] Memory state around the buggy address: [ 19.611378] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.611438] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.611544] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.611611] ^ [ 19.611912] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.612066] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.612209] ================================================================== [ 19.786961] ================================================================== [ 19.787049] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 19.787113] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.787277] [ 19.787344] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.787500] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.787608] Hardware name: linux,dummy-virt (DT) [ 19.787644] Call trace: [ 19.787827] show_stack+0x20/0x38 (C) [ 19.787892] dump_stack_lvl+0x8c/0xd0 [ 19.788243] print_report+0x118/0x608 [ 19.788465] kasan_report+0xdc/0x128 [ 19.789057] kasan_check_range+0x100/0x1a8 [ 19.789159] __kasan_check_write+0x20/0x30 [ 19.789306] kasan_atomics_helper+0x10c0/0x4858 [ 19.789404] kasan_atomics+0x198/0x2e0 [ 19.789456] kunit_try_run_case+0x170/0x3f0 [ 19.789599] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.789690] kthread+0x328/0x630 [ 19.789752] ret_from_fork+0x10/0x20 [ 19.789813] [ 19.789837] Allocated by task 274: [ 19.789866] kasan_save_stack+0x3c/0x68 [ 19.790369] kasan_save_track+0x20/0x40 [ 19.790641] kasan_save_alloc_info+0x40/0x58 [ 19.790780] __kasan_kmalloc+0xd4/0xd8 [ 19.790877] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.790956] kasan_atomics+0xb8/0x2e0 [ 19.791159] kunit_try_run_case+0x170/0x3f0 [ 19.791436] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.791708] kthread+0x328/0x630 [ 19.791892] ret_from_fork+0x10/0x20 [ 19.792110] [ 19.792192] The buggy address belongs to the object at fff00000c5210800 [ 19.792192] which belongs to the cache kmalloc-64 of size 64 [ 19.792594] The buggy address is located 0 bytes to the right of [ 19.792594] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.792975] [ 19.793125] The buggy address belongs to the physical page: [ 19.793346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.793600] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.793657] page_type: f5(slab) [ 19.793882] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.794153] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.794416] page dumped because: kasan: bad access detected [ 19.794491] [ 19.794546] Memory state around the buggy address: [ 19.794612] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.794815] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.794991] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.795094] ^ [ 19.795260] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.795359] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.795449] ================================================================== [ 19.612881] ================================================================== [ 19.613355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 19.613430] Write of size 4 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.613485] [ 19.613956] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.614204] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.614264] Hardware name: linux,dummy-virt (DT) [ 19.614415] Call trace: [ 19.614465] show_stack+0x20/0x38 (C) [ 19.614705] dump_stack_lvl+0x8c/0xd0 [ 19.614772] print_report+0x118/0x608 [ 19.615064] kasan_report+0xdc/0x128 [ 19.615128] kasan_check_range+0x100/0x1a8 [ 19.615181] __kasan_check_write+0x20/0x30 [ 19.615228] kasan_atomics_helper+0xad4/0x4858 [ 19.615281] kasan_atomics+0x198/0x2e0 [ 19.615330] kunit_try_run_case+0x170/0x3f0 [ 19.615481] ret_from_fork+0x10/0x20 [ 19.615821] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.615955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.616370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.616447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.616500] page_type: f5(slab) [ 19.616542] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.616596] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.616641] page dumped because: kasan: bad access detected [ 19.616676] [ 19.616706] Memory state around the buggy address: [ 19.616750] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.616805] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.616859] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.616899] ^ [ 19.616998] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.617176] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.617223] ================================================================== [ 19.927291] ================================================================== [ 19.927350] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 19.927578] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.927673] [ 19.927706] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.928050] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.928176] Hardware name: linux,dummy-virt (DT) [ 19.928278] Call trace: [ 19.928304] show_stack+0x20/0x38 (C) [ 19.928380] dump_stack_lvl+0x8c/0xd0 [ 19.928514] print_report+0x118/0x608 [ 19.928571] kasan_report+0xdc/0x128 [ 19.928784] kasan_check_range+0x100/0x1a8 [ 19.928980] __kasan_check_write+0x20/0x30 [ 19.929226] kasan_atomics_helper+0x16d0/0x4858 [ 19.929307] kasan_atomics+0x198/0x2e0 [ 19.929654] kunit_try_run_case+0x170/0x3f0 [ 19.929998] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.930075] kthread+0x328/0x630 [ 19.930134] ret_from_fork+0x10/0x20 [ 19.930498] [ 19.930586] Allocated by task 274: [ 19.930667] kasan_save_stack+0x3c/0x68 [ 19.930962] kasan_save_track+0x20/0x40 [ 19.931072] kasan_save_alloc_info+0x40/0x58 [ 19.931118] __kasan_kmalloc+0xd4/0xd8 [ 19.931618] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.931819] kasan_atomics+0xb8/0x2e0 [ 19.931961] kunit_try_run_case+0x170/0x3f0 [ 19.932222] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.932413] kthread+0x328/0x630 [ 19.932498] ret_from_fork+0x10/0x20 [ 19.932693] [ 19.932843] The buggy address belongs to the object at fff00000c5210800 [ 19.932843] which belongs to the cache kmalloc-64 of size 64 [ 19.933183] The buggy address is located 0 bytes to the right of [ 19.933183] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.933314] [ 19.933365] The buggy address belongs to the physical page: [ 19.933723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.934095] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.934406] page_type: f5(slab) [ 19.934457] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.934512] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.934554] page dumped because: kasan: bad access detected [ 19.934842] [ 19.934910] Memory state around the buggy address: [ 19.935082] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.935132] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.935200] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.935241] ^ [ 19.935278] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.935345] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.935387] ================================================================== [ 19.902668] ================================================================== [ 19.902723] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 19.902779] Read of size 8 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.902877] [ 19.902912] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.903015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.903044] Hardware name: linux,dummy-virt (DT) [ 19.903078] Call trace: [ 19.903346] show_stack+0x20/0x38 (C) [ 19.903420] dump_stack_lvl+0x8c/0xd0 [ 19.903637] print_report+0x118/0x608 [ 19.903846] kasan_report+0xdc/0x128 [ 19.903911] __asan_report_load8_noabort+0x20/0x30 [ 19.904025] kasan_atomics_helper+0x3db0/0x4858 [ 19.904101] kasan_atomics+0x198/0x2e0 [ 19.904167] kunit_try_run_case+0x170/0x3f0 [ 19.904288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.904363] kthread+0x328/0x630 [ 19.904578] ret_from_fork+0x10/0x20 [ 19.904851] [ 19.904887] Allocated by task 274: [ 19.904957] kasan_save_stack+0x3c/0x68 [ 19.905145] kasan_save_track+0x20/0x40 [ 19.905191] kasan_save_alloc_info+0x40/0x58 [ 19.905231] __kasan_kmalloc+0xd4/0xd8 [ 19.905271] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.905313] kasan_atomics+0xb8/0x2e0 [ 19.905847] kunit_try_run_case+0x170/0x3f0 [ 19.906020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.906151] kthread+0x328/0x630 [ 19.906192] ret_from_fork+0x10/0x20 [ 19.906532] [ 19.906633] The buggy address belongs to the object at fff00000c5210800 [ 19.906633] which belongs to the cache kmalloc-64 of size 64 [ 19.906702] The buggy address is located 0 bytes to the right of [ 19.906702] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.906796] [ 19.906953] The buggy address belongs to the physical page: [ 19.906998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.907058] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.907108] page_type: f5(slab) [ 19.907196] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.907264] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.907324] page dumped because: kasan: bad access detected [ 19.907360] [ 19.907398] Memory state around the buggy address: [ 19.907432] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.907495] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.907551] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.907600] ^ [ 19.907636] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.907691] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.907742] ================================================================== [ 19.951977] ================================================================== [ 19.952025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 19.952490] Read of size 8 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.952562] [ 19.952625] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.952922] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.952990] Hardware name: linux,dummy-virt (DT) [ 19.953025] Call trace: [ 19.953130] show_stack+0x20/0x38 (C) [ 19.953192] dump_stack_lvl+0x8c/0xd0 [ 19.953252] print_report+0x118/0x608 [ 19.953309] kasan_report+0xdc/0x128 [ 19.953778] __asan_report_load8_noabort+0x20/0x30 [ 19.953976] kasan_atomics_helper+0x3e20/0x4858 [ 19.954051] kasan_atomics+0x198/0x2e0 [ 19.954171] kunit_try_run_case+0x170/0x3f0 [ 19.954239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.954387] kthread+0x328/0x630 [ 19.954483] ret_from_fork+0x10/0x20 [ 19.954666] [ 19.954692] Allocated by task 274: [ 19.954876] kasan_save_stack+0x3c/0x68 [ 19.955067] kasan_save_track+0x20/0x40 [ 19.955143] kasan_save_alloc_info+0x40/0x58 [ 19.955346] __kasan_kmalloc+0xd4/0xd8 [ 19.955548] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.955603] kasan_atomics+0xb8/0x2e0 [ 19.956002] kunit_try_run_case+0x170/0x3f0 [ 19.956197] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.956472] kthread+0x328/0x630 [ 19.956511] ret_from_fork+0x10/0x20 [ 19.956738] [ 19.956895] The buggy address belongs to the object at fff00000c5210800 [ 19.956895] which belongs to the cache kmalloc-64 of size 64 [ 19.957080] The buggy address is located 0 bytes to the right of [ 19.957080] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.957185] [ 19.957229] The buggy address belongs to the physical page: [ 19.957263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.957442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.957520] page_type: f5(slab) [ 19.957579] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.957643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.957704] page dumped because: kasan: bad access detected [ 19.957737] [ 19.957757] Memory state around the buggy address: [ 19.957809] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.957856] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.957916] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.957969] ^ [ 19.958012] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.958695] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.958766] ================================================================== [ 19.809058] ================================================================== [ 19.809141] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 19.809205] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.809258] [ 19.809461] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.809561] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.809822] Hardware name: linux,dummy-virt (DT) [ 19.810091] Call trace: [ 19.810135] show_stack+0x20/0x38 (C) [ 19.810198] dump_stack_lvl+0x8c/0xd0 [ 19.810403] print_report+0x118/0x608 [ 19.810495] kasan_report+0xdc/0x128 [ 19.810699] kasan_check_range+0x100/0x1a8 [ 19.810760] __kasan_check_write+0x20/0x30 [ 19.811019] kasan_atomics_helper+0x1190/0x4858 [ 19.811138] kasan_atomics+0x198/0x2e0 [ 19.811383] kunit_try_run_case+0x170/0x3f0 [ 19.811663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.811770] kthread+0x328/0x630 [ 19.812030] ret_from_fork+0x10/0x20 [ 19.812137] [ 19.812289] Allocated by task 274: [ 19.812367] kasan_save_stack+0x3c/0x68 [ 19.812816] kasan_save_track+0x20/0x40 [ 19.812893] kasan_save_alloc_info+0x40/0x58 [ 19.813107] __kasan_kmalloc+0xd4/0xd8 [ 19.813352] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.813405] kasan_atomics+0xb8/0x2e0 [ 19.813647] kunit_try_run_case+0x170/0x3f0 [ 19.813791] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.814235] kthread+0x328/0x630 [ 19.814384] ret_from_fork+0x10/0x20 [ 19.814462] [ 19.814485] The buggy address belongs to the object at fff00000c5210800 [ 19.814485] which belongs to the cache kmalloc-64 of size 64 [ 19.814745] The buggy address is located 0 bytes to the right of [ 19.814745] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.815020] [ 19.815427] The buggy address belongs to the physical page: [ 19.815496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.815909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.816204] page_type: f5(slab) [ 19.816641] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.816736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.816819] page dumped because: kasan: bad access detected [ 19.817066] [ 19.817194] Memory state around the buggy address: [ 19.817498] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.817565] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.817633] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.817683] ^ [ 19.817719] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.817770] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.817817] ================================================================== [ 19.959770] ================================================================== [ 19.959824] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 19.959877] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.959941] [ 19.960316] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.960455] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.960870] Hardware name: linux,dummy-virt (DT) [ 19.960964] Call trace: [ 19.961010] show_stack+0x20/0x38 (C) [ 19.961426] dump_stack_lvl+0x8c/0xd0 [ 19.961506] print_report+0x118/0x608 [ 19.961653] kasan_report+0xdc/0x128 [ 19.961709] kasan_check_range+0x100/0x1a8 [ 19.961812] __kasan_check_write+0x20/0x30 [ 19.961862] kasan_atomics_helper+0x17ec/0x4858 [ 19.961947] kasan_atomics+0x198/0x2e0 [ 19.962145] kunit_try_run_case+0x170/0x3f0 [ 19.962517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.962670] kthread+0x328/0x630 [ 19.962960] ret_from_fork+0x10/0x20 [ 19.963325] [ 19.963469] Allocated by task 274: [ 19.963535] kasan_save_stack+0x3c/0x68 [ 19.963611] kasan_save_track+0x20/0x40 [ 19.963653] kasan_save_alloc_info+0x40/0x58 [ 19.963856] __kasan_kmalloc+0xd4/0xd8 [ 19.964433] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.964565] kasan_atomics+0xb8/0x2e0 [ 19.964608] kunit_try_run_case+0x170/0x3f0 [ 19.964684] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.964934] kthread+0x328/0x630 [ 19.965206] ret_from_fork+0x10/0x20 [ 19.965365] [ 19.965415] The buggy address belongs to the object at fff00000c5210800 [ 19.965415] which belongs to the cache kmalloc-64 of size 64 [ 19.965479] The buggy address is located 0 bytes to the right of [ 19.965479] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.965802] [ 19.966084] The buggy address belongs to the physical page: [ 19.966191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.966333] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.966390] page_type: f5(slab) [ 19.966435] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.966488] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.966532] page dumped because: kasan: bad access detected [ 19.966566] [ 19.966586] Memory state around the buggy address: [ 19.966621] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.966667] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.966872] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.967398] ^ [ 19.967486] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.967624] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.967667] ================================================================== [ 19.715048] ================================================================== [ 19.715114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 19.715175] Read of size 8 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.715968] [ 19.716036] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.716134] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.716163] Hardware name: linux,dummy-virt (DT) [ 19.716437] Call trace: [ 19.716604] show_stack+0x20/0x38 (C) [ 19.716676] dump_stack_lvl+0x8c/0xd0 [ 19.716728] print_report+0x118/0x608 [ 19.717141] kasan_report+0xdc/0x128 [ 19.717219] __asan_report_load8_noabort+0x20/0x30 [ 19.717273] kasan_atomics_helper+0x3f58/0x4858 [ 19.717325] kasan_atomics+0x198/0x2e0 [ 19.717374] kunit_try_run_case+0x170/0x3f0 [ 19.717662] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.717742] kthread+0x328/0x630 [ 19.717787] ret_from_fork+0x10/0x20 [ 19.718154] [ 19.718253] Allocated by task 274: [ 19.718336] kasan_save_stack+0x3c/0x68 [ 19.718415] kasan_save_track+0x20/0x40 [ 19.718495] kasan_save_alloc_info+0x40/0x58 [ 19.718540] __kasan_kmalloc+0xd4/0xd8 [ 19.718856] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.718964] kasan_atomics+0xb8/0x2e0 [ 19.719038] kunit_try_run_case+0x170/0x3f0 [ 19.719378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.719522] kthread+0x328/0x630 [ 19.719561] ret_from_fork+0x10/0x20 [ 19.719637] [ 19.719984] The buggy address belongs to the object at fff00000c5210800 [ 19.719984] which belongs to the cache kmalloc-64 of size 64 [ 19.720418] The buggy address is located 0 bytes to the right of [ 19.720418] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.720500] [ 19.720796] The buggy address belongs to the physical page: [ 19.720985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.721216] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.721333] page_type: f5(slab) [ 19.721427] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.721528] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.721767] page dumped because: kasan: bad access detected [ 19.721940] [ 19.722007] Memory state around the buggy address: [ 19.722103] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.722207] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.722255] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.722327] ^ [ 19.722364] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.722409] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.722778] ================================================================== [ 19.838828] ================================================================== [ 19.838882] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 19.838948] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.839000] [ 19.839426] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.839905] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.840092] Hardware name: linux,dummy-virt (DT) [ 19.840160] Call trace: [ 19.840209] show_stack+0x20/0x38 (C) [ 19.840293] dump_stack_lvl+0x8c/0xd0 [ 19.840355] print_report+0x118/0x608 [ 19.840405] kasan_report+0xdc/0x128 [ 19.840645] kasan_check_range+0x100/0x1a8 [ 19.840847] __kasan_check_write+0x20/0x30 [ 19.841010] kasan_atomics_helper+0x12d8/0x4858 [ 19.841317] kasan_atomics+0x198/0x2e0 [ 19.841472] kunit_try_run_case+0x170/0x3f0 [ 19.841816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.841895] kthread+0x328/0x630 [ 19.841951] ret_from_fork+0x10/0x20 [ 19.842213] [ 19.842402] Allocated by task 274: [ 19.842457] kasan_save_stack+0x3c/0x68 [ 19.842672] kasan_save_track+0x20/0x40 [ 19.842807] kasan_save_alloc_info+0x40/0x58 [ 19.843107] __kasan_kmalloc+0xd4/0xd8 [ 19.843731] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.843865] kasan_atomics+0xb8/0x2e0 [ 19.843908] kunit_try_run_case+0x170/0x3f0 [ 19.844286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.844495] kthread+0x328/0x630 [ 19.844693] ret_from_fork+0x10/0x20 [ 19.844778] [ 19.845198] The buggy address belongs to the object at fff00000c5210800 [ 19.845198] which belongs to the cache kmalloc-64 of size 64 [ 19.845428] The buggy address is located 0 bytes to the right of [ 19.845428] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.845641] [ 19.845698] The buggy address belongs to the physical page: [ 19.845751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.846146] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.846436] page_type: f5(slab) [ 19.846540] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.846640] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.847088] page dumped because: kasan: bad access detected [ 19.847150] [ 19.847205] Memory state around the buggy address: [ 19.847623] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.847800] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.847909] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.848076] ^ [ 19.848145] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.848217] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.848263] ================================================================== [ 19.596528] ================================================================== [ 19.596637] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 19.596751] Write of size 4 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.596816] [ 19.596881] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.596998] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.597026] Hardware name: linux,dummy-virt (DT) [ 19.597063] Call trace: [ 19.597088] show_stack+0x20/0x38 (C) [ 19.597143] dump_stack_lvl+0x8c/0xd0 [ 19.597191] print_report+0x118/0x608 [ 19.597239] kasan_report+0xdc/0x128 [ 19.597286] kasan_check_range+0x100/0x1a8 [ 19.597335] __kasan_check_write+0x20/0x30 [ 19.597381] kasan_atomics_helper+0xa04/0x4858 [ 19.597443] kasan_atomics+0x198/0x2e0 [ 19.597491] kunit_try_run_case+0x170/0x3f0 [ 19.597541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.597611] kthread+0x328/0x630 [ 19.597664] ret_from_fork+0x10/0x20 [ 19.597715] [ 19.597752] Allocated by task 274: [ 19.597782] kasan_save_stack+0x3c/0x68 [ 19.597825] kasan_save_track+0x20/0x40 [ 19.597867] kasan_save_alloc_info+0x40/0x58 [ 19.597910] __kasan_kmalloc+0xd4/0xd8 [ 19.597960] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.598003] kasan_atomics+0xb8/0x2e0 [ 19.598327] kunit_try_run_case+0x170/0x3f0 [ 19.599488] The buggy address belongs to the object at fff00000c5210800 [ 19.599488] which belongs to the cache kmalloc-64 of size 64 [ 19.599711] [ 19.599736] The buggy address belongs to the physical page: [ 19.600072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.600309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.600570] page_type: f5(slab) [ 19.600794] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.601204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.601310] page dumped because: kasan: bad access detected [ 19.601472] [ 19.601706] Memory state around the buggy address: [ 19.601804] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.602086] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.602269] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.602386] ^ [ 19.602439] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.602485] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.602535] ================================================================== [ 19.829597] ================================================================== [ 19.829660] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 19.829714] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.829915] [ 19.829963] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.830414] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.830452] Hardware name: linux,dummy-virt (DT) [ 19.830486] Call trace: [ 19.830528] show_stack+0x20/0x38 (C) [ 19.830593] dump_stack_lvl+0x8c/0xd0 [ 19.830922] print_report+0x118/0x608 [ 19.831334] kasan_report+0xdc/0x128 [ 19.831686] kasan_check_range+0x100/0x1a8 [ 19.831942] __kasan_check_write+0x20/0x30 [ 19.832240] kasan_atomics_helper+0x126c/0x4858 [ 19.832337] kasan_atomics+0x198/0x2e0 [ 19.832426] kunit_try_run_case+0x170/0x3f0 [ 19.832598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.832718] kthread+0x328/0x630 [ 19.832898] ret_from_fork+0x10/0x20 [ 19.833035] [ 19.833065] Allocated by task 274: [ 19.833097] kasan_save_stack+0x3c/0x68 [ 19.833344] kasan_save_track+0x20/0x40 [ 19.833686] kasan_save_alloc_info+0x40/0x58 [ 19.834119] __kasan_kmalloc+0xd4/0xd8 [ 19.834394] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.834480] kasan_atomics+0xb8/0x2e0 [ 19.834729] kunit_try_run_case+0x170/0x3f0 [ 19.834895] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.835221] kthread+0x328/0x630 [ 19.835482] ret_from_fork+0x10/0x20 [ 19.835676] [ 19.835734] The buggy address belongs to the object at fff00000c5210800 [ 19.835734] which belongs to the cache kmalloc-64 of size 64 [ 19.836077] The buggy address is located 0 bytes to the right of [ 19.836077] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.836340] [ 19.836435] The buggy address belongs to the physical page: [ 19.836472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.836630] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.836708] page_type: f5(slab) [ 19.836768] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.836823] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.836878] page dumped because: kasan: bad access detected [ 19.836913] [ 19.836944] Memory state around the buggy address: [ 19.836977] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.837025] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.837084] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.837125] ^ [ 19.837170] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.837222] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.837264] ================================================================== [ 19.886470] ================================================================== [ 19.886522] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 19.886960] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.887053] [ 19.887086] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.887318] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.887481] Hardware name: linux,dummy-virt (DT) [ 19.887525] Call trace: [ 19.887836] show_stack+0x20/0x38 (C) [ 19.887947] dump_stack_lvl+0x8c/0xd0 [ 19.888001] print_report+0x118/0x608 [ 19.888112] kasan_report+0xdc/0x128 [ 19.888200] kasan_check_range+0x100/0x1a8 [ 19.888318] __kasan_check_write+0x20/0x30 [ 19.888376] kasan_atomics_helper+0x154c/0x4858 [ 19.888428] kasan_atomics+0x198/0x2e0 [ 19.888492] kunit_try_run_case+0x170/0x3f0 [ 19.888546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.888740] kthread+0x328/0x630 [ 19.888969] ret_from_fork+0x10/0x20 [ 19.889512] [ 19.889577] Allocated by task 274: [ 19.889612] kasan_save_stack+0x3c/0x68 [ 19.889686] kasan_save_track+0x20/0x40 [ 19.889730] kasan_save_alloc_info+0x40/0x58 [ 19.889970] __kasan_kmalloc+0xd4/0xd8 [ 19.890032] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.890897] kasan_atomics+0xb8/0x2e0 [ 19.891044] kunit_try_run_case+0x170/0x3f0 [ 19.891104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.891160] kthread+0x328/0x630 [ 19.891311] ret_from_fork+0x10/0x20 [ 19.891561] [ 19.891600] The buggy address belongs to the object at fff00000c5210800 [ 19.891600] which belongs to the cache kmalloc-64 of size 64 [ 19.891946] The buggy address is located 0 bytes to the right of [ 19.891946] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.892074] [ 19.892123] The buggy address belongs to the physical page: [ 19.892158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.892430] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.892562] page_type: f5(slab) [ 19.892734] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.893146] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.893394] page dumped because: kasan: bad access detected [ 19.893658] [ 19.893823] Memory state around the buggy address: [ 19.894149] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.894234] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.894374] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.894452] ^ [ 19.894603] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.894670] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.894845] ================================================================== [ 19.674348] ================================================================== [ 19.674547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 19.674611] Read of size 4 at addr fff00000c5210830 by task kunit_try_catch/274 [ 19.674665] [ 19.674699] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT [ 19.675151] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.675203] Hardware name: linux,dummy-virt (DT) [ 19.675990] Call trace: [ 19.676070] show_stack+0x20/0x38 (C) [ 19.676412] dump_stack_lvl+0x8c/0xd0 [ 19.676487] print_report+0x118/0x608 [ 19.676538] kasan_report+0xdc/0x128 [ 19.676879] __asan_report_load4_noabort+0x20/0x30 [ 19.677225] kasan_atomics_helper+0x3dd8/0x4858 [ 19.677303] kasan_atomics+0x198/0x2e0 [ 19.677479] kunit_try_run_case+0x170/0x3f0 [ 19.677813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.678041] kthread+0x328/0x630 [ 19.678098] ret_from_fork+0x10/0x20 [ 19.678150] [ 19.678180] Allocated by task 274: [ 19.678273] kasan_save_stack+0x3c/0x68 [ 19.678349] kasan_save_track+0x20/0x40 [ 19.678391] kasan_save_alloc_info+0x40/0x58 [ 19.678545] __kasan_kmalloc+0xd4/0xd8 [ 19.678727] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.678816] kasan_atomics+0xb8/0x2e0 [ 19.679014] kunit_try_run_case+0x170/0x3f0 [ 19.679261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.679316] kthread+0x328/0x630 [ 19.679375] ret_from_fork+0x10/0x20 [ 19.679422] [ 19.679594] The buggy address belongs to the object at fff00000c5210800 [ 19.679594] which belongs to the cache kmalloc-64 of size 64 [ 19.680011] The buggy address is located 0 bytes to the right of [ 19.680011] allocated 48-byte region [fff00000c5210800, fff00000c5210830) [ 19.680488] [ 19.680690] The buggy address belongs to the physical page: [ 19.680741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210 [ 19.681052] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.681277] page_type: f5(slab) [ 19.681524] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.681648] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.681716] page dumped because: kasan: bad access detected [ 19.681791] [ 19.681853] Memory state around the buggy address: [ 19.682078] fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.682318] fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.682391] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.682581] ^ [ 19.682803] fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.682896] fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.683055] ==================================================================
