Date
June 19, 2025, 12:07 p.m.
Environment | |
---|---|
qemu-arm64 |
[ 33.865115] ================================================================== [ 33.865362] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 33.866005] Read of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 33.866141] [ 33.866233] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 33.866464] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.866881] Hardware name: linux,dummy-virt (DT) [ 33.867114] Call trace: [ 33.867217] show_stack+0x20/0x38 (C) [ 33.867433] dump_stack_lvl+0x8c/0xd0 [ 33.867910] print_report+0x118/0x608 [ 33.868346] kasan_report+0xdc/0x128 [ 33.868614] __asan_report_load4_noabort+0x20/0x30 [ 33.869216] kasan_atomics_helper+0x42d8/0x4858 [ 33.869454] kasan_atomics+0x198/0x2e0 [ 33.869587] kunit_try_run_case+0x170/0x3f0 [ 33.869712] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.869854] kthread+0x328/0x630 [ 33.869977] ret_from_fork+0x10/0x20 [ 33.870092] [ 33.870143] Allocated by task 276: [ 33.870223] kasan_save_stack+0x3c/0x68 [ 33.870330] kasan_save_track+0x20/0x40 [ 33.870429] kasan_save_alloc_info+0x40/0x58 [ 33.870529] __kasan_kmalloc+0xd4/0xd8 [ 33.870625] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.870724] kasan_atomics+0xb8/0x2e0 [ 33.870841] kunit_try_run_case+0x170/0x3f0 [ 33.870934] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.871049] kthread+0x328/0x630 [ 33.871118] ret_from_fork+0x10/0x20 [ 33.871205] [ 33.871259] The buggy address belongs to the object at fff00000c76a3180 [ 33.871259] which belongs to the cache kmalloc-64 of size 64 [ 33.871390] The buggy address is located 0 bytes to the right of [ 33.871390] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 33.871563] [ 33.871637] The buggy address belongs to the physical page: [ 33.871715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 33.871867] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.871999] page_type: f5(slab) [ 33.872136] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.872312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.872468] page dumped because: kasan: bad access detected [ 33.872565] [ 33.872612] Memory state around the buggy address: [ 33.872698] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.872861] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.873029] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.873164] ^ [ 33.873257] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.873368] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.873494] ================================================================== [ 33.880405] ================================================================== [ 33.880520] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 33.880647] Write of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 33.880790] [ 33.880893] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 33.881154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.881334] Hardware name: linux,dummy-virt (DT) [ 33.881437] Call trace: [ 33.881518] show_stack+0x20/0x38 (C) [ 33.881698] dump_stack_lvl+0x8c/0xd0 [ 33.881812] print_report+0x118/0x608 [ 33.881942] kasan_report+0xdc/0x128 [ 33.882061] kasan_check_range+0x100/0x1a8 [ 33.882187] __kasan_check_write+0x20/0x30 [ 33.882289] kasan_atomics_helper+0x99c/0x4858 [ 33.882403] kasan_atomics+0x198/0x2e0 [ 33.882516] kunit_try_run_case+0x170/0x3f0 [ 33.882653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.882806] kthread+0x328/0x630 [ 33.882918] ret_from_fork+0x10/0x20 [ 33.883098] [ 33.883153] Allocated by task 276: [ 33.883232] kasan_save_stack+0x3c/0x68 [ 33.883342] kasan_save_track+0x20/0x40 [ 33.883443] kasan_save_alloc_info+0x40/0x58 [ 33.883548] __kasan_kmalloc+0xd4/0xd8 [ 33.883646] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.883755] kasan_atomics+0xb8/0x2e0 [ 33.883854] kunit_try_run_case+0x170/0x3f0 [ 33.884023] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.884136] kthread+0x328/0x630 [ 33.884234] ret_from_fork+0x10/0x20 [ 33.884325] [ 33.884371] The buggy address belongs to the object at fff00000c76a3180 [ 33.884371] which belongs to the cache kmalloc-64 of size 64 [ 33.884526] The buggy address is located 0 bytes to the right of [ 33.884526] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 33.884799] [ 33.884860] The buggy address belongs to the physical page: [ 33.884949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 33.885087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.885225] page_type: f5(slab) [ 33.885351] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.885532] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.885746] page dumped because: kasan: bad access detected [ 33.885849] [ 33.885903] Memory state around the buggy address: [ 33.885981] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.886098] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.886218] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.886317] ^ [ 33.886392] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.886483] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.886566] ================================================================== [ 34.090155] ================================================================== [ 34.090547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 34.090866] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.091072] [ 34.091201] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.091387] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.091453] Hardware name: linux,dummy-virt (DT) [ 34.091531] Call trace: [ 34.091589] show_stack+0x20/0x38 (C) [ 34.091763] dump_stack_lvl+0x8c/0xd0 [ 34.091983] print_report+0x118/0x608 [ 34.092097] kasan_report+0xdc/0x128 [ 34.092445] kasan_check_range+0x100/0x1a8 [ 34.092571] __kasan_check_write+0x20/0x30 [ 34.093027] kasan_atomics_helper+0xf88/0x4858 [ 34.093259] kasan_atomics+0x198/0x2e0 [ 34.093403] kunit_try_run_case+0x170/0x3f0 [ 34.093522] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.093759] kthread+0x328/0x630 [ 34.093856] ret_from_fork+0x10/0x20 [ 34.093977] [ 34.094017] Allocated by task 276: [ 34.094074] kasan_save_stack+0x3c/0x68 [ 34.094161] kasan_save_track+0x20/0x40 [ 34.094259] kasan_save_alloc_info+0x40/0x58 [ 34.094523] __kasan_kmalloc+0xd4/0xd8 [ 34.094643] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.094773] kasan_atomics+0xb8/0x2e0 [ 34.094914] kunit_try_run_case+0x170/0x3f0 [ 34.095025] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.095131] kthread+0x328/0x630 [ 34.095502] ret_from_fork+0x10/0x20 [ 34.095616] [ 34.095672] The buggy address belongs to the object at fff00000c76a3180 [ 34.095672] which belongs to the cache kmalloc-64 of size 64 [ 34.095839] The buggy address is located 0 bytes to the right of [ 34.095839] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.096022] [ 34.096083] The buggy address belongs to the physical page: [ 34.096165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.096318] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.096504] page_type: f5(slab) [ 34.096603] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.096735] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.096847] page dumped because: kasan: bad access detected [ 34.097319] [ 34.097514] Memory state around the buggy address: [ 34.097666] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.097882] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.098267] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.098388] ^ [ 34.098529] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.098644] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.098730] ================================================================== [ 34.124567] ================================================================== [ 34.124696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 34.125252] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.125423] [ 34.125515] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.125744] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.125807] Hardware name: linux,dummy-virt (DT) [ 34.125898] Call trace: [ 34.125957] show_stack+0x20/0x38 (C) [ 34.126085] dump_stack_lvl+0x8c/0xd0 [ 34.126213] print_report+0x118/0x608 [ 34.126331] kasan_report+0xdc/0x128 [ 34.126446] kasan_check_range+0x100/0x1a8 [ 34.126570] __kasan_check_write+0x20/0x30 [ 34.126694] kasan_atomics_helper+0x10c0/0x4858 [ 34.126823] kasan_atomics+0x198/0x2e0 [ 34.128949] kunit_try_run_case+0x170/0x3f0 [ 34.129528] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.129710] kthread+0x328/0x630 [ 34.129816] ret_from_fork+0x10/0x20 [ 34.129941] [ 34.130047] Allocated by task 276: [ 34.130146] kasan_save_stack+0x3c/0x68 [ 34.130275] kasan_save_track+0x20/0x40 [ 34.130381] kasan_save_alloc_info+0x40/0x58 [ 34.130491] __kasan_kmalloc+0xd4/0xd8 [ 34.131575] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.131776] kasan_atomics+0xb8/0x2e0 [ 34.131931] kunit_try_run_case+0x170/0x3f0 [ 34.132204] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.132416] kthread+0x328/0x630 [ 34.132503] ret_from_fork+0x10/0x20 [ 34.133496] [ 34.133692] The buggy address belongs to the object at fff00000c76a3180 [ 34.133692] which belongs to the cache kmalloc-64 of size 64 [ 34.134326] The buggy address is located 0 bytes to the right of [ 34.134326] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.135354] [ 34.135578] The buggy address belongs to the physical page: [ 34.136268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.136922] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.137620] page_type: f5(slab) [ 34.138208] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.138752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.139017] page dumped because: kasan: bad access detected [ 34.139589] [ 34.139658] Memory state around the buggy address: [ 34.139888] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.140181] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.140429] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.140533] ^ [ 34.140624] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.140736] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.140840] ================================================================== [ 34.099467] ================================================================== [ 34.099665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 34.099788] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.099924] [ 34.100012] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.100230] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.100303] Hardware name: linux,dummy-virt (DT) [ 34.100385] Call trace: [ 34.100439] show_stack+0x20/0x38 (C) [ 34.100556] dump_stack_lvl+0x8c/0xd0 [ 34.100683] print_report+0x118/0x608 [ 34.101335] kasan_report+0xdc/0x128 [ 34.101582] kasan_check_range+0x100/0x1a8 [ 34.102026] __kasan_check_write+0x20/0x30 [ 34.102373] kasan_atomics_helper+0xff0/0x4858 [ 34.102584] kasan_atomics+0x198/0x2e0 [ 34.102844] kunit_try_run_case+0x170/0x3f0 [ 34.103168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.103592] kthread+0x328/0x630 [ 34.103827] ret_from_fork+0x10/0x20 [ 34.104334] [ 34.104397] Allocated by task 276: [ 34.104483] kasan_save_stack+0x3c/0x68 [ 34.104599] kasan_save_track+0x20/0x40 [ 34.104760] kasan_save_alloc_info+0x40/0x58 [ 34.104870] __kasan_kmalloc+0xd4/0xd8 [ 34.104982] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.105084] kasan_atomics+0xb8/0x2e0 [ 34.105179] kunit_try_run_case+0x170/0x3f0 [ 34.105291] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.105421] kthread+0x328/0x630 [ 34.105724] ret_from_fork+0x10/0x20 [ 34.106024] [ 34.106074] The buggy address belongs to the object at fff00000c76a3180 [ 34.106074] which belongs to the cache kmalloc-64 of size 64 [ 34.106194] The buggy address is located 0 bytes to the right of [ 34.106194] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.106349] [ 34.106401] The buggy address belongs to the physical page: [ 34.106479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.106612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.106742] page_type: f5(slab) [ 34.106838] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.107000] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.107112] page dumped because: kasan: bad access detected [ 34.107200] [ 34.107916] Memory state around the buggy address: [ 34.108361] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.108762] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.109162] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.109475] ^ [ 34.109726] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.110059] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.110486] ================================================================== [ 33.917169] ================================================================== [ 33.917329] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 33.918017] Write of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 33.918397] [ 33.918654] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 33.918884] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.919709] Hardware name: linux,dummy-virt (DT) [ 33.919829] Call trace: [ 33.919903] show_stack+0x20/0x38 (C) [ 33.920038] dump_stack_lvl+0x8c/0xd0 [ 33.920678] print_report+0x118/0x608 [ 33.921113] kasan_report+0xdc/0x128 [ 33.921527] kasan_check_range+0x100/0x1a8 [ 33.921908] __kasan_check_write+0x20/0x30 [ 33.922117] kasan_atomics_helper+0xad4/0x4858 [ 33.922253] kasan_atomics+0x198/0x2e0 [ 33.922355] kunit_try_run_case+0x170/0x3f0 [ 33.923036] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.923563] kthread+0x328/0x630 [ 33.924023] ret_from_fork+0x10/0x20 [ 33.924231] [ 33.924297] Allocated by task 276: [ 33.924450] kasan_save_stack+0x3c/0x68 [ 33.924586] kasan_save_track+0x20/0x40 [ 33.924697] kasan_save_alloc_info+0x40/0x58 [ 33.924795] __kasan_kmalloc+0xd4/0xd8 [ 33.925490] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.925628] kasan_atomics+0xb8/0x2e0 [ 33.925708] kunit_try_run_case+0x170/0x3f0 [ 33.925802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.925920] kthread+0x328/0x630 [ 33.926900] ret_from_fork+0x10/0x20 [ 33.927054] [ 33.927117] The buggy address belongs to the object at fff00000c76a3180 [ 33.927117] which belongs to the cache kmalloc-64 of size 64 [ 33.927357] The buggy address is located 0 bytes to the right of [ 33.927357] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 33.928005] [ 33.928076] The buggy address belongs to the physical page: [ 33.928236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 33.928381] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.928510] page_type: f5(slab) [ 33.928621] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.928758] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.928895] page dumped because: kasan: bad access detected [ 33.929300] [ 33.929360] Memory state around the buggy address: [ 33.929513] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.930266] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.930409] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.930523] ^ [ 33.930618] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.931345] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.931464] ================================================================== [ 34.011028] ================================================================== [ 34.011174] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 34.011305] Read of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.011436] [ 34.011524] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.011719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.011778] Hardware name: linux,dummy-virt (DT) [ 34.011853] Call trace: [ 34.011925] show_stack+0x20/0x38 (C) [ 34.012388] dump_stack_lvl+0x8c/0xd0 [ 34.012528] print_report+0x118/0x608 [ 34.012651] kasan_report+0xdc/0x128 [ 34.012764] __asan_report_load4_noabort+0x20/0x30 [ 34.012956] kasan_atomics_helper+0x3e04/0x4858 [ 34.013146] kasan_atomics+0x198/0x2e0 [ 34.013318] kunit_try_run_case+0x170/0x3f0 [ 34.013502] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.013635] kthread+0x328/0x630 [ 34.013754] ret_from_fork+0x10/0x20 [ 34.013868] [ 34.013925] Allocated by task 276: [ 34.014006] kasan_save_stack+0x3c/0x68 [ 34.014103] kasan_save_track+0x20/0x40 [ 34.014194] kasan_save_alloc_info+0x40/0x58 [ 34.014284] __kasan_kmalloc+0xd4/0xd8 [ 34.014370] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.014471] kasan_atomics+0xb8/0x2e0 [ 34.015015] kunit_try_run_case+0x170/0x3f0 [ 34.015173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.015347] kthread+0x328/0x630 [ 34.015439] ret_from_fork+0x10/0x20 [ 34.015535] [ 34.015593] The buggy address belongs to the object at fff00000c76a3180 [ 34.015593] which belongs to the cache kmalloc-64 of size 64 [ 34.015746] The buggy address is located 0 bytes to the right of [ 34.015746] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.015930] [ 34.015987] The buggy address belongs to the physical page: [ 34.016085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.016267] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.016420] page_type: f5(slab) [ 34.016564] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.016752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.016903] page dumped because: kasan: bad access detected [ 34.016978] [ 34.017022] Memory state around the buggy address: [ 34.017104] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.017227] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.017582] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.017846] ^ [ 34.017947] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.018058] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.018332] ================================================================== [ 34.312117] ================================================================== [ 34.312798] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 34.313089] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.313242] [ 34.313759] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.314159] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.314234] Hardware name: linux,dummy-virt (DT) [ 34.314342] Call trace: [ 34.314414] show_stack+0x20/0x38 (C) [ 34.314685] dump_stack_lvl+0x8c/0xd0 [ 34.314821] print_report+0x118/0x608 [ 34.314963] kasan_report+0xdc/0x128 [ 34.315549] kasan_check_range+0x100/0x1a8 [ 34.315701] __kasan_check_write+0x20/0x30 [ 34.315809] kasan_atomics_helper+0x16d0/0x4858 [ 34.316416] kasan_atomics+0x198/0x2e0 [ 34.316563] kunit_try_run_case+0x170/0x3f0 [ 34.317324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.317643] kthread+0x328/0x630 [ 34.317774] ret_from_fork+0x10/0x20 [ 34.318259] [ 34.318365] Allocated by task 276: [ 34.318742] kasan_save_stack+0x3c/0x68 [ 34.318867] kasan_save_track+0x20/0x40 [ 34.318994] kasan_save_alloc_info+0x40/0x58 [ 34.319496] __kasan_kmalloc+0xd4/0xd8 [ 34.319622] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.320246] kasan_atomics+0xb8/0x2e0 [ 34.320422] kunit_try_run_case+0x170/0x3f0 [ 34.320523] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.320633] kthread+0x328/0x630 [ 34.320725] ret_from_fork+0x10/0x20 [ 34.321379] [ 34.321728] The buggy address belongs to the object at fff00000c76a3180 [ 34.321728] which belongs to the cache kmalloc-64 of size 64 [ 34.322192] The buggy address is located 0 bytes to the right of [ 34.322192] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.322642] [ 34.322710] The buggy address belongs to the physical page: [ 34.323071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.323259] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.323395] page_type: f5(slab) [ 34.324049] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.324200] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.324661] page dumped because: kasan: bad access detected [ 34.324769] [ 34.325097] Memory state around the buggy address: [ 34.325192] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.325668] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.325797] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.325917] ^ [ 34.326560] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.326678] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.327099] ================================================================== [ 34.174303] ================================================================== [ 34.174484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 34.174610] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.174738] [ 34.174826] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.175356] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.175475] Hardware name: linux,dummy-virt (DT) [ 34.175560] Call trace: [ 34.175626] show_stack+0x20/0x38 (C) [ 34.175794] dump_stack_lvl+0x8c/0xd0 [ 34.175966] print_report+0x118/0x608 [ 34.176109] kasan_report+0xdc/0x128 [ 34.176226] kasan_check_range+0x100/0x1a8 [ 34.176356] __kasan_check_write+0x20/0x30 [ 34.176503] kasan_atomics_helper+0x126c/0x4858 [ 34.176615] kasan_atomics+0x198/0x2e0 [ 34.176723] kunit_try_run_case+0x170/0x3f0 [ 34.176840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.177018] kthread+0x328/0x630 [ 34.177136] ret_from_fork+0x10/0x20 [ 34.177265] [ 34.177333] Allocated by task 276: [ 34.177463] kasan_save_stack+0x3c/0x68 [ 34.177595] kasan_save_track+0x20/0x40 [ 34.177693] kasan_save_alloc_info+0x40/0x58 [ 34.177799] __kasan_kmalloc+0xd4/0xd8 [ 34.177905] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.178010] kasan_atomics+0xb8/0x2e0 [ 34.178100] kunit_try_run_case+0x170/0x3f0 [ 34.178192] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.178284] kthread+0x328/0x630 [ 34.178353] ret_from_fork+0x10/0x20 [ 34.178443] [ 34.178498] The buggy address belongs to the object at fff00000c76a3180 [ 34.178498] which belongs to the cache kmalloc-64 of size 64 [ 34.178675] The buggy address is located 0 bytes to the right of [ 34.178675] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.178847] [ 34.178913] The buggy address belongs to the physical page: [ 34.179010] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.179151] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.180016] page_type: f5(slab) [ 34.180138] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.180266] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.180507] page dumped because: kasan: bad access detected [ 34.180790] [ 34.180991] Memory state around the buggy address: [ 34.181245] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.181507] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.181733] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.182083] ^ [ 34.182308] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.182584] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.182772] ================================================================== [ 34.255805] ================================================================== [ 34.255933] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 34.256058] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.256181] [ 34.256268] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.256496] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.256564] Hardware name: linux,dummy-virt (DT) [ 34.257037] Call trace: [ 34.257227] show_stack+0x20/0x38 (C) [ 34.257479] dump_stack_lvl+0x8c/0xd0 [ 34.257706] print_report+0x118/0x608 [ 34.257888] kasan_report+0xdc/0x128 [ 34.258008] kasan_check_range+0x100/0x1a8 [ 34.258114] __kasan_check_write+0x20/0x30 [ 34.258215] kasan_atomics_helper+0x154c/0x4858 [ 34.258337] kasan_atomics+0x198/0x2e0 [ 34.258456] kunit_try_run_case+0x170/0x3f0 [ 34.259020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.259319] kthread+0x328/0x630 [ 34.259942] ret_from_fork+0x10/0x20 [ 34.260106] [ 34.260171] Allocated by task 276: [ 34.260498] kasan_save_stack+0x3c/0x68 [ 34.260627] kasan_save_track+0x20/0x40 [ 34.260730] kasan_save_alloc_info+0x40/0x58 [ 34.260834] __kasan_kmalloc+0xd4/0xd8 [ 34.260933] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.261026] kasan_atomics+0xb8/0x2e0 [ 34.261120] kunit_try_run_case+0x170/0x3f0 [ 34.261264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.261381] kthread+0x328/0x630 [ 34.262011] ret_from_fork+0x10/0x20 [ 34.262397] [ 34.262483] The buggy address belongs to the object at fff00000c76a3180 [ 34.262483] which belongs to the cache kmalloc-64 of size 64 [ 34.262786] The buggy address is located 0 bytes to the right of [ 34.262786] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.263097] [ 34.263414] The buggy address belongs to the physical page: [ 34.263513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.263717] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.264123] page_type: f5(slab) [ 34.264247] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.264384] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.264572] page dumped because: kasan: bad access detected [ 34.264915] [ 34.265136] Memory state around the buggy address: [ 34.265269] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.265499] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.265641] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.266135] ^ [ 34.266379] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.266495] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.266901] ================================================================== [ 34.328678] ================================================================== [ 34.328816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 34.328967] Read of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.329105] [ 34.329197] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.329414] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.329503] Hardware name: linux,dummy-virt (DT) [ 34.329586] Call trace: [ 34.330266] show_stack+0x20/0x38 (C) [ 34.330460] dump_stack_lvl+0x8c/0xd0 [ 34.331028] print_report+0x118/0x608 [ 34.331471] kasan_report+0xdc/0x128 [ 34.331620] __asan_report_load8_noabort+0x20/0x30 [ 34.331754] kasan_atomics_helper+0x3e10/0x4858 [ 34.331895] kasan_atomics+0x198/0x2e0 [ 34.332020] kunit_try_run_case+0x170/0x3f0 [ 34.333275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.333962] kthread+0x328/0x630 [ 34.334094] ret_from_fork+0x10/0x20 [ 34.334193] [ 34.334232] Allocated by task 276: [ 34.334303] kasan_save_stack+0x3c/0x68 [ 34.335444] kasan_save_track+0x20/0x40 [ 34.335585] kasan_save_alloc_info+0x40/0x58 [ 34.335695] __kasan_kmalloc+0xd4/0xd8 [ 34.336067] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.336684] kasan_atomics+0xb8/0x2e0 [ 34.336798] kunit_try_run_case+0x170/0x3f0 [ 34.336909] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.337245] kthread+0x328/0x630 [ 34.337762] ret_from_fork+0x10/0x20 [ 34.337917] [ 34.337978] The buggy address belongs to the object at fff00000c76a3180 [ 34.337978] which belongs to the cache kmalloc-64 of size 64 [ 34.338243] The buggy address is located 0 bytes to the right of [ 34.338243] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.338386] [ 34.338430] The buggy address belongs to the physical page: [ 34.338722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.338893] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.339046] page_type: f5(slab) [ 34.339720] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.339866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.340333] page dumped because: kasan: bad access detected [ 34.340448] [ 34.340676] Memory state around the buggy address: [ 34.341072] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.341352] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.341809] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.342040] ^ [ 34.342152] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.342274] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.342426] ================================================================== [ 