[ 23.773914] ================================================================== [ 23.774793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 23.775510] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 23.776154] [ 23.776476] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 23.776602] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.776643] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.776705] Call Trace: [ 23.776757] <TASK> [ 23.776798] dump_stack_lvl+0x73/0xb0 [ 23.776898] print_report+0xd1/0x650 [ 23.776977] ? __virt_addr_valid+0x1db/0x2d0 [ 23.777052] ? kasan_atomics_helper+0x19e3/0x5450 [ 23.777150] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.777295] ? kasan_atomics_helper+0x19e3/0x5450 [ 23.777372] kasan_report+0x141/0x180 [ 23.777499] ? kasan_atomics_helper+0x19e3/0x5450 [ 23.777589] kasan_check_range+0x10c/0x1c0 [ 23.777675] __kasan_check_write+0x18/0x20 [ 23.777748] kasan_atomics_helper+0x19e3/0x5450 [ 23.777873] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.777953] ? kasan_save_alloc_info+0x3b/0x50 [ 23.778047] kasan_atomics+0x1dc/0x310 [ 23.778150] ? __pfx_kasan_atomics+0x10/0x10 [ 23.778303] ? __pfx_read_tsc+0x10/0x10 [ 23.778378] ? ktime_get_ts64+0x86/0x230 [ 23.778486] kunit_try_run_case+0x1a5/0x480 [ 23.778595] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.778672] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.778766] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.778894] ? __kthread_parkme+0x82/0x180 [ 23.778965] ? preempt_count_sub+0x50/0x80 [ 23.779006] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.779044] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.779081] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.779155] kthread+0x337/0x6f0 [ 23.779243] ? trace_preempt_on+0x20/0xc0 [ 23.779397] ? __pfx_kthread+0x10/0x10 [ 23.779477] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.779565] ? calculate_sigpending+0x7b/0xa0 [ 23.779694] ? __pfx_kthread+0x10/0x10 [ 23.779775] ret_from_fork+0x116/0x1d0 [ 23.779858] ? __pfx_kthread+0x10/0x10 [ 23.779898] ret_from_fork_asm+0x1a/0x30 [ 23.779945] </TASK> [ 23.779962] [ 23.793974] Allocated by task 292: [ 23.794270] kasan_save_stack+0x45/0x70 [ 23.794680] kasan_save_track+0x18/0x40 [ 23.795099] kasan_save_alloc_info+0x3b/0x50 [ 23.795597] __kasan_kmalloc+0xb7/0xc0 [ 23.795997] __kmalloc_cache_noprof+0x189/0x420 [ 23.796500] kasan_atomics+0x95/0x310 [ 23.796901] kunit_try_run_case+0x1a5/0x480 [ 23.797356] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.797712] kthread+0x337/0x6f0 [ 23.798066] ret_from_fork+0x116/0x1d0 [ 23.798498] ret_from_fork_asm+0x1a/0x30 [ 23.798913] [ 23.799120] The buggy address belongs to the object at ffff88810383ae00 [ 23.799120] which belongs to the cache kmalloc-64 of size 64 [ 23.800119] The buggy address is located 0 bytes to the right of [ 23.800119] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 23.800941] [ 23.801150] The buggy address belongs to the physical page: [ 23.801650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 23.802272] flags: 0x200000000000000(node=0|zone=2) [ 23.802598] page_type: f5(slab) [ 23.802891] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.803574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.804205] page dumped because: kasan: bad access detected [ 23.804739] [ 23.804918] Memory state around the buggy address: [ 23.805266] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.805866] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.806484] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.807067] ^ [ 23.807487] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.808087] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.808653] ================================================================== [ 21.875033] ================================================================== [ 21.876014] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 21.877083] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 21.878479] [ 21.878878] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 21.879007] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.879096] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.879177] Call Trace: [ 21.879225] <TASK> [ 21.879270] dump_stack_lvl+0x73/0xb0 [ 21.879366] print_report+0xd1/0x650 [ 21.879447] ? __virt_addr_valid+0x1db/0x2d0 [ 21.879521] ? kasan_atomics_helper+0x4b6e/0x5450 [ 21.879566] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.879600] ? kasan_atomics_helper+0x4b6e/0x5450 [ 21.879633] kasan_report+0x141/0x180 [ 21.879666] ? kasan_atomics_helper+0x4b6e/0x5450 [ 21.879700] __asan_report_store4_noabort+0x1b/0x30 [ 21.879738] kasan_atomics_helper+0x4b6e/0x5450 [ 21.879770] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.879800] ? kasan_save_alloc_info+0x3b/0x50 [ 21.879866] kasan_atomics+0x1dc/0x310 [ 21.879905] ? __pfx_kasan_atomics+0x10/0x10 [ 21.879943] ? __pfx_read_tsc+0x10/0x10 [ 21.879973] ? ktime_get_ts64+0x86/0x230 [ 21.880008] kunit_try_run_case+0x1a5/0x480 [ 21.880044] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.880076] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.880106] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.880143] ? __kthread_parkme+0x82/0x180 [ 21.880171] ? preempt_count_sub+0x50/0x80 [ 21.880204] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.880284] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.880358] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.880396] kthread+0x337/0x6f0 [ 21.880423] ? trace_preempt_on+0x20/0xc0 [ 21.880459] ? __pfx_kthread+0x10/0x10 [ 21.880489] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.880522] ? calculate_sigpending+0x7b/0xa0 [ 21.880558] ? __pfx_kthread+0x10/0x10 [ 21.880588] ret_from_fork+0x116/0x1d0 [ 21.880615] ? __pfx_kthread+0x10/0x10 [ 21.880643] ret_from_fork_asm+0x1a/0x30 [ 21.880686] </TASK> [ 21.880700] [ 21.900044] Allocated by task 292: [ 21.900578] kasan_save_stack+0x45/0x70 [ 21.900987] kasan_save_track+0x18/0x40 [ 21.901728] kasan_save_alloc_info+0x3b/0x50 [ 21.902064] __kasan_kmalloc+0xb7/0xc0 [ 21.902511] __kmalloc_cache_noprof+0x189/0x420 [ 21.903257] kasan_atomics+0x95/0x310 [ 21.903660] kunit_try_run_case+0x1a5/0x480 [ 21.904147] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.904505] kthread+0x337/0x6f0 [ 21.905028] ret_from_fork+0x116/0x1d0 [ 21.905415] ret_from_fork_asm+0x1a/0x30 [ 21.906169] [ 21.906486] The buggy address belongs to the object at ffff88810383ae00 [ 21.906486] which belongs to the cache kmalloc-64 of size 64 [ 21.907217] The buggy address is located 0 bytes to the right of [ 21.907217] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 21.908799] [ 21.909042] The buggy address belongs to the physical page: [ 21.909847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 21.910366] flags: 0x200000000000000(node=0|zone=2) [ 21.910977] page_type: f5(slab) [ 21.911503] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.912098] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.912979] page dumped because: kasan: bad access detected [ 21.913344] [ 21.913506] Memory state around the buggy address: [ 21.913912] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.914898] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.915637] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.916175] ^ [ 21.916937] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.917697] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.918170] ================================================================== [ 22.016417] ================================================================== [ 22.018022] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 22.019847] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 22.021086] [ 22.021315] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 22.021448] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.021491] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.021554] Call Trace: [ 22.021604] <TASK> [ 22.021641] dump_stack_lvl+0x73/0xb0 [ 22.021704] print_report+0xd1/0x650 [ 22.021776] ? __virt_addr_valid+0x1db/0x2d0 [ 22.021850] ? kasan_atomics_helper+0x4a0/0x5450 [ 22.021903] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.021956] ? kasan_atomics_helper+0x4a0/0x5450 [ 22.022006] kasan_report+0x141/0x180 [ 22.022067] ? kasan_atomics_helper+0x4a0/0x5450 [ 22.022133] kasan_check_range+0x10c/0x1c0 [ 22.022191] __kasan_check_write+0x18/0x20 [ 22.022709] kasan_atomics_helper+0x4a0/0x5450 [ 22.022796] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.022876] ? kasan_save_alloc_info+0x3b/0x50 [ 22.022947] kasan_atomics+0x1dc/0x310 [ 22.023009] ? __pfx_kasan_atomics+0x10/0x10 [ 22.023084] ? __pfx_read_tsc+0x10/0x10 [ 22.023155] ? ktime_get_ts64+0x86/0x230 [ 22.023344] kunit_try_run_case+0x1a5/0x480 [ 22.023415] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.023469] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.023521] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.023594] ? __kthread_parkme+0x82/0x180 [ 22.023647] ? preempt_count_sub+0x50/0x80 [ 22.023685] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.023721] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.023755] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.023790] kthread+0x337/0x6f0 [ 22.023823] ? trace_preempt_on+0x20/0xc0 [ 22.023890] ? __pfx_kthread+0x10/0x10 [ 22.023924] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.023959] ? calculate_sigpending+0x7b/0xa0 [ 22.023996] ? __pfx_kthread+0x10/0x10 [ 22.024027] ret_from_fork+0x116/0x1d0 [ 22.024056] ? __pfx_kthread+0x10/0x10 [ 22.024085] ret_from_fork_asm+0x1a/0x30 [ 22.024129] </TASK> [ 22.024144] [ 22.042012] Allocated by task 292: [ 22.042572] kasan_save_stack+0x45/0x70 [ 22.043036] kasan_save_track+0x18/0x40 [ 22.043610] kasan_save_alloc_info+0x3b/0x50 [ 22.044059] __kasan_kmalloc+0xb7/0xc0 [ 22.044485] __kmalloc_cache_noprof+0x189/0x420 [ 22.044960] kasan_atomics+0x95/0x310 [ 22.045659] kunit_try_run_case+0x1a5/0x480 [ 22.046126] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.046764] kthread+0x337/0x6f0 [ 22.047179] ret_from_fork+0x116/0x1d0 [ 22.047524] ret_from_fork_asm+0x1a/0x30 [ 22.047848] [ 22.048140] The buggy address belongs to the object at ffff88810383ae00 [ 22.048140] which belongs to the cache kmalloc-64 of size 64 [ 22.049691] The buggy address is located 0 bytes to the right of [ 22.049691] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 22.050803] [ 22.051191] The buggy address belongs to the physical page: [ 22.051778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 22.052671] flags: 0x200000000000000(node=0|zone=2) [ 22.053141] page_type: f5(slab) [ 22.053741] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.054483] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.055565] page dumped because: kasan: bad access detected [ 22.056094] [ 22.056304] Memory state around the buggy address: [ 22.056671] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.058146] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.058595] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.058847] ^ [ 22.059205] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.060470] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.061593] ================================================================== [ 22.619047] ================================================================== [ 22.619753] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 22.620717] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 22.621712] [ 22.622487] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 22.622939] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.622993] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.623029] Call Trace: [ 22.623054] <TASK> [ 22.623078] dump_stack_lvl+0x73/0xb0 [ 22.623120] print_report+0xd1/0x650 [ 22.623153] ? __virt_addr_valid+0x1db/0x2d0 [ 22.623186] ? kasan_atomics_helper+0xc70/0x5450 [ 22.623240] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.623322] ? kasan_atomics_helper+0xc70/0x5450 [ 22.623398] kasan_report+0x141/0x180 [ 22.623437] ? kasan_atomics_helper+0xc70/0x5450 [ 22.623475] kasan_check_range+0x10c/0x1c0 [ 22.623510] __kasan_check_write+0x18/0x20 [ 22.623550] kasan_atomics_helper+0xc70/0x5450 [ 22.623585] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.623617] ? kasan_save_alloc_info+0x3b/0x50 [ 22.623658] kasan_atomics+0x1dc/0x310 [ 22.623693] ? __pfx_kasan_atomics+0x10/0x10 [ 22.623728] ? __pfx_read_tsc+0x10/0x10 [ 22.623759] ? ktime_get_ts64+0x86/0x230 [ 22.623796] kunit_try_run_case+0x1a5/0x480 [ 22.623852] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.623907] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.623941] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.623978] ? __kthread_parkme+0x82/0x180 [ 22.624008] ? preempt_count_sub+0x50/0x80 [ 22.624042] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.624077] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.624111] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.624146] kthread+0x337/0x6f0 [ 22.624173] ? trace_preempt_on+0x20/0xc0 [ 22.624207] ? __pfx_kthread+0x10/0x10 [ 22.624273] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.624348] ? calculate_sigpending+0x7b/0xa0 [ 22.624388] ? __pfx_kthread+0x10/0x10 [ 22.624421] ret_from_fork+0x116/0x1d0 [ 22.624448] ? __pfx_kthread+0x10/0x10 [ 22.624478] ret_from_fork_asm+0x1a/0x30 [ 22.624519] </TASK> [ 22.624535] [ 22.638646] Allocated by task 292: [ 22.638963] kasan_save_stack+0x45/0x70 [ 22.639746] kasan_save_track+0x18/0x40 [ 22.640171] kasan_save_alloc_info+0x3b/0x50 [ 22.640927] __kasan_kmalloc+0xb7/0xc0 [ 22.641348] __kmalloc_cache_noprof+0x189/0x420 [ 22.641789] kasan_atomics+0x95/0x310 [ 22.642186] kunit_try_run_case+0x1a5/0x480 [ 22.642666] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.643075] kthread+0x337/0x6f0 [ 22.643346] ret_from_fork+0x116/0x1d0 [ 22.643639] ret_from_fork_asm+0x1a/0x30 [ 22.644114] [ 22.644660] The buggy address belongs to the object at ffff88810383ae00 [ 22.644660] which belongs to the cache kmalloc-64 of size 64 [ 22.646043] The buggy address is located 0 bytes to the right of [ 22.646043] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 22.647547] [ 22.647712] The buggy address belongs to the physical page: [ 22.648127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 22.649376] flags: 0x200000000000000(node=0|zone=2) [ 22.649727] page_type: f5(slab) [ 22.650075] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.651144] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.651785] page dumped because: kasan: bad access detected [ 22.652546] [ 22.652759] Memory state around the buggy address: [ 22.653105] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.653752] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.654560] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.654991] ^ [ 22.655309] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.655750] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.656399] ================================================================== [ 22.657472] ================================================================== [ 22.658157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 22.659160] Read of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 22.660270] [ 22.660514] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 22.660644] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.660690] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.660753] Call Trace: [ 22.660793] <TASK> [ 22.660852] dump_stack_lvl+0x73/0xb0 [ 22.660921] print_report+0xd1/0x650 [ 22.660996] ? __virt_addr_valid+0x1db/0x2d0 [ 22.661074] ? kasan_atomics_helper+0x4a84/0x5450 [ 22.661148] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.661225] ? kasan_atomics_helper+0x4a84/0x5450 [ 22.661302] kasan_report+0x141/0x180 [ 22.661377] ? kasan_atomics_helper+0x4a84/0x5450 [ 22.661462] __asan_report_load4_noabort+0x18/0x20 [ 22.661543] kasan_atomics_helper+0x4a84/0x5450 [ 22.661620] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.661692] ? kasan_save_alloc_info+0x3b/0x50 [ 22.661782] kasan_atomics+0x1dc/0x310 [ 22.661973] ? __pfx_kasan_atomics+0x10/0x10 [ 22.662057] ? __pfx_read_tsc+0x10/0x10 [ 22.662131] ? ktime_get_ts64+0x86/0x230 [ 22.662215] kunit_try_run_case+0x1a5/0x480 [ 22.662580] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.662657] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.662729] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.662814] ? __kthread_parkme+0x82/0x180 [ 22.662907] ? preempt_count_sub+0x50/0x80 [ 22.662992] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.663072] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.663156] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.663231] kthread+0x337/0x6f0 [ 22.663433] ? trace_preempt_on+0x20/0xc0 [ 22.663512] ? __pfx_kthread+0x10/0x10 [ 22.663601] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.663683] ? calculate_sigpending+0x7b/0xa0 [ 22.663764] ? __pfx_kthread+0x10/0x10 [ 22.663852] ret_from_fork+0x116/0x1d0 [ 22.663924] ? __pfx_kthread+0x10/0x10 [ 22.663995] ret_from_fork_asm+0x1a/0x30 [ 22.664087] </TASK> [ 22.664124] [ 22.679156] Allocated by task 292: [ 22.679451] kasan_save_stack+0x45/0x70 [ 22.679773] kasan_save_track+0x18/0x40 [ 22.680079] kasan_save_alloc_info+0x3b/0x50 [ 22.680486] __kasan_kmalloc+0xb7/0xc0 [ 22.681200] __kmalloc_cache_noprof+0x189/0x420 [ 22.681772] kasan_atomics+0x95/0x310 [ 22.682197] kunit_try_run_case+0x1a5/0x480 [ 22.682705] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.683158] kthread+0x337/0x6f0 [ 22.683579] ret_from_fork+0x116/0x1d0 [ 22.683970] ret_from_fork_asm+0x1a/0x30 [ 22.684727] [ 22.684946] The buggy address belongs to the object at ffff88810383ae00 [ 22.684946] which belongs to the cache kmalloc-64 of size 64 [ 22.685892] The buggy address is located 0 bytes to the right of [ 22.685892] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 22.686751] [ 22.687040] The buggy address belongs to the physical page: [ 22.687787] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 22.688341] flags: 0x200000000000000(node=0|zone=2) [ 22.689103] page_type: f5(slab) [ 22.689552] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.690092] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.690524] page dumped because: kasan: bad access detected [ 22.690878] [ 22.691073] Memory state around the buggy address: [ 22.691507] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.692146] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.693195] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.693735] ^ [ 22.694191] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.694812] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.695505] ================================================================== [ 22.341681] ================================================================== [ 22.342642] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 22.343884] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 22.344702] [ 22.344947] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 22.345137] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.345184] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.345247] Call Trace: [ 22.345299] <TASK> [ 22.345349] dump_stack_lvl+0x73/0xb0 [ 22.345499] print_report+0xd1/0x650 [ 22.345585] ? __virt_addr_valid+0x1db/0x2d0 [ 22.345667] ? kasan_atomics_helper+0x860/0x5450 [ 22.345750] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.345854] ? kasan_atomics_helper+0x860/0x5450 [ 22.345935] kasan_report+0x141/0x180 [ 22.346010] ? kasan_atomics_helper+0x860/0x5450 [ 22.346053] kasan_check_range+0x10c/0x1c0 [ 22.346091] __kasan_check_write+0x18/0x20 [ 22.346120] kasan_atomics_helper+0x860/0x5450 [ 22.346152] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.346184] ? kasan_save_alloc_info+0x3b/0x50 [ 22.346240] kasan_atomics+0x1dc/0x310 [ 22.346324] ? __pfx_kasan_atomics+0x10/0x10 [ 22.346381] ? __pfx_read_tsc+0x10/0x10 [ 22.346416] ? ktime_get_ts64+0x86/0x230 [ 22.346453] kunit_try_run_case+0x1a5/0x480 [ 22.346488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.346523] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.346553] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.346592] ? __kthread_parkme+0x82/0x180 [ 22.346620] ? preempt_count_sub+0x50/0x80 [ 22.346655] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.346690] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.346724] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.346758] kthread+0x337/0x6f0 [ 22.346786] ? trace_preempt_on+0x20/0xc0 [ 22.346819] ? __pfx_kthread+0x10/0x10 [ 22.346879] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.346917] ? calculate_sigpending+0x7b/0xa0 [ 22.346956] ? __pfx_kthread+0x10/0x10 [ 22.346988] ret_from_fork+0x116/0x1d0 [ 22.347014] ? __pfx_kthread+0x10/0x10 [ 22.347045] ret_from_fork_asm+0x1a/0x30 [ 22.347086] </TASK> [ 22.347100] [ 22.365615] Allocated by task 292: [ 22.366059] kasan_save_stack+0x45/0x70 [ 22.366722] kasan_save_track+0x18/0x40 [ 22.367276] kasan_save_alloc_info+0x3b/0x50 [ 22.367758] __kasan_kmalloc+0xb7/0xc0 [ 22.368191] __kmalloc_cache_noprof+0x189/0x420 [ 22.369171] kasan_atomics+0x95/0x310 [ 22.369628] kunit_try_run_case+0x1a5/0x480 [ 22.370972] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.372022] kthread+0x337/0x6f0 [ 22.372437] ret_from_fork+0x116/0x1d0 [ 22.373151] ret_from_fork_asm+0x1a/0x30 [ 22.373933] [ 22.374150] The buggy address belongs to the object at ffff88810383ae00 [ 22.374150] which belongs to the cache kmalloc-64 of size 64 [ 22.375590] The buggy address is located 0 bytes to the right of [ 22.375590] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 22.376688] [ 22.376873] The buggy address belongs to the physical page: [ 22.377264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 22.377813] flags: 0x200000000000000(node=0|zone=2) [ 22.378362] page_type: f5(slab) [ 22.378772] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.379612] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.380175] page dumped because: kasan: bad access detected [ 22.380744] [ 22.381001] Memory state around the buggy address: [ 22.381377] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.381799] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.382322] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.382993] ^ [ 22.383636] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.384274] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.385599] ================================================================== [ 24.219723] ================================================================== [ 24.220871] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 24.221340] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 24.222481] [ 24.222736] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 24.222892] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.222935] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.223003] Call Trace: [ 24.223050] <TASK> [ 24.223097] dump_stack_lvl+0x73/0xb0 [ 24.223183] print_report+0xd1/0x650 [ 24.223306] ? __virt_addr_valid+0x1db/0x2d0 [ 24.223386] ? kasan_atomics_helper+0x2006/0x5450 [ 24.223458] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.223532] ? kasan_atomics_helper+0x2006/0x5450 [ 24.223616] kasan_report+0x141/0x180 [ 24.223693] ? kasan_atomics_helper+0x2006/0x5450 [ 24.223777] kasan_check_range+0x10c/0x1c0 [ 24.223916] __kasan_check_write+0x18/0x20 [ 24.223997] kasan_atomics_helper+0x2006/0x5450 [ 24.224121] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.224200] ? kasan_save_alloc_info+0x3b/0x50 [ 24.224401] kasan_atomics+0x1dc/0x310 [ 24.224490] ? __pfx_kasan_atomics+0x10/0x10 [ 24.224575] ? __pfx_read_tsc+0x10/0x10 [ 24.224637] ? ktime_get_ts64+0x86/0x230 [ 24.224703] kunit_try_run_case+0x1a5/0x480 [ 24.224787] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.224917] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.225023] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.225164] ? __kthread_parkme+0x82/0x180 [ 24.225304] ? preempt_count_sub+0x50/0x80 [ 24.225415] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.225493] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.225571] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.225647] kthread+0x337/0x6f0 [ 24.225717] ? trace_preempt_on+0x20/0xc0 [ 24.225796] ? __pfx_kthread+0x10/0x10 [ 24.225889] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.225968] ? calculate_sigpending+0x7b/0xa0 [ 24.226047] ? __pfx_kthread+0x10/0x10 [ 24.226118] ret_from_fork+0x116/0x1d0 [ 24.226366] ? __pfx_kthread+0x10/0x10 [ 24.226439] ret_from_fork_asm+0x1a/0x30 [ 24.226531] </TASK> [ 24.226563] [ 24.240743] Allocated by task 292: [ 24.241096] kasan_save_stack+0x45/0x70 [ 24.241560] kasan_save_track+0x18/0x40 [ 24.241962] kasan_save_alloc_info+0x3b/0x50 [ 24.242423] __kasan_kmalloc+0xb7/0xc0 [ 24.242800] __kmalloc_cache_noprof+0x189/0x420 [ 24.243255] kasan_atomics+0x95/0x310 [ 24.243705] kunit_try_run_case+0x1a5/0x480 [ 24.244124] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.244649] kthread+0x337/0x6f0 [ 24.244999] ret_from_fork+0x116/0x1d0 [ 24.245426] ret_from_fork_asm+0x1a/0x30 [ 24.245876] [ 24.246056] The buggy address belongs to the object at ffff88810383ae00 [ 24.246056] which belongs to the cache kmalloc-64 of size 64 [ 24.247051] The buggy address is located 0 bytes to the right of [ 24.247051] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 24.248031] [ 24.248259] The buggy address belongs to the physical page: [ 24.248685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 24.249266] flags: 0x200000000000000(node=0|zone=2) [ 24.249701] page_type: f5(slab) [ 24.250056] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.250594] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.251195] page dumped because: kasan: bad access detected [ 24.251728] [ 24.251944] Memory state around the buggy address: [ 24.252373] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.252925] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.253402] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.253814] ^ [ 24.254332] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.254977] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.255646] ================================================================== [ 23.456088] ================================================================== [ 23.456720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 23.457324] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 23.458010] [ 23.458218] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 23.458350] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.458435] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.458524] Call Trace: [ 23.458619] <TASK> [ 23.458696] dump_stack_lvl+0x73/0xb0 [ 23.458780] print_report+0xd1/0x650 [ 23.458930] ? __virt_addr_valid+0x1db/0x2d0 [ 23.459039] ? kasan_atomics_helper+0x151d/0x5450 [ 23.459108] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.459184] ? kasan_atomics_helper+0x151d/0x5450 [ 23.459260] kasan_report+0x141/0x180 [ 23.459341] ? kasan_atomics_helper+0x151d/0x5450 [ 23.459449] kasan_check_range+0x10c/0x1c0 [ 23.459568] __kasan_check_write+0x18/0x20 [ 23.459621] kasan_atomics_helper+0x151d/0x5450 [ 23.459659] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.459696] ? kasan_save_alloc_info+0x3b/0x50 [ 23.459739] kasan_atomics+0x1dc/0x310 [ 23.459773] ? __pfx_kasan_atomics+0x10/0x10 [ 23.459810] ? __pfx_read_tsc+0x10/0x10 [ 23.459867] ? ktime_get_ts64+0x86/0x230 [ 23.459906] kunit_try_run_case+0x1a5/0x480 [ 23.459942] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.459977] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.460008] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.460047] ? __kthread_parkme+0x82/0x180 [ 23.460077] ? preempt_count_sub+0x50/0x80 [ 23.460110] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.460147] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.460181] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.460226] kthread+0x337/0x6f0 [ 23.460278] ? trace_preempt_on+0x20/0xc0 [ 23.460316] ? __pfx_kthread+0x10/0x10 [ 23.460348] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.460384] ? calculate_sigpending+0x7b/0xa0 [ 23.460420] ? __pfx_kthread+0x10/0x10 [ 23.460453] ret_from_fork+0x116/0x1d0 [ 23.460479] ? __pfx_kthread+0x10/0x10 [ 23.460511] ret_from_fork_asm+0x1a/0x30 [ 23.460554] </TASK> [ 23.460571] [ 23.477520] Allocated by task 292: [ 23.477893] kasan_save_stack+0x45/0x70 [ 23.478952] kasan_save_track+0x18/0x40 [ 23.479431] kasan_save_alloc_info+0x3b/0x50 [ 23.479761] __kasan_kmalloc+0xb7/0xc0 [ 23.480165] __kmalloc_cache_noprof+0x189/0x420 [ 23.480746] kasan_atomics+0x95/0x310 [ 23.481055] kunit_try_run_case+0x1a5/0x480 [ 23.481524] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.482106] kthread+0x337/0x6f0 [ 23.482627] ret_from_fork+0x116/0x1d0 [ 23.482935] ret_from_fork_asm+0x1a/0x30 [ 23.483297] [ 23.483549] The buggy address belongs to the object at ffff88810383ae00 [ 23.483549] which belongs to the cache kmalloc-64 of size 64 [ 23.485122] The buggy address is located 0 bytes to the right of [ 23.485122] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 23.486564] [ 23.486769] The buggy address belongs to the physical page: [ 23.487666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 23.488648] flags: 0x200000000000000(node=0|zone=2) [ 23.489114] page_type: f5(slab) [ 23.489452] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.490320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.491201] page dumped because: kasan: bad access detected [ 23.491711] [ 23.491944] Memory state around the buggy address: [ 23.492370] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.493096] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.493774] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.494691] ^ [ 23.495292] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.495792] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.496525] ================================================================== [ 23.327471] ================================================================== [ 23.328107] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 23.328699] Read of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 23.329147] [ 23.329399] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 23.329529] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.329569] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.329628] Call Trace: [ 23.329682] <TASK> [ 23.329769] dump_stack_lvl+0x73/0xb0 [ 23.329876] print_report+0xd1/0x650 [ 23.329995] ? __virt_addr_valid+0x1db/0x2d0 [ 23.330109] ? kasan_atomics_helper+0x4eae/0x5450 [ 23.330278] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.330390] ? kasan_atomics_helper+0x4eae/0x5450 [ 23.330497] kasan_report+0x141/0x180 [ 23.330610] ? kasan_atomics_helper+0x4eae/0x5450 [ 23.330703] __asan_report_load8_noabort+0x18/0x20 [ 23.330785] kasan_atomics_helper+0x4eae/0x5450 [ 23.330880] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.330956] ? kasan_save_alloc_info+0x3b/0x50 [ 23.331049] kasan_atomics+0x1dc/0x310 [ 23.331125] ? __pfx_kasan_atomics+0x10/0x10 [ 23.331207] ? __pfx_read_tsc+0x10/0x10 [ 23.331325] ? ktime_get_ts64+0x86/0x230 [ 23.331405] kunit_try_run_case+0x1a5/0x480 [ 23.331483] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.331568] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.331623] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.331695] ? __kthread_parkme+0x82/0x180 [ 23.331762] ? preempt_count_sub+0x50/0x80 [ 23.331907] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.331987] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.332069] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.332186] kthread+0x337/0x6f0 [ 23.332311] ? trace_preempt_on+0x20/0xc0 [ 23.332427] ? __pfx_kthread+0x10/0x10 [ 23.332534] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.332615] ? calculate_sigpending+0x7b/0xa0 [ 23.332731] ? __pfx_kthread+0x10/0x10 [ 23.332852] ret_from_fork+0x116/0x1d0 [ 23.332923] ? __pfx_kthread+0x10/0x10 [ 23.332998] ret_from_fork_asm+0x1a/0x30 [ 23.333095] </TASK> [ 23.333137] [ 23.355286] Allocated by task 292: [ 23.355817] kasan_save_stack+0x45/0x70 [ 23.356189] kasan_save_track+0x18/0x40 [ 23.356681] kasan_save_alloc_info+0x3b/0x50 [ 23.357078] __kasan_kmalloc+0xb7/0xc0 [ 23.357552] __kmalloc_cache_noprof+0x189/0x420 [ 23.357960] kasan_atomics+0x95/0x310 [ 23.358452] kunit_try_run_case+0x1a5/0x480 [ 23.358899] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.359366] kthread+0x337/0x6f0 [ 23.359647] ret_from_fork+0x116/0x1d0 [ 23.359982] ret_from_fork_asm+0x1a/0x30 [ 23.360484] [ 23.360699] The buggy address belongs to the object at ffff88810383ae00 [ 23.360699] which belongs to the cache kmalloc-64 of size 64 [ 23.361789] The buggy address is located 0 bytes to the right of [ 23.361789] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 23.362821] [ 23.363021] The buggy address belongs to the physical page: [ 23.363568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 23.364053] flags: 0x200000000000000(node=0|zone=2) [ 23.364561] page_type: f5(slab) [ 23.364952] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.365704] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.366161] page dumped because: kasan: bad access detected [ 23.366616] [ 23.366860] Memory state around the buggy address: [ 23.367346] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.368046] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.368772] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.369399] ^ [ 23.369864] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.370486] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.370890] ================================================================== [ 22.105877] ================================================================== [ 22.107299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 22.108070] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 22.109419] [ 22.109795] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 22.109945] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.109987] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.110052] Call Trace: [ 22.110110] <TASK> [ 22.110278] dump_stack_lvl+0x73/0xb0 [ 22.110349] print_report+0xd1/0x650 [ 22.110389] ? __virt_addr_valid+0x1db/0x2d0 [ 22.110427] ? kasan_atomics_helper+0x565/0x5450 [ 22.110460] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.110494] ? kasan_atomics_helper+0x565/0x5450 [ 22.110526] kasan_report+0x141/0x180 [ 22.110559] ? kasan_atomics_helper+0x565/0x5450 [ 22.110622] kasan_check_range+0x10c/0x1c0 [ 22.110709] __kasan_check_write+0x18/0x20 [ 22.110761] kasan_atomics_helper+0x565/0x5450 [ 22.110797] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.110851] ? kasan_save_alloc_info+0x3b/0x50 [ 22.110902] kasan_atomics+0x1dc/0x310 [ 22.110938] ? __pfx_kasan_atomics+0x10/0x10 [ 22.110976] ? __pfx_read_tsc+0x10/0x10 [ 22.111009] ? ktime_get_ts64+0x86/0x230 [ 22.111045] kunit_try_run_case+0x1a5/0x480 [ 22.111081] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.111113] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.111144] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.111182] ? __kthread_parkme+0x82/0x180 [ 22.111213] ? preempt_count_sub+0x50/0x80 [ 22.111246] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.111282] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.111367] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.111443] kthread+0x337/0x6f0 [ 22.111474] ? trace_preempt_on+0x20/0xc0 [ 22.111513] ? __pfx_kthread+0x10/0x10 [ 22.111552] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.111588] ? calculate_sigpending+0x7b/0xa0 [ 22.111623] ? __pfx_kthread+0x10/0x10 [ 22.111653] ret_from_fork+0x116/0x1d0 [ 22.111678] ? __pfx_kthread+0x10/0x10 [ 22.111708] ret_from_fork_asm+0x1a/0x30 [ 22.111748] </TASK> [ 22.111762] [ 22.130699] Allocated by task 292: [ 22.131306] kasan_save_stack+0x45/0x70 [ 22.132725] kasan_save_track+0x18/0x40 [ 22.133158] kasan_save_alloc_info+0x3b/0x50 [ 22.133911] __kasan_kmalloc+0xb7/0xc0 [ 22.134328] __kmalloc_cache_noprof+0x189/0x420 [ 22.134711] kasan_atomics+0x95/0x310 [ 22.135185] kunit_try_run_case+0x1a5/0x480 [ 22.135762] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.136229] kthread+0x337/0x6f0 [ 22.136518] ret_from_fork+0x116/0x1d0 [ 22.137048] ret_from_fork_asm+0x1a/0x30 [ 22.137752] [ 22.137959] The buggy address belongs to the object at ffff88810383ae00 [ 22.137959] which belongs to the cache kmalloc-64 of size 64 [ 22.138976] The buggy address is located 0 bytes to the right of [ 22.138976] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 22.140286] [ 22.140496] The buggy address belongs to the physical page: [ 22.141099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 22.142787] flags: 0x200000000000000(node=0|zone=2) [ 22.143117] page_type: f5(slab) [ 22.143700] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.144444] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.145178] page dumped because: kasan: bad access detected [ 22.145784] [ 22.146042] Memory state around the buggy address: [ 22.146480] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.147500] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.148275] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.149012] ^ [ 22.149634] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.150492] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.151405] ================================================================== [ 22.246641] ================================================================== [ 22.247883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 22.248797] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 22.250158] [ 22.250545] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 22.250678] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.250712] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.250746] Call Trace: [ 22.250770] <TASK> [ 22.250794] dump_stack_lvl+0x73/0xb0 [ 22.250868] print_report+0xd1/0x650 [ 22.250954] ? __virt_addr_valid+0x1db/0x2d0 [ 22.251032] ? kasan_atomics_helper+0x72f/0x5450 [ 22.251107] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.251191] ? kasan_atomics_helper+0x72f/0x5450 [ 22.251268] kasan_report+0x141/0x180 [ 22.251349] ? kasan_atomics_helper+0x72f/0x5450 [ 22.251443] kasan_check_range+0x10c/0x1c0 [ 22.251532] __kasan_check_write+0x18/0x20 [ 22.251622] kasan_atomics_helper+0x72f/0x5450 [ 22.251702] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.251746] ? kasan_save_alloc_info+0x3b/0x50 [ 22.251789] kasan_atomics+0x1dc/0x310 [ 22.251824] ? __pfx_kasan_atomics+0x10/0x10 [ 22.251888] ? __pfx_read_tsc+0x10/0x10 [ 22.251921] ? ktime_get_ts64+0x86/0x230 [ 22.251959] kunit_try_run_case+0x1a5/0x480 [ 22.251994] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.252025] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.252055] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.252092] ? __kthread_parkme+0x82/0x180 [ 22.252120] ? preempt_count_sub+0x50/0x80 [ 22.252156] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.252190] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.252235] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.252317] kthread+0x337/0x6f0 [ 22.252370] ? trace_preempt_on+0x20/0xc0 [ 22.252407] ? __pfx_kthread+0x10/0x10 [ 22.252438] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.252472] ? calculate_sigpending+0x7b/0xa0 [ 22.252506] ? __pfx_kthread+0x10/0x10 [ 22.252537] ret_from_fork+0x116/0x1d0 [ 22.252565] ? __pfx_kthread+0x10/0x10 [ 22.252595] ret_from_fork_asm+0x1a/0x30 [ 22.252637] </TASK> [ 22.252652] [ 22.270799] Allocated by task 292: [ 22.271703] kasan_save_stack+0x45/0x70 [ 22.272128] kasan_save_track+0x18/0x40 [ 22.272635] kasan_save_alloc_info+0x3b/0x50 [ 22.272985] __kasan_kmalloc+0xb7/0xc0 [ 22.273410] __kmalloc_cache_noprof+0x189/0x420 [ 22.273905] kasan_atomics+0x95/0x310 [ 22.274446] kunit_try_run_case+0x1a5/0x480 [ 22.274896] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.275442] kthread+0x337/0x6f0 [ 22.277385] ret_from_fork+0x116/0x1d0 [ 22.279371] ret_from_fork_asm+0x1a/0x30 [ 22.279690] [ 22.279821] The buggy address belongs to the object at ffff88810383ae00 [ 22.279821] which belongs to the cache kmalloc-64 of size 64 [ 22.281133] The buggy address is located 0 bytes to the right of [ 22.281133] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 22.284784] [ 22.284974] The buggy address belongs to the physical page: [ 22.286172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 22.286787] flags: 0x200000000000000(node=0|zone=2) [ 22.287083] page_type: f5(slab) [ 22.287287] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.287757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.288713] page dumped because: kasan: bad access detected [ 22.290263] [ 22.290408] Memory state around the buggy address: [ 22.290662] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.292360] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.293599] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.294823] ^ [ 22.295228] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.295818] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.296579] ================================================================== [ 23.696561] ================================================================== [ 23.697115] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 23.697598] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 23.698262] [ 23.698618] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 23.698724] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.698759] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.698819] Call Trace: [ 23.698890] <TASK> [ 23.698933] dump_stack_lvl+0x73/0xb0 [ 23.699014] print_report+0xd1/0x650 [ 23.699089] ? __virt_addr_valid+0x1db/0x2d0 [ 23.699163] ? kasan_atomics_helper+0x18b1/0x5450 [ 23.699279] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.699356] ? kasan_atomics_helper+0x18b1/0x5450 [ 23.699429] kasan_report+0x141/0x180 [ 23.699504] ? kasan_atomics_helper+0x18b1/0x5450 [ 23.699597] kasan_check_range+0x10c/0x1c0 [ 23.699678] __kasan_check_write+0x18/0x20 [ 23.699750] kasan_atomics_helper+0x18b1/0x5450 [ 23.699823] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.699922] ? kasan_save_alloc_info+0x3b/0x50 [ 23.700012] kasan_atomics+0x1dc/0x310 [ 23.700089] ? __pfx_kasan_atomics+0x10/0x10 [ 23.700166] ? __pfx_read_tsc+0x10/0x10 [ 23.700279] ? ktime_get_ts64+0x86/0x230 [ 23.700362] kunit_try_run_case+0x1a5/0x480 [ 23.700440] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.700515] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.700589] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.700667] ? __kthread_parkme+0x82/0x180 [ 23.700721] ? preempt_count_sub+0x50/0x80 [ 23.700787] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.700883] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.701009] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.701094] kthread+0x337/0x6f0 [ 23.701161] ? trace_preempt_on+0x20/0xc0 [ 23.701316] ? __pfx_kthread+0x10/0x10 [ 23.701397] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.701474] ? calculate_sigpending+0x7b/0xa0 [ 23.701557] ? __pfx_kthread+0x10/0x10 [ 23.701674] ret_from_fork+0x116/0x1d0 [ 23.701742] ? __pfx_kthread+0x10/0x10 [ 23.701819] ret_from_fork_asm+0x1a/0x30 [ 23.701962] </TASK> [ 23.702008] [ 23.716307] Allocated by task 292: [ 23.716656] kasan_save_stack+0x45/0x70 [ 23.716975] kasan_save_track+0x18/0x40 [ 23.717378] kasan_save_alloc_info+0x3b/0x50 [ 23.717821] __kasan_kmalloc+0xb7/0xc0 [ 23.718200] __kmalloc_cache_noprof+0x189/0x420 [ 23.718521] kasan_atomics+0x95/0x310 [ 23.718926] kunit_try_run_case+0x1a5/0x480 [ 23.719419] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.719866] kthread+0x337/0x6f0 [ 23.720128] ret_from_fork+0x116/0x1d0 [ 23.720456] ret_from_fork_asm+0x1a/0x30 [ 23.720752] [ 23.721003] The buggy address belongs to the object at ffff88810383ae00 [ 23.721003] which belongs to the cache kmalloc-64 of size 64 [ 23.723136] The buggy address is located 0 bytes to the right of [ 23.723136] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 23.725149] [ 23.725555] The buggy address belongs to the physical page: [ 23.726076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 23.727760] flags: 0x200000000000000(node=0|zone=2) [ 23.728363] page_type: f5(slab) [ 23.728821] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.729459] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.730152] page dumped because: kasan: bad access detected [ 23.730692] [ 23.730897] Memory state around the buggy address: [ 23.731370] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.732015] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.732649] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.733300] ^ [ 23.733747] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.734373] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.734865] ================================================================== [ 23.497972] ================================================================== [ 23.499553] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 23.499810] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 23.501082] [ 23.501437] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 23.501566] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.501605] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.501666] Call Trace: [ 23.501718] <TASK> [ 23.501770] dump_stack_lvl+0x73/0xb0 [ 23.501909] print_report+0xd1/0x650 [ 23.501994] ? __virt_addr_valid+0x1db/0x2d0 [ 23.502076] ? kasan_atomics_helper+0x15b6/0x5450 [ 23.502152] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.502197] ? kasan_atomics_helper+0x15b6/0x5450 [ 23.502278] kasan_report+0x141/0x180 [ 23.502359] ? kasan_atomics_helper+0x15b6/0x5450 [ 23.502403] kasan_check_range+0x10c/0x1c0 [ 23.502440] __kasan_check_write+0x18/0x20 [ 23.502470] kasan_atomics_helper+0x15b6/0x5450 [ 23.502503] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.502535] ? kasan_save_alloc_info+0x3b/0x50 [ 23.502577] kasan_atomics+0x1dc/0x310 [ 23.502612] ? __pfx_kasan_atomics+0x10/0x10 [ 23.502649] ? __pfx_read_tsc+0x10/0x10 [ 23.502680] ? ktime_get_ts64+0x86/0x230 [ 23.502717] kunit_try_run_case+0x1a5/0x480 [ 23.502753] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.502787] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.502816] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.502887] ? __kthread_parkme+0x82/0x180 [ 23.502919] ? preempt_count_sub+0x50/0x80 [ 23.502955] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.502989] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.503024] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.503058] kthread+0x337/0x6f0 [ 23.503087] ? trace_preempt_on+0x20/0xc0 [ 23.503124] ? __pfx_kthread+0x10/0x10 [ 23.503156] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.503192] ? calculate_sigpending+0x7b/0xa0 [ 23.503230] ? __pfx_kthread+0x10/0x10 [ 23.503262] ret_from_fork+0x116/0x1d0 [ 23.503289] ? __pfx_kthread+0x10/0x10 [ 23.503355] ret_from_fork_asm+0x1a/0x30 [ 23.503443] </TASK> [ 23.503464] [ 23.520428] Allocated by task 292: [ 23.520858] kasan_save_stack+0x45/0x70 [ 23.521161] kasan_save_track+0x18/0x40 [ 23.521555] kasan_save_alloc_info+0x3b/0x50 [ 23.522055] __kasan_kmalloc+0xb7/0xc0 [ 23.522432] __kmalloc_cache_noprof+0x189/0x420 [ 23.522757] kasan_atomics+0x95/0x310 [ 23.523144] kunit_try_run_case+0x1a5/0x480 [ 23.523760] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.524199] kthread+0x337/0x6f0 [ 23.524553] ret_from_fork+0x116/0x1d0 [ 23.525010] ret_from_fork_asm+0x1a/0x30 [ 23.525318] [ 23.525481] The buggy address belongs to the object at ffff88810383ae00 [ 23.525481] which belongs to the cache kmalloc-64 of size 64 [ 23.526654] The buggy address is located 0 bytes to the right of [ 23.526654] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 23.527862] [ 23.528027] The buggy address belongs to the physical page: [ 23.528513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 23.529400] flags: 0x200000000000000(node=0|zone=2) [ 23.529863] page_type: f5(slab) [ 23.530134] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.531195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.531797] page dumped because: kasan: bad access detected [ 23.532342] [ 23.532586] Memory state around the buggy address: [ 23.533022] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.533688] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.534302] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.534894] ^ [ 23.535326] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.535956] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.536586] ================================================================== [ 23.809643] ================================================================== [ 23.810230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 23.810725] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 23.811324] [ 23.811560] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 23.811685] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.811725] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.811787] Call Trace: [ 23.812052] <TASK> [ 23.812108] dump_stack_lvl+0x73/0xb0 [ 23.812190] print_report+0xd1/0x650 [ 23.812317] ? __virt_addr_valid+0x1db/0x2d0 [ 23.812398] ? kasan_atomics_helper+0x1a7f/0x5450 [ 23.812475] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.812552] ? kasan_atomics_helper+0x1a7f/0x5450 [ 23.812628] kasan_report+0x141/0x180 [ 23.812708] ? kasan_atomics_helper+0x1a7f/0x5450 [ 23.812797] kasan_check_range+0x10c/0x1c0 [ 23.812906] __kasan_check_write+0x18/0x20 [ 23.812978] kasan_atomics_helper+0x1a7f/0x5450 [ 23.813058] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.813134] ? kasan_save_alloc_info+0x3b/0x50 [ 23.813269] kasan_atomics+0x1dc/0x310 [ 23.813359] ? __pfx_kasan_atomics+0x10/0x10 [ 23.813439] ? __pfx_read_tsc+0x10/0x10 [ 23.813511] ? ktime_get_ts64+0x86/0x230 [ 23.813588] kunit_try_run_case+0x1a5/0x480 [ 23.813671] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.813745] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.813814] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.813917] ? __kthread_parkme+0x82/0x180 [ 23.813986] ? preempt_count_sub+0x50/0x80 [ 23.814063] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.814140] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.814256] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.814341] kthread+0x337/0x6f0 [ 23.814408] ? trace_preempt_on+0x20/0xc0 [ 23.814488] ? __pfx_kthread+0x10/0x10 [ 23.814557] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.814638] ? calculate_sigpending+0x7b/0xa0 [ 23.814717] ? __pfx_kthread+0x10/0x10 [ 23.814789] ret_from_fork+0x116/0x1d0 [ 23.815270] ? __pfx_kthread+0x10/0x10 [ 23.815353] ret_from_fork_asm+0x1a/0x30 [ 23.815447] </TASK> [ 23.815486] [ 23.833062] Allocated by task 292: [ 23.833960] kasan_save_stack+0x45/0x70 [ 23.834537] kasan_save_track+0x18/0x40 [ 23.835058] kasan_save_alloc_info+0x3b/0x50 [ 23.835750] __kasan_kmalloc+0xb7/0xc0 [ 23.836087] __kmalloc_cache_noprof+0x189/0x420 [ 23.836507] kasan_atomics+0x95/0x310 [ 23.836968] kunit_try_run_case+0x1a5/0x480 [ 23.837621] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.838016] kthread+0x337/0x6f0 [ 23.838361] ret_from_fork+0x116/0x1d0 [ 23.838763] ret_from_fork_asm+0x1a/0x30 [ 23.839102] [ 23.839345] The buggy address belongs to the object at ffff88810383ae00 [ 23.839345] which belongs to the cache kmalloc-64 of size 64 [ 23.840125] The buggy address is located 0 bytes to the right of [ 23.840125] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 23.841082] [ 23.841302] The buggy address belongs to the physical page: [ 23.841773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 23.842902] flags: 0x200000000000000(node=0|zone=2) [ 23.843328] page_type: f5(slab) [ 23.843779] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.844808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.845799] page dumped because: kasan: bad access detected [ 23.846440] [ 23.846646] Memory state around the buggy address: [ 23.847429] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.848042] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.848926] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.849767] ^ [ 23.850410] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.851197] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.852306] ================================================================== [ 24.062647] ================================================================== [ 24.063268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 24.063815] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 24.064449] [ 24.064685] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 24.064818] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.064877] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.064939] Call Trace: [ 24.064988] <TASK> [ 24.065037] dump_stack_lvl+0x73/0xb0 [ 24.065118] print_report+0xd1/0x650 [ 24.065200] ? __virt_addr_valid+0x1db/0x2d0 [ 24.065326] ? kasan_atomics_helper+0x1e12/0x5450 [ 24.065401] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.065478] ? kasan_atomics_helper+0x1e12/0x5450 [ 24.065552] kasan_report+0x141/0x180 [ 24.065631] ? kasan_atomics_helper+0x1e12/0x5450 [ 24.065712] kasan_check_range+0x10c/0x1c0 [ 24.065772] __kasan_check_write+0x18/0x20 [ 24.065844] kasan_atomics_helper+0x1e12/0x5450 [ 24.065923] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.066004] ? kasan_save_alloc_info+0x3b/0x50 [ 24.066099] kasan_atomics+0x1dc/0x310 [ 24.066180] ? __pfx_kasan_atomics+0x10/0x10 [ 24.066306] ? __pfx_read_tsc+0x10/0x10 [ 24.066383] ? ktime_get_ts64+0x86/0x230 [ 24.066465] kunit_try_run_case+0x1a5/0x480 [ 24.066546] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.066609] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.066645] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.066684] ? __kthread_parkme+0x82/0x180 [ 24.066712] ? preempt_count_sub+0x50/0x80 [ 24.066749] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.066784] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.066819] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.066884] kthread+0x337/0x6f0 [ 24.066915] ? trace_preempt_on+0x20/0xc0 [ 24.066952] ? __pfx_kthread+0x10/0x10 [ 24.066983] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.067019] ? calculate_sigpending+0x7b/0xa0 [ 24.067055] ? __pfx_kthread+0x10/0x10 [ 24.067086] ret_from_fork+0x116/0x1d0 [ 24.067112] ? __pfx_kthread+0x10/0x10 [ 24.067142] ret_from_fork_asm+0x1a/0x30 [ 24.067185] </TASK> [ 24.067200] [ 24.083301] Allocated by task 292: [ 24.083592] kasan_save_stack+0x45/0x70 [ 24.083945] kasan_save_track+0x18/0x40 [ 24.084358] kasan_save_alloc_info+0x3b/0x50 [ 24.084780] __kasan_kmalloc+0xb7/0xc0 [ 24.085187] __kmalloc_cache_noprof+0x189/0x420 [ 24.085646] kasan_atomics+0x95/0x310 [ 24.086059] kunit_try_run_case+0x1a5/0x480 [ 24.086507] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.087032] kthread+0x337/0x6f0 [ 24.087500] ret_from_fork+0x116/0x1d0 [ 24.087900] ret_from_fork_asm+0x1a/0x30 [ 24.088198] [ 24.088359] The buggy address belongs to the object at ffff88810383ae00 [ 24.088359] which belongs to the cache kmalloc-64 of size 64 [ 24.089470] The buggy address is located 0 bytes to the right of [ 24.089470] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 24.090782] [ 24.091445] The buggy address belongs to the physical page: [ 24.092820] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 24.093687] flags: 0x200000000000000(node=0|zone=2) [ 24.094080] page_type: f5(slab) [ 24.094399] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.094958] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.095706] page dumped because: kasan: bad access detected [ 24.096257] [ 24.096503] Memory state around the buggy address: [ 24.096968] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.097592] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.098250] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.098850] ^ [ 24.099326] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.099942] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.100576] ================================================================== [ 22.520274] ================================================================== [ 22.520752] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 22.521215] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 22.522142] [ 22.522386] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 22.522511] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.522551] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.522614] Call Trace: [ 22.522660] <TASK> [ 22.522707] dump_stack_lvl+0x73/0xb0 [ 22.522788] print_report+0xd1/0x650 [ 22.522883] ? __virt_addr_valid+0x1db/0x2d0 [ 22.522955] ? kasan_atomics_helper+0xac7/0x5450 [ 22.523152] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.523363] ? kasan_atomics_helper+0xac7/0x5450 [ 22.523515] kasan_report+0x141/0x180 [ 22.523954] ? kasan_atomics_helper+0xac7/0x5450 [ 22.524043] kasan_check_range+0x10c/0x1c0 [ 22.524162] __kasan_check_write+0x18/0x20 [ 22.524419] kasan_atomics_helper+0xac7/0x5450 [ 22.524569] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.524645] ? kasan_save_alloc_info+0x3b/0x50 [ 22.524698] kasan_atomics+0x1dc/0x310 [ 22.524735] ? __pfx_kasan_atomics+0x10/0x10 [ 22.524770] ? __pfx_read_tsc+0x10/0x10 [ 22.524801] ? ktime_get_ts64+0x86/0x230 [ 22.524864] kunit_try_run_case+0x1a5/0x480 [ 22.524904] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.524939] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.524970] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.525006] ? __kthread_parkme+0x82/0x180 [ 22.525035] ? preempt_count_sub+0x50/0x80 [ 22.525069] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.525104] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.525138] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.525172] kthread+0x337/0x6f0 [ 22.525200] ? trace_preempt_on+0x20/0xc0 [ 22.525309] ? __pfx_kthread+0x10/0x10 [ 22.525371] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.525410] ? calculate_sigpending+0x7b/0xa0 [ 22.525446] ? __pfx_kthread+0x10/0x10 [ 22.525478] ret_from_fork+0x116/0x1d0 [ 22.525511] ? __pfx_kthread+0x10/0x10 [ 22.525542] ret_from_fork_asm+0x1a/0x30 [ 22.525586] </TASK> [ 22.525601] [ 22.542817] Allocated by task 292: [ 22.543097] kasan_save_stack+0x45/0x70 [ 22.543380] kasan_save_track+0x18/0x40 [ 22.543651] kasan_save_alloc_info+0x3b/0x50 [ 22.544017] __kasan_kmalloc+0xb7/0xc0 [ 22.544262] __kmalloc_cache_noprof+0x189/0x420 [ 22.544557] kasan_atomics+0x95/0x310 [ 22.547162] kunit_try_run_case+0x1a5/0x480 [ 22.550262] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.552080] kthread+0x337/0x6f0 [ 22.553660] ret_from_fork+0x116/0x1d0 [ 22.554618] ret_from_fork_asm+0x1a/0x30 [ 22.555584] [ 22.556375] The buggy address belongs to the object at ffff88810383ae00 [ 22.556375] which belongs to the cache kmalloc-64 of size 64 [ 22.557434] The buggy address is located 0 bytes to the right of [ 22.557434] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 22.559599] [ 22.559772] The buggy address belongs to the physical page: [ 22.561009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 22.561600] flags: 0x200000000000000(node=0|zone=2) [ 22.562054] page_type: f5(slab) [ 22.562604] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.563375] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.564331] page dumped because: kasan: bad access detected [ 22.565127] [ 22.565394] Memory state around the buggy address: [ 22.566058] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.566806] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.567749] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.568534] ^ [ 22.569296] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.570040] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.570770] ================================================================== [ 23.852988] ================================================================== [ 23.854560] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 23.855119] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 23.855692] [ 23.856038] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 23.856230] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.856273] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.856335] Call Trace: [ 23.856382] <TASK> [ 23.856428] dump_stack_lvl+0x73/0xb0 [ 23.856513] print_report+0xd1/0x650 [ 23.856592] ? __virt_addr_valid+0x1db/0x2d0 [ 23.856669] ? kasan_atomics_helper+0x1b22/0x5450 [ 23.856743] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.856817] ? kasan_atomics_helper+0x1b22/0x5450 [ 23.856915] kasan_report+0x141/0x180 [ 23.856993] ? kasan_atomics_helper+0x1b22/0x5450 [ 23.857077] kasan_check_range+0x10c/0x1c0 [ 23.857156] __kasan_check_write+0x18/0x20 [ 23.857228] kasan_atomics_helper+0x1b22/0x5450 [ 23.857286] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.857322] ? kasan_save_alloc_info+0x3b/0x50 [ 23.857366] kasan_atomics+0x1dc/0x310 [ 23.857403] ? __pfx_kasan_atomics+0x10/0x10 [ 23.857440] ? __pfx_read_tsc+0x10/0x10 [ 23.857472] ? ktime_get_ts64+0x86/0x230 [ 23.857508] kunit_try_run_case+0x1a5/0x480 [ 23.857545] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.857579] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.857608] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.857647] ? __kthread_parkme+0x82/0x180 [ 23.857676] ? preempt_count_sub+0x50/0x80 [ 23.857711] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.857749] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.857784] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.857820] kthread+0x337/0x6f0 [ 23.857878] ? trace_preempt_on+0x20/0xc0 [ 23.857918] ? __pfx_kthread+0x10/0x10 [ 23.857952] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.857989] ? calculate_sigpending+0x7b/0xa0 [ 23.858025] ? __pfx_kthread+0x10/0x10 [ 23.858057] ret_from_fork+0x116/0x1d0 [ 23.858084] ? __pfx_kthread+0x10/0x10 [ 23.858115] ret_from_fork_asm+0x1a/0x30 [ 23.858160] </TASK> [ 23.858176] [ 23.876317] Allocated by task 292: [ 23.876573] kasan_save_stack+0x45/0x70 [ 23.878498] kasan_save_track+0x18/0x40 [ 23.879146] kasan_save_alloc_info+0x3b/0x50 [ 23.879471] __kasan_kmalloc+0xb7/0xc0 [ 23.879719] __kmalloc_cache_noprof+0x189/0x420 [ 23.881486] kasan_atomics+0x95/0x310 [ 23.882201] kunit_try_run_case+0x1a5/0x480 [ 23.882992] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.883884] kthread+0x337/0x6f0 [ 23.884279] ret_from_fork+0x116/0x1d0 [ 23.884737] ret_from_fork_asm+0x1a/0x30 [ 23.885464] [ 23.885617] The buggy address belongs to the object at ffff88810383ae00 [ 23.885617] which belongs to the cache kmalloc-64 of size 64 [ 23.886690] The buggy address is located 0 bytes to the right of [ 23.886690] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 23.887758] [ 23.888022] The buggy address belongs to the physical page: [ 23.888547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 23.889179] flags: 0x200000000000000(node=0|zone=2) [ 23.889723] page_type: f5(slab) [ 23.890194] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.890801] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.891561] page dumped because: kasan: bad access detected [ 23.892130] [ 23.892333] Memory state around the buggy address: [ 23.892819] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.893610] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.894277] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.894812] ^ [ 23.895198] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.895799] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.896339] ================================================================== [ 24.022888] ================================================================== [ 24.024047] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 24.024865] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 24.026693] [ 24.026968] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 24.027339] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.027387] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.027447] Call Trace: [ 24.027498] <TASK> [ 24.027551] dump_stack_lvl+0x73/0xb0 [ 24.027634] print_report+0xd1/0x650 [ 24.027696] ? __virt_addr_valid+0x1db/0x2d0 [ 24.027735] ? kasan_atomics_helper+0x1d7a/0x5450 [ 24.027768] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.027803] ? kasan_atomics_helper+0x1d7a/0x5450 [ 24.027859] kasan_report+0x141/0x180 [ 24.027898] ? kasan_atomics_helper+0x1d7a/0x5450 [ 24.027937] kasan_check_range+0x10c/0x1c0 [ 24.027972] __kasan_check_write+0x18/0x20 [ 24.028001] kasan_atomics_helper+0x1d7a/0x5450 [ 24.028035] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.028067] ? kasan_save_alloc_info+0x3b/0x50 [ 24.028111] kasan_atomics+0x1dc/0x310 [ 24.028143] ? __pfx_kasan_atomics+0x10/0x10 [ 24.028178] ? __pfx_read_tsc+0x10/0x10 [ 24.028224] ? ktime_get_ts64+0x86/0x230 [ 24.028288] kunit_try_run_case+0x1a5/0x480 [ 24.028326] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.028361] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.028393] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.028432] ? __kthread_parkme+0x82/0x180 [ 24.028462] ? preempt_count_sub+0x50/0x80 [ 24.028498] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.028534] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.028568] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.028604] kthread+0x337/0x6f0 [ 24.028634] ? trace_preempt_on+0x20/0xc0 [ 24.028670] ? __pfx_kthread+0x10/0x10 [ 24.028702] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.028739] ? calculate_sigpending+0x7b/0xa0 [ 24.028776] ? __pfx_kthread+0x10/0x10 [ 24.028809] ret_from_fork+0x116/0x1d0 [ 24.028858] ? __pfx_kthread+0x10/0x10 [ 24.028893] ret_from_fork_asm+0x1a/0x30 [ 24.028938] </TASK> [ 24.028955] [ 24.042650] Allocated by task 292: [ 24.043074] kasan_save_stack+0x45/0x70 [ 24.043575] kasan_save_track+0x18/0x40 [ 24.044030] kasan_save_alloc_info+0x3b/0x50 [ 24.044495] __kasan_kmalloc+0xb7/0xc0 [ 24.044957] __kmalloc_cache_noprof+0x189/0x420 [ 24.045480] kasan_atomics+0x95/0x310 [ 24.045849] kunit_try_run_case+0x1a5/0x480 [ 24.046288] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.046763] kthread+0x337/0x6f0 [ 24.047053] ret_from_fork+0x116/0x1d0 [ 24.047864] ret_from_fork_asm+0x1a/0x30 [ 24.048290] [ 24.048502] The buggy address belongs to the object at ffff88810383ae00 [ 24.048502] which belongs to the cache kmalloc-64 of size 64 [ 24.051390] The buggy address is located 0 bytes to the right of [ 24.051390] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 24.052334] [ 24.052501] The buggy address belongs to the physical page: [ 24.052855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 24.053641] flags: 0x200000000000000(node=0|zone=2) [ 24.054752] page_type: f5(slab) [ 24.055131] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.055905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.056685] page dumped because: kasan: bad access detected [ 24.057050] [ 24.057265] Memory state around the buggy address: [ 24.057717] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.058617] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.059172] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.059871] ^ [ 24.060172] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.060952] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.061549] ================================================================== [ 23.164727] ================================================================== [ 23.165176] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 23.166183] Read of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 23.166722] [ 23.166965] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 23.167133] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.167207] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.167312] Call Trace: [ 23.167394] <TASK> [ 23.167453] dump_stack_lvl+0x73/0xb0 [ 23.167547] print_report+0xd1/0x650 [ 23.167625] ? __virt_addr_valid+0x1db/0x2d0 [ 23.167700] ? kasan_atomics_helper+0x49e8/0x5450 [ 23.167772] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.167863] ? kasan_atomics_helper+0x49e8/0x5450 [ 23.167942] kasan_report+0x141/0x180 [ 23.168016] ? kasan_atomics_helper+0x49e8/0x5450 [ 23.168100] __asan_report_load4_noabort+0x18/0x20 [ 23.168184] kasan_atomics_helper+0x49e8/0x5450 [ 23.168319] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.168477] ? kasan_save_alloc_info+0x3b/0x50 [ 23.168601] kasan_atomics+0x1dc/0x310 [ 23.168680] ? __pfx_kasan_atomics+0x10/0x10 [ 23.168748] ? __pfx_read_tsc+0x10/0x10 [ 23.168785] ? ktime_get_ts64+0x86/0x230 [ 23.168826] kunit_try_run_case+0x1a5/0x480 [ 23.168892] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.168929] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.168960] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.168999] ? __kthread_parkme+0x82/0x180 [ 23.169028] ? preempt_count_sub+0x50/0x80 [ 23.169063] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.169100] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.169134] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.169168] kthread+0x337/0x6f0 [ 23.169198] ? trace_preempt_on+0x20/0xc0 [ 23.169267] ? __pfx_kthread+0x10/0x10 [ 23.169303] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.169339] ? calculate_sigpending+0x7b/0xa0 [ 23.169376] ? __pfx_kthread+0x10/0x10 [ 23.169407] ret_from_fork+0x116/0x1d0 [ 23.169434] ? __pfx_kthread+0x10/0x10 [ 23.169463] ret_from_fork_asm+0x1a/0x30 [ 23.169506] </TASK> [ 23.169521] [ 23.183765] Allocated by task 292: [ 23.184171] kasan_save_stack+0x45/0x70 [ 23.184604] kasan_save_track+0x18/0x40 [ 23.185030] kasan_save_alloc_info+0x3b/0x50 [ 23.185432] __kasan_kmalloc+0xb7/0xc0 [ 23.185716] __kmalloc_cache_noprof+0x189/0x420 [ 23.186193] kasan_atomics+0x95/0x310 [ 23.186661] kunit_try_run_case+0x1a5/0x480 [ 23.187121] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.187664] kthread+0x337/0x6f0 [ 23.187954] ret_from_fork+0x116/0x1d0 [ 23.188274] ret_from_fork_asm+0x1a/0x30 [ 23.188631] [ 23.188899] The buggy address belongs to the object at ffff88810383ae00 [ 23.188899] which belongs to the cache kmalloc-64 of size 64 [ 23.189988] The buggy address is located 0 bytes to the right of [ 23.189988] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 23.190990] [ 23.191158] The buggy address belongs to the physical page: [ 23.191670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 23.192452] flags: 0x200000000000000(node=0|zone=2) [ 23.193462] page_type: f5(slab) [ 23.193728] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.194194] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.195904] page dumped because: kasan: bad access detected [ 23.197069] [ 23.197269] Memory state around the buggy address: [ 23.198092] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.198991] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.199732] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.200532] ^ [ 23.201287] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.201978] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.202581] ================================================================== [ 23.203454] ================================================================== [ 23.204369] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 23.204939] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 23.205556] [ 23.205788] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 23.205933] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.205975] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.206036] Call Trace: [ 23.206087] <TASK> [ 23.206133] dump_stack_lvl+0x73/0xb0 [ 23.206258] print_report+0xd1/0x650 [ 23.206342] ? __virt_addr_valid+0x1db/0x2d0 [ 23.206419] ? kasan_atomics_helper+0x12e6/0x5450 [ 23.206494] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.206566] ? kasan_atomics_helper+0x12e6/0x5450 [ 23.206638] kasan_report+0x141/0x180 [ 23.206713] ? kasan_atomics_helper+0x12e6/0x5450 [ 23.206796] kasan_check_range+0x10c/0x1c0 [ 23.206894] __kasan_check_write+0x18/0x20 [ 23.206965] kasan_atomics_helper+0x12e6/0x5450 [ 23.207042] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.207117] ? kasan_save_alloc_info+0x3b/0x50 [ 23.207248] kasan_atomics+0x1dc/0x310 [ 23.207334] ? __pfx_kasan_atomics+0x10/0x10 [ 23.207421] ? __pfx_read_tsc+0x10/0x10 [ 23.207494] ? ktime_get_ts64+0x86/0x230 [ 23.207598] kunit_try_run_case+0x1a5/0x480 [ 