34.183599] ================================================================== [ 34.183859] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 34.184216] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.184571] [ 34.184741] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.185171] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.185238] Hardware name: linux,dummy-virt (DT) [ 34.185316] Call trace: [ 34.185371] show_stack+0x20/0x38 (C) [ 34.185905] dump_stack_lvl+0x8c/0xd0 [ 34.186418] print_report+0x118/0x608 [ 34.186789] kasan_report+0xdc/0x128 [ 34.187092] kasan_check_range+0x100/0x1a8 [ 34.187413] __kasan_check_write+0x20/0x30 [ 34.187554] kasan_atomics_helper+0x12d8/0x4858 [ 34.187894] kasan_atomics+0x198/0x2e0 [ 34.188134] kunit_try_run_case+0x170/0x3f0 [ 34.188535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.188956] kthread+0x328/0x630 [ 34.189218] ret_from_fork+0x10/0x20 [ 34.189535] [ 34.189593] Allocated by task 276: [ 34.189678] kasan_save_stack+0x3c/0x68 [ 34.189796] kasan_save_track+0x20/0x40 [ 34.190133] kasan_save_alloc_info+0x40/0x58 [ 34.190387] __kasan_kmalloc+0xd4/0xd8 [ 34.190721] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.190868] kasan_atomics+0xb8/0x2e0 [ 34.190980] kunit_try_run_case+0x170/0x3f0 [ 34.191248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.191735] kthread+0x328/0x630 [ 34.191848] ret_from_fork+0x10/0x20 [ 34.191955] [ 34.192262] The buggy address belongs to the object at fff00000c76a3180 [ 34.192262] which belongs to the cache kmalloc-64 of size 64 [ 34.192615] The buggy address is located 0 bytes to the right of [ 34.192615] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.193176] [ 34.193367] The buggy address belongs to the physical page: [ 34.193586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.193731] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.193851] page_type: f5(slab) [ 34.194268] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.194659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.194908] page dumped because: kasan: bad access detected [ 34.195017] [ 34.195070] Memory state around the buggy address: [ 34.195159] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.195274] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.195387] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.195490] ^ [ 34.195579] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.195970] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.196253] ================================================================== [ 34.296984] ================================================================== [ 34.297098] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 34.297208] Read of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.297330] [ 34.297422] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.297668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.297739] Hardware name: linux,dummy-virt (DT) [ 34.297815] Call trace: [ 34.297936] show_stack+0x20/0x38 (C) [ 34.298161] dump_stack_lvl+0x8c/0xd0 [ 34.298289] print_report+0x118/0x608 [ 34.298403] kasan_report+0xdc/0x128 [ 34.298531] __asan_report_load8_noabort+0x20/0x30 [ 34.298667] kasan_atomics_helper+0x3df4/0x4858 [ 34.298792] kasan_atomics+0x198/0x2e0 [ 34.298958] kunit_try_run_case+0x170/0x3f0 [ 34.299086] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.299240] kthread+0x328/0x630 [ 34.299483] ret_from_fork+0x10/0x20 [ 34.299631] [ 34.299684] Allocated by task 276: [ 34.299764] kasan_save_stack+0x3c/0x68 [ 34.299859] kasan_save_track+0x20/0x40 [ 34.299954] kasan_save_alloc_info+0x40/0x58 [ 34.300106] __kasan_kmalloc+0xd4/0xd8 [ 34.300206] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.300950] kasan_atomics+0xb8/0x2e0 [ 34.301323] kunit_try_run_case+0x170/0x3f0 [ 34.302103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.302385] kthread+0x328/0x630 [ 34.302906] ret_from_fork+0x10/0x20 [ 34.303113] [ 34.303296] The buggy address belongs to the object at fff00000c76a3180 [ 34.303296] which belongs to the cache kmalloc-64 of size 64 [ 34.303988] The buggy address is located 0 bytes to the right of [ 34.303988] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.304765] [ 34.304963] The buggy address belongs to the physical page: [ 34.305227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.305463] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.305580] page_type: f5(slab) [ 34.306497] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.306845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.306983] page dumped because: kasan: bad access detected [ 34.307071] [ 34.307125] Memory state around the buggy address: [ 34.307612] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.307749] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.308001] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.308237] ^ [ 34.308321] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.308443] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.308861] ================================================================== [ 34.281039] ================================================================== [ 34.281164] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 34.281292] Read of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.281427] [ 34.281516] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.281745] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.281818] Hardware name: linux,dummy-virt (DT) [ 34.282425] Call trace: [ 34.282493] show_stack+0x20/0x38 (C) [ 34.282618] dump_stack_lvl+0x8c/0xd0 [ 34.282744] print_report+0x118/0x608 [ 34.283264] kasan_report+0xdc/0x128 [ 34.283545] __asan_report_load8_noabort+0x20/0x30 [ 34.283701] kasan_atomics_helper+0x3db0/0x4858 [ 34.283822] kasan_atomics+0x198/0x2e0 [ 34.284127] kunit_try_run_case+0x170/0x3f0 [ 34.284276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.284413] kthread+0x328/0x630 [ 34.284513] ret_from_fork+0x10/0x20 [ 34.284658] [ 34.284751] Allocated by task 276: [ 34.284829] kasan_save_stack+0x3c/0x68 [ 34.284965] kasan_save_track+0x20/0x40 [ 34.285068] kasan_save_alloc_info+0x40/0x58 [ 34.285176] __kasan_kmalloc+0xd4/0xd8 [ 34.285274] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.285379] kasan_atomics+0xb8/0x2e0 [ 34.285501] kunit_try_run_case+0x170/0x3f0 [ 34.285595] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.285925] kthread+0x328/0x630 [ 34.286016] ret_from_fork+0x10/0x20 [ 34.286111] [ 34.286344] The buggy address belongs to the object at fff00000c76a3180 [ 34.286344] which belongs to the cache kmalloc-64 of size 64 [ 34.286504] The buggy address is located 0 bytes to the right of [ 34.286504] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.286657] [ 34.286711] The buggy address belongs to the physical page: [ 34.286838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.287069] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.287221] page_type: f5(slab) [ 34.287368] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.287552] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.287682] page dumped because: kasan: bad access detected [ 34.287769] [ 34.287838] Memory state around the buggy address: [ 34.287969] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.288092] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.288209] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.288314] ^ [ 34.288441] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.288591] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.288694] ================================================================== [ 34.345109] ================================================================== [ 34.345315] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 34.345485] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.345613] [ 34.345698] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.345912] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.345987] Hardware name: linux,dummy-virt (DT) [ 34.346075] Call trace: [ 34.346898] show_stack+0x20/0x38 (C) [ 34.347260] dump_stack_lvl+0x8c/0xd0 [ 34.347409] print_report+0x118/0x608 [ 34.347525] kasan_report+0xdc/0x128 [ 34.348085] kasan_check_range+0x100/0x1a8 [ 34.348451] __kasan_check_write+0x20/0x30 [ 34.348751] kasan_atomics_helper+0x175c/0x4858 [ 34.348934] kasan_atomics+0x198/0x2e0 [ 34.349433] kunit_try_run_case+0x170/0x3f0 [ 34.349617] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.349778] kthread+0x328/0x630 [ 34.349909] ret_from_fork+0x10/0x20 [ 34.350757] [ 34.350841] Allocated by task 276: [ 34.350957] kasan_save_stack+0x3c/0x68 [ 34.351145] kasan_save_track+0x20/0x40 [ 34.351478] kasan_save_alloc_info+0x40/0x58 [ 34.351755] __kasan_kmalloc+0xd4/0xd8 [ 34.351858] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.351973] kasan_atomics+0xb8/0x2e0 [ 34.352071] kunit_try_run_case+0x170/0x3f0 [ 34.352175] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.352288] kthread+0x328/0x630 [ 34.352997] ret_from_fork+0x10/0x20 [ 34.353134] [ 34.353570] The buggy address belongs to the object at fff00000c76a3180 [ 34.353570] which belongs to the cache kmalloc-64 of size 64 [ 34.353983] The buggy address is located 0 bytes to the right of [ 34.353983] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.354174] [ 