23.207682] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.207757] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.207827] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.207900] ? __kthread_parkme+0x82/0x180 [ 23.207931] ? preempt_count_sub+0x50/0x80 [ 23.207969] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.208007] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.208043] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.208079] kthread+0x337/0x6f0 [ 23.208109] ? trace_preempt_on+0x20/0xc0 [ 23.208144] ? __pfx_kthread+0x10/0x10 [ 23.208176] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.208228] ? calculate_sigpending+0x7b/0xa0 [ 23.208290] ? __pfx_kthread+0x10/0x10 [ 23.208324] ret_from_fork+0x116/0x1d0 [ 23.208353] ? __pfx_kthread+0x10/0x10 [ 23.208384] ret_from_fork_asm+0x1a/0x30 [ 23.208428] </TASK> [ 23.208444] [ 23.223739] Allocated by task 292: [ 23.224048] kasan_save_stack+0x45/0x70 [ 23.224460] kasan_save_track+0x18/0x40 [ 23.224904] kasan_save_alloc_info+0x3b/0x50 [ 23.225432] __kasan_kmalloc+0xb7/0xc0 [ 23.225810] __kmalloc_cache_noprof+0x189/0x420 [ 23.226361] kasan_atomics+0x95/0x310 [ 23.226795] kunit_try_run_case+0x1a5/0x480 [ 23.228858] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.229219] kthread+0x337/0x6f0 [ 23.229487] ret_from_fork+0x116/0x1d0 [ 23.229772] ret_from_fork_asm+0x1a/0x30 [ 23.230110] [ 23.230455] The buggy address belongs to the object at ffff88810383ae00 [ 23.230455] which belongs to the cache kmalloc-64 of size 64 [ 23.231157] The buggy address is located 0 bytes to the right of [ 23.231157] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 23.233149] [ 23.233339] The buggy address belongs to the physical page: [ 23.234140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 23.234969] flags: 0x200000000000000(node=0|zone=2) [ 23.235396] page_type: f5(slab) [ 23.235726] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.236428] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.236861] page dumped because: kasan: bad access detected [ 23.237170] [ 23.237315] Memory state around the buggy address: [ 23.237704] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.239682] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.240088] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.242182] ^ [ 23.242502] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.243270] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.243721] ================================================================== [ 23.121757] ================================================================== [ 23.123622] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 23.124202] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 23.124998] [ 23.125176] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 23.125651] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.125996] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.126086] Call Trace: [ 23.126200] <TASK> [ 23.126244] dump_stack_lvl+0x73/0xb0 [ 23.126298] print_report+0xd1/0x650 [ 23.126336] ? __virt_addr_valid+0x1db/0x2d0 [ 23.126372] ? kasan_atomics_helper+0x1217/0x5450 [ 23.126404] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.126437] ? kasan_atomics_helper+0x1217/0x5450 [ 23.126469] kasan_report+0x141/0x180 [ 23.126502] ? kasan_atomics_helper+0x1217/0x5450 [ 23.126541] kasan_check_range+0x10c/0x1c0 [ 23.126577] __kasan_check_write+0x18/0x20 [ 23.126606] kasan_atomics_helper+0x1217/0x5450 [ 23.126639] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.126672] ? kasan_save_alloc_info+0x3b/0x50 [ 23.126714] kasan_atomics+0x1dc/0x310 [ 23.126749] ? __pfx_kasan_atomics+0x10/0x10 [ 23.126785] ? __pfx_read_tsc+0x10/0x10 [ 23.126816] ? ktime_get_ts64+0x86/0x230 [ 23.126880] kunit_try_run_case+0x1a5/0x480 [ 23.126919] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.126953] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.126984] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.127022] ? __kthread_parkme+0x82/0x180 [ 23.127051] ? preempt_count_sub+0x50/0x80 [ 23.127085] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.127120] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.127154] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.127189] kthread+0x337/0x6f0 [ 23.127235] ? trace_preempt_on+0x20/0xc0 [ 23.127286] ? __pfx_kthread+0x10/0x10 [ 23.127317] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.127353] ? calculate_sigpending+0x7b/0xa0 [ 23.127389] ? __pfx_kthread+0x10/0x10 [ 23.127420] ret_from_fork+0x116/0x1d0 [ 23.127447] ? __pfx_kthread+0x10/0x10 [ 23.127477] ret_from_fork_asm+0x1a/0x30 [ 23.127520] </TASK> [ 23.127542] [ 23.145739] Allocated by task 292: [ 23.145991] kasan_save_stack+0x45/0x70 [ 23.146387] kasan_save_track+0x18/0x40 [ 23.146769] kasan_save_alloc_info+0x3b/0x50 [ 23.147267] __kasan_kmalloc+0xb7/0xc0 [ 23.147565] __kmalloc_cache_noprof+0x189/0x420 [ 23.148020] kasan_atomics+0x95/0x310 [ 23.148554] kunit_try_run_case+0x1a5/0x480 [ 23.149399] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.150035] kthread+0x337/0x6f0 [ 23.150675] ret_from_fork+0x116/0x1d0 [ 23.151379] ret_from_fork_asm+0x1a/0x30 [ 23.151960] [ 23.152169] The buggy address belongs to the object at ffff88810383ae00 [ 23.152169] which belongs to the cache kmalloc-64 of size 64 [ 23.153098] The buggy address is located 0 bytes to the right of [ 23.153098] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 23.153920] [ 23.154204] The buggy address belongs to the physical page: [ 23.154713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 23.155243] flags: 0x200000000000000(node=0|zone=2) [ 23.155788] page_type: f5(slab) [ 23.156113] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.156773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.157980] page dumped because: kasan: bad access detected [ 23.158631] [ 23.159028] Memory state around the buggy address: [ 23.159583] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.160267] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.160793] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.161636] ^ [ 23.162171] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.162973] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.163708] ================================================================== [ 23.574902] ================================================================== [ 23.575574] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 23.576461] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 23.576920] [ 23.577113] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 23.577241] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.577284] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.577346] Call Trace: [ 23.577391] <TASK> [ 23.577436] dump_stack_lvl+0x73/0xb0 [ 23.577519] print_report+0xd1/0x650 [ 23.577595] ? __virt_addr_valid+0x1db/0x2d0 [ 23.577670] ? kasan_atomics_helper+0x16e7/0x5450 [ 23.577740] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.577815] ? kasan_atomics_helper+0x16e7/0x5450 [ 23.577910] kasan_report+0x141/0x180 [ 23.577990] ? kasan_atomics_helper+0x16e7/0x5450 [ 23.578076] kasan_check_range+0x10c/0x1c0 [ 23.578156] __kasan_check_write+0x18/0x20 [ 23.578228] kasan_atomics_helper+0x16e7/0x5450 [ 23.578309] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.578389] ? kasan_save_alloc_info+0x3b/0x50 [ 23.578479] kasan_atomics+0x1dc/0x310 [ 23.578559] ? __pfx_kasan_atomics+0x10/0x10 [ 23.578640] ? __pfx_read_tsc+0x10/0x10 [ 23.578800] ? ktime_get_ts64+0x86/0x230 [ 23.578905] kunit_try_run_case+0x1a5/0x480 [ 23.578985] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.579057] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.579127] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.579205] ? __kthread_parkme+0x82/0x180 [ 23.579276] ? preempt_count_sub+0x50/0x80 [ 23.579357] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.579434] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.579509] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.579603] kthread+0x337/0x6f0 [ 23.579669] ? trace_preempt_on+0x20/0xc0 [ 23.579747] ? __pfx_kthread+0x10/0x10 [ 23.579818] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.579914] ? calculate_sigpending+0x7b/0xa0 [ 23.579983] ? __pfx_kthread+0x10/0x10 [ 23.580039] ret_from_fork+0x116/0x1d0 [ 23.580106] ? __pfx_kthread+0x10/0x10 [ 23.580236] ret_from_fork_asm+0x1a/0x30 [ 23.580414] </TASK> [ 23.580531] [ 23.596207] Allocated by task 292: [ 23.596522] kasan_save_stack+0x45/0x70 [ 23.596913] kasan_save_track+0x18/0x40 [ 23.599264] kasan_save_alloc_info+0x3b/0x50 [ 23.600069] __kasan_kmalloc+0xb7/0xc0 [ 23.601009] __kmalloc_cache_noprof+0x189/0x420 [ 23.602139] kasan_atomics+0x95/0x310 [ 23.603374] kunit_try_run_case+0x1a5/0x480 [ 23.604554] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.605133] kthread+0x337/0x6f0 [ 23.605938] ret_from_fork+0x116/0x1d0 [ 23.606580] ret_from_fork_asm+0x1a/0x30 [ 23.607607] [ 23.608502] The buggy address belongs to the object at ffff88810383ae00 [ 23.608502] which belongs to the cache kmalloc-64 of size 64 [ 23.609683] The buggy address is located 0 bytes to the right of [ 23.609683] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 23.612361] [ 23.612864] The buggy address belongs to the physical page: [ 23.613573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 23.614986] flags: 0x200000000000000(node=0|zone=2) [ 23.615754] page_type: f5(slab) [ 23.616158] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.616877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.617496] page dumped because: kasan: bad access detected [ 23.617986] [ 23.618208] Memory state around the buggy address: [ 23.618711] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.619303] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.619883] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.620572] ^ [ 23.621057] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.621714] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.622276] ================================================================== [ 22.386857] ================================================================== [ 22.388432] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 22.389670] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 22.390227] [ 22.390641] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 22.390872] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.390917] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.390977] Call Trace: [ 22.391030] <TASK> [ 22.391082] dump_stack_lvl+0x73/0xb0 [ 22.391170] print_report+0xd1/0x650 [ 22.391248] ? __virt_addr_valid+0x1db/0x2d0 [ 22.391329] ? kasan_atomics_helper+0x8f9/0x5450 [ 22.391426] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.391517] ? kasan_atomics_helper+0x8f9/0x5450 [ 22.391612] kasan_report+0x141/0x180 [ 22.391691] ? kasan_atomics_helper+0x8f9/0x5450 [ 22.391734] kasan_check_range+0x10c/0x1c0 [ 22.391774] __kasan_check_write+0x18/0x20 [ 22.391805] kasan_atomics_helper+0x8f9/0x5450 [ 22.391864] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.391903] ? kasan_save_alloc_info+0x3b/0x50 [ 22.391947] kasan_atomics+0x1dc/0x310 [ 22.391985] ? __pfx_kasan_atomics+0x10/0x10 [ 22.392023] ? __pfx_read_tsc+0x10/0x10 [ 22.392056] ? ktime_get_ts64+0x86/0x230 [ 22.392096] kunit_try_run_case+0x1a5/0x480 [ 22.392134] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.392168] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.392201] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.392293] ? __kthread_parkme+0x82/0x180 [ 22.392361] ? preempt_count_sub+0x50/0x80 [ 22.392400] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.392436] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.392473] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.392511] kthread+0x337/0x6f0 [ 22.392540] ? trace_preempt_on+0x20/0xc0 [ 22.392577] ? __pfx_kthread+0x10/0x10 [ 22.392607] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.392644] ? calculate_sigpending+0x7b/0xa0 [ 22.392681] ? __pfx_kthread+0x10/0x10 [ 22.392713] ret_from_fork+0x116/0x1d0 [ 22.392740] ? __pfx_kthread+0x10/0x10 [ 22.392771] ret_from_fork_asm+0x1a/0x30 [ 22.392816] </TASK> [ 22.392872] [ 22.410743] Allocated by task 292: [ 22.411122] kasan_save_stack+0x45/0x70 [ 22.411979] kasan_save_track+0x18/0x40 [ 22.412437] kasan_save_alloc_info+0x3b/0x50 [ 22.413082] __kasan_kmalloc+0xb7/0xc0 [ 22.413697] __kmalloc_cache_noprof+0x189/0x420 [ 22.414044] kasan_atomics+0x95/0x310 [ 22.414328] kunit_try_run_case+0x1a5/0x480 [ 22.414898] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.415388] kthread+0x337/0x6f0 [ 22.415751] ret_from_fork+0x116/0x1d0 [ 22.416149] ret_from_fork_asm+0x1a/0x30 [ 22.416550] [ 22.416761] The buggy address belongs to the object at ffff88810383ae00 [ 22.416761] which belongs to the cache kmalloc-64 of size 64 [ 22.418343] The buggy address is located 0 bytes to the right of [ 22.418343] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 22.419093] [ 22.419397] The buggy address belongs to the physical page: [ 22.419974] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 22.420764] flags: 0x200000000000000(node=0|zone=2) [ 22.421639] page_type: f5(slab) [ 22.421994] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.422941] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.424014] page dumped because: kasan: bad access detected [ 22.424756] [ 22.424975] Memory state around the buggy address: [ 22.425630] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.426439] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.427175] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.427691] ^ [ 22.428073] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.428671] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.429109] ================================================================== [ 23.537608] ================================================================== [ 23.538221] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 23.538784] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 23.539440] [ 23.539735] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 23.539876] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.539918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.539979] Call Trace: [ 23.540029] <TASK> [ 23.540077] dump_stack_lvl+0x73/0xb0 [ 23.540159] print_report+0xd1/0x650 [ 23.540237] ? __virt_addr_valid+0x1db/0x2d0 [ 23.540313] ? kasan_atomics_helper+0x164f/0x5450 [ 23.540389] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.540465] ? kasan_atomics_helper+0x164f/0x5450 [ 23.540538] kasan_report+0x141/0x180 [ 23.540617] ? kasan_atomics_helper+0x164f/0x5450 [ 23.540704] kasan_check_range+0x10c/0x1c0 [ 23.540803] __kasan_check_write+0x18/0x20 [ 23.540911] kasan_atomics_helper+0x164f/0x5450 [ 23.540990] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.541065] ? kasan_save_alloc_info+0x3b/0x50 [ 23.541152] kasan_atomics+0x1dc/0x310 [ 23.541231] ? __pfx_kasan_atomics+0x10/0x10 [ 23.541314] ? __pfx_read_tsc+0x10/0x10 [ 23.541382] ? ktime_get_ts64+0x86/0x230 [ 23.541462] kunit_try_run_case+0x1a5/0x480 [ 23.541537] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.541610] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.541678] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.541759] ? __kthread_parkme+0x82/0x180 [ 23.541826] ? preempt_count_sub+0x50/0x80 [ 23.541925] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.542004] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.542062] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.542126] kthread+0x337/0x6f0 [ 23.542195] ? trace_preempt_on+0x20/0xc0 [ 23.542275] ? __pfx_kthread+0x10/0x10 [ 23.542399] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.542500] ? calculate_sigpending+0x7b/0xa0 [ 23.542628] ? __pfx_kthread+0x10/0x10 [ 23.542731] ret_from_fork+0x116/0x1d0 [ 23.542815] ? __pfx_kthread+0x10/0x10 [ 23.542921] ret_from_fork_asm+0x1a/0x30 [ 23.543014] </TASK> [ 23.543054] [ 23.556708] Allocated by task 292: [ 23.557141] kasan_save_stack+0x45/0x70 [ 23.557577] kasan_save_track+0x18/0x40 [ 23.558010] kasan_save_alloc_info+0x3b/0x50 [ 23.558890] __kasan_kmalloc+0xb7/0xc0 [ 23.559321] __kmalloc_cache_noprof+0x189/0x420 [ 23.559867] kasan_atomics+0x95/0x310 [ 23.560367] kunit_try_run_case+0x1a5/0x480 [ 23.560902] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.561473] kthread+0x337/0x6f0 [ 23.561811] ret_from_fork+0x116/0x1d0 [ 23.562215] ret_from_fork_asm+0x1a/0x30 [ 23.562575] [ 23.562736] The buggy address belongs to the object at ffff88810383ae00 [ 23.562736] which belongs to the cache kmalloc-64 of size 64 [ 23.563917] The buggy address is located 0 bytes to the right of [ 23.563917] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 23.565102] [ 23.565418] The buggy address belongs to the physical page: [ 23.565885] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 23.566350] flags: 0x200000000000000(node=0|zone=2) [ 23.566677] page_type: f5(slab) [ 23.566992] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.567640] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.568391] page dumped because: kasan: bad access detected [ 23.568895] [ 23.569194] Memory state around the buggy address: [ 23.569792] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.570501] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.571101] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.571670] ^ [ 23.572006] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.572530] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.573574] ================================================================== [ 23.660976] ================================================================== [ 23.661644] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 23.662249] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 23.662928] [ 23.663138] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 23.663346] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.663391] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.663455] Call Trace: [ 23.663504] <TASK> [ 23.663559] dump_stack_lvl+0x73/0xb0 [ 23.663682] print_report+0xd1/0x650 [ 23.663767] ? __virt_addr_valid+0x1db/0x2d0 [ 23.663891] ? kasan_atomics_helper+0x1818/0x5450 [ 23.663976] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.664056] ? kasan_atomics_helper+0x1818/0x5450 [ 23.664135] kasan_report+0x141/0x180 [ 23.664255] ? kasan_atomics_helper+0x1818/0x5450 [ 23.664381] kasan_check_range+0x10c/0x1c0 [ 23.664469] __kasan_check_write+0x18/0x20 [ 23.664541] kasan_atomics_helper+0x1818/0x5450 [ 23.664617] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.664690] ? kasan_save_alloc_info+0x3b/0x50 [ 23.664781] kasan_atomics+0x1dc/0x310 [ 23.664876] ? __pfx_kasan_atomics+0x10/0x10 [ 23.664947] ? __pfx_read_tsc+0x10/0x10 [ 23.665004] ? ktime_get_ts64+0x86/0x230 [ 23.665088] kunit_try_run_case+0x1a5/0x480 [ 23.665244] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.665329] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.665404] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.665487] ? __kthread_parkme+0x82/0x180 [ 23.665563] ? preempt_count_sub+0x50/0x80 [ 23.665645] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.665766] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.665855] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.665918] kthread+0x337/0x6f0 [ 23.665984] ? trace_preempt_on+0x20/0xc0 [ 23.666060] ? __pfx_kthread+0x10/0x10 [ 23.666134] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.666255] ? calculate_sigpending+0x7b/0xa0 [ 23.666344] ? __pfx_kthread+0x10/0x10 [ 23.666416] ret_from_fork+0x116/0x1d0 [ 23.666485] ? __pfx_kthread+0x10/0x10 [ 23.666562] ret_from_fork_asm+0x1a/0x30 [ 23.666657] </TASK> [ 23.666698] [ 23.680129] Allocated by task 292: [ 23.680533] kasan_save_stack+0x45/0x70 [ 23.680974] kasan_save_track+0x18/0x40 [ 23.681479] kasan_save_alloc_info+0x3b/0x50 [ 23.681916] __kasan_kmalloc+0xb7/0xc0 [ 23.682393] __kmalloc_cache_noprof+0x189/0x420 [ 23.682905] kasan_atomics+0x95/0x310 [ 23.683371] kunit_try_run_case+0x1a5/0x480 [ 23.683780] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.684154] kthread+0x337/0x6f0 [ 23.684475] ret_from_fork+0x116/0x1d0 [ 23.684895] ret_from_fork_asm+0x1a/0x30 [ 23.685383] [ 23.685625] The buggy address belongs to the object at ffff88810383ae00 [ 23.685625] which belongs to the cache kmalloc-64 of size 64 [ 23.686665] The buggy address is located 0 bytes to the right of [ 23.686665] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 23.687523] [ 23.687702] The buggy address belongs to the physical page: [ 23.688298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 23.689019] flags: 0x200000000000000(node=0|zone=2) [ 23.689470] page_type: f5(slab) [ 23.689727] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.690455] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.691059] page dumped because: kasan: bad access detected [ 23.691451] [ 23.691620] Memory state around the buggy address: [ 23.691945] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.692410] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.692959] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.693638] ^ [ 23.694122] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.694806] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.695493] ================================================================== [ 22.993854] ================================================================== [ 22.995074] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 22.995733] Read of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 22.996391] [ 22.996649] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 22.996825] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.996885] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.996942] Call Trace: [ 22.996967] <TASK> [ 22.996993] dump_stack_lvl+0x73/0xb0 [ 22.997037] print_report+0xd1/0x650 [ 22.997099] ? __virt_addr_valid+0x1db/0x2d0 [ 22.997157] ? kasan_atomics_helper+0x4a1c/0x5450 [ 22.997259] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.997342] ? kasan_atomics_helper+0x4a1c/0x5450 [ 22.997416] kasan_report+0x141/0x180 [ 22.997492] ? kasan_atomics_helper+0x4a1c/0x5450 [ 22.997579] __asan_report_load4_noabort+0x18/0x20 [ 22.997655] kasan_atomics_helper+0x4a1c/0x5450 [ 22.997734] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.997813] ? kasan_save_alloc_info+0x3b/0x50 [ 22.997928] kasan_atomics+0x1dc/0x310 [ 22.998012] ? __pfx_kasan_atomics+0x10/0x10 [ 22.998138] ? __pfx_read_tsc+0x10/0x10 [ 22.998252] ? ktime_get_ts64+0x86/0x230 [ 22.998339] kunit_try_run_case+0x1a5/0x480 [ 22.998420] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.998493] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.998561] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.998640] ? __kthread_parkme+0x82/0x180 [ 22.998711] ? preempt_count_sub+0x50/0x80 [ 22.998789] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.998885] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.998933] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.998972] kthread+0x337/0x6f0 [ 22.999003] ? trace_preempt_on+0x20/0xc0 [ 22.999042] ? __pfx_kthread+0x10/0x10 [ 22.999072] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.999109] ? calculate_sigpending+0x7b/0xa0 [ 22.999146] ? __pfx_kthread+0x10/0x10 [ 22.999177] ret_from_fork+0x116/0x1d0 [ 22.999203] ? __pfx_kthread+0x10/0x10 [ 22.999277] ret_from_fork_asm+0x1a/0x30 [ 22.999323] </TASK> [ 22.999341] [ 23.015088] Allocated by task 292: [ 23.015753] kasan_save_stack+0x45/0x70 [ 23.016088] kasan_save_track+0x18/0x40 [ 23.016384] kasan_save_alloc_info+0x3b/0x50 [ 23.016697] __kasan_kmalloc+0xb7/0xc0 [ 23.017162] __kmalloc_cache_noprof+0x189/0x420 [ 23.017777] kasan_atomics+0x95/0x310 [ 23.018211] kunit_try_run_case+0x1a5/0x480 [ 23.018587] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.019106] kthread+0x337/0x6f0 [ 23.019526] ret_from_fork+0x116/0x1d0 [ 23.020262] ret_from_fork_asm+0x1a/0x30 [ 23.020651] [ 23.020914] The buggy address belongs to the object at ffff88810383ae00 [ 23.020914] which belongs to the cache kmalloc-64 of size 64 [ 23.021908] The buggy address is located 0 bytes to the right of [ 23.021908] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 23.023005] [ 23.024133] The buggy address belongs to the physical page: [ 23.025009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 23.026140] flags: 0x200000000000000(node=0|zone=2) [ 23.026918] page_type: f5(slab) [ 23.027066] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.027718] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.028995] page dumped because: kasan: bad access detected [ 23.029588] [ 23.029977] Memory state around the buggy address: [ 23.030811] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.032164] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.033073] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.033702] ^ [ 23.034089] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.035233] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.035864] ================================================================== [ 23.623866] ================================================================== [ 23.624619] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 23.625243] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 23.626465] [ 23.626687] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 23.626873] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.626917] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.626979] Call Trace: [ 23.627034] <TASK> [ 23.627084] dump_stack_lvl+0x73/0xb0 [ 23.627251] print_report+0xd1/0x650 [ 23.627369] ? __virt_addr_valid+0x1db/0x2d0 [ 23.627446] ? kasan_atomics_helper+0x177f/0x5450 [ 23.627520] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.627608] ? kasan_atomics_helper+0x177f/0x5450 [ 23.627757] kasan_report+0x141/0x180 [ 23.627857] ? kasan_atomics_helper+0x177f/0x5450 [ 23.627946] kasan_check_range+0x10c/0x1c0 [ 23.628067] __kasan_check_write+0x18/0x20 [ 23.628145] kasan_atomics_helper+0x177f/0x5450 [ 23.628226] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.628289] ? kasan_save_alloc_info+0x3b/0x50 [ 23.628336] kasan_atomics+0x1dc/0x310 [ 23.628371] ? __pfx_kasan_atomics+0x10/0x10 [ 23.628407] ? __pfx_read_tsc+0x10/0x10 [ 23.628440] ? ktime_get_ts64+0x86/0x230 [ 23.628477] kunit_try_run_case+0x1a5/0x480 [ 23.628512] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.628545] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.628575] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.628614] ? __kthread_parkme+0x82/0x180 [ 23.628641] ? preempt_count_sub+0x50/0x80 [ 23.628674] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.628709] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.628744] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.628779] kthread+0x337/0x6f0 [ 23.628808] ? trace_preempt_on+0x20/0xc0 [ 23.628872] ? __pfx_kthread+0x10/0x10 [ 23.628907] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.628943] ? calculate_sigpending+0x7b/0xa0 [ 23.628981] ? __pfx_kthread+0x10/0x10 [ 23.629012] ret_from_fork+0x116/0x1d0 [ 23.629039] ? __pfx_kthread+0x10/0x10 [ 23.629069] ret_from_fork_asm+0x1a/0x30 [ 23.629110] </TASK> [ 23.629125] [ 23.642957] Allocated by task 292: [ 23.643379] kasan_save_stack+0x45/0x70 [ 23.643768] kasan_save_track+0x18/0x40 [ 23.644177] kasan_save_alloc_info+0x3b/0x50 [ 23.644670] __kasan_kmalloc+0xb7/0xc0 [ 23.645067] __kmalloc_cache_noprof+0x189/0x420 [ 23.645440] kasan_atomics+0x95/0x310 [ 23.645728] kunit_try_run_case+0x1a5/0x480 [ 23.646188] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.646754] kthread+0x337/0x6f0 [ 23.647208] ret_from_fork+0x116/0x1d0 [ 23.647666] ret_from_fork_asm+0x1a/0x30 [ 23.648125] [ 23.648378] The buggy address belongs to the object at ffff88810383ae00 [ 23.648378] which belongs to the cache kmalloc-64 of size 64 [ 23.649387] The buggy address is located 0 bytes to the right of [ 23.649387] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 23.650080] [ 23.650376] The buggy address belongs to the physical page: [ 23.650861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 23.651639] flags: 0x200000000000000(node=0|zone=2) [ 23.652153] page_type: f5(slab) [ 23.652533] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.653208] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.653873] page dumped because: kasan: bad access detected [ 23.654398] [ 23.654603] Memory state around the buggy address: [ 23.655050] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.655699] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.656374] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.656984] ^ [ 23.657386] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.657809] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.658526] ================================================================== [ 22.741536] ================================================================== [ 22.742112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 22.743813] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 22.744776] [ 22.745039] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 22.745167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.745209] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.745273] Call Trace: [ 22.745326] <TASK> [ 22.745376] dump_stack_lvl+0x73/0xb0 [ 22.745462] print_report+0xd1/0x650 [ 22.745544] ? __virt_addr_valid+0x1db/0x2d0 [ 22.745623] ? kasan_atomics_helper+0xde0/0x5450 [ 22.745695] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.745771] ? kasan_atomics_helper+0xde0/0x5450 [ 22.745864] kasan_report+0x141/0x180 [ 22.745944] ? kasan_atomics_helper+0xde0/0x5450 [ 22.746037] kasan_check_range+0x10c/0x1c0 [ 22.746124] __kasan_check_write+0x18/0x20 [ 22.746200] kasan_atomics_helper+0xde0/0x5450 [ 22.746281] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.746363] ? kasan_save_alloc_info+0x3b/0x50 [ 22.746418] kasan_atomics+0x1dc/0x310 [ 22.746455] ? __pfx_kasan_atomics+0x10/0x10 [ 22.746492] ? __pfx_read_tsc+0x10/0x10 [ 22.746522] ? ktime_get_ts64+0x86/0x230 [ 22.746559] kunit_try_run_case+0x1a5/0x480 [ 22.746596] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.746630] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.746660] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.746698] ? __kthread_parkme+0x82/0x180 [ 22.746727] ? preempt_count_sub+0x50/0x80 [ 22.746760] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.746795] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.746852] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.746896] kthread+0x337/0x6f0 [ 22.746926] ? trace_preempt_on+0x20/0xc0 [ 22.746962] ? __pfx_kthread+0x10/0x10 [ 22.746994] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.747030] ? calculate_sigpending+0x7b/0xa0 [ 22.747065] ? __pfx_kthread+0x10/0x10 [ 22.747096] ret_from_fork+0x116/0x1d0 [ 22.747123] ? __pfx_kthread+0x10/0x10 [ 22.747152] ret_from_fork_asm+0x1a/0x30 [ 22.747193] </TASK> [ 22.747209] [ 22.767688] Allocated by task 292: [ 22.767974] kasan_save_stack+0x45/0x70 [ 22.768390] kasan_save_track+0x18/0x40 [ 22.768789] kasan_save_alloc_info+0x3b/0x50 [ 22.769239] __kasan_kmalloc+0xb7/0xc0 [ 22.769633] __kmalloc_cache_noprof+0x189/0x420 [ 22.770089] kasan_atomics+0x95/0x310 [ 22.770468] kunit_try_run_case+0x1a5/0x480 [ 22.770992] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.771629] kthread+0x337/0x6f0 [ 22.772022] ret_from_fork+0x116/0x1d0 [ 22.772565] ret_from_fork_asm+0x1a/0x30 [ 22.772999] [ 22.773218] The buggy address belongs to the object at ffff88810383ae00 [ 22.773218] which belongs to the cache kmalloc-64 of size 64 [ 22.773919] The buggy address is located 0 bytes to the right of [ 22.773919] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 22.775444] [ 22.775676] The buggy address belongs to the physical page: [ 22.776213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 22.777076] flags: 0x200000000000000(node=0|zone=2) [ 22.777624] page_type: f5(slab) [ 22.778014] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.778880] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.779432] page dumped because: kasan: bad access detected [ 22.779777] [ 22.780520] Memory state around the buggy address: [ 22.781005] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.782061] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.783040] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.784054] ^ [ 22.784705] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.785303] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.785878] ================================================================== [ 23.080894] ================================================================== [ 23.083875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 23.084878] Read of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 23.085701] [ 23.085983] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 23.086144] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.086188] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.086375] Call Trace: [ 23.086458] <TASK> [ 23.086513] dump_stack_lvl+0x73/0xb0 [ 23.086601] print_report+0xd1/0x650 [ 23.086700] ? __virt_addr_valid+0x1db/0x2d0 [ 23.086811] ? kasan_atomics_helper+0x4a02/0x5450 [ 23.086904] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.086980] ? kasan_atomics_helper+0x4a02/0x5450 [ 23.087056] kasan_report+0x141/0x180 [ 23.087132] ? kasan_atomics_helper+0x4a02/0x5450 [ 23.087242] __asan_report_load4_noabort+0x18/0x20 [ 23.087354] kasan_atomics_helper+0x4a02/0x5450 [ 23.087486] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.087575] ? kasan_save_alloc_info+0x3b/0x50 [ 23.087626] kasan_atomics+0x1dc/0x310 [ 23.087663] ? __pfx_kasan_atomics+0x10/0x10 [ 23.087699] ? __pfx_read_tsc+0x10/0x10 [ 23.087733] ? ktime_get_ts64+0x86/0x230 [ 23.087769] kunit_try_run_case+0x1a5/0x480 [ 23.087805] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.087867] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.087904] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.087944] ? __kthread_parkme+0x82/0x180 [ 23.087976] ? preempt_count_sub+0x50/0x80 [ 23.088010] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.088046] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.088081] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.088116] kthread+0x337/0x6f0 [ 23.088146] ? trace_preempt_on+0x20/0xc0 [ 23.088181] ? __pfx_kthread+0x10/0x10 [ 23.088215] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.088275] ? calculate_sigpending+0x7b/0xa0 [ 23.088316] ? __pfx_kthread+0x10/0x10 [ 23.088348] ret_from_fork+0x116/0x1d0 [ 23.088377] ? __pfx_kthread+0x10/0x10 [ 23.088409] ret_from_fork_asm+0x1a/0x30 [ 23.088452] </TASK> [ 23.088468] [ 23.103890] Allocated by task 292: [ 23.104348] kasan_save_stack+0x45/0x70 [ 23.104748] kasan_save_track+0x18/0x40 [ 23.105190] kasan_save_alloc_info+0x3b/0x50 [ 23.105551] __kasan_kmalloc+0xb7/0xc0 [ 23.106059] __kmalloc_cache_noprof+0x189/0x420 [ 23.106619] kasan_atomics+0x95/0x310 [ 23.107020] kunit_try_run_case+0x1a5/0x480 [ 23.107480] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.108058] kthread+0x337/0x6f0 [ 23.108518] ret_from_fork+0x116/0x1d0 [ 23.108942] ret_from_fork_asm+0x1a/0x30 [ 23.109425] [ 23.109698] The buggy address belongs to the object at ffff88810383ae00 [ 23.109698] which belongs to the cache kmalloc-64 of size 64 [ 23.110671] The buggy address is located 0 bytes to the right of [ 23.110671] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 23.111741] [ 23.111994] The buggy address belongs to the physical page: [ 23.112515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 23.113336] flags: 0x200000000000000(node=0|zone=2) [ 23.113847] page_type: f5(slab) [ 23.114255] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.114895] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.115460] page dumped because: kasan: bad access detected [ 23.115981] [ 23.116189] Memory state around the buggy address: [ 23.116724] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.117442] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.117884] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.118484] ^ [ 23.119057] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.119725] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.120431] ================================================================== [ 22.430579] ================================================================== [ 22.431402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 22.431957] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 22.432666] [ 22.432980] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 22.433110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.433152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.433213] Call Trace: [ 22.433264] <TASK> [ 22.433312] dump_stack_lvl+0x73/0xb0 [ 22.433394] print_report+0xd1/0x650 [ 22.433470] ? __virt_addr_valid+0x1db/0x2d0 [ 22.433546] ? kasan_atomics_helper+0x992/0x5450 [ 22.433620] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.433733] ? kasan_atomics_helper+0x992/0x5450 [ 22.433818] kasan_report+0x141/0x180 [ 22.433945] ? kasan_atomics_helper+0x992/0x5450 [ 22.434040] kasan_check_range+0x10c/0x1c0 [ 22.434125] __kasan_check_write+0x18/0x20 [ 22.434197] kasan_atomics_helper+0x992/0x5450 [ 22.434627] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.434704] ? kasan_save_alloc_info+0x3b/0x50 [ 22.434796] kasan_atomics+0x1dc/0x310 [ 22.434893] ? __pfx_kasan_atomics+0x10/0x10 [ 22.434972] ? __pfx_read_tsc+0x10/0x10 [ 22.435008] ? ktime_get_ts64+0x86/0x230 [ 22.435047] kunit_try_run_case+0x1a5/0x480 [ 22.435086] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.435124] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.435156] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.435194] ? __kthread_parkme+0x82/0x180 [ 22.435241] ? preempt_count_sub+0x50/0x80 [ 22.435322] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.435385] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.435422] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.435459] kthread+0x337/0x6f0 [ 22.435489] ? trace_preempt_on+0x20/0xc0 [ 22.435526] ? __pfx_kthread+0x10/0x10 [ 22.435569] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.435606] ? calculate_sigpending+0x7b/0xa0 [ 22.435642] ? __pfx_kthread+0x10/0x10 [ 22.435674] ret_from_fork+0x116/0x1d0 [ 22.435701] ? __pfx_kthread+0x10/0x10 [ 22.435733] ret_from_fork_asm+0x1a/0x30 [ 22.435777] </TASK> [ 22.435793] [ 22.456093] Allocated by task 292: [ 22.456717] kasan_save_stack+0x45/0x70 [ 22.457129] kasan_save_track+0x18/0x40 [ 22.458000] kasan_save_alloc_info+0x3b/0x50 [ 22.458316] __kasan_kmalloc+0xb7/0xc0 [ 22.458744] __kmalloc_cache_noprof+0x189/0x420 [ 22.459268] kasan_atomics+0x95/0x310 [ 22.460098] kunit_try_run_case+0x1a5/0x480 [ 22.460513] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.461216] kthread+0x337/0x6f0 [ 22.461608] ret_from_fork+0x116/0x1d0 [ 22.462046] ret_from_fork_asm+0x1a/0x30 [ 22.462902] [ 22.463095] The buggy address belongs to the object at ffff88810383ae00 [ 22.463095] which belongs to the cache kmalloc-64 of size 64 [ 22.464293] The buggy address is located 0 bytes to the right of [ 22.464293] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 22.466105] [ 22.466471] The buggy address belongs to the physical page: [ 22.466827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 22.467359] flags: 0x200000000000000(node=0|zone=2) [ 22.468230] page_type: f5(slab) [ 22.468744] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.470071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.470895] page dumped because: kasan: bad access detected [ 22.471653] [ 22.471894] Memory state around the buggy address: [ 22.472284] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.473084] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.473625] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.474642] ^ [ 22.475049] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.475974] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.476601] ================================================================== [ 22.838529] ================================================================== [ 22.839152] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 22.840146] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 22.841082] [ 22.841321] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 22.841453] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.841494] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.841873] Call Trace: [ 22.842138] <TASK> [ 22.842192] dump_stack_lvl+0x73/0xb0 [ 22.842278] print_report+0xd1/0x650 [ 22.842353] ? __virt_addr_valid+0x1db/0x2d0 [ 22.842432] ? kasan_atomics_helper+0xf10/0x5450 [ 22.842520] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.842560] ? kasan_atomics_helper+0xf10/0x5450 [ 22.842593] kasan_report+0x141/0x180 [ 22.842631] ? kasan_atomics_helper+0xf10/0x5450 [ 22.842713] kasan_check_range+0x10c/0x1c0 [ 22.842796] __kasan_check_write+0x18/0x20 [ 22.842976] kasan_atomics_helper+0xf10/0x5450 [ 22.843141] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.843253] ? kasan_save_alloc_info+0x3b/0x50 [ 22.843357] kasan_atomics+0x1dc/0x310 [ 22.843427] ? __pfx_kasan_atomics+0x10/0x10 [ 22.843469] ? __pfx_read_tsc+0x10/0x10 [ 22.843521] ? ktime_get_ts64+0x86/0x230 [ 22.843579] kunit_try_run_case+0x1a5/0x480 [ 22.843631] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.843673] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.843718] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.843770] ? __kthread_parkme+0x82/0x180 [ 22.843811] ? preempt_count_sub+0x50/0x80 [ 22.843879] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.843920] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.843975] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.844013] kthread+0x337/0x6f0 [ 22.844062] ? trace_preempt_on+0x20/0xc0 [ 22.844098] ? __pfx_kthread+0x10/0x10 [ 22.844167] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.844217] ? calculate_sigpending+0x7b/0xa0 [ 22.844278] ? __pfx_kthread+0x10/0x10 [ 22.844313] ret_from_fork+0x116/0x1d0 [ 22.844340] ? __pfx_kthread+0x10/0x10 [ 22.844370] ret_from_fork_asm+0x1a/0x30 [ 22.844413] </TASK> [ 22.844428] [ 22.859815] Allocated by task 292: [ 22.860178] kasan_save_stack+0x45/0x70 [ 22.860581] kasan_save_track+0x18/0x40 [ 22.860975] kasan_save_alloc_info+0x3b/0x50 [ 22.862882] __kasan_kmalloc+0xb7/0xc0 [ 22.863315] __kmalloc_cache_noprof+0x189/0x420 [ 22.864063] kasan_atomics+0x95/0x310 [ 22.864341] kunit_try_run_case+0x1a5/0x480 [ 22.864826] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.865366] kthread+0x337/0x6f0 [ 22.865714] ret_from_fork+0x116/0x1d0 [ 22.866117] ret_from_fork_asm+0x1a/0x30 [ 22.866717] [ 22.867038] The buggy address belongs to the object at ffff88810383ae00 [ 22.867038] which belongs to the cache kmalloc-64 of size 64 [ 22.868139] The buggy address is located 0 bytes to the right of [ 22.868139] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 22.869171] [ 22.869494] The buggy address belongs to the physical page: [ 22.869988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 22.870708] flags: 0x200000000000000(node=0|zone=2) [ 22.871262] page_type: f5(slab) [ 22.871719] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.872409] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.873072] page dumped because: kasan: bad access detected [ 22.873607] [ 22.873859] Memory state around the buggy address: [ 22.874388] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.875043] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.875726] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.876387] ^ [ 22.876882] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.877543] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.878303] ================================================================== [ 22.880251] ================================================================== [ 22.880741] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 22.881560] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 22.882351] [ 22.882737] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 22.882884] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.882926] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.882989] Call Trace: [ 22.883031] <TASK> [ 22.883078] dump_stack_lvl+0x73/0xb0 [ 22.883157] print_report+0xd1/0x650 [ 22.883254] ? __virt_addr_valid+0x1db/0x2d0 [ 22.883488] ? kasan_atomics_helper+0xfa9/0x5450 [ 22.883601] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.883682] ? kasan_atomics_helper+0xfa9/0x5450 [ 22.883752] kasan_report+0x141/0x180 [ 22.883846] ? kasan_atomics_helper+0xfa9/0x5450 [ 22.883932] kasan_check_range+0x10c/0x1c0 [ 22.884016] __kasan_check_write+0x18/0x20 [ 22.884085] kasan_atomics_helper+0xfa9/0x5450 [ 22.884188] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.884320] ? kasan_save_alloc_info+0x3b/0x50 [ 22.884407] kasan_atomics+0x1dc/0x310 [ 22.884453] ? __pfx_kasan_atomics+0x10/0x10 [ 22.884494] ? __pfx_read_tsc+0x10/0x10 [ 22.884524] ? ktime_get_ts64+0x86/0x230 [ 22.884563] kunit_try_run_case+0x1a5/0x480 [ 22.884601] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.884635] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.884666] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.884704] ? __kthread_parkme+0x82/0x180 [ 22.884733] ? preempt_count_sub+0x50/0x80 [ 22.884768] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.884804] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.884865] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.884906] kthread+0x337/0x6f0 [ 22.884938] ? trace_preempt_on+0x20/0xc0 [ 22.884975] ? __pfx_kthread+0x10/0x10 [ 22.885005] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.885041] ? calculate_sigpending+0x7b/0xa0 [ 22.885077] ? __pfx_kthread+0x10/0x10 [ 22.885110] ret_from_fork+0x116/0x1d0 [ 22.885138] ? __pfx_kthread+0x10/0x10 [ 22.885170] ret_from_fork_asm+0x1a/0x30 [ 22.885231] </TASK> [ 22.885269] [ 22.899260] Allocated by task 292: [ 22.899609] kasan_save_stack+0x45/0x70 [ 22.900024] kasan_save_track+0x18/0x40 [ 22.900432] kasan_save_alloc_info+0x3b/0x50 [ 22.900869] __kasan_kmalloc+0xb7/0xc0 [ 22.901247] __kmalloc_cache_noprof+0x189/0x420 [ 22.901692] kasan_atomics+0x95/0x310 [ 22.902060] kunit_try_run_case+0x1a5/0x480 [ 22.902438] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.902944] kthread+0x337/0x6f0 [ 22.903311] ret_from_fork+0x116/0x1d0 [ 22.903687] ret_from_fork_asm+0x1a/0x30 [ 22.904059] [ 22.904267] The buggy address belongs to the object at ffff88810383ae00 [ 22.904267] which belongs to the cache kmalloc-64 of size 64 [ 22.904937] The buggy address is located 0 bytes to the right of [ 22.904937] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 22.905547] [ 22.905756] The buggy address belongs to the physical page: [ 22.906109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 22.907297] flags: 0x200000000000000(node=0|zone=2) [ 22.908072] page_type: f5(slab) [ 22.908711] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.910102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.910648] page dumped because: kasan: bad access detected [ 22.911007] [ 22.911168] Memory state around the buggy address: [ 22.912284] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.913404] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.914504] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.915549] ^ [ 22.915985] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.916800] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.917268] ================================================================== [ 23.037692] ================================================================== [ 23.038516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 23.039170] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 23.039997] [ 23.040191] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 23.040285] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.040307] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.040340] Call Trace: [ 23.040357] <TASK> [ 23.040379] dump_stack_lvl+0x73/0xb0 [ 23.040419] print_report+0xd1/0x650 [ 23.040451] ? __virt_addr_valid+0x1db/0x2d0 [ 23.040484] ? kasan_atomics_helper+0x1148/0x5450 [ 23.040516] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.040550] ? kasan_atomics_helper+0x1148/0x5450 [ 23.040581] kasan_report+0x141/0x180 [ 23.040613] ? kasan_atomics_helper+0x1148/0x5450 [ 23.040652] kasan_check_range+0x10c/0x1c0 [ 23.040688] __kasan_check_write+0x18/0x20 [ 23.040716] kasan_atomics_helper+0x1148/0x5450 [ 23.040749] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.040781] ? kasan_save_alloc_info+0x3b/0x50 [ 23.040823] kasan_atomics+0x1dc/0x310 [ 23.040915] ? __pfx_kasan_atomics+0x10/0x10 [ 23.040997] ? __pfx_read_tsc+0x10/0x10 [ 23.041072] ? ktime_get_ts64+0x86/0x230 [ 23.041158] kunit_try_run_case+0x1a5/0x480 [ 23.041241] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.041320] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.041429] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.041520] ? __kthread_parkme+0x82/0x180 [ 23.041596] ? preempt_count_sub+0x50/0x80 [ 23.041676] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.041751] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.041843] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.041927] kthread+0x337/0x6f0 [ 23.041995] ? trace_preempt_on+0x20/0xc0 [ 23.042040] ? __pfx_kthread+0x10/0x10 [ 23.042073] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.042110] ? calculate_sigpending+0x7b/0xa0 [ 23.042146] ? __pfx_kthread+0x10/0x10 [ 23.042177] ret_from_fork+0x116/0x1d0 [ 23.042206] ? __pfx_kthread+0x10/0x10 [ 23.042266] ret_from_fork_asm+0x1a/0x30 [ 23.042314] </TASK> [ 23.042329] [ 23.058395] Allocated by task 292: [ 23.058733] kasan_save_stack+0x45/0x70 [ 23.059192] kasan_save_track+0x18/0x40 [ 23.059690] kasan_save_alloc_info+0x3b/0x50 [ 23.060179] __kasan_kmalloc+0xb7/0xc0 [ 23.060670] __kmalloc_cache_noprof+0x189/0x420 [ 23.061198] kasan_atomics+0x95/0x310 [ 23.061723] kunit_try_run_case+0x1a5/0x480 [ 23.062185] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.062770] kthread+0x337/0x6f0 [ 23.063170] ret_from_fork+0x116/0x1d0 [ 23.063499] ret_from_fork_asm+0x1a/0x30 [ 23.063918] [ 23.064199] The buggy address belongs to the object at ffff88810383ae00 [ 23.064199] which belongs to the cache kmalloc-64 of size 64 [ 23.065425] The buggy address is located 0 bytes to the right of [ 23.065425] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 23.066594] [ 23.066856] The buggy address belongs to the physical page: [ 23.067302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 23.067958] flags: 0x200000000000000(node=0|zone=2) [ 23.068534] page_type: f5(slab) [ 23.068799] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.069659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.070393] page dumped because: kasan: bad access detected [ 23.070810] [ 23.070973] Memory state around the buggy address: [ 23.072104] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.074463] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.076255] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.076618] ^ [ 23.076915] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.077276] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.077670] ================================================================== [ 23.980682] ================================================================== [ 23.981764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 23.982869] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 23.983948] [ 23.984407] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 23.984592] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.984661] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.984723] Call Trace: [ 23.984818] <TASK> [ 23.984900] dump_stack_lvl+0x73/0xb0 [ 23.984982] print_report+0xd1/0x650 [ 23.985067] ? __virt_addr_valid+0x1db/0x2d0 [ 23.985202] ? kasan_atomics_helper+0x1ce1/0x5450 [ 23.985309] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.985391] ? kasan_atomics_helper+0x1ce1/0x5450 [ 23.985516] kasan_report+0x141/0x180 [ 23.985626] ? kasan_atomics_helper+0x1ce1/0x5450 [ 23.985716] kasan_check_range+0x10c/0x1c0 [ 23.985775] __kasan_check_write+0x18/0x20 [ 23.985807] kasan_atomics_helper+0x1ce1/0x5450 [ 23.985866] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.985903] ? kasan_save_alloc_info+0x3b/0x50 [ 23.985948] kasan_atomics+0x1dc/0x310 [ 23.985984] ? __pfx_kasan_atomics+0x10/0x10 [ 23.986021] ? __pfx_read_tsc+0x10/0x10 [ 23.986053] ? ktime_get_ts64+0x86/0x230 [ 23.986093] kunit_try_run_case+0x1a5/0x480 [ 23.986130] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.986165] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.986195] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.986259] ? __kthread_parkme+0x82/0x180 [ 23.986295] ? preempt_count_sub+0x50/0x80 [ 23.986332] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.986368] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.986403] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.986439] kthread+0x337/0x6f0 [ 23.986467] ? trace_preempt_on+0x20/0xc0 [ 23.986505] ? __pfx_kthread+0x10/0x10 [ 23.986537] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.986573] ? calculate_sigpending+0x7b/0xa0 [ 23.986610] ? __pfx_kthread+0x10/0x10 [ 23.986641] ret_from_fork+0x116/0x1d0 [ 23.986668] ? __pfx_kthread+0x10/0x10 [ 23.986698] ret_from_fork_asm+0x1a/0x30 [ 23.986742] </TASK> [ 23.986759] [ 24.003930] Allocated by task 292: [ 24.004297] kasan_save_stack+0x45/0x70 [ 24.004777] kasan_save_track+0x18/0x40 [ 24.005222] kasan_save_alloc_info+0x3b/0x50 [ 24.005696] __kasan_kmalloc+0xb7/0xc0 [ 24.006869] __kmalloc_cache_noprof+0x189/0x420 [ 24.007230] kasan_atomics+0x95/0x310 [ 24.007643] kunit_try_run_case+0x1a5/0x480 [ 24.008017] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.008599] kthread+0x337/0x6f0 [ 24.009018] ret_from_fork+0x116/0x1d0 [ 24.009494] ret_from_fork_asm+0x1a/0x30 [ 24.010749] [ 24.011094] The buggy address belongs to the object at ffff88810383ae00 [ 24.011094] which belongs to the cache kmalloc-64 of size 64 [ 24.012184] The buggy address is located 0 bytes to the right of [ 24.012184] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 24.013290] [ 24.013535] The buggy address belongs to the physical page: [ 24.014093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 24.014749] flags: 0x200000000000000(node=0|zone=2) [ 24.015303] page_type: f5(slab) [ 24.015765] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.016389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.017042] page dumped because: kasan: bad access detected [ 24.017508] [ 24.017698] Memory state around the buggy address: [ 24.018129] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.018648] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.019424] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.019875] ^ [ 24.020334] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.021330] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.021883] ================================================================== [ 24.146870] ================================================================== [ 24.147501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 24.148145] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 24.148792] [ 24.149056] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 24.149193] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.149280] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.149346] Call Trace: [ 24.149399] <TASK> [ 24.149450] dump_stack_lvl+0x73/0xb0 [ 24.149539] print_report+0xd1/0x650 [ 24.149617] ? __virt_addr_valid+0x1db/0x2d0 [ 24.149694] ? kasan_atomics_helper+0x1f43/0x5450 [ 24.149771] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.149904] ? kasan_atomics_helper+0x1f43/0x5450 [ 24.149987] kasan_report+0x141/0x180 [ 24.150067] ? kasan_atomics_helper+0x1f43/0x5450 [ 24.150153] kasan_check_range+0x10c/0x1c0 [ 24.150271] __kasan_check_write+0x18/0x20 [ 24.150346] kasan_atomics_helper+0x1f43/0x5450 [ 24.150419] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.150490] ? kasan_save_alloc_info+0x3b/0x50 [ 24.150579] kasan_atomics+0x1dc/0x310 [ 24.150656] ? __pfx_kasan_atomics+0x10/0x10 [ 24.150733] ? __pfx_read_tsc+0x10/0x10 [ 24.150804] ? ktime_get_ts64+0x86/0x230 [ 24.150921] kunit_try_run_case+0x1a5/0x480 [ 24.150998] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.151074] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.151122] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.151164] ? __kthread_parkme+0x82/0x180 [ 24.151194] ? preempt_count_sub+0x50/0x80 [ 24.151272] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.151314] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.151350] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.151388] kthread+0x337/0x6f0 [ 24.151419] ? trace_preempt_on+0x20/0xc0 [ 24.151457] ? __pfx_kthread+0x10/0x10 [ 24.151489] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.151526] ? calculate_sigpending+0x7b/0xa0 [ 24.151574] ? __pfx_kthread+0x10/0x10 [ 24.151608] ret_from_fork+0x116/0x1d0 [ 24.151636] ? __pfx_kthread+0x10/0x10 [ 24.151666] ret_from_fork_asm+0x1a/0x30 [ 24.151710] </TASK> [ 24.151728] [ 24.166855] Allocated by task 292: [ 24.167182] kasan_save_stack+0x45/0x70 [ 24.167645] kasan_save_track+0x18/0x40 [ 24.168043] kasan_save_alloc_info+0x3b/0x50 [ 24.168514] __kasan_kmalloc+0xb7/0xc0 [ 24.168904] __kmalloc_cache_noprof+0x189/0x420 [ 24.169357] kasan_atomics+0x95/0x310 [ 24.169736] kunit_try_run_case+0x1a5/0x480 [ 24.170147] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.170598] kthread+0x337/0x6f0 [ 24.170969] ret_from_fork+0x116/0x1d0 [ 24.171379] ret_from_fork_asm+0x1a/0x30 [ 24.171752] [ 24.171969] The buggy address belongs to the object at ffff88810383ae00 [ 24.171969] which belongs to the cache kmalloc-64 of size 64 [ 24.172845] The buggy address is located 0 bytes to the right of [ 24.172845] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 24.173767] [ 24.173956] The buggy address belongs to the physical page: [ 24.174350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 24.174817] flags: 0x200000000000000(node=0|zone=2) [ 24.175358] page_type: f5(slab) [ 24.175728] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.176469] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.177128] page dumped because: kasan: bad access detected [ 24.177655] [ 24.177815] Memory state around the buggy address: [ 24.178142] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.178672] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.179350] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.179958] ^ [ 24.180464] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.181064] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.181628] ================================================================== [ 24.422499] ================================================================== [ 24.423085] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 24.423826] Read of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 24.424575] [ 24.424777] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 24.424931] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.424974] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.425035] Call Trace: [ 24.425089] <TASK> [ 24.425140] dump_stack_lvl+0x73/0xb0 [ 24.425279] print_report+0xd1/0x650 [ 24.425367] ? __virt_addr_valid+0x1db/0x2d0 [ 24.425465] ? kasan_atomics_helper+0x4fa5/0x5450 [ 24.425543] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.425689] ? kasan_atomics_helper+0x4fa5/0x5450 [ 24.425773] kasan_report+0x141/0x180 [ 24.425870] ? kasan_atomics_helper+0x4fa5/0x5450 [ 24.426030] __asan_report_load8_noabort+0x18/0x20 [ 24.426115] kasan_atomics_helper+0x4fa5/0x5450 [ 24.426194] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.426337] ? kasan_save_alloc_info+0x3b/0x50 [ 24.426433] kasan_atomics+0x1dc/0x310 [ 24.426491] ? __pfx_kasan_atomics+0x10/0x10 [ 24.426533] ? __pfx_read_tsc+0x10/0x10 [ 24.426565] ? ktime_get_ts64+0x86/0x230 [ 24.426617] kunit_try_run_case+0x1a5/0x480 [ 24.426696] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.426853] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.426932] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.427013] ? __kthread_parkme+0x82/0x180 [ 24.427087] ? preempt_count_sub+0x50/0x80 [ 24.427239] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.427325] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.427400] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.427442] kthread+0x337/0x6f0 [ 24.427472] ? trace_preempt_on+0x20/0xc0 [ 24.427511] ? __pfx_kthread+0x10/0x10 [ 24.427551] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.427588] ? calculate_sigpending+0x7b/0xa0 [ 24.427625] ? __pfx_kthread+0x10/0x10 [ 24.427656] ret_from_fork+0x116/0x1d0 [ 24.427684] ? __pfx_kthread+0x10/0x10 [ 24.427713] ret_from_fork_asm+0x1a/0x30 [ 24.427756] </TASK> [ 24.427771] [ 24.445923] Allocated by task 292: [ 24.446347] kasan_save_stack+0x45/0x70 [ 24.446763] kasan_save_track+0x18/0x40 [ 24.447149] kasan_save_alloc_info+0x3b/0x50 [ 24.447618] __kasan_kmalloc+0xb7/0xc0 [ 24.448069] __kmalloc_cache_noprof+0x189/0x420 [ 24.448489] kasan_atomics+0x95/0x310 [ 24.448776] kunit_try_run_case+0x1a5/0x480 [ 24.449318] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.449815] kthread+0x337/0x6f0 [ 24.450260] ret_from_fork+0x116/0x1d0 [ 24.450544] ret_from_fork_asm+0x1a/0x30 [ 24.450954] [ 24.451179] The buggy address belongs to the object at ffff88810383ae00 [ 24.451179] which belongs to the cache kmalloc-64 of size 64 [ 24.452326] The buggy address is located 0 bytes to the right of [ 24.452326] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 24.453190] [ 24.453487] The buggy address belongs to the physical page: [ 24.454041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 24.454625] flags: 0x200000000000000(node=0|zone=2) [ 24.455051] page_type: f5(slab) [ 24.455482] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.456178] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.456701] page dumped because: kasan: bad access detected [ 24.457059] [ 24.457322] Memory state around the buggy address: [ 24.457776] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.458518] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.459100] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.459664] ^ [ 24.460001] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.460632] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.461352] ================================================================== [ 24.256794] ================================================================== [ 24.257392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 24.257951] Read of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 24.258540] [ 24.258735] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 24.258880] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.258921] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.258982] Call Trace: [ 24.259030] <TASK> [ 24.259075] dump_stack_lvl+0x73/0xb0 [ 24.259154] print_report+0xd1/0x650 [ 24.259278] ? __virt_addr_valid+0x1db/0x2d0 [ 24.259362] ? kasan_atomics_helper+0x4f98/0x5450 [ 24.259436] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.259514] ? kasan_atomics_helper+0x4f98/0x5450 [ 24.259598] kasan_report+0x141/0x180 [ 24.259679] ? kasan_atomics_helper+0x4f98/0x5450 [ 24.259766] __asan_report_load8_noabort+0x18/0x20 [ 24.259873] kasan_atomics_helper+0x4f98/0x5450 [ 24.259956] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.260031] ? kasan_save_alloc_info+0x3b/0x50 [ 24.260120] kasan_atomics+0x1dc/0x310 [ 24.260197] ? __pfx_kasan_atomics+0x10/0x10 [ 24.260321] ? __pfx_read_tsc+0x10/0x10 [ 24.260390] ? ktime_get_ts64+0x86/0x230 [ 24.260472] kunit_try_run_case+0x1a5/0x480 [ 24.260547] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.260622] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.260698] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.260779] ? __kthread_parkme+0x82/0x180 [ 24.260868] ? preempt_count_sub+0x50/0x80 [ 24.260949] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.261023] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.261098] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.261175] kthread+0x337/0x6f0 [ 24.261289] ? trace_preempt_on+0x20/0xc0 [ 24.261369] ? __pfx_kthread+0x10/0x10 [ 24.261439] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.261515] ? calculate_sigpending+0x7b/0xa0 [ 24.261593] ? __pfx_kthread+0x10/0x10 [ 24.261663] ret_from_fork+0x116/0x1d0 [ 24.261731] ? __pfx_kthread+0x10/0x10 [ 24.261806] ret_from_fork_asm+0x1a/0x30 [ 24.261921] </TASK> [ 24.261960] [ 24.274732] Allocated by task 292: [ 24.275122] kasan_save_stack+0x45/0x70 [ 24.275588] kasan_save_track+0x18/0x40 [ 24.276011] kasan_save_alloc_info+0x3b/0x50 [ 24.276479] __kasan_kmalloc+0xb7/0xc0 [ 24.276763] __kmalloc_cache_noprof+0x189/0x420 [ 24.277134] kasan_atomics+0x95/0x310 [ 24.277545] kunit_try_run_case+0x1a5/0x480 [ 24.277968] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.278529] kthread+0x337/0x6f0 [ 24.278895] ret_from_fork+0x116/0x1d0 [ 24.279320] ret_from_fork_asm+0x1a/0x30 [ 24.279663] [ 24.279879] The buggy address belongs to the object at ffff88810383ae00 [ 24.279879] which belongs to the cache kmalloc-64 of size 64 [ 24.280619] The buggy address is located 0 bytes to the right of [ 24.280619] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 24.282788] [ 24.283020] The buggy address belongs to the physical page: [ 24.284375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 24.284981] flags: 0x200000000000000(node=0|zone=2) [ 24.285316] page_type: f5(slab) [ 24.285578] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.287794] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.288754] page dumped because: kasan: bad access detected [ 24.289352] [ 24.289559] Memory state around the buggy address: [ 24.290052] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.290721] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.291374] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.292087] ^ [ 24.292572] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.293131] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.293773] ================================================================== [ 22.062149] ================================================================== [ 22.062969] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 22.063705] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 22.064518] [ 22.064972] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 22.065104] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.065146] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.065225] Call Trace: [ 22.065279] <TASK> [ 22.065327] dump_stack_lvl+0x73/0xb0 [ 22.065409] print_report+0xd1/0x650 [ 22.065483] ? __virt_addr_valid+0x1db/0x2d0 [ 22.065558] ? kasan_atomics_helper+0x4b3a/0x5450 [ 22.065631] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.065708] ? kasan_atomics_helper+0x4b3a/0x5450 [ 22.065786] kasan_report+0x141/0x180 [ 22.065888] ? kasan_atomics_helper+0x4b3a/0x5450 [ 22.065987] __asan_report_store4_noabort+0x1b/0x30 [ 22.066047] kasan_atomics_helper+0x4b3a/0x5450 [ 22.066085] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.066118] ? kasan_save_alloc_info+0x3b/0x50 [ 22.066161] kasan_atomics+0x1dc/0x310 [ 22.066195] ? __pfx_kasan_atomics+0x10/0x10 [ 22.066231] ? __pfx_read_tsc+0x10/0x10 [ 22.066263] ? ktime_get_ts64+0x86/0x230 [ 22.066300] kunit_try_run_case+0x1a5/0x480 [ 22.066336] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.066369] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.066399] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.066438] ? __kthread_parkme+0x82/0x180 [ 22.066469] ? preempt_count_sub+0x50/0x80 [ 22.066543] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.066617] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.066657] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.066693] kthread+0x337/0x6f0 [ 22.066723] ? trace_preempt_on+0x20/0xc0 [ 22.066760] ? __pfx_kthread+0x10/0x10 [ 22.066791] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.066825] ? calculate_sigpending+0x7b/0xa0 [ 22.066889] ? __pfx_kthread+0x10/0x10 [ 22.066921] ret_from_fork+0x116/0x1d0 [ 22.066950] ? __pfx_kthread+0x10/0x10 [ 22.066983] ret_from_fork_asm+0x1a/0x30 [ 22.067027] </TASK> [ 22.067043] [ 22.085734] Allocated by task 292: [ 22.086131] kasan_save_stack+0x45/0x70 [ 22.086440] kasan_save_track+0x18/0x40 [ 22.087151] kasan_save_alloc_info+0x3b/0x50 [ 22.087855] __kasan_kmalloc+0xb7/0xc0 [ 22.088203] __kmalloc_cache_noprof+0x189/0x420 [ 22.088901] kasan_atomics+0x95/0x310 [ 22.089860] kunit_try_run_case+0x1a5/0x480 [ 22.090342] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.090882] kthread+0x337/0x6f0 [ 22.091287] ret_from_fork+0x116/0x1d0 [ 22.091664] ret_from_fork_asm+0x1a/0x30 [ 22.092049] [ 22.092294] The buggy address belongs to the object at ffff88810383ae00 [ 22.092294] which belongs to the cache kmalloc-64 of size 64 [ 22.093155] The buggy address is located 0 bytes to the right of [ 22.093155] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 22.094322] [ 22.094616] The buggy address belongs to the physical page: [ 22.095151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 22.095955] flags: 0x200000000000000(node=0|zone=2) [ 22.096713] page_type: f5(slab) [ 22.097012] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.097574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.098108] page dumped because: kasan: bad access detected [ 22.098509] [ 22.098660] Memory state around the buggy address: [ 22.100146] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.101386] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.102095] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.102667] ^ [ 22.103075] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.104090] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.104876] ================================================================== [ 21.966900] ================================================================== [ 