34.354739] The buggy address belongs to the physical page: [ 34.354846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.355009] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.355498] page_type: f5(slab) [ 34.355957] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.356136] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.356401] page dumped because: kasan: bad access detected [ 34.356707] [ 34.356772] Memory state around the buggy address: [ 34.357097] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.357228] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.357345] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.357455] ^ [ 34.357551] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.357666] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.357772] ================================================================== [ 34.080313] ================================================================== [ 34.080445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 34.080650] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.080776] [ 34.081203] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.081851] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.081946] Hardware name: linux,dummy-virt (DT) [ 34.082451] Call trace: [ 34.082545] show_stack+0x20/0x38 (C) [ 34.082685] dump_stack_lvl+0x8c/0xd0 [ 34.082810] print_report+0x118/0x608 [ 34.082953] kasan_report+0xdc/0x128 [ 34.083081] kasan_check_range+0x100/0x1a8 [ 34.083206] __kasan_check_write+0x20/0x30 [ 34.083322] kasan_atomics_helper+0xf20/0x4858 [ 34.083451] kasan_atomics+0x198/0x2e0 [ 34.083572] kunit_try_run_case+0x170/0x3f0 [ 34.083698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.083846] kthread+0x328/0x630 [ 34.083965] ret_from_fork+0x10/0x20 [ 34.084375] [ 34.084537] Allocated by task 276: [ 34.084646] kasan_save_stack+0x3c/0x68 [ 34.084754] kasan_save_track+0x20/0x40 [ 34.084853] kasan_save_alloc_info+0x40/0x58 [ 34.084974] __kasan_kmalloc+0xd4/0xd8 [ 34.085073] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.085178] kasan_atomics+0xb8/0x2e0 [ 34.085278] kunit_try_run_case+0x170/0x3f0 [ 34.085412] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.085563] kthread+0x328/0x630 [ 34.085685] ret_from_fork+0x10/0x20 [ 34.085803] [ 34.085859] The buggy address belongs to the object at fff00000c76a3180 [ 34.085859] which belongs to the cache kmalloc-64 of size 64 [ 34.086009] The buggy address is located 0 bytes to the right of [ 34.086009] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.086174] [ 34.086236] The buggy address belongs to the physical page: [ 34.086327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.086458] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.086571] page_type: f5(slab) [ 34.087077] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.087592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.087842] page dumped because: kasan: bad access detected [ 34.088070] [ 34.088118] Memory state around the buggy address: [ 34.088308] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.088531] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.088678] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.088800] ^ [ 34.089181] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.089300] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.089578] ================================================================== [ 34.221415] ================================================================== [ 34.222052] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 34.222445] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.222682] [ 34.223006] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.223538] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.223702] Hardware name: linux,dummy-virt (DT) [ 34.223803] Call trace: [ 34.223867] show_stack+0x20/0x38 (C) [ 34.224013] dump_stack_lvl+0x8c/0xd0 [ 34.224139] print_report+0x118/0x608 [ 34.224259] kasan_report+0xdc/0x128 [ 34.225025] kasan_check_range+0x100/0x1a8 [ 34.225308] __kasan_check_write+0x20/0x30 [ 34.225617] kasan_atomics_helper+0x1414/0x4858 [ 34.225789] kasan_atomics+0x198/0x2e0 [ 34.226041] kunit_try_run_case+0x170/0x3f0 [ 34.226311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.226769] kthread+0x328/0x630 [ 34.226897] ret_from_fork+0x10/0x20 [ 34.227139] [ 34.227309] Allocated by task 276: [ 34.227408] kasan_save_stack+0x3c/0x68 [ 34.227728] kasan_save_track+0x20/0x40 [ 34.228100] kasan_save_alloc_info+0x40/0x58 [ 34.228226] __kasan_kmalloc+0xd4/0xd8 [ 34.228331] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.228430] kasan_atomics+0xb8/0x2e0 [ 34.228524] kunit_try_run_case+0x170/0x3f0 [ 34.228628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.228741] kthread+0x328/0x630 [ 34.228825] ret_from_fork+0x10/0x20 [ 34.228931] [ 34.228990] The buggy address belongs to the object at fff00000c76a3180 [ 34.228990] which belongs to the cache kmalloc-64 of size 64 [ 34.229511] The buggy address is located 0 bytes to the right of [ 34.229511] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.229856] [ 34.230112] The buggy address belongs to the physical page: [ 34.230512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.230675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.231043] page_type: f5(slab) [ 34.231145] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.231400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.231711] page dumped because: kasan: bad access detected [ 34.232020] [ 34.232077] Memory state around the buggy address: [ 34.232163] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.232674] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.233091] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.233438] ^ [ 34.233628] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.233837] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.233938] ================================================================== [ 34.040018] ================================================================== [ 34.040139] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 34.040262] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.040395] [ 34.040488] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.040719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.042297] Hardware name: linux,dummy-virt (DT) [ 34.042408] Call trace: [ 34.042474] show_stack+0x20/0x38 (C) [ 34.042953] dump_stack_lvl+0x8c/0xd0 [ 34.043570] print_report+0x118/0x608 [ 34.043842] kasan_report+0xdc/0x128 [ 34.043987] kasan_check_range+0x100/0x1a8 [ 34.044110] __kasan_check_write+0x20/0x30 [ 34.044814] kasan_atomics_helper+0xe44/0x4858 [ 34.045251] kasan_atomics+0x198/0x2e0 [ 34.045384] kunit_try_run_case+0x170/0x3f0 [ 34.045999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.046581] kthread+0x328/0x630 [ 34.047053] ret_from_fork+0x10/0x20 [ 34.047221] [ 34.047444] Allocated by task 276: [ 34.047532] kasan_save_stack+0x3c/0x68 [ 34.048105] kasan_save_track+0x20/0x40 [ 34.048218] kasan_save_alloc_info+0x40/0x58 [ 34.048330] __kasan_kmalloc+0xd4/0xd8 [ 34.048428] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.048541] kasan_atomics+0xb8/0x2e0 [ 34.048640] kunit_try_run_case+0x170/0x3f0 [ 34.049814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.050214] kthread+0x328/0x630 [ 34.050556] ret_from_fork+0x10/0x20 [ 34.050887] [ 34.050964] The buggy address belongs to the object at fff00000c76a3180 [ 34.050964] which belongs to the cache kmalloc-64 of size 64 [ 34.051374] The buggy address is located 0 bytes to the right of [ 34.051374] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.051564] [ 34.051614] The buggy address belongs to the physical page: [ 34.051686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.051809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.051952] page_type: f5(slab) [ 34.052056] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.053158] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.053438] page dumped because: kasan: bad access detected [ 34.053530] [ 34.053574] Memory state around the buggy address: [ 34.054054] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.054366] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.054497] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.055086] ^ [ 34.055193] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.055306] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.055668] ================================================================== [ 34.210732] ================================================================== [ 34.210865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 34.211002] Read of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.211107] [ 34.211190] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.211412] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.211484] Hardware name: linux,dummy-virt (DT) [ 34.211571] Call trace: [ 34.211630] show_stack+0x20/0x38 (C) [ 34.211758] dump_stack_lvl+0x8c/0xd0 [ 34.211889] print_report+0x118/0x608 [ 34.212021] kasan_report+0xdc/0x128 [ 34.212138] __asan_report_load8_noabort+0x20/0x30 [ 34.212261] kasan_atomics_helper+0x3f04/0x4858 [ 34.212387] kasan_atomics+0x198/0x2e0 [ 34.212510] kunit_try_run_case+0x170/0x3f0 [ 34.212640] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.212783] kthread+0x328/0x630 [ 34.213548] ret_from_fork+0x10/0x20 [ 34.213843] [ 34.213910] Allocated by task 276: [ 34.213998] kasan_save_stack+0x3c/0x68 [ 34.214387] kasan_save_track+0x20/0x40 [ 34.214489] kasan_save_alloc_info+0x40/0x58 [ 34.214572] __kasan_kmalloc+0xd4/0xd8 [ 34.214643] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.214738] kasan_atomics+0xb8/0x2e0 [ 34.214825] kunit_try_run_case+0x170/0x3f0 [ 34.215024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.215293] kthread+0x328/0x630 [ 34.215747] ret_from_fork+0x10/0x20 [ 34.216081] [ 34.216213] The buggy address belongs to the object at fff00000c76a3180 [ 34.216213] which belongs to the cache kmalloc-64 of size 64 [ 34.216426] The buggy address is located 0 bytes to the right of [ 34.216426] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.216998] [ 34.217079] The buggy address belongs to the physical page: [ 34.217298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.217534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.217894] page_type: f5(slab) [ 34.217998] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.218120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.218374] page dumped because: kasan: bad access detected [ 34.218568] [ 34.218643] Memory state around the buggy address: [ 34.218758] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.218881] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.219008] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.219738] ^ [ 34.220044] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.220184] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.220294] ================================================================== [ 34.166336] ================================================================== [ 34.166465] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 34.166643] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.166818] [ 34.166975] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.167273] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.167344] Hardware name: linux,dummy-virt (DT) [ 34.167430] Call trace: [ 34.167515] show_stack+0x20/0x38 (C) [ 34.167681] dump_stack_lvl+0x8c/0xd0 [ 34.167847] print_report+0x118/0x608 [ 34.167967] kasan_report+0xdc/0x128 [ 34.168081] kasan_check_range+0x100/0x1a8 [ 34.168250] __kasan_check_write+0x20/0x30 [ 34.168360] kasan_atomics_helper+0x11f8/0x4858 [ 34.168477] kasan_atomics+0x198/0x2e0 [ 34.168593] kunit_try_run_case+0x170/0x3f0 [ 34.168727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.168928] kthread+0x328/0x630 [ 34.169062] ret_from_fork+0x10/0x20 [ 34.169214] [ 34.169283] Allocated by task 276: [ 34.169379] kasan_save_stack+0x3c/0x68 [ 34.169506] kasan_save_track+0x20/0x40 [ 34.169637] kasan_save_alloc_info+0x40/0x58 [ 34.169853] __kasan_kmalloc+0xd4/0xd8 [ 34.169993] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.170109] kasan_atomics+0xb8/0x2e0 [ 34.170198] kunit_try_run_case+0x170/0x3f0 [ 34.170284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.170372] kthread+0x328/0x630 [ 34.170450] ret_from_fork+0x10/0x20 [ 34.170545] [ 34.170602] The buggy address belongs to the object at fff00000c76a3180 [ 34.170602] which belongs to the cache kmalloc-64 of size 64 [ 34.171239] The buggy address is located 0 bytes to the right of [ 34.171239] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.172433] [ 34.172508] The buggy address belongs to the physical page: [ 34.172591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.172675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.172736] page_type: f5(slab) [ 34.172788] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.172845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.172947] page dumped because: kasan: bad access detected [ 34.173070] [ 34.173120] Memory state around the buggy address: [ 34.173206] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.173322] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.173429] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.173531] ^ [ 34.173613] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.173706] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.173793] ================================================================== [ 33.874083] ================================================================== [ 33.874211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 33.874375] Write of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 33.874508] [ 33.874589] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 33.874785] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.875726] kasan_atomics_helper+0x934/0x4858 [ 33.877084] __kasan_kmalloc+0xd4/0xd8 [ 33.877179] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.877280] kasan_atomics+0xb8/0x2e0 [ 33.877371] kunit_try_run_case+0x170/0x3f0 [ 33.877603] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.877744] kthread+0x328/0x630 [ 33.877827] ret_from_fork+0x10/0x20 [ 33.877928] [ 33.878012] The buggy address belongs to the object at fff00000c76a3180 [ 33.878012] which belongs to the cache kmalloc-64 of size 64 [ 33.878162] The buggy address is located 0 bytes to the right of [ 33.878162] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 33.878346] [ 33.878410] The buggy address belongs to the physical page: [ 33.878481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 33.878595] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.878711] page_type: f5(slab) [ 33.878814] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.878972] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.879092] page dumped because: kasan: bad access detected [ 33.879168] [ 33.879233] Memory state around the buggy address: [ 33.879321] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.879430] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.879548] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.879653] ^ [ 33.879744] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.879859] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.879974] ================================================================== [ 33.990765] ================================================================== [ 33.990987] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 33.991125] Read of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 33.991256] [ 33.991338] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 33.991557] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.991634] Hardware name: linux,dummy-virt (DT) [ 33.991724] Call trace: [ 33.991811] show_stack+0x20/0x38 (C) [ 33.992075] dump_stack_lvl+0x8c/0xd0 [ 33.992323] print_report+0x118/0x608 [ 33.993098] kasan_report+0xdc/0x128 [ 33.993482] __asan_report_load4_noabort+0x20/0x30 [ 33.993742] kasan_atomics_helper+0x3dd8/0x4858 [ 33.993912] kasan_atomics+0x198/0x2e0 [ 33.994036] kunit_try_run_case+0x170/0x3f0 [ 33.994166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.994307] kthread+0x328/0x630 [ 33.994422] ret_from_fork+0x10/0x20 [ 33.994544] [ 33.994586] Allocated by task 276: [ 33.994647] kasan_save_stack+0x3c/0x68 [ 33.995124] kasan_save_track+0x20/0x40 [ 33.995366] kasan_save_alloc_info+0x40/0x58 [ 33.995480] __kasan_kmalloc+0xd4/0xd8 [ 33.995665] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.995948] kasan_atomics+0xb8/0x2e0 [ 33.996047] kunit_try_run_case+0x170/0x3f0 [ 33.996311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.996623] kthread+0x328/0x630 [ 33.996821] ret_from_fork+0x10/0x20 [ 33.997032] [ 33.997105] The buggy address belongs to the object at fff00000c76a3180 [ 33.997105] which belongs to the cache kmalloc-64 of size 64 [ 33.997376] The buggy address is located 0 bytes to the right of [ 33.997376] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 33.997563] [ 33.997622] The buggy address belongs to the physical page: [ 33.997709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 33.997850] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.997990] page_type: f5(slab) [ 33.998089] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.998263] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.998625] page dumped because: kasan: bad access detected [ 33.998758] [ 33.998839] Memory state around the buggy address: [ 33.998986] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.999156] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.999321] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.999467] ^ [ 33.999967] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.000087] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.000193] ================================================================== [ 33.900918] ================================================================== [ 33.901055] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 33.901839] Write of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 33.902007] [ 33.902097] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 33.902326] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.902407] Hardware name: linux,dummy-virt (DT) [ 33.903390] Call trace: [ 33.903571] show_stack+0x20/0x38 (C) [ 33.904160] dump_stack_lvl+0x8c/0xd0 [ 33.904518] print_report+0x118/0x608 [ 33.904881] kasan_report+0xdc/0x128 [ 33.905379] kasan_check_range+0x100/0x1a8 [ 33.905624] __kasan_check_write+0x20/0x30 [ 33.905859] kasan_atomics_helper+0xa6c/0x4858 [ 33.906188] kasan_atomics+0x198/0x2e0 [ 33.906426] kunit_try_run_case+0x170/0x3f0 [ 33.906822] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.907209] kthread+0x328/0x630 [ 33.907648] ret_from_fork+0x10/0x20 [ 33.908036] [ 33.908100] Allocated by task 276: [ 33.908471] kasan_save_stack+0x3c/0x68 [ 33.908593] kasan_save_track+0x20/0x40 [ 33.908932] kasan_save_alloc_info+0x40/0x58 [ 33.909055] __kasan_kmalloc+0xd4/0xd8 [ 33.909660] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.909848] kasan_atomics+0xb8/0x2e0 [ 33.909960] kunit_try_run_case+0x170/0x3f0 [ 33.910293] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.910663] kthread+0x328/0x630 [ 33.910805] ret_from_fork+0x10/0x20 [ 33.911118] [ 33.911443] The buggy address belongs to the object at fff00000c76a3180 [ 33.911443] which belongs to the cache kmalloc-64 of size 64 [ 33.911811] The buggy address is located 0 bytes to the right of [ 33.911811] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 33.912384] [ 33.912463] The buggy address belongs to the physical page: [ 33.912554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 33.913102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.913250] page_type: f5(slab) [ 33.913795] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.914324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.914449] page dumped because: kasan: bad access detected [ 33.914606] [ 33.914686] Memory state around the buggy address: [ 33.914882] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.915021] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.915200] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.915367] ^ [ 33.915465] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.915617] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.915806] ================================================================== [ 34.031573] ================================================================== [ 34.031637] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 34.031745] Read of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.031858] [ 34.031962] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.032150] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.032221] Hardware name: linux,dummy-virt (DT) [ 34.032304] Call trace: [ 34.032360] show_stack+0x20/0x38 (C) [ 34.032493] dump_stack_lvl+0x8c/0xd0 [ 34.032617] print_report+0x118/0x608 [ 34.032738] kasan_report+0xdc/0x128 [ 34.032853] __asan_report_load8_noabort+0x20/0x30 [ 34.032999] kasan_atomics_helper+0x3f58/0x4858 [ 34.033129] kasan_atomics+0x198/0x2e0 [ 34.033248] kunit_try_run_case+0x170/0x3f0 [ 34.033379] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.033517] kthread+0x328/0x630 [ 34.033631] ret_from_fork+0x10/0x20 [ 34.033757] [ 34.033806] Allocated by task 276: [ 34.033889] kasan_save_stack+0x3c/0x68 [ 34.034295] kasan_save_track+0x20/0x40 [ 34.034395] kasan_save_alloc_info+0x40/0x58 [ 34.034490] __kasan_kmalloc+0xd4/0xd8 [ 34.034762] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.034866] kasan_atomics+0xb8/0x2e0 [ 34.034989] kunit_try_run_case+0x170/0x3f0 [ 34.035081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.035184] kthread+0x328/0x630 [ 34.035258] ret_from_fork+0x10/0x20 [ 34.035332] [ 34.035382] The buggy address belongs to the object at fff00000c76a3180 [ 34.035382] which belongs to the cache kmalloc-64 of size 64 [ 34.035934] The buggy address is located 0 bytes to the right of [ 34.035934] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.036190] [ 34.036251] The buggy address belongs to the physical page: [ 34.036492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.036962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.037800] page_type: f5(slab) [ 34.037924] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.038078] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.038508] page dumped because: kasan: bad access detected [ 34.038589] [ 34.038644] Memory state around the buggy address: [ 34.038743] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.038857] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.038989] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.039077] ^ [ 34.039157] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.039250] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.039361] ================================================================== [ 34.057646] ================================================================== [ 34.058461] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 34.058766] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.058982] [ 34.059082] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.059602] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.059824] Hardware name: linux,dummy-virt (DT) [ 34.060030] Call trace: [ 34.060244] show_stack+0x20/0x38 (C) [ 34.060504] dump_stack_lvl+0x8c/0xd0 [ 34.060933] print_report+0x118/0x608 [ 34.061214] kasan_report+0xdc/0x128 [ 34.061382] __asan_report_store8_noabort+0x20/0x30 [ 34.061767] kasan_atomics_helper+0x3e5c/0x4858 [ 34.062092] kasan_atomics+0x198/0x2e0 [ 34.062168] kunit_try_run_case+0x170/0x3f0 [ 34.062228] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.062293] kthread+0x328/0x630 [ 34.062346] ret_from_fork+0x10/0x20 [ 34.062407] [ 34.062431] Allocated by task 276: [ 34.062470] kasan_save_stack+0x3c/0x68 [ 34.062525] kasan_save_track+0x20/0x40 [ 34.062571] kasan_save_alloc_info+0x40/0x58 [ 34.062618] __kasan_kmalloc+0xd4/0xd8 [ 34.062662] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.062709] kasan_atomics+0xb8/0x2e0 [ 34.062751] kunit_try_run_case+0x170/0x3f0 [ 34.062794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.062845] kthread+0x328/0x630 [ 34.062914] ret_from_fork+0x10/0x20 [ 34.063543] [ 34.063647] The buggy address belongs to the object at fff00000c76a3180 [ 34.063647] which belongs to the cache kmalloc-64 of size 64 [ 34.064106] The buggy address is located 0 bytes to the right of [ 34.064106] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.064578] [ 34.064686] The buggy address belongs to the physical page: [ 34.064904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.065034] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.065553] page_type: f5(slab) [ 34.065841] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.065992] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.066105] page dumped because: kasan: bad access detected [ 34.066535] [ 34.066593] Memory state around the buggy address: [ 34.066853] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.067107] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.067450] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.067773] ^ [ 34.068099] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.068350] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.068462] ================================================================== [ 34.289220] ================================================================== [ 34.289566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 34.289786] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.290081] [ 34.290390] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.290646] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.290718] Hardware name: linux,dummy-virt (DT) [ 34.290802] Call trace: [ 34.290892] show_stack+0x20/0x38 (C) [ 34.291330] dump_stack_lvl+0x8c/0xd0 [ 34.291539] print_report+0x118/0x608 [ 34.291703] kasan_report+0xdc/0x128 [ 34.291895] kasan_check_range+0x100/0x1a8 [ 34.292015] __kasan_check_write+0x20/0x30 [ 34.292111] kasan_atomics_helper+0x1644/0x4858 [ 34.292254] kasan_atomics+0x198/0x2e0 [ 34.292385] kunit_try_run_case+0x170/0x3f0 [ 34.292524] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.292644] kthread+0x328/0x630 [ 34.292751] ret_from_fork+0x10/0x20 [ 34.292894] [ 34.292951] Allocated by task 276: [ 34.293034] kasan_save_stack+0x3c/0x68 [ 34.293133] kasan_save_track+0x20/0x40 [ 34.293251] kasan_save_alloc_info+0x40/0x58 [ 34.293386] __kasan_kmalloc+0xd4/0xd8 [ 34.293544] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.293649] kasan_atomics+0xb8/0x2e0 [ 34.293732] kunit_try_run_case+0x170/0x3f0 [ 34.293832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.293984] kthread+0x328/0x630 [ 34.294078] ret_from_fork+0x10/0x20 [ 34.294208] [ 34.294259] The buggy address belongs to the object at fff00000c76a3180 [ 34.294259] which belongs to the cache kmalloc-64 of size 64 [ 34.294449] The buggy address is located 0 bytes to the right of [ 34.294449] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.294624] [ 34.294708] The buggy address belongs to the physical page: [ 34.294784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.294937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.295072] page_type: f5(slab) [ 34.295161] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.295305] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.295412] page dumped because: kasan: bad access detected [ 34.295496] [ 34.295547] Memory state around the buggy address: [ 34.295632] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.295750] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.295929] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.296084] ^ [ 