21.967688] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 21.968781] Read of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 21.969531] [ 21.969790] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 21.970152] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.970339] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.970410] Call Trace: [ 21.970462] <TASK> [ 21.970514] dump_stack_lvl+0x73/0xb0 [ 21.970599] print_report+0xd1/0x650 [ 21.970673] ? __virt_addr_valid+0x1db/0x2d0 [ 21.970749] ? kasan_atomics_helper+0x4b54/0x5450 [ 21.970912] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.971041] ? kasan_atomics_helper+0x4b54/0x5450 [ 21.971174] kasan_report+0x141/0x180 [ 21.971492] ? kasan_atomics_helper+0x4b54/0x5450 [ 21.971547] __asan_report_load4_noabort+0x18/0x20 [ 21.971589] kasan_atomics_helper+0x4b54/0x5450 [ 21.971623] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.971659] ? kasan_save_alloc_info+0x3b/0x50 [ 21.971702] kasan_atomics+0x1dc/0x310 [ 21.971736] ? __pfx_kasan_atomics+0x10/0x10 [ 21.971773] ? __pfx_read_tsc+0x10/0x10 [ 21.971804] ? ktime_get_ts64+0x86/0x230 [ 21.971865] kunit_try_run_case+0x1a5/0x480 [ 21.971906] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.971940] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.971969] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.972008] ? __kthread_parkme+0x82/0x180 [ 21.972039] ? preempt_count_sub+0x50/0x80 [ 21.972074] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.972111] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.972145] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.972180] kthread+0x337/0x6f0 [ 21.972210] ? trace_preempt_on+0x20/0xc0 [ 21.972304] ? __pfx_kthread+0x10/0x10 [ 21.972383] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.972470] ? calculate_sigpending+0x7b/0xa0 [ 21.972543] ? __pfx_kthread+0x10/0x10 [ 21.972579] ret_from_fork+0x116/0x1d0 [ 21.972608] ? __pfx_kthread+0x10/0x10 [ 21.972641] ret_from_fork_asm+0x1a/0x30 [ 21.972689] </TASK> [ 21.972704] [ 21.991734] Allocated by task 292: [ 21.992547] kasan_save_stack+0x45/0x70 [ 21.992873] kasan_save_track+0x18/0x40 [ 21.993159] kasan_save_alloc_info+0x3b/0x50 [ 21.994009] __kasan_kmalloc+0xb7/0xc0 [ 21.994404] __kmalloc_cache_noprof+0x189/0x420 [ 21.995245] kasan_atomics+0x95/0x310 [ 21.995662] kunit_try_run_case+0x1a5/0x480 [ 21.996040] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.996814] kthread+0x337/0x6f0 [ 21.997809] ret_from_fork+0x116/0x1d0 [ 21.998306] ret_from_fork_asm+0x1a/0x30 [ 21.998639] [ 21.998855] The buggy address belongs to the object at ffff88810383ae00 [ 21.998855] which belongs to the cache kmalloc-64 of size 64 [ 21.999962] The buggy address is located 0 bytes to the right of [ 21.999962] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 22.001586] [ 22.001820] The buggy address belongs to the physical page: [ 22.002283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 22.003134] flags: 0x200000000000000(node=0|zone=2) [ 22.003900] page_type: f5(slab) [ 22.004264] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.005167] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.005614] page dumped because: kasan: bad access detected [ 22.006594] [ 22.006845] Memory state around the buggy address: [ 22.007628] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.008449] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.008868] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.010721] ^ [ 22.011019] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.012769] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.013627] ================================================================== [ 22.918223] ================================================================== [ 22.918793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 22.920003] Read of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 22.920597] [ 22.920866] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 22.920995] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.921034] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.921097] Call Trace: [ 22.921149] <TASK> [ 22.921198] dump_stack_lvl+0x73/0xb0 [ 22.921325] print_report+0xd1/0x650 [ 22.921405] ? __virt_addr_valid+0x1db/0x2d0 [ 22.921480] ? kasan_atomics_helper+0x4a36/0x5450 [ 22.921555] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.921629] ? kasan_atomics_helper+0x4a36/0x5450 [ 22.921703] kasan_report+0x141/0x180 [ 22.921778] ? kasan_atomics_helper+0x4a36/0x5450 [ 22.921881] __asan_report_load4_noabort+0x18/0x20 [ 22.921971] kasan_atomics_helper+0x4a36/0x5450 [ 22.922049] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.922125] ? kasan_save_alloc_info+0x3b/0x50 [ 22.922256] kasan_atomics+0x1dc/0x310 [ 22.922338] ? __pfx_kasan_atomics+0x10/0x10 [ 22.922416] ? __pfx_read_tsc+0x10/0x10 [ 22.922454] ? ktime_get_ts64+0x86/0x230 [ 22.922492] kunit_try_run_case+0x1a5/0x480 [ 22.922530] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.922565] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.922595] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.922633] ? __kthread_parkme+0x82/0x180 [ 22.922662] ? preempt_count_sub+0x50/0x80 [ 22.922698] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.922733] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.922767] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.922802] kthread+0x337/0x6f0 [ 22.922853] ? trace_preempt_on+0x20/0xc0 [ 22.922898] ? __pfx_kthread+0x10/0x10 [ 22.922929] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.922964] ? calculate_sigpending+0x7b/0xa0 [ 22.923000] ? __pfx_kthread+0x10/0x10 [ 22.923030] ret_from_fork+0x116/0x1d0 [ 22.923057] ? __pfx_kthread+0x10/0x10 [ 22.923087] ret_from_fork_asm+0x1a/0x30 [ 22.923128] </TASK> [ 22.923143] [ 22.935928] Allocated by task 292: [ 22.936330] kasan_save_stack+0x45/0x70 [ 22.936727] kasan_save_track+0x18/0x40 [ 22.937150] kasan_save_alloc_info+0x3b/0x50 [ 22.937608] __kasan_kmalloc+0xb7/0xc0 [ 22.937974] __kmalloc_cache_noprof+0x189/0x420 [ 22.938429] kasan_atomics+0x95/0x310 [ 22.938804] kunit_try_run_case+0x1a5/0x480 [ 22.939137] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.939649] kthread+0x337/0x6f0 [ 22.940041] ret_from_fork+0x116/0x1d0 [ 22.940449] ret_from_fork_asm+0x1a/0x30 [ 22.940856] [ 22.941070] The buggy address belongs to the object at ffff88810383ae00 [ 22.941070] which belongs to the cache kmalloc-64 of size 64 [ 22.941859] The buggy address is located 0 bytes to the right of [ 22.941859] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 22.942593] [ 22.942762] The buggy address belongs to the physical page: [ 22.943326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 22.944062] flags: 0x200000000000000(node=0|zone=2) [ 22.944526] page_type: f5(slab) [ 22.944894] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.945567] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.946111] page dumped because: kasan: bad access detected [ 22.946499] [ 22.946658] Memory state around the buggy address: [ 22.947059] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.947678] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.948282] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.951092] ^ [ 22.952610] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.953163] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.954168] ================================================================== [ 23.897703] ================================================================== [ 23.898151] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 23.899701] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 23.900805] [ 23.901079] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 23.901339] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.901384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.901448] Call Trace: [ 23.901498] <TASK> [ 23.901549] dump_stack_lvl+0x73/0xb0 [ 23.901601] print_report+0xd1/0x650 [ 23.901639] ? __virt_addr_valid+0x1db/0x2d0 [ 23.901674] ? kasan_atomics_helper+0x1c18/0x5450 [ 23.901705] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.901737] ? kasan_atomics_helper+0x1c18/0x5450 [ 23.901768] kasan_report+0x141/0x180 [ 23.901801] ? kasan_atomics_helper+0x1c18/0x5450 [ 23.901864] kasan_check_range+0x10c/0x1c0 [ 23.901904] __kasan_check_write+0x18/0x20 [ 23.901934] kasan_atomics_helper+0x1c18/0x5450 [ 23.901968] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.902000] ? kasan_save_alloc_info+0x3b/0x50 [ 23.902041] kasan_atomics+0x1dc/0x310 [ 23.902074] ? __pfx_kasan_atomics+0x10/0x10 [ 23.902109] ? __pfx_read_tsc+0x10/0x10 [ 23.902140] ? ktime_get_ts64+0x86/0x230 [ 23.902174] kunit_try_run_case+0x1a5/0x480 [ 23.902223] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.902283] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.902317] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.902356] ? __kthread_parkme+0x82/0x180 [ 23.902384] ? preempt_count_sub+0x50/0x80 [ 23.902419] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.902454] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.902487] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.902522] kthread+0x337/0x6f0 [ 23.902550] ? trace_preempt_on+0x20/0xc0 [ 23.902586] ? __pfx_kthread+0x10/0x10 [ 23.902616] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.902651] ? calculate_sigpending+0x7b/0xa0 [ 23.902688] ? __pfx_kthread+0x10/0x10 [ 23.902724] ret_from_fork+0x116/0x1d0 [ 23.902752] ? __pfx_kthread+0x10/0x10 [ 23.902784] ret_from_fork_asm+0x1a/0x30 [ 23.902825] </TASK> [ 23.902868] [ 23.919400] Allocated by task 292: [ 23.919774] kasan_save_stack+0x45/0x70 [ 23.920264] kasan_save_track+0x18/0x40 [ 23.920698] kasan_save_alloc_info+0x3b/0x50 [ 23.921177] __kasan_kmalloc+0xb7/0xc0 [ 23.921629] __kmalloc_cache_noprof+0x189/0x420 [ 23.922125] kasan_atomics+0x95/0x310 [ 23.922571] kunit_try_run_case+0x1a5/0x480 [ 23.923003] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.923565] kthread+0x337/0x6f0 [ 23.923952] ret_from_fork+0x116/0x1d0 [ 23.924435] ret_from_fork_asm+0x1a/0x30 [ 23.924877] [ 23.925081] The buggy address belongs to the object at ffff88810383ae00 [ 23.925081] which belongs to the cache kmalloc-64 of size 64 [ 23.926041] The buggy address is located 0 bytes to the right of [ 23.926041] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 23.927059] [ 23.927376] The buggy address belongs to the physical page: [ 23.927913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 23.928598] flags: 0x200000000000000(node=0|zone=2) [ 23.929082] page_type: f5(slab) [ 23.929520] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.930055] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.930867] page dumped because: kasan: bad access detected [ 23.931412] [ 23.931614] Memory state around the buggy address: [ 23.932026] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.932699] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.933445] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.933982] ^ [ 23.934538] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.935180] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.935865] ================================================================== [ 22.199119] ================================================================== [ 22.199602] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 22.200920] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 22.201630] [ 22.202042] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 22.202200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.202242] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.202306] Call Trace: [ 22.202357] <TASK> [ 22.202407] dump_stack_lvl+0x73/0xb0 [ 22.202488] print_report+0xd1/0x650 [ 22.202563] ? __virt_addr_valid+0x1db/0x2d0 [ 22.202640] ? kasan_atomics_helper+0x697/0x5450 [ 22.202719] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.202796] ? kasan_atomics_helper+0x697/0x5450 [ 22.202912] kasan_report+0x141/0x180 [ 22.203021] ? kasan_atomics_helper+0x697/0x5450 [ 22.203082] kasan_check_range+0x10c/0x1c0 [ 22.203123] __kasan_check_write+0x18/0x20 [ 22.203153] kasan_atomics_helper+0x697/0x5450 [ 22.203199] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.203276] ? kasan_save_alloc_info+0x3b/0x50 [ 22.203376] kasan_atomics+0x1dc/0x310 [ 22.203466] ? __pfx_kasan_atomics+0x10/0x10 [ 22.203562] ? __pfx_read_tsc+0x10/0x10 [ 22.203598] ? ktime_get_ts64+0x86/0x230 [ 22.203638] kunit_try_run_case+0x1a5/0x480 [ 22.203674] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.203709] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.203740] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.203780] ? __kthread_parkme+0x82/0x180 [ 22.203809] ? preempt_count_sub+0x50/0x80 [ 22.203870] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.203913] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.203950] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.203984] kthread+0x337/0x6f0 [ 22.204014] ? trace_preempt_on+0x20/0xc0 [ 22.204050] ? __pfx_kthread+0x10/0x10 [ 22.204082] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.204117] ? calculate_sigpending+0x7b/0xa0 [ 22.204154] ? __pfx_kthread+0x10/0x10 [ 22.204186] ret_from_fork+0x116/0x1d0 [ 22.204218] ? __pfx_kthread+0x10/0x10 [ 22.204291] ret_from_fork_asm+0x1a/0x30 [ 22.204369] </TASK> [ 22.204387] [ 22.224376] Allocated by task 292: [ 22.224800] kasan_save_stack+0x45/0x70 [ 22.225176] kasan_save_track+0x18/0x40 [ 22.225689] kasan_save_alloc_info+0x3b/0x50 [ 22.226686] __kasan_kmalloc+0xb7/0xc0 [ 22.227110] __kmalloc_cache_noprof+0x189/0x420 [ 22.227709] kasan_atomics+0x95/0x310 [ 22.228211] kunit_try_run_case+0x1a5/0x480 [ 22.228856] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.229661] kthread+0x337/0x6f0 [ 22.230044] ret_from_fork+0x116/0x1d0 [ 22.230367] ret_from_fork_asm+0x1a/0x30 [ 22.230736] [ 22.231458] The buggy address belongs to the object at ffff88810383ae00 [ 22.231458] which belongs to the cache kmalloc-64 of size 64 [ 22.233743] The buggy address is located 0 bytes to the right of [ 22.233743] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 22.234542] [ 22.234706] The buggy address belongs to the physical page: [ 22.235143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 22.235704] flags: 0x200000000000000(node=0|zone=2) [ 22.236821] page_type: f5(slab) [ 22.237656] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.238394] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.238958] page dumped because: kasan: bad access detected [ 22.239432] [ 22.239700] Memory state around the buggy address: [ 22.240427] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.241209] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.241917] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.242560] ^ [ 22.243253] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.244548] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.245461] ================================================================== [ 23.736048] ================================================================== [ 23.736700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 23.737288] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 23.737898] [ 23.738172] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 23.738373] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.738420] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.738482] Call Trace: [ 23.738529] <TASK> [ 23.738576] dump_stack_lvl+0x73/0xb0 [ 23.738657] print_report+0xd1/0x650 [ 23.738733] ? __virt_addr_valid+0x1db/0x2d0 [ 23.738867] ? kasan_atomics_helper+0x194a/0x5450 [ 23.738947] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.739026] ? kasan_atomics_helper+0x194a/0x5450 [ 23.739102] kasan_report+0x141/0x180 [ 23.739253] ? kasan_atomics_helper+0x194a/0x5450 [ 23.739345] kasan_check_range+0x10c/0x1c0 [ 23.739410] __kasan_check_write+0x18/0x20 [ 23.739478] kasan_atomics_helper+0x194a/0x5450 [ 23.739608] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.739691] ? kasan_save_alloc_info+0x3b/0x50 [ 23.739785] kasan_atomics+0x1dc/0x310 [ 23.739884] ? __pfx_kasan_atomics+0x10/0x10 [ 23.739967] ? __pfx_read_tsc+0x10/0x10 [ 23.740039] ? ktime_get_ts64+0x86/0x230 [ 23.740120] kunit_try_run_case+0x1a5/0x480 [ 23.740203] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.740348] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.740424] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.740506] ? __kthread_parkme+0x82/0x180 [ 23.740577] ? preempt_count_sub+0x50/0x80 [ 23.740656] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.740731] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.740809] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.740908] kthread+0x337/0x6f0 [ 23.740976] ? trace_preempt_on+0x20/0xc0 [ 23.741023] ? __pfx_kthread+0x10/0x10 [ 23.741057] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.741094] ? calculate_sigpending+0x7b/0xa0 [ 23.741131] ? __pfx_kthread+0x10/0x10 [ 23.741162] ret_from_fork+0x116/0x1d0 [ 23.741188] ? __pfx_kthread+0x10/0x10 [ 23.741245] ret_from_fork_asm+0x1a/0x30 [ 23.741303] </TASK> [ 23.741321] [ 23.757510] Allocated by task 292: [ 23.757869] kasan_save_stack+0x45/0x70 [ 23.758335] kasan_save_track+0x18/0x40 [ 23.758724] kasan_save_alloc_info+0x3b/0x50 [ 23.759151] __kasan_kmalloc+0xb7/0xc0 [ 23.759590] __kmalloc_cache_noprof+0x189/0x420 [ 23.760053] kasan_atomics+0x95/0x310 [ 23.760504] kunit_try_run_case+0x1a5/0x480 [ 23.760966] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.761408] kthread+0x337/0x6f0 [ 23.761754] ret_from_fork+0x116/0x1d0 [ 23.762161] ret_from_fork_asm+0x1a/0x30 [ 23.762652] [ 23.762820] The buggy address belongs to the object at ffff88810383ae00 [ 23.762820] which belongs to the cache kmalloc-64 of size 64 [ 23.763800] The buggy address is located 0 bytes to the right of [ 23.763800] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 23.764786] [ 23.765017] The buggy address belongs to the physical page: [ 23.765550] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 23.766167] flags: 0x200000000000000(node=0|zone=2) [ 23.766688] page_type: f5(slab) [ 23.767045] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.767733] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.768412] page dumped because: kasan: bad access detected [ 23.768876] [ 23.769068] Memory state around the buggy address: [ 23.769434] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.769931] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.770645] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.771303] ^ [ 23.771732] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.772397] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.772808] ================================================================== [ 24.182928] ================================================================== [ 24.183527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 24.184116] Read of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 24.184655] [ 24.184878] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 24.185007] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.185048] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.185112] Call Trace: [ 24.185159] <TASK> [ 24.185205] dump_stack_lvl+0x73/0xb0 [ 24.185332] print_report+0xd1/0x650 [ 24.185408] ? __virt_addr_valid+0x1db/0x2d0 [ 24.185478] ? kasan_atomics_helper+0x4f71/0x5450 [ 24.185553] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.185628] ? kasan_atomics_helper+0x4f71/0x5450 [ 24.185710] kasan_report+0x141/0x180 [ 24.185788] ? kasan_atomics_helper+0x4f71/0x5450 [ 24.185894] __asan_report_load8_noabort+0x18/0x20 [ 24.185980] kasan_atomics_helper+0x4f71/0x5450 [ 24.186058] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.186133] ? kasan_save_alloc_info+0x3b/0x50 [ 24.186268] kasan_atomics+0x1dc/0x310 [ 24.186354] ? __pfx_kasan_atomics+0x10/0x10 [ 24.186435] ? __pfx_read_tsc+0x10/0x10 [ 24.186507] ? ktime_get_ts64+0x86/0x230 [ 24.186588] kunit_try_run_case+0x1a5/0x480 [ 24.186671] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.186745] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.186816] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.187008] ? __kthread_parkme+0x82/0x180 [ 24.187089] ? preempt_count_sub+0x50/0x80 [ 24.187173] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.187330] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.187415] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.187495] kthread+0x337/0x6f0 [ 24.187570] ? trace_preempt_on+0x20/0xc0 [ 24.187649] ? __pfx_kthread+0x10/0x10 [ 24.187718] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.187794] ? calculate_sigpending+0x7b/0xa0 [ 24.187894] ? __pfx_kthread+0x10/0x10 [ 24.187970] ret_from_fork+0x116/0x1d0 [ 24.188032] ? __pfx_kthread+0x10/0x10 [ 24.188104] ret_from_fork_asm+0x1a/0x30 [ 24.188197] </TASK> [ 24.188281] [ 24.202082] Allocated by task 292: [ 24.202543] kasan_save_stack+0x45/0x70 [ 24.203007] kasan_save_track+0x18/0x40 [ 24.203402] kasan_save_alloc_info+0x3b/0x50 [ 24.203893] __kasan_kmalloc+0xb7/0xc0 [ 24.204345] __kmalloc_cache_noprof+0x189/0x420 [ 24.204815] kasan_atomics+0x95/0x310 [ 24.205292] kunit_try_run_case+0x1a5/0x480 [ 24.205721] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.206347] kthread+0x337/0x6f0 [ 24.206721] ret_from_fork+0x116/0x1d0 [ 24.207144] ret_from_fork_asm+0x1a/0x30 [ 24.207606] [ 24.207809] The buggy address belongs to the object at ffff88810383ae00 [ 24.207809] which belongs to the cache kmalloc-64 of size 64 [ 24.208916] The buggy address is located 0 bytes to the right of [ 24.208916] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 24.209880] [ 24.210103] The buggy address belongs to the physical page: [ 24.210656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 24.211387] flags: 0x200000000000000(node=0|zone=2) [ 24.211794] page_type: f5(slab) [ 24.212196] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.212902] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.213539] page dumped because: kasan: bad access detected [ 24.213902] [ 24.214062] Memory state around the buggy address: [ 24.214507] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.215141] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.215892] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.216533] ^ [ 24.217016] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.217511] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.218132] ================================================================== [ 24.462753] ================================================================== [ 24.463756] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 24.465487] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 24.467114] [ 24.467382] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 24.467512] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.467563] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.467628] Call Trace: [ 24.467683] <TASK> [ 24.467732] dump_stack_lvl+0x73/0xb0 [ 24.467820] print_report+0xd1/0x650 [ 24.467924] ? __virt_addr_valid+0x1db/0x2d0 [ 24.468006] ? kasan_atomics_helper+0x224c/0x5450 [ 24.468079] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.468157] ? kasan_atomics_helper+0x224c/0x5450 [ 24.468234] kasan_report+0x141/0x180 [ 24.468314] ? kasan_atomics_helper+0x224c/0x5450 [ 24.468402] kasan_check_range+0x10c/0x1c0 [ 24.468485] __kasan_check_write+0x18/0x20 [ 24.468553] kasan_atomics_helper+0x224c/0x5450 [ 24.468629] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.468699] ? kasan_save_alloc_info+0x3b/0x50 [ 24.468787] kasan_atomics+0x1dc/0x310 [ 24.468917] ? __pfx_kasan_atomics+0x10/0x10 [ 24.468998] ? __pfx_read_tsc+0x10/0x10 [ 24.469070] ? ktime_get_ts64+0x86/0x230 [ 24.469150] kunit_try_run_case+0x1a5/0x480 [ 24.469203] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.469279] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.469315] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.469355] ? __kthread_parkme+0x82/0x180 [ 24.469387] ? preempt_count_sub+0x50/0x80 [ 24.469422] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.469458] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.469494] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.469528] kthread+0x337/0x6f0 [ 24.469558] ? trace_preempt_on+0x20/0xc0 [ 24.469593] ? __pfx_kthread+0x10/0x10 [ 24.469624] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.469661] ? calculate_sigpending+0x7b/0xa0 [ 24.469697] ? __pfx_kthread+0x10/0x10 [ 24.469729] ret_from_fork+0x116/0x1d0 [ 24.469756] ? __pfx_kthread+0x10/0x10 [ 24.469788] ret_from_fork_asm+0x1a/0x30 [ 24.469854] </TASK> [ 24.469875] [ 24.486727] Allocated by task 292: [ 24.487185] kasan_save_stack+0x45/0x70 [ 24.487593] kasan_save_track+0x18/0x40 [ 24.487934] kasan_save_alloc_info+0x3b/0x50 [ 24.488372] __kasan_kmalloc+0xb7/0xc0 [ 24.488751] __kmalloc_cache_noprof+0x189/0x420 [ 24.489159] kasan_atomics+0x95/0x310 [ 24.489512] kunit_try_run_case+0x1a5/0x480 [ 24.489989] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.490610] kthread+0x337/0x6f0 [ 24.490891] ret_from_fork+0x116/0x1d0 [ 24.491174] ret_from_fork_asm+0x1a/0x30 [ 24.491553] [ 24.491760] The buggy address belongs to the object at ffff88810383ae00 [ 24.491760] which belongs to the cache kmalloc-64 of size 64 [ 24.492767] The buggy address is located 0 bytes to the right of [ 24.492767] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 24.493872] [ 24.494040] The buggy address belongs to the physical page: [ 24.494427] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 24.495010] flags: 0x200000000000000(node=0|zone=2) [ 24.495598] page_type: f5(slab) [ 24.495970] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.496651] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.497424] page dumped because: kasan: bad access detected [ 24.497937] [ 24.498261] Memory state around the buggy address: [ 24.498692] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.499402] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.499849] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.500621] ^ [ 24.501140] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.501793] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.502860] ================================================================== [ 21.788784] ================================================================== [ 21.789477] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 21.790750] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 21.791983] [ 21.792207] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 21.792336] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.792372] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.792431] Call Trace: [ 21.792471] <TASK> [ 21.792516] dump_stack_lvl+0x73/0xb0 [ 21.792601] print_report+0xd1/0x650 [ 21.792677] ? __virt_addr_valid+0x1db/0x2d0 [ 21.792754] ? kasan_atomics_helper+0x4ba2/0x5450 [ 21.792826] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.792919] ? kasan_atomics_helper+0x4ba2/0x5450 [ 21.792976] kasan_report+0x141/0x180 [ 21.793013] ? kasan_atomics_helper+0x4ba2/0x5450 [ 21.793049] __asan_report_store4_noabort+0x1b/0x30 [ 21.793085] kasan_atomics_helper+0x4ba2/0x5450 [ 21.793115] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.793144] ? kasan_save_alloc_info+0x3b/0x50 [ 21.793183] kasan_atomics+0x1dc/0x310 [ 21.793223] ? __pfx_kasan_atomics+0x10/0x10 [ 21.793298] ? __pfx_read_tsc+0x10/0x10 [ 21.793358] ? ktime_get_ts64+0x86/0x230 [ 21.793397] kunit_try_run_case+0x1a5/0x480 [ 21.793433] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.793465] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.793494] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.793531] ? __kthread_parkme+0x82/0x180 [ 21.793557] ? preempt_count_sub+0x50/0x80 [ 21.793589] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.793622] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.793654] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.793687] kthread+0x337/0x6f0 [ 21.793713] ? trace_preempt_on+0x20/0xc0 [ 21.793747] ? __pfx_kthread+0x10/0x10 [ 21.793775] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.793808] ? calculate_sigpending+0x7b/0xa0 [ 21.793867] ? __pfx_kthread+0x10/0x10 [ 21.793902] ret_from_fork+0x116/0x1d0 [ 21.793929] ? __pfx_kthread+0x10/0x10 [ 21.793957] ret_from_fork_asm+0x1a/0x30 [ 21.793997] </TASK> [ 21.794012] [ 21.808077] Allocated by task 292: [ 21.808668] kasan_save_stack+0x45/0x70 [ 21.808986] kasan_save_track+0x18/0x40 [ 21.809272] kasan_save_alloc_info+0x3b/0x50 [ 21.809579] __kasan_kmalloc+0xb7/0xc0 [ 21.809886] __kmalloc_cache_noprof+0x189/0x420 [ 21.810632] kasan_atomics+0x95/0x310 [ 21.811068] kunit_try_run_case+0x1a5/0x480 [ 21.811644] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.812219] kthread+0x337/0x6f0 [ 21.814574] ret_from_fork+0x116/0x1d0 [ 21.814987] ret_from_fork_asm+0x1a/0x30 [ 21.815439] [ 21.815614] The buggy address belongs to the object at ffff88810383ae00 [ 21.815614] which belongs to the cache kmalloc-64 of size 64 [ 21.817354] The buggy address is located 0 bytes to the right of [ 21.817354] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 21.818967] [ 21.819597] The buggy address belongs to the physical page: [ 21.819936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 21.821065] flags: 0x200000000000000(node=0|zone=2) [ 21.821569] page_type: f5(slab) [ 21.821918] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.822710] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.823361] page dumped because: kasan: bad access detected [ 21.823777] [ 21.824017] Memory state around the buggy address: [ 21.824780] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.825368] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.825998] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.826786] ^ [ 21.827209] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.827910] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.828331] ================================================================== [ 22.297818] ================================================================== [ 22.298362] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 22.298996] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 22.300345] [ 22.300970] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 22.301103] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.301147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.301211] Call Trace: [ 22.301278] <TASK> [ 22.301326] dump_stack_lvl+0x73/0xb0 [ 22.301413] print_report+0xd1/0x650 [ 22.301496] ? __virt_addr_valid+0x1db/0x2d0 [ 22.301581] ? kasan_atomics_helper+0x7c7/0x5450 [ 22.301655] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.301731] ? kasan_atomics_helper+0x7c7/0x5450 [ 22.301807] kasan_report+0x141/0x180 [ 22.301911] ? kasan_atomics_helper+0x7c7/0x5450 [ 22.302002] kasan_check_range+0x10c/0x1c0 [ 22.302085] __kasan_check_write+0x18/0x20 [ 22.302156] kasan_atomics_helper+0x7c7/0x5450 [ 22.302234] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.302314] ? kasan_save_alloc_info+0x3b/0x50 [ 22.302372] kasan_atomics+0x1dc/0x310 [ 22.302410] ? __pfx_kasan_atomics+0x10/0x10 [ 22.302448] ? __pfx_read_tsc+0x10/0x10 [ 22.302483] ? ktime_get_ts64+0x86/0x230 [ 22.302521] kunit_try_run_case+0x1a5/0x480 [ 22.302559] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.302593] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.302624] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.302663] ? __kthread_parkme+0x82/0x180 [ 22.302694] ? preempt_count_sub+0x50/0x80 [ 22.302728] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.302765] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.302801] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.302861] kthread+0x337/0x6f0 [ 22.302895] ? trace_preempt_on+0x20/0xc0 [ 22.302932] ? __pfx_kthread+0x10/0x10 [ 22.302962] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.302998] ? calculate_sigpending+0x7b/0xa0 [ 22.303035] ? __pfx_kthread+0x10/0x10 [ 22.303066] ret_from_fork+0x116/0x1d0 [ 22.303093] ? __pfx_kthread+0x10/0x10 [ 22.303123] ret_from_fork_asm+0x1a/0x30 [ 22.303168] </TASK> [ 22.303184] [ 22.320804] Allocated by task 292: [ 22.321153] kasan_save_stack+0x45/0x70 [ 22.321481] kasan_save_track+0x18/0x40 [ 22.322442] kasan_save_alloc_info+0x3b/0x50 [ 22.322943] __kasan_kmalloc+0xb7/0xc0 [ 22.323622] __kmalloc_cache_noprof+0x189/0x420 [ 22.324164] kasan_atomics+0x95/0x310 [ 22.324587] kunit_try_run_case+0x1a5/0x480 [ 22.324937] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.325850] kthread+0x337/0x6f0 [ 22.326186] ret_from_fork+0x116/0x1d0 [ 22.326780] ret_from_fork_asm+0x1a/0x30 [ 22.327428] [ 22.327728] The buggy address belongs to the object at ffff88810383ae00 [ 22.327728] which belongs to the cache kmalloc-64 of size 64 [ 22.328757] The buggy address is located 0 bytes to the right of [ 22.328757] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 22.330286] [ 22.330505] The buggy address belongs to the physical page: [ 22.330993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 22.331589] flags: 0x200000000000000(node=0|zone=2) [ 22.332017] page_type: f5(slab) [ 22.332361] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.333184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.333958] page dumped because: kasan: bad access detected [ 22.334699] [ 22.334920] Memory state around the buggy address: [ 22.335770] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.336534] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.337153] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.338164] ^ [ 22.338599] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.339635] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.340354] ================================================================== [ 22.478151] ================================================================== [ 22.478852] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 22.479668] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 22.480231] [ 22.480785] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 22.480924] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.480969] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.481027] Call Trace: [ 22.481119] <TASK> [ 22.481197] dump_stack_lvl+0x73/0xb0 [ 22.481284] print_report+0xd1/0x650 [ 22.481363] ? __virt_addr_valid+0x1db/0x2d0 [ 22.481439] ? kasan_atomics_helper+0xa2b/0x5450 [ 22.481508] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.481583] ? kasan_atomics_helper+0xa2b/0x5450 [ 22.481656] kasan_report+0x141/0x180 [ 22.481729] ? kasan_atomics_helper+0xa2b/0x5450 [ 22.481815] kasan_check_range+0x10c/0x1c0 [ 22.482053] __kasan_check_write+0x18/0x20 [ 22.482126] kasan_atomics_helper+0xa2b/0x5450 [ 22.482240] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.482415] ? kasan_save_alloc_info+0x3b/0x50 [ 22.482508] kasan_atomics+0x1dc/0x310 [ 22.482558] ? __pfx_kasan_atomics+0x10/0x10 [ 22.482598] ? __pfx_read_tsc+0x10/0x10 [ 22.482630] ? ktime_get_ts64+0x86/0x230 [ 22.482669] kunit_try_run_case+0x1a5/0x480 [ 22.482704] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.482737] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.482766] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.482804] ? __kthread_parkme+0x82/0x180 [ 22.482858] ? preempt_count_sub+0x50/0x80 [ 22.482898] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.482934] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.482968] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.483003] kthread+0x337/0x6f0 [ 22.483031] ? trace_preempt_on+0x20/0xc0 [ 22.483067] ? __pfx_kthread+0x10/0x10 [ 22.483096] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.483131] ? calculate_sigpending+0x7b/0xa0 [ 22.483167] ? __pfx_kthread+0x10/0x10 [ 22.483197] ret_from_fork+0x116/0x1d0 [ 22.483239] ? __pfx_kthread+0x10/0x10 [ 22.483347] ret_from_fork_asm+0x1a/0x30 [ 22.483399] </TASK> [ 22.483418] [ 22.500818] Allocated by task 292: [ 22.501145] kasan_save_stack+0x45/0x70 [ 22.501935] kasan_save_track+0x18/0x40 [ 22.502236] kasan_save_alloc_info+0x3b/0x50 [ 22.502556] __kasan_kmalloc+0xb7/0xc0 [ 22.502902] __kmalloc_cache_noprof+0x189/0x420 [ 22.503616] kasan_atomics+0x95/0x310 [ 22.504048] kunit_try_run_case+0x1a5/0x480 [ 22.504630] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.505198] kthread+0x337/0x6f0 [ 22.505584] ret_from_fork+0x116/0x1d0 [ 22.506190] ret_from_fork_asm+0x1a/0x30 [ 22.506773] [ 22.507005] The buggy address belongs to the object at ffff88810383ae00 [ 22.507005] which belongs to the cache kmalloc-64 of size 64 [ 22.508018] The buggy address is located 0 bytes to the right of [ 22.508018] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 22.509294] [ 22.509461] The buggy address belongs to the physical page: [ 22.509793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 22.510357] flags: 0x200000000000000(node=0|zone=2) [ 22.511383] page_type: f5(slab) [ 22.511788] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.512610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.513268] page dumped because: kasan: bad access detected [ 22.513781] [ 22.514256] Memory state around the buggy address: [ 22.514739] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.516075] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.516751] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.517531] ^ [ 22.517969] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.518670] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.519162] ================================================================== [ 22.571824] ================================================================== [ 22.572948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 22.573825] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 22.574584] [ 22.575330] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 22.575469] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.575512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.575586] Call Trace: [ 22.575662] <TASK> [ 22.575739] dump_stack_lvl+0x73/0xb0 [ 22.575846] print_report+0xd1/0x650 [ 22.575903] ? __virt_addr_valid+0x1db/0x2d0 [ 22.575939] ? kasan_atomics_helper+0xb6a/0x5450 [ 22.575969] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.576001] ? kasan_atomics_helper+0xb6a/0x5450 [ 22.576030] kasan_report+0x141/0x180 [ 22.576064] ? kasan_atomics_helper+0xb6a/0x5450 [ 22.576101] kasan_check_range+0x10c/0x1c0 [ 22.576135] __kasan_check_write+0x18/0x20 [ 22.576162] kasan_atomics_helper+0xb6a/0x5450 [ 22.576193] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.576282] ? kasan_save_alloc_info+0x3b/0x50 [ 22.576385] kasan_atomics+0x1dc/0x310 [ 22.576427] ? __pfx_kasan_atomics+0x10/0x10 [ 22.576465] ? __pfx_read_tsc+0x10/0x10 [ 22.576496] ? ktime_get_ts64+0x86/0x230 [ 22.576533] kunit_try_run_case+0x1a5/0x480 [ 22.576570] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.576604] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.576632] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.576670] ? __kthread_parkme+0x82/0x180 [ 22.576697] ? preempt_count_sub+0x50/0x80 [ 22.576731] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.576766] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.576800] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.576859] kthread+0x337/0x6f0 [ 22.576892] ? trace_preempt_on+0x20/0xc0 [ 22.576928] ? __pfx_kthread+0x10/0x10 [ 22.576957] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.576992] ? calculate_sigpending+0x7b/0xa0 [ 22.577028] ? __pfx_kthread+0x10/0x10 [ 22.577058] ret_from_fork+0x116/0x1d0 [ 22.577084] ? __pfx_kthread+0x10/0x10 [ 22.577112] ret_from_fork_asm+0x1a/0x30 [ 22.577154] </TASK> [ 22.577169] [ 22.596953] Allocated by task 292: [ 22.597533] kasan_save_stack+0x45/0x70 [ 22.598010] kasan_save_track+0x18/0x40 [ 22.598470] kasan_save_alloc_info+0x3b/0x50 [ 22.598914] __kasan_kmalloc+0xb7/0xc0 [ 22.599388] __kmalloc_cache_noprof+0x189/0x420 [ 22.599741] kasan_atomics+0x95/0x310 [ 22.600045] kunit_try_run_case+0x1a5/0x480 [ 22.600525] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.601185] kthread+0x337/0x6f0 [ 22.601605] ret_from_fork+0x116/0x1d0 [ 22.602605] ret_from_fork_asm+0x1a/0x30 [ 22.603016] [ 22.603195] The buggy address belongs to the object at ffff88810383ae00 [ 22.603195] which belongs to the cache kmalloc-64 of size 64 [ 22.605683] The buggy address is located 0 bytes to the right of [ 22.605683] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 22.607299] [ 22.607690] The buggy address belongs to the physical page: [ 22.608204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 22.608816] flags: 0x200000000000000(node=0|zone=2) [ 22.609405] page_type: f5(slab) [ 22.610185] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.610924] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.611940] page dumped because: kasan: bad access detected [ 22.612136] [ 22.612238] Memory state around the buggy address: [ 22.612622] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.613410] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.614874] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.615574] ^ [ 22.616051] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.616700] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.617265] ================================================================== [ 23.416656] ================================================================== [ 23.417160] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 23.417628] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 23.418356] [ 23.418619] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 23.418752] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.418794] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.418876] Call Trace: [ 23.418930] <TASK> [ 23.418985] dump_stack_lvl+0x73/0xb0 [ 23.419068] print_report+0xd1/0x650 [ 23.419152] ? __virt_addr_valid+0x1db/0x2d0 [ 23.419233] ? kasan_atomics_helper+0x50d4/0x5450 [ 23.419308] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.419386] ? kasan_atomics_helper+0x50d4/0x5450 [ 23.419460] kasan_report+0x141/0x180 [ 23.419532] ? kasan_atomics_helper+0x50d4/0x5450 [ 23.419623] __asan_report_store8_noabort+0x1b/0x30 [ 23.419706] kasan_atomics_helper+0x50d4/0x5450 [ 23.419785] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.419883] ? kasan_save_alloc_info+0x3b/0x50 [ 23.419978] kasan_atomics+0x1dc/0x310 [ 23.420061] ? __pfx_kasan_atomics+0x10/0x10 [ 23.420144] ? __pfx_read_tsc+0x10/0x10 [ 23.420214] ? ktime_get_ts64+0x86/0x230 [ 23.420300] kunit_try_run_case+0x1a5/0x480 [ 23.420381] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.420456] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.420529] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.420618] ? __kthread_parkme+0x82/0x180 [ 23.420685] ? preempt_count_sub+0x50/0x80 [ 23.420765] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.420861] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.420939] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.421004] kthread+0x337/0x6f0 [ 23.421037] ? trace_preempt_on+0x20/0xc0 [ 23.421076] ? __pfx_kthread+0x10/0x10 [ 23.421107] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.421142] ? calculate_sigpending+0x7b/0xa0 [ 23.421179] ? __pfx_kthread+0x10/0x10 [ 23.421211] ret_from_fork+0x116/0x1d0 [ 23.421269] ? __pfx_kthread+0x10/0x10 [ 23.421306] ret_from_fork_asm+0x1a/0x30 [ 23.421352] </TASK> [ 23.421369] [ 23.435733] Allocated by task 292: [ 23.436071] kasan_save_stack+0x45/0x70 [ 23.436576] kasan_save_track+0x18/0x40 [ 23.437133] kasan_save_alloc_info+0x3b/0x50 [ 23.437473] __kasan_kmalloc+0xb7/0xc0 [ 23.438303] __kmalloc_cache_noprof+0x189/0x420 [ 23.438765] kasan_atomics+0x95/0x310 [ 23.439190] kunit_try_run_case+0x1a5/0x480 [ 23.439645] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.441073] kthread+0x337/0x6f0 [ 23.441895] ret_from_fork+0x116/0x1d0 [ 23.442291] ret_from_fork_asm+0x1a/0x30 [ 23.442867] [ 23.443020] The buggy address belongs to the object at ffff88810383ae00 [ 23.443020] which belongs to the cache kmalloc-64 of size 64 [ 23.444516] The buggy address is located 0 bytes to the right of [ 23.444516] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 23.445669] [ 23.445878] The buggy address belongs to the physical page: [ 23.446553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 23.447245] flags: 0x200000000000000(node=0|zone=2) [ 23.447703] page_type: f5(slab) [ 23.448107] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.448611] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.449445] page dumped because: kasan: bad access detected [ 23.449820] [ 23.450113] Memory state around the buggy address: [ 23.450567] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.451170] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.451846] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.452937] ^ [ 23.453330] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.453979] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.454661] ================================================================== [ 24.101822] ================================================================== [ 24.102440] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 24.103316] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 24.103757] [ 24.104032] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 24.104157] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.104201] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.104260] Call Trace: [ 24.104313] <TASK> [ 24.104360] dump_stack_lvl+0x73/0xb0 [ 24.104435] print_report+0xd1/0x650 [ 24.104494] ? __virt_addr_valid+0x1db/0x2d0 [ 24.104559] ? kasan_atomics_helper+0x1eaa/0x5450 [ 24.104624] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.104689] ? kasan_atomics_helper+0x1eaa/0x5450 [ 24.104755] kasan_report+0x141/0x180 [ 24.104815] ? kasan_atomics_helper+0x1eaa/0x5450 [ 24.104988] kasan_check_range+0x10c/0x1c0 [ 24.105072] __kasan_check_write+0x18/0x20 [ 24.105183] kasan_atomics_helper+0x1eaa/0x5450 [ 24.105299] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.105416] ? kasan_save_alloc_info+0x3b/0x50 [ 24.105539] kasan_atomics+0x1dc/0x310 [ 24.105621] ? __pfx_kasan_atomics+0x10/0x10 [ 24.105702] ? __pfx_read_tsc+0x10/0x10 [ 24.105772] ? ktime_get_ts64+0x86/0x230 [ 24.105869] kunit_try_run_case+0x1a5/0x480 [ 24.105951] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.106022] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.106095] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.106174] ? __kthread_parkme+0x82/0x180 [ 24.106293] ? preempt_count_sub+0x50/0x80 [ 24.106378] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.106504] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.106588] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.106702] kthread+0x337/0x6f0 [ 24.106780] ? trace_preempt_on+0x20/0xc0 [ 24.106880] ? __pfx_kthread+0x10/0x10 [ 24.106952] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.107030] ? calculate_sigpending+0x7b/0xa0 [ 24.107109] ? __pfx_kthread+0x10/0x10 [ 24.107181] ret_from_fork+0x116/0x1d0 [ 24.107263] ? __pfx_kthread+0x10/0x10 [ 24.107300] ret_from_fork_asm+0x1a/0x30 [ 24.107345] </TASK> [ 24.107361] [ 24.123215] Allocated by task 292: [ 24.123583] kasan_save_stack+0x45/0x70 [ 24.125481] kasan_save_track+0x18/0x40 [ 24.125920] kasan_save_alloc_info+0x3b/0x50 [ 24.126606] __kasan_kmalloc+0xb7/0xc0 [ 24.127294] __kmalloc_cache_noprof+0x189/0x420 [ 24.127758] kasan_atomics+0x95/0x310 [ 24.128163] kunit_try_run_case+0x1a5/0x480 [ 24.128631] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.129188] kthread+0x337/0x6f0 [ 24.129574] ret_from_fork+0x116/0x1d0 [ 24.130000] ret_from_fork_asm+0x1a/0x30 [ 24.130460] [ 24.130692] The buggy address belongs to the object at ffff88810383ae00 [ 24.130692] which belongs to the cache kmalloc-64 of size 64 [ 24.131673] The buggy address is located 0 bytes to the right of [ 24.131673] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 24.134900] [ 24.135044] The buggy address belongs to the physical page: [ 24.135336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 24.135730] flags: 0x200000000000000(node=0|zone=2) [ 24.136073] page_type: f5(slab) [ 24.136349] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.137001] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.137438] page dumped because: kasan: bad access detected [ 24.138915] [ 24.139747] Memory state around the buggy address: [ 24.141349] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.143003] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.143398] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.143752] ^ [ 24.144037] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.144388] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.144741] ================================================================== [ 23.245282] ================================================================== [ 23.247095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 23.248774] Read of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 23.249937] [ 23.250440] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 23.250597] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.250640] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.250687] Call Trace: [ 23.250715] <TASK> [ 23.250742] dump_stack_lvl+0x73/0xb0 [ 23.250788] print_report+0xd1/0x650 [ 23.250824] ? __virt_addr_valid+0x1db/0x2d0 [ 23.250894] ? kasan_atomics_helper+0x49ce/0x5450 [ 23.250928] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.250961] ? kasan_atomics_helper+0x49ce/0x5450 [ 23.250992] kasan_report+0x141/0x180 [ 23.251025] ? kasan_atomics_helper+0x49ce/0x5450 [ 23.251061] __asan_report_load4_noabort+0x18/0x20 [ 23.251098] kasan_atomics_helper+0x49ce/0x5450 [ 23.251130] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.251162] ? kasan_save_alloc_info+0x3b/0x50 [ 23.251203] kasan_atomics+0x1dc/0x310 [ 23.251280] ? __pfx_kasan_atomics+0x10/0x10 [ 23.251321] ? __pfx_read_tsc+0x10/0x10 [ 23.251353] ? ktime_get_ts64+0x86/0x230 [ 23.251389] kunit_try_run_case+0x1a5/0x480 [ 23.251425] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.251458] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.251487] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.251525] ? __kthread_parkme+0x82/0x180 [ 23.251565] ? preempt_count_sub+0x50/0x80 [ 23.251600] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.251635] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.251668] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.251701] kthread+0x337/0x6f0 [ 23.251729] ? trace_preempt_on+0x20/0xc0 [ 23.251765] ? __pfx_kthread+0x10/0x10 [ 23.251795] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.251851] ? calculate_sigpending+0x7b/0xa0 [ 23.251896] ? __pfx_kthread+0x10/0x10 [ 23.251928] ret_from_fork+0x116/0x1d0 [ 23.251955] ? __pfx_kthread+0x10/0x10 [ 23.251985] ret_from_fork_asm+0x1a/0x30 [ 23.252027] </TASK> [ 23.252042] [ 23.269768] Allocated by task 292: [ 23.270543] kasan_save_stack+0x45/0x70 [ 23.271119] kasan_save_track+0x18/0x40 [ 23.271654] kasan_save_alloc_info+0x3b/0x50 [ 23.272133] __kasan_kmalloc+0xb7/0xc0 [ 23.272539] __kmalloc_cache_noprof+0x189/0x420 [ 23.273117] kasan_atomics+0x95/0x310 [ 23.273495] kunit_try_run_case+0x1a5/0x480 [ 23.274081] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.274710] kthread+0x337/0x6f0 [ 23.275100] ret_from_fork+0x116/0x1d0 [ 23.275590] ret_from_fork_asm+0x1a/0x30 [ 23.276060] [ 23.276366] The buggy address belongs to the object at ffff88810383ae00 [ 23.276366] which belongs to the cache kmalloc-64 of size 64 [ 23.277349] The buggy address is located 0 bytes to the right of [ 23.277349] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 23.278507] [ 23.278717] The buggy address belongs to the physical page: [ 23.279345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 23.280077] flags: 0x200000000000000(node=0|zone=2) [ 23.280646] page_type: f5(slab) [ 23.281064] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.281868] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.282453] page dumped because: kasan: bad access detected [ 23.282954] [ 23.283138] Memory state around the buggy address: [ 23.283890] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.285477] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.286384] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.286640] ^ [ 23.286812] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.287277] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.288266] ================================================================== [ 22.697812] ================================================================== [ 22.699409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 22.700103] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 22.701609] [ 22.701813] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 22.701961] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.702001] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.702059] Call Trace: [ 22.702106] <TASK> [ 22.702152] dump_stack_lvl+0x73/0xb0 [ 22.702234] print_report+0xd1/0x650 [ 22.702314] ? __virt_addr_valid+0x1db/0x2d0 [ 22.702390] ? kasan_atomics_helper+0xd47/0x5450 [ 22.702457] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.702513] ? kasan_atomics_helper+0xd47/0x5450 [ 22.702580] kasan_report+0x141/0x180 [ 22.702656] ? kasan_atomics_helper+0xd47/0x5450 [ 22.702742] kasan_check_range+0x10c/0x1c0 [ 22.702844] __kasan_check_write+0x18/0x20 [ 22.702920] kasan_atomics_helper+0xd47/0x5450 [ 22.702996] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.703075] ? kasan_save_alloc_info+0x3b/0x50 [ 22.703170] kasan_atomics+0x1dc/0x310 [ 22.703550] ? __pfx_kasan_atomics+0x10/0x10 [ 22.703641] ? __pfx_read_tsc+0x10/0x10 [ 22.703716] ? ktime_get_ts64+0x86/0x230 [ 22.703803] kunit_try_run_case+0x1a5/0x480 [ 22.703903] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.703980] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.704055] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.704138] ? __kthread_parkme+0x82/0x180 [ 22.704213] ? preempt_count_sub+0x50/0x80 [ 22.704399] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.704484] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.704565] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.704650] kthread+0x337/0x6f0 [ 22.704723] ? trace_preempt_on+0x20/0xc0 [ 22.704806] ? __pfx_kthread+0x10/0x10 [ 22.704902] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.704982] ? calculate_sigpending+0x7b/0xa0 [ 22.705059] ? __pfx_kthread+0x10/0x10 [ 22.705140] ret_from_fork+0x116/0x1d0 [ 22.705209] ? __pfx_kthread+0x10/0x10 [ 22.705382] ret_from_fork_asm+0x1a/0x30 [ 22.705477] </TASK> [ 22.705501] [ 22.719691] Allocated by task 292: [ 22.720060] kasan_save_stack+0x45/0x70 [ 22.720856] kasan_save_track+0x18/0x40 [ 22.721154] kasan_save_alloc_info+0x3b/0x50 [ 22.721471] __kasan_kmalloc+0xb7/0xc0 [ 22.721825] __kmalloc_cache_noprof+0x189/0x420 [ 22.722296] kasan_atomics+0x95/0x310 [ 22.722808] kunit_try_run_case+0x1a5/0x480 [ 22.723351] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.723893] kthread+0x337/0x6f0 [ 22.724266] ret_from_fork+0x116/0x1d0 [ 22.724616] ret_from_fork_asm+0x1a/0x30 [ 22.724983] [ 22.725194] The buggy address belongs to the object at ffff88810383ae00 [ 22.725194] which belongs to the cache kmalloc-64 of size 64 [ 22.726213] The buggy address is located 0 bytes to the right of [ 22.726213] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 22.728367] [ 22.728583] The buggy address belongs to the physical page: [ 22.729878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 22.731193] flags: 0x200000000000000(node=0|zone=2) [ 22.731620] page_type: f5(slab) [ 22.731982] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.734169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.734716] page dumped because: kasan: bad access detected [ 22.735364] [ 22.735581] Memory state around the buggy address: [ 22.735938] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.736961] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.737624] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.738391] ^ [ 22.738800] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.739511] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.740716] ================================================================== [ 23.289607] ================================================================== [ 23.290168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 23.290820] Read of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 23.291508] [ 23.291730] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 23.291871] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.291912] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.291967] Call Trace: [ 23.292016] <TASK> [ 23.292060] dump_stack_lvl+0x73/0xb0 [ 23.292144] print_report+0xd1/0x650 [ 23.292218] ? __virt_addr_valid+0x1db/0x2d0 [ 23.292289] ? kasan_atomics_helper+0x13b5/0x5450 [ 23.292361] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.292433] ? kasan_atomics_helper+0x13b5/0x5450 [ 23.292502] kasan_report+0x141/0x180 [ 23.292579] ? kasan_atomics_helper+0x13b5/0x5450 [ 23.292662] kasan_check_range+0x10c/0x1c0 [ 23.292739] __kasan_check_read+0x15/0x20 [ 23.292805] kasan_atomics_helper+0x13b5/0x5450 [ 23.292901] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.292971] ? kasan_save_alloc_info+0x3b/0x50 [ 23.293128] kasan_atomics+0x1dc/0x310 [ 23.293275] ? __pfx_kasan_atomics+0x10/0x10 [ 23.293366] ? __pfx_read_tsc+0x10/0x10 [ 23.293438] ? ktime_get_ts64+0x86/0x230 [ 23.293528] kunit_try_run_case+0x1a5/0x480 [ 23.293660] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.293824] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.293922] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.294004] ? __kthread_parkme+0x82/0x180 [ 23.294074] ? preempt_count_sub+0x50/0x80 [ 23.294141] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.294182] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.294231] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.294289] kthread+0x337/0x6f0 [ 23.294321] ? trace_preempt_on+0x20/0xc0 [ 23.294359] ? __pfx_kthread+0x10/0x10 [ 23.294391] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.294428] ? calculate_sigpending+0x7b/0xa0 [ 23.294464] ? __pfx_kthread+0x10/0x10 [ 23.294497] ret_from_fork+0x116/0x1d0 [ 23.294524] ? __pfx_kthread+0x10/0x10 [ 23.294555] ret_from_fork_asm+0x1a/0x30 [ 23.294598] </TASK> [ 23.294615] [ 23.310128] Allocated by task 292: [ 23.310436] kasan_save_stack+0x45/0x70 [ 23.310825] kasan_save_track+0x18/0x40 [ 23.311257] kasan_save_alloc_info+0x3b/0x50 [ 23.311699] __kasan_kmalloc+0xb7/0xc0 [ 23.312087] __kmalloc_cache_noprof+0x189/0x420 [ 23.312574] kasan_atomics+0x95/0x310 [ 23.312955] kunit_try_run_case+0x1a5/0x480 [ 23.313360] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.313803] kthread+0x337/0x6f0 [ 23.314161] ret_from_fork+0x116/0x1d0 [ 23.314593] ret_from_fork_asm+0x1a/0x30 [ 23.314989] [ 23.315169] The buggy address belongs to the object at ffff88810383ae00 [ 23.315169] which belongs to the cache kmalloc-64 of size 64 [ 23.316039] The buggy address is located 0 bytes to the right of [ 23.316039] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 23.317018] [ 23.317268] The buggy address belongs to the physical page: [ 23.317660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 23.318976] flags: 0x200000000000000(node=0|zone=2) [ 23.319668] page_type: f5(slab) [ 23.320059] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.320699] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.321407] page dumped because: kasan: bad access detected [ 23.321919] [ 23.322134] Memory state around the buggy address: [ 23.322617] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.323309] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.323931] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.324542] ^ [ 23.324880] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.325584] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.326303] ================================================================== [ 24.504097] ================================================================== [ 24.504767] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 24.505495] Read of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 24.506093] [ 24.506443] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 24.506572] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.506613] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.506661] Call Trace: [ 24.506701] <TASK> [ 24.506744] dump_stack_lvl+0x73/0xb0 [ 24.506825] print_report+0xd1/0x650 [ 24.507055] ? __virt_addr_valid+0x1db/0x2d0 [ 24.507169] ? kasan_atomics_helper+0x5115/0x5450 [ 24.507359] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.507437] ? kasan_atomics_helper+0x5115/0x5450 [ 24.507515] kasan_report+0x141/0x180 [ 24.507601] ? kasan_atomics_helper+0x5115/0x5450 [ 24.507653] __asan_report_load8_noabort+0x18/0x20 [ 24.507692] kasan_atomics_helper+0x5115/0x5450 [ 24.507728] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.507785] ? kasan_save_alloc_info+0x3b/0x50 [ 24.507872] kasan_atomics+0x1dc/0x310 [ 24.507913] ? __pfx_kasan_atomics+0x10/0x10 [ 24.507949] ? __pfx_read_tsc+0x10/0x10 [ 24.507980] ? ktime_get_ts64+0x86/0x230 [ 24.508016] kunit_try_run_case+0x1a5/0x480 [ 24.508050] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.508082] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.508112] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.508149] ? __kthread_parkme+0x82/0x180 [ 24.508176] ? preempt_count_sub+0x50/0x80 [ 24.508229] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.508291] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.508329] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.508362] kthread+0x337/0x6f0 [ 24.508390] ? trace_preempt_on+0x20/0xc0 [ 24.508425] ? __pfx_kthread+0x10/0x10 [ 24.508456] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.508491] ? calculate_sigpending+0x7b/0xa0 [ 24.508526] ? __pfx_kthread+0x10/0x10 [ 24.508557] ret_from_fork+0x116/0x1d0 [ 24.508583] ? __pfx_kthread+0x10/0x10 [ 24.508613] ret_from_fork_asm+0x1a/0x30 [ 24.508654] </TASK> [ 24.508669] [ 24.523813] Allocated by task 292: [ 24.524227] kasan_save_stack+0x45/0x70 [ 24.524657] kasan_save_track+0x18/0x40 [ 24.525081] kasan_save_alloc_info+0x3b/0x50 [ 24.525562] __kasan_kmalloc+0xb7/0xc0 [ 24.525978] __kmalloc_cache_noprof+0x189/0x420 [ 24.526486] kasan_atomics+0x95/0x310 [ 24.526900] kunit_try_run_case+0x1a5/0x480 [ 24.527258] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.527624] kthread+0x337/0x6f0 [ 24.527932] ret_from_fork+0x116/0x1d0 [ 24.528317] ret_from_fork_asm+0x1a/0x30 [ 24.528747] [ 24.529029] The buggy address belongs to the object at ffff88810383ae00 [ 24.529029] which belongs to the cache kmalloc-64 of size 64 [ 24.530131] The buggy address is located 0 bytes to the right of [ 24.530131] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 24.531017] [ 24.531180] The buggy address belongs to the physical page: [ 24.531757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 24.532517] flags: 0x200000000000000(node=0|zone=2) [ 24.533041] page_type: f5(slab) [ 24.533478] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.534070] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.534713] page dumped because: kasan: bad access detected [ 24.535190] [ 24.535465] Memory state around the buggy address: [ 24.535891] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.536549] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.537092] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.537731] ^ [ 24.538126] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.538810] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.539982] ================================================================== [ 21.919040] ================================================================== [ 21.920751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 21.921985] Read of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 21.922845] [ 21.923073] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 21.923229] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.923266] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.923679] Call Trace: [ 21.923728] <TASK> [ 21.923904] dump_stack_lvl+0x73/0xb0 [ 21.923951] print_report+0xd1/0x650 [ 21.924015] ? __virt_addr_valid+0x1db/0x2d0 [ 21.924052] ? kasan_atomics_helper+0x3df/0x5450 [ 21.924083] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.924115] ? kasan_atomics_helper+0x3df/0x5450 [ 21.924148] kasan_report+0x141/0x180 [ 21.924181] ? kasan_atomics_helper+0x3df/0x5450 [ 21.924219] kasan_check_range+0x10c/0x1c0 [ 21.924301] __kasan_check_read+0x15/0x20 [ 21.924380] kasan_atomics_helper+0x3df/0x5450 [ 21.924423] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.924456] ? kasan_save_alloc_info+0x3b/0x50 [ 21.924500] kasan_atomics+0x1dc/0x310 [ 21.924533] ? __pfx_kasan_atomics+0x10/0x10 [ 21.924571] ? __pfx_read_tsc+0x10/0x10 [ 21.924600] ? ktime_get_ts64+0x86/0x230 [ 21.924636] kunit_try_run_case+0x1a5/0x480 [ 21.924670] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.924703] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.924733] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.924771] ? __kthread_parkme+0x82/0x180 [ 21.924801] ? preempt_count_sub+0x50/0x80 [ 21.924858] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.924900] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.924937] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.924972] kthread+0x337/0x6f0 [ 21.925001] ? trace_preempt_on+0x20/0xc0 [ 21.925038] ? __pfx_kthread+0x10/0x10 [ 21.925068] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.925104] ? calculate_sigpending+0x7b/0xa0 [ 21.925141] ? __pfx_kthread+0x10/0x10 [ 21.925172] ret_from_fork+0x116/0x1d0 [ 21.925200] ? __pfx_kthread+0x10/0x10 [ 21.925273] ret_from_fork_asm+0x1a/0x30 [ 21.925361] </TASK> [ 21.925380] [ 21.944822] Allocated by task 292: [ 21.945693] kasan_save_stack+0x45/0x70 [ 21.946014] kasan_save_track+0x18/0x40 [ 21.946637] kasan_save_alloc_info+0x3b/0x50 [ 21.947168] __kasan_kmalloc+0xb7/0xc0 [ 21.947787] __kmalloc_cache_noprof+0x189/0x420 [ 21.948609] kasan_atomics+0x95/0x310 [ 21.949340] kunit_try_run_case+0x1a5/0x480 [ 21.949968] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.950778] kthread+0x337/0x6f0 [ 21.951210] ret_from_fork+0x116/0x1d0 [ 21.951776] ret_from_fork_asm+0x1a/0x30 [ 21.952174] [ 21.952812] The buggy address belongs to the object at ffff88810383ae00 [ 21.952812] which belongs to the cache kmalloc-64 of size 64 [ 21.954024] The buggy address is located 0 bytes to the right of [ 21.954024] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 21.955194] [ 21.955564] The buggy address belongs to the physical page: [ 21.956149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 21.957127] flags: 0x200000000000000(node=0|zone=2) [ 21.957816] page_type: f5(slab) [ 21.958355] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.959062] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.959860] page dumped because: kasan: bad access detected [ 21.960564] [ 21.960757] Memory state around the buggy address: [ 21.961273] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.962139] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.962927] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.963698] ^ [ 21.964162] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.965086] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.965861] ================================================================== [ 24.336670] ================================================================== [ 24.337351] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 24.338648] Read of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 24.340137] [ 24.340380] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 24.340876] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.340899] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.340931] Call Trace: [ 24.340955] <TASK> [ 24.340979] dump_stack_lvl+0x73/0xb0 [ 24.341022] print_report+0xd1/0x650 [ 24.341058] ? __virt_addr_valid+0x1db/0x2d0 [ 24.341094] ? kasan_atomics_helper+0x4fb2/0x5450 [ 24.341125] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.341155] ? kasan_atomics_helper+0x4fb2/0x5450 [ 24.341186] kasan_report+0x141/0x180 [ 24.341243] ? kasan_atomics_helper+0x4fb2/0x5450 [ 24.341300] __asan_report_load8_noabort+0x18/0x20 [ 24.341339] kasan_atomics_helper+0x4fb2/0x5450 [ 24.341371] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.341402] ? kasan_save_alloc_info+0x3b/0x50 [ 24.341444] kasan_atomics+0x1dc/0x310 [ 24.341477] ? __pfx_kasan_atomics+0x10/0x10 [ 24.341511] ? __pfx_read_tsc+0x10/0x10 [ 24.341541] ? ktime_get_ts64+0x86/0x230 [ 24.341577] kunit_try_run_case+0x1a5/0x480 [ 24.341614] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.341647] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.341677] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.341714] ? __kthread_parkme+0x82/0x180 [ 24.341743] ? preempt_count_sub+0x50/0x80 [ 24.341778] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.341813] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.341874] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.341912] kthread+0x337/0x6f0 [ 24.341941] ? trace_preempt_on+0x20/0xc0 [ 24.341975] ? __pfx_kthread+0x10/0x10 [ 24.342005] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.342038] ? calculate_sigpending+0x7b/0xa0 [ 24.342073] ? __pfx_kthread+0x10/0x10 [ 24.342103] ret_from_fork+0x116/0x1d0 [ 24.342129] ? __pfx_kthread+0x10/0x10 [ 24.342158] ret_from_fork_asm+0x1a/0x30 [ 24.342201] </TASK> [ 24.342225] [ 24.359027] Allocated by task 292: [ 24.359396] kasan_save_stack+0x45/0x70 [ 24.359704] kasan_save_track+0x18/0x40 [ 24.360116] kasan_save_alloc_info+0x3b/0x50 [ 24.360603] __kasan_kmalloc+0xb7/0xc0 [ 24.361058] __kmalloc_cache_noprof+0x189/0x420 [ 24.361589] kasan_atomics+0x95/0x310 [ 24.361992] kunit_try_run_case+0x1a5/0x480 [ 24.362494] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.362948] kthread+0x337/0x6f0 [ 24.363355] ret_from_fork+0x116/0x1d0 [ 24.363766] ret_from_fork_asm+0x1a/0x30 [ 24.364282] [ 24.364487] The buggy address belongs to the object at ffff88810383ae00 [ 24.364487] which belongs to the cache kmalloc-64 of size 64 [ 24.365450] The buggy address is located 0 bytes to the right of [ 24.365450] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 24.366424] [ 24.366652] The buggy address belongs to the physical page: [ 24.367073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 24.367597] flags: 0x200000000000000(node=0|zone=2) [ 24.368059] page_type: f5(slab) [ 24.368482] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.369140] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.369856] page dumped because: kasan: bad access detected [ 24.370370] [ 24.370531] Memory state around the buggy address: [ 24.370859] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.371492] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.372120] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.372797] ^ [ 24.374044] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.374617] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.375599] ================================================================== [ 24.295023] ================================================================== [ 24.295977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 24.296511] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 24.297030] [ 24.297391] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 24.297577] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.297623] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.297718] Call Trace: [ 24.297794] <TASK> [ 24.297859] dump_stack_lvl+0x73/0xb0 [ 24.297946] print_report+0xd1/0x650 [ 24.298022] ? __virt_addr_valid+0x1db/0x2d0 [ 24.298094] ? kasan_atomics_helper+0x20c8/0x5450 [ 24.298166] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.298285] ? kasan_atomics_helper+0x20c8/0x5450 [ 24.298361] kasan_report+0x141/0x180 [ 24.298439] ? kasan_atomics_helper+0x20c8/0x5450 [ 24.298522] kasan_check_range+0x10c/0x1c0 [ 24.298599] __kasan_check_write+0x18/0x20 [ 24.298664] kasan_atomics_helper+0x20c8/0x5450 [ 24.298738] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.298811] ? kasan_save_alloc_info+0x3b/0x50 [ 24.298921] kasan_atomics+0x1dc/0x310 [ 24.299038] ? __pfx_kasan_atomics+0x10/0x10 [ 24.299152] ? __pfx_read_tsc+0x10/0x10 [ 24.299267] ? ktime_get_ts64+0x86/0x230 [ 24.299356] kunit_try_run_case+0x1a5/0x480 [ 24.299433] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.299506] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.299584] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.299665] ? __kthread_parkme+0x82/0x180 [ 24.299731] ? preempt_count_sub+0x50/0x80 [ 24.299809] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.299904] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.299978] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.300054] kthread+0x337/0x6f0 [ 24.300125] ? trace_preempt_on+0x20/0xc0 [ 24.300201] ? __pfx_kthread+0x10/0x10 [ 24.300317] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.300397] ? calculate_sigpending+0x7b/0xa0 [ 24.300478] ? __pfx_kthread+0x10/0x10 [ 24.300549] ret_from_fork+0x116/0x1d0 [ 24.300613] ? __pfx_kthread+0x10/0x10 [ 24.300680] ret_from_fork_asm+0x1a/0x30 [ 24.300771] </TASK> [ 24.300811] [ 24.318710] Allocated by task 292: [ 24.319159] kasan_save_stack+0x45/0x70 [ 24.320061] kasan_save_track+0x18/0x40 [ 24.320736] kasan_save_alloc_info+0x3b/0x50 [ 24.321035] __kasan_kmalloc+0xb7/0xc0 [ 24.321510] __kmalloc_cache_noprof+0x189/0x420 [ 24.321981] kasan_atomics+0x95/0x310 [ 24.322368] kunit_try_run_case+0x1a5/0x480 [ 24.322731] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.323315] kthread+0x337/0x6f0 [ 24.323690] ret_from_fork+0x116/0x1d0 [ 24.324108] ret_from_fork_asm+0x1a/0x30 [ 24.324605] [ 24.324846] The buggy address belongs to the object at ffff88810383ae00 [ 24.324846] which belongs to the cache kmalloc-64 of size 64 [ 24.325899] The buggy address is located 0 bytes to the right of [ 24.325899] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 24.326896] [ 24.327154] The buggy address belongs to the physical page: [ 24.327620] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 24.328251] flags: 0x200000000000000(node=0|zone=2) [ 24.328794] page_type: f5(slab) [ 24.329147] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.329878] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.330496] page dumped because: kasan: bad access detected [ 24.330960] [ 24.331121] Memory state around the buggy address: [ 24.331556] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.332255] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.332825] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.333486] ^ [ 24.333990] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.334617] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.335247] ================================================================== [ 22.956365] ================================================================== [ 22.956982] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 22.957743] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 22.958279] [ 22.958540] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 22.958671] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.958712] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.958771] Call Trace: [ 22.958822] <TASK> [ 22.958892] dump_stack_lvl+0x73/0xb0 [ 22.958979] print_report+0xd1/0x650 [ 22.959059] ? __virt_addr_valid+0x1db/0x2d0 [ 22.959136] ? kasan_atomics_helper+0x1079/0x5450 [ 22.959212] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.959288] ? kasan_atomics_helper+0x1079/0x5450 [ 22.959363] kasan_report+0x141/0x180 [ 22.959437] ? kasan_atomics_helper+0x1079/0x5450 [ 22.959513] kasan_check_range+0x10c/0x1c0 [ 22.959565] __kasan_check_write+0x18/0x20 [ 22.959596] kasan_atomics_helper+0x1079/0x5450 [ 22.959631] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.959667] ? kasan_save_alloc_info+0x3b/0x50 [ 22.959710] kasan_atomics+0x1dc/0x310 [ 22.959744] ? __pfx_kasan_atomics+0x10/0x10 [ 22.959779] ? __pfx_read_tsc+0x10/0x10 [ 22.959810] ? ktime_get_ts64+0x86/0x230 [ 22.959871] kunit_try_run_case+0x1a5/0x480 [ 22.959910] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.959944] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.959974] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.960012] ? __kthread_parkme+0x82/0x180 [ 22.960040] ? preempt_count_sub+0x50/0x80 [ 22.960075] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.960111] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.960145] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.960179] kthread+0x337/0x6f0 [ 22.960209] ? trace_preempt_on+0x20/0xc0 [ 22.960272] ? __pfx_kthread+0x10/0x10 [ 22.960306] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.960340] ? calculate_sigpending+0x7b/0xa0 [ 22.960376] ? __pfx_kthread+0x10/0x10 [ 22.960407] ret_from_fork+0x116/0x1d0 [ 22.960434] ? __pfx_kthread+0x10/0x10 [ 22.960466] ret_from_fork_asm+0x1a/0x30 [ 22.960508] </TASK> [ 22.960524] [ 22.975418] Allocated by task 292: [ 22.975851] kasan_save_stack+0x45/0x70 [ 22.976338] kasan_save_track+0x18/0x40 [ 22.976664] kasan_save_alloc_info+0x3b/0x50 [ 22.977170] __kasan_kmalloc+0xb7/0xc0 [ 22.977571] __kmalloc_cache_noprof+0x189/0x420 [ 22.978089] kasan_atomics+0x95/0x310 [ 22.978527] kunit_try_run_case+0x1a5/0x480 [ 22.978953] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.979518] kthread+0x337/0x6f0 [ 22.979895] ret_from_fork+0x116/0x1d0 [ 22.980347] ret_from_fork_asm+0x1a/0x30 [ 22.980730] [ 22.980970] The buggy address belongs to the object at ffff88810383ae00 [ 22.980970] which belongs to the cache kmalloc-64 of size 64 [ 22.981928] The buggy address is located 0 bytes to the right of [ 22.981928] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 22.982744] [ 22.982978] The buggy address belongs to the physical page: [ 22.983576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 22.984309] flags: 0x200000000000000(node=0|zone=2) [ 22.984647] page_type: f5(slab) [ 22.984993] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.985715] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.986444] page dumped because: kasan: bad access detected [ 22.986936] [ 22.987138] Memory state around the buggy address: [ 22.987622] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.988261] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.988869] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.989491] ^ [ 22.989935] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.990600] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.991263] ================================================================== [ 23.372532] ================================================================== [ 23.373408] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 23.373978] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 23.374412] [ 23.374746] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 23.374901] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.374945] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.375007] Call Trace: [ 23.375064] <TASK> [ 23.375115] dump_stack_lvl+0x73/0xb0 [ 23.375198] print_report+0xd1/0x650 [ 23.375324] ? __virt_addr_valid+0x1db/0x2d0 [ 23.375406] ? kasan_atomics_helper+0x1467/0x5450 [ 23.375480] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.375564] ? kasan_atomics_helper+0x1467/0x5450 [ 23.375642] kasan_report+0x141/0x180 [ 23.375742] ? kasan_atomics_helper+0x1467/0x5450 [ 23.375878] kasan_check_range+0x10c/0x1c0 [ 23.375968] __kasan_check_write+0x18/0x20 [ 23.376063] kasan_atomics_helper+0x1467/0x5450 [ 23.376172] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.376293] ? kasan_save_alloc_info+0x3b/0x50 [ 23.376382] kasan_atomics+0x1dc/0x310 [ 23.376454] ? __pfx_kasan_atomics+0x10/0x10 [ 23.376512] ? __pfx_read_tsc+0x10/0x10 [ 23.376580] ? ktime_get_ts64+0x86/0x230 [ 23.376658] kunit_try_run_case+0x1a5/0x480 [ 23.376789] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.376886] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.376960] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.377067] ? __kthread_parkme+0x82/0x180 [ 23.377169] ? preempt_count_sub+0x50/0x80 [ 23.377297] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.377427] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.377509] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.377590] kthread+0x337/0x6f0 [ 23.377687] ? trace_preempt_on+0x20/0xc0 [ 23.377797] ? __pfx_kthread+0x10/0x10 [ 23.377887] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.377967] ? calculate_sigpending+0x7b/0xa0 [ 23.378071] ? __pfx_kthread+0x10/0x10 [ 23.378178] ret_from_fork+0x116/0x1d0 [ 23.378290] ? __pfx_kthread+0x10/0x10 [ 23.378388] ret_from_fork_asm+0x1a/0x30 [ 23.378509] </TASK> [ 23.378556] [ 23.396208] Allocated by task 292: [ 23.396626] kasan_save_stack+0x45/0x70 [ 23.397142] kasan_save_track+0x18/0x40 [ 23.397572] kasan_save_alloc_info+0x3b/0x50 [ 23.397906] __kasan_kmalloc+0xb7/0xc0 [ 23.398365] __kmalloc_cache_noprof+0x189/0x420 [ 23.398941] kasan_atomics+0x95/0x310 [ 23.399451] kunit_try_run_case+0x1a5/0x480 [ 23.399983] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.400583] kthread+0x337/0x6f0 [ 23.401024] ret_from_fork+0x116/0x1d0 [ 23.401430] ret_from_fork_asm+0x1a/0x30 [ 23.401729] [ 23.402013] The buggy address belongs to the object at ffff88810383ae00 [ 23.402013] which belongs to the cache kmalloc-64 of size 64 [ 23.403165] The buggy address is located 0 bytes to the right of [ 23.403165] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 23.404341] [ 23.404606] The buggy address belongs to the physical page: [ 23.405117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 23.406475] flags: 0x200000000000000(node=0|zone=2) [ 23.407097] page_type: f5(slab) [ 23.407486] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.408119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.409100] page dumped because: kasan: bad access detected [ 23.409893] [ 23.410090] Memory state around the buggy address: [ 23.410498] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.411759] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.412703] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.413329] ^ [ 23.413752] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.414335] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.415463] ================================================================== [ 24.376736] ================================================================== [ 24.377418] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 24.377986] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 24.378711] [ 24.378946] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 24.379065] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.379128] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.379252] Call Trace: [ 24.379306] <TASK> [ 24.379350] dump_stack_lvl+0x73/0xb0 [ 24.379433] print_report+0xd1/0x650 [ 24.379534] ? __virt_addr_valid+0x1db/0x2d0 [ 24.379652] ? kasan_atomics_helper+0x218a/0x5450 [ 24.379728] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.379805] ? kasan_atomics_helper+0x218a/0x5450 [ 24.379944] kasan_report+0x141/0x180 [ 24.380033] ? kasan_atomics_helper+0x218a/0x5450 [ 24.380119] kasan_check_range+0x10c/0x1c0 [ 24.380268] __kasan_check_write+0x18/0x20 [ 24.380346] kasan_atomics_helper+0x218a/0x5450 [ 24.380420] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.380494] ? kasan_save_alloc_info+0x3b/0x50 [ 24.380584] kasan_atomics+0x1dc/0x310 [ 24.380665] ? __pfx_kasan_atomics+0x10/0x10 [ 24.380769] ? __pfx_read_tsc+0x10/0x10 [ 24.380885] ? ktime_get_ts64+0x86/0x230 [ 24.380973] kunit_try_run_case+0x1a5/0x480 [ 24.381055] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.381155] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.381281] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.381325] ? __kthread_parkme+0x82/0x180 [ 24.381355] ? preempt_count_sub+0x50/0x80 [ 24.381394] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.381431] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.381465] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.381499] kthread+0x337/0x6f0 [ 24.381529] ? trace_preempt_on+0x20/0xc0 [ 24.381564] ? __pfx_kthread+0x10/0x10 [ 24.381597] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.381633] ? calculate_sigpending+0x7b/0xa0 [ 24.381670] ? __pfx_kthread+0x10/0x10 [ 24.381701] ret_from_fork+0x116/0x1d0 [ 24.381730] ? __pfx_kthread+0x10/0x10 [ 24.381760] ret_from_fork_asm+0x1a/0x30 [ 24.381803] </TASK> [ 24.381820] [ 24.398569] Allocated by task 292: [ 24.398870] kasan_save_stack+0x45/0x70 [ 24.401553] kasan_save_track+0x18/0x40 [ 24.402011] kasan_save_alloc_info+0x3b/0x50 [ 24.402292] __kasan_kmalloc+0xb7/0xc0 [ 24.402528] __kmalloc_cache_noprof+0x189/0x420 [ 24.402797] kasan_atomics+0x95/0x310 [ 24.404625] kunit_try_run_case+0x1a5/0x480 [ 24.404927] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.405793] kthread+0x337/0x6f0 [ 24.406168] ret_from_fork+0x116/0x1d0 [ 24.407717] ret_from_fork_asm+0x1a/0x30 [ 24.409026] [ 24.409583] The buggy address belongs to the object at ffff88810383ae00 [ 24.409583] which belongs to the cache kmalloc-64 of size 64 [ 24.411118] The buggy address is located 0 bytes to the right of [ 24.411118] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 24.412412] [ 24.412622] The buggy address belongs to the physical page: [ 24.413176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 24.413903] flags: 0x200000000000000(node=0|zone=2) [ 24.414467] page_type: f5(slab) [ 24.414799] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.415517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.416298] page dumped because: kasan: bad access detected [ 24.416782] [ 24.417081] Memory state around the buggy address: [ 24.417603] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.418311] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.418897] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.419640] ^ [ 24.420049] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.420716] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.421436] ================================================================== [ 23.936877] ================================================================== [ 23.937504] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 23.938410] Read of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 23.938952] [ 23.939147] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 23.939461] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.939503] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.939588] Call Trace: [ 23.939633] <TASK> [ 23.939677] dump_stack_lvl+0x73/0xb0 [ 23.939761] print_report+0xd1/0x650 [ 23.940339] ? __virt_addr_valid+0x1db/0x2d0 [ 23.940453] ? kasan_atomics_helper+0x4f30/0x5450 [ 23.940527] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.940602] ? kasan_atomics_helper+0x4f30/0x5450 [ 23.940680] kasan_report+0x141/0x180 [ 23.940758] ? kasan_atomics_helper+0x4f30/0x5450 [ 23.940860] __asan_report_load8_noabort+0x18/0x20 [ 23.940945] kasan_atomics_helper+0x4f30/0x5450 [ 23.941020] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.941096] ? kasan_save_alloc_info+0x3b/0x50 [ 23.941209] kasan_atomics+0x1dc/0x310 [ 23.941316] ? __pfx_kasan_atomics+0x10/0x10 [ 23.941399] ? __pfx_read_tsc+0x10/0x10 [ 23.941469] ? ktime_get_ts64+0x86/0x230 [ 23.941577] kunit_try_run_case+0x1a5/0x480 [ 23.941685] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.941759] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.941851] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.941961] ? __kthread_parkme+0x82/0x180 [ 23.942060] ? preempt_count_sub+0x50/0x80 [ 23.942141] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.942306] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.942392] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.942472] kthread+0x337/0x6f0 [ 23.942508] ? trace_preempt_on+0x20/0xc0 [ 23.942547] ? __pfx_kthread+0x10/0x10 [ 23.942581] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.942619] ? calculate_sigpending+0x7b/0xa0 [ 23.942655] ? __pfx_kthread+0x10/0x10 [ 23.942687] ret_from_fork+0x116/0x1d0 [ 23.942715] ? __pfx_kthread+0x10/0x10 [ 23.942747] ret_from_fork_asm+0x1a/0x30 [ 23.942791] </TASK> [ 23.942808] [ 23.960669] Allocated by task 292: [ 23.961076] kasan_save_stack+0x45/0x70 [ 23.961602] kasan_save_track+0x18/0x40 [ 23.962065] kasan_save_alloc_info+0x3b/0x50 [ 23.962586] __kasan_kmalloc+0xb7/0xc0 [ 23.963070] __kmalloc_cache_noprof+0x189/0x420 [ 23.963619] kasan_atomics+0x95/0x310 [ 23.964092] kunit_try_run_case+0x1a5/0x480 [ 23.964565] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.965280] kthread+0x337/0x6f0 [ 23.965655] ret_from_fork+0x116/0x1d0 [ 23.966080] ret_from_fork_asm+0x1a/0x30 [ 23.966537] [ 23.966774] The buggy address belongs to the object at ffff88810383ae00 [ 23.966774] which belongs to the cache kmalloc-64 of size 64 [ 23.968177] The buggy address is located 0 bytes to the right of [ 23.968177] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 23.969547] [ 23.969880] The buggy address belongs to the physical page: [ 23.970433] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 23.971320] flags: 0x200000000000000(node=0|zone=2) [ 23.971844] page_type: f5(slab) [ 23.972192] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.973047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.973533] page dumped because: kasan: bad access detected [ 23.974012] [ 23.974499] Memory state around the buggy address: [ 23.974949] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.975810] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.976436] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.977022] ^ [ 23.977630] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.978377] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.978858] ================================================================== [ 22.152210] ================================================================== [ 22.152855] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 22.153363] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 22.154005] [ 22.154301] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 22.154464] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.154510] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.154599] Call Trace: [ 22.154652] <TASK> [ 22.154698] dump_stack_lvl+0x73/0xb0 [ 22.154780] print_report+0xd1/0x650 [ 22.154875] ? __virt_addr_valid+0x1db/0x2d0 [ 22.154954] ? kasan_atomics_helper+0x5fe/0x5450 [ 22.155025] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.155102] ? kasan_atomics_helper+0x5fe/0x5450 [ 22.155173] kasan_report+0x141/0x180 [ 22.155250] ? kasan_atomics_helper+0x5fe/0x5450 [ 22.155339] kasan_check_range+0x10c/0x1c0 [ 22.155432] __kasan_check_write+0x18/0x20 [ 22.155511] kasan_atomics_helper+0x5fe/0x5450 [ 22.155606] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.155688] ? kasan_save_alloc_info+0x3b/0x50 [ 22.155820] kasan_atomics+0x1dc/0x310 [ 22.155960] ? __pfx_kasan_atomics+0x10/0x10 [ 22.156049] ? __pfx_read_tsc+0x10/0x10 [ 22.156124] ? ktime_get_ts64+0x86/0x230 [ 22.156246] kunit_try_run_case+0x1a5/0x480 [ 22.156338] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.156449] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.156533] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.156618] ? __kthread_parkme+0x82/0x180 [ 22.156689] ? preempt_count_sub+0x50/0x80 [ 22.156772] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.156865] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.156949] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.157027] kthread+0x337/0x6f0 [ 22.157097] ? trace_preempt_on+0x20/0xc0 [ 22.157143] ? __pfx_kthread+0x10/0x10 [ 22.157177] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.157216] ? calculate_sigpending+0x7b/0xa0 [ 22.157294] ? __pfx_kthread+0x10/0x10 [ 22.157361] ret_from_fork+0x116/0x1d0 [ 22.157394] ? __pfx_kthread+0x10/0x10 [ 22.157426] ret_from_fork_asm+0x1a/0x30 [ 22.157470] </TASK> [ 22.157486] [ 22.176768] Allocated by task 292: [ 22.177081] kasan_save_stack+0x45/0x70 [ 22.177482] kasan_save_track+0x18/0x40 [ 22.178544] kasan_save_alloc_info+0x3b/0x50 [ 22.178953] __kasan_kmalloc+0xb7/0xc0 [ 22.179633] __kmalloc_cache_noprof+0x189/0x420 [ 22.180190] kasan_atomics+0x95/0x310 [ 22.180894] kunit_try_run_case+0x1a5/0x480 [ 22.181715] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.182097] kthread+0x337/0x6f0 [ 22.182852] ret_from_fork+0x116/0x1d0 [ 22.183606] ret_from_fork_asm+0x1a/0x30 [ 22.184338] [ 22.184689] The buggy address belongs to the object at ffff88810383ae00 [ 22.184689] which belongs to the cache kmalloc-64 of size 64 [ 22.186412] The buggy address is located 0 bytes to the right of [ 22.186412] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 22.187594] [ 22.188105] The buggy address belongs to the physical page: [ 22.188800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 22.189792] flags: 0x200000000000000(node=0|zone=2) [ 22.190378] page_type: f5(slab) [ 22.190662] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.191221] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.191731] page dumped because: kasan: bad access detected [ 22.192127] [ 22.192334] Memory state around the buggy address: [ 22.192890] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.193423] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.194134] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.195189] ^ [ 22.196265] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.197164] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.198002] ================================================================== [ 21.734595] ================================================================== [ 21.736127] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 21.737022] Read of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 21.737519] [ 21.737726] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 21.737879] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.737918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.737981] Call Trace: [ 21.738018] <TASK> [ 21.738069] dump_stack_lvl+0x73/0xb0 [ 21.738135] print_report+0xd1/0x650 [ 21.738170] ? __virt_addr_valid+0x1db/0x2d0 [ 21.738205] ? kasan_atomics_helper+0x4bbc/0x5450 [ 21.738344] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.738463] ? kasan_atomics_helper+0x4bbc/0x5450 [ 21.738570] kasan_report+0x141/0x180 [ 21.738679] ? kasan_atomics_helper+0x4bbc/0x5450 [ 21.738790] __asan_report_load4_noabort+0x18/0x20 [ 21.738935] kasan_atomics_helper+0x4bbc/0x5450 [ 21.739044] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.739147] ? kasan_save_alloc_info+0x3b/0x50 [ 21.739310] kasan_atomics+0x1dc/0x310 [ 21.739427] ? __pfx_kasan_atomics+0x10/0x10 [ 21.739470] ? __pfx_read_tsc+0x10/0x10 [ 21.739507] ? ktime_get_ts64+0x86/0x230 [ 21.739553] kunit_try_run_case+0x1a5/0x480 [ 21.739594] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.739627] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.739657] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.739696] ? __kthread_parkme+0x82/0x180 [ 21.739726] ? preempt_count_sub+0x50/0x80 [ 21.739761] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.739796] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.739851] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.739893] kthread+0x337/0x6f0 [ 21.739924] ? trace_preempt_on+0x20/0xc0 [ 21.739959] ? __pfx_kthread+0x10/0x10 [ 21.739988] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.740022] ? calculate_sigpending+0x7b/0xa0 [ 21.740056] ? __pfx_kthread+0x10/0x10 [ 21.740088] ret_from_fork+0x116/0x1d0 [ 21.740113] ? __pfx_kthread+0x10/0x10 [ 21.740143] ret_from_fork_asm+0x1a/0x30 [ 21.740187] </TASK> [ 21.740204] [ 21.764861] Allocated by task 292: [ 21.765297] kasan_save_stack+0x45/0x70 [ 21.765898] kasan_save_track+0x18/0x40 [ 21.766819] kasan_save_alloc_info+0x3b/0x50 [ 21.767420] __kasan_kmalloc+0xb7/0xc0 [ 21.767923] __kmalloc_cache_noprof+0x189/0x420 [ 21.768570] kasan_atomics+0x95/0x310 [ 21.768994] kunit_try_run_case+0x1a5/0x480 [ 21.769607] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.770186] kthread+0x337/0x6f0 [ 21.771046] ret_from_fork+0x116/0x1d0 [ 21.771727] ret_from_fork_asm+0x1a/0x30 [ 21.772108] [ 21.772622] The buggy address belongs to the object at ffff88810383ae00 [ 21.772622] which belongs to the cache kmalloc-64 of size 64 [ 21.774127] The buggy address is located 0 bytes to the right of [ 21.774127] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 21.776312] [ 21.776733] The buggy address belongs to the physical page: [ 21.777535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 21.778320] flags: 0x200000000000000(node=0|zone=2) [ 21.779331] page_type: f5(slab) [ 21.779686] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.780909] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.781602] page dumped because: kasan: bad access detected [ 21.782036] [ 21.782268] Memory state around the buggy address: [ 21.782722] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.783300] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.783915] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.784519] ^ [ 21.785153] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.785755] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.786902] ================================================================== [ 21.829280] ================================================================== [ 21.830531] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 21.831005] Read of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 21.831775] [ 21.832035] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 21.832157] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.832193] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.832247] Call Trace: [ 21.832296] <TASK> [ 21.832336] dump_stack_lvl+0x73/0xb0 [ 21.832417] print_report+0xd1/0x650 [ 21.832492] ? __virt_addr_valid+0x1db/0x2d0 [ 21.832570] ? kasan_atomics_helper+0x4b88/0x5450 [ 21.832636] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.832705] ? kasan_atomics_helper+0x4b88/0x5450 [ 21.832776] kasan_report+0x141/0x180 [ 21.832866] ? kasan_atomics_helper+0x4b88/0x5450 [ 21.832947] __asan_report_load4_noabort+0x18/0x20 [ 21.833028] kasan_atomics_helper+0x4b88/0x5450 [ 21.833103] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.833175] ? kasan_save_alloc_info+0x3b/0x50 [ 21.833265] kasan_atomics+0x1dc/0x310 [ 21.833344] ? __pfx_kasan_atomics+0x10/0x10 [ 21.833422] ? __pfx_read_tsc+0x10/0x10 [ 21.833491] ? ktime_get_ts64+0x86/0x230 [ 21.833572] kunit_try_run_case+0x1a5/0x480 [ 21.833651] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.833721] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.833789] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.834196] ? __kthread_parkme+0x82/0x180 [ 21.834353] ? preempt_count_sub+0x50/0x80 [ 21.834398] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.834434] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.834468] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.834501] kthread+0x337/0x6f0 [ 21.834530] ? trace_preempt_on+0x20/0xc0 [ 21.834563] ? __pfx_kthread+0x10/0x10 [ 21.834591] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.834624] ? calculate_sigpending+0x7b/0xa0 [ 21.834659] ? __pfx_kthread+0x10/0x10 [ 21.834688] ret_from_fork+0x116/0x1d0 [ 21.834713] ? __pfx_kthread+0x10/0x10 [ 21.834740] ret_from_fork_asm+0x1a/0x30 [ 21.834780] </TASK> [ 21.834794] [ 21.852941] Allocated by task 292: [ 21.853201] kasan_save_stack+0x45/0x70 [ 21.853592] kasan_save_track+0x18/0x40 [ 21.853995] kasan_save_alloc_info+0x3b/0x50 [ 21.854599] __kasan_kmalloc+0xb7/0xc0 [ 21.854904] __kmalloc_cache_noprof+0x189/0x420 [ 21.855223] kasan_atomics+0x95/0x310 [ 21.855629] kunit_try_run_case+0x1a5/0x480 [ 21.856094] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.856975] kthread+0x337/0x6f0 [ 21.857406] ret_from_fork+0x116/0x1d0 [ 21.858090] ret_from_fork_asm+0x1a/0x30 [ 21.859471] [ 21.860039] The buggy address belongs to the object at ffff88810383ae00 [ 21.860039] which belongs to the cache kmalloc-64 of size 64 [ 21.861434] The buggy address is located 0 bytes to the right of [ 21.861434] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 21.863442] [ 21.863827] The buggy address belongs to the physical page: [ 21.864207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 21.864935] flags: 0x200000000000000(node=0|zone=2) [ 21.865352] page_type: f5(slab) [ 21.865770] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.866441] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.867060] page dumped because: kasan: bad access detected [ 21.867773] [ 21.868086] Memory state around the buggy address: [ 21.868583] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.869278] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.870793] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.871589] ^ [ 21.871886] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.872899] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.873880] ================================================================== [ 22.786537] ================================================================== [ 22.787328] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 22.788599] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292 [ 22.789239] [ 22.789470] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 22.789587] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.789910] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.790002] Call Trace: [ 22.790053] <TASK> [ 22.790129] dump_stack_lvl+0x73/0xb0 [ 22.790242] print_report+0xd1/0x650 [ 22.790327] ? __virt_addr_valid+0x1db/0x2d0 [ 22.790437] ? kasan_atomics_helper+0xe78/0x5450 [ 22.790543] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.790620] ? kasan_atomics_helper+0xe78/0x5450 [ 22.790695] kasan_report+0x141/0x180 [ 22.790773] ? kasan_atomics_helper+0xe78/0x5450 [ 22.790873] kasan_check_range+0x10c/0x1c0 [ 22.790953] __kasan_check_write+0x18/0x20 [ 22.791022] kasan_atomics_helper+0xe78/0x5450 [ 22.791097] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.791170] ? kasan_save_alloc_info+0x3b/0x50 [ 22.791290] kasan_atomics+0x1dc/0x310 [ 22.791371] ? __pfx_kasan_atomics+0x10/0x10 [ 22.791452] ? __pfx_read_tsc+0x10/0x10 [ 22.791519] ? ktime_get_ts64+0x86/0x230 [ 22.791611] kunit_try_run_case+0x1a5/0x480 [ 22.791688] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.791759] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.791846] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.791931] ? __kthread_parkme+0x82/0x180 [ 22.792002] ? preempt_count_sub+0x50/0x80 [ 22.792081] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.792161] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.792242] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.792325] kthread+0x337/0x6f0 [ 22.792397] ? trace_preempt_on+0x20/0xc0 [ 22.792438] ? __pfx_kthread+0x10/0x10 [ 22.792470] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.792507] ? calculate_sigpending+0x7b/0xa0 [ 22.792543] ? __pfx_kthread+0x10/0x10 [ 22.792573] ret_from_fork+0x116/0x1d0 [ 22.792601] ? __pfx_kthread+0x10/0x10 [ 22.792630] ret_from_fork_asm+0x1a/0x30 [ 22.792672] </TASK> [ 22.792687] [ 22.813294] Allocated by task 292: [ 22.813668] kasan_save_stack+0x45/0x70 [ 22.815693] kasan_save_track+0x18/0x40 [ 22.817113] kasan_save_alloc_info+0x3b/0x50 [ 22.818102] __kasan_kmalloc+0xb7/0xc0 [ 22.818472] __kmalloc_cache_noprof+0x189/0x420 [ 22.819514] kasan_atomics+0x95/0x310 [ 22.821054] kunit_try_run_case+0x1a5/0x480 [ 22.821540] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.822127] kthread+0x337/0x6f0 [ 22.822673] ret_from_fork+0x116/0x1d0 [ 22.823063] ret_from_fork_asm+0x1a/0x30 [ 22.823490] [ 22.823721] The buggy address belongs to the object at ffff88810383ae00 [ 22.823721] which belongs to the cache kmalloc-64 of size 64 [ 22.824526] The buggy address is located 0 bytes to the right of [ 22.824526] allocated 48-byte region [ffff88810383ae00, ffff88810383ae30) [ 22.825637] [ 22.825807] The buggy address belongs to the physical page: [ 22.826478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a [ 22.827165] flags: 0x200000000000000(node=0|zone=2) [ 22.828356] page_type: f5(slab) [ 22.829203] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.830504] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.831582] page dumped because: kasan: bad access detected [ 22.832000] [ 22.832153] Memory state around the buggy address: [ 22.833076] ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.834235] ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.834751] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.835376] ^ [ 22.835926] ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.836623] ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.837292] ==================================================================