34.296217] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.296381] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.296531] ================================================================== [ 33.886996] ================================================================== [ 33.887118] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 33.887243] Write of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 33.887380] [ 33.887506] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 33.888392] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.888568] Hardware name: linux,dummy-virt (DT) [ 33.888657] Call trace: [ 33.888712] show_stack+0x20/0x38 (C) [ 33.888846] dump_stack_lvl+0x8c/0xd0 [ 33.888985] print_report+0x118/0x608 [ 33.889107] kasan_report+0xdc/0x128 [ 33.889227] kasan_check_range+0x100/0x1a8 [ 33.889355] __kasan_check_write+0x20/0x30 [ 33.889927] kasan_atomics_helper+0xa04/0x4858 [ 33.890620] kasan_atomics+0x198/0x2e0 [ 33.890795] kunit_try_run_case+0x170/0x3f0 [ 33.891207] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.891593] kthread+0x328/0x630 [ 33.891724] ret_from_fork+0x10/0x20 [ 33.891976] [ 33.892038] Allocated by task 276: [ 33.892242] kasan_save_stack+0x3c/0x68 [ 33.892793] kasan_save_track+0x20/0x40 [ 33.892946] kasan_save_alloc_info+0x40/0x58 [ 33.893158] __kasan_kmalloc+0xd4/0xd8 [ 33.893266] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.893828] kasan_atomics+0xb8/0x2e0 [ 33.893954] kunit_try_run_case+0x170/0x3f0 [ 33.894367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.894490] kthread+0x328/0x630 [ 33.894568] ret_from_fork+0x10/0x20 [ 33.894649] [ 33.894706] The buggy address belongs to the object at fff00000c76a3180 [ 33.894706] which belongs to the cache kmalloc-64 of size 64 [ 33.895725] The buggy address is located 0 bytes to the right of [ 33.895725] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 33.896013] [ 33.896163] The buggy address belongs to the physical page: [ 33.896283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 33.896460] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.896648] page_type: f5(slab) [ 33.896821] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.897204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.897533] page dumped because: kasan: bad access detected [ 33.897630] [ 33.897677] Memory state around the buggy address: [ 33.897751] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.897855] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.898434] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.899029] ^ [ 33.899155] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.899682] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.900164] ================================================================== [ 34.268958] ================================================================== [ 34.269092] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 34.269224] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.269358] [ 34.269462] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.269694] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.269765] Hardware name: linux,dummy-virt (DT) [ 34.269850] Call trace: [ 34.272628] show_stack+0x20/0x38 (C) [ 34.272792] dump_stack_lvl+0x8c/0xd0 [ 34.273028] print_report+0x118/0x608 [ 34.273157] kasan_report+0xdc/0x128 [ 34.273365] kasan_check_range+0x100/0x1a8 [ 34.273655] __kasan_check_write+0x20/0x30 [ 34.273866] kasan_atomics_helper+0x15b4/0x4858 [ 34.274198] kasan_atomics+0x198/0x2e0 [ 34.274364] kunit_try_run_case+0x170/0x3f0 [ 34.274472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.274587] kthread+0x328/0x630 [ 34.274674] ret_from_fork+0x10/0x20 [ 34.274798] [ 34.275299] Allocated by task 276: [ 34.275382] kasan_save_stack+0x3c/0x68 [ 34.275486] kasan_save_track+0x20/0x40 [ 34.275570] kasan_save_alloc_info+0x40/0x58 [ 34.275668] __kasan_kmalloc+0xd4/0xd8 [ 34.275761] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.276316] kasan_atomics+0xb8/0x2e0 [ 34.276436] kunit_try_run_case+0x170/0x3f0 [ 34.276538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.277129] kthread+0x328/0x630 [ 34.277754] ret_from_fork+0x10/0x20 [ 34.277868] [ 34.277967] The buggy address belongs to the object at fff00000c76a3180 [ 34.277967] which belongs to the cache kmalloc-64 of size 64 [ 34.278113] The buggy address is located 0 bytes to the right of [ 34.278113] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.278383] [ 34.278713] The buggy address belongs to the physical page: [ 34.278843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.279084] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.279222] page_type: f5(slab) [ 34.279326] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.279453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.279582] page dumped because: kasan: bad access detected [ 34.279702] [ 34.279783] Memory state around the buggy address: [ 34.279909] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.280014] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.280124] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.280228] ^ [ 34.280319] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.280426] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.280521] ================================================================== [ 34.021554] ================================================================== [ 34.021680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 34.022138] Read of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.022327] [ 34.022419] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.022635] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.022709] Hardware name: linux,dummy-virt (DT) [ 34.022988] Call trace: [ 34.023059] show_stack+0x20/0x38 (C) [ 34.023237] dump_stack_lvl+0x8c/0xd0 [ 34.023404] print_report+0x118/0x608 [ 34.023581] kasan_report+0xdc/0x128 [ 34.023754] kasan_check_range+0x100/0x1a8 [ 34.023955] __kasan_check_read+0x20/0x30 [ 34.024141] kasan_atomics_helper+0xdd4/0x4858 [ 34.024318] kasan_atomics+0x198/0x2e0 [ 34.024488] kunit_try_run_case+0x170/0x3f0 [ 34.024628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.024789] kthread+0x328/0x630 [ 34.024915] ret_from_fork+0x10/0x20 [ 34.025048] [ 34.025125] Allocated by task 276: [ 34.025232] kasan_save_stack+0x3c/0x68 [ 34.025384] kasan_save_track+0x20/0x40 [ 34.025525] kasan_save_alloc_info+0x40/0x58 [ 34.025627] __kasan_kmalloc+0xd4/0xd8 [ 34.025723] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.025831] kasan_atomics+0xb8/0x2e0 [ 34.026384] kunit_try_run_case+0x170/0x3f0 [ 34.027197] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.027359] kthread+0x328/0x630 [ 34.027451] ret_from_fork+0x10/0x20 [ 34.027548] [ 34.027630] The buggy address belongs to the object at fff00000c76a3180 [ 34.027630] which belongs to the cache kmalloc-64 of size 64 [ 34.027768] The buggy address is located 0 bytes to the right of [ 34.027768] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.028206] [ 34.028301] The buggy address belongs to the physical page: [ 34.028425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.028582] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.028723] page_type: f5(slab) [ 34.028886] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.029027] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.029134] page dumped because: kasan: bad access detected [ 34.029219] [ 34.029268] Memory state around the buggy address: [ 34.029358] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.029509] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.029622] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.029732] ^ [ 34.030375] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.030509] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.030918] ================================================================== [ 34.142751] ================================================================== [ 34.143235] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 34.143692] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.143827] [ 34.143928] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.144151] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.144227] Hardware name: linux,dummy-virt (DT) [ 34.144312] Call trace: [ 34.144368] show_stack+0x20/0x38 (C) [ 34.144491] dump_stack_lvl+0x8c/0xd0 [ 34.144620] print_report+0x118/0x608 [ 34.144739] kasan_report+0xdc/0x128 [ 34.144859] kasan_check_range+0x100/0x1a8 [ 34.146185] __kasan_check_write+0x20/0x30 [ 34.146502] kasan_atomics_helper+0x1128/0x4858 [ 34.146721] kasan_atomics+0x198/0x2e0 [ 34.146868] kunit_try_run_case+0x170/0x3f0 [ 34.147013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.147239] kthread+0x328/0x630 [ 34.147421] ret_from_fork+0x10/0x20 [ 34.147617] [ 34.147673] Allocated by task 276: [ 34.147767] kasan_save_stack+0x3c/0x68 [ 34.147889] kasan_save_track+0x20/0x40 [ 34.147992] kasan_save_alloc_info+0x40/0x58 [ 34.148092] __kasan_kmalloc+0xd4/0xd8 [ 34.148206] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.148320] kasan_atomics+0xb8/0x2e0 [ 34.148416] kunit_try_run_case+0x170/0x3f0 [ 34.148512] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.148628] kthread+0x328/0x630 [ 34.148715] ret_from_fork+0x10/0x20 [ 34.148842] [ 34.149187] The buggy address belongs to the object at fff00000c76a3180 [ 34.149187] which belongs to the cache kmalloc-64 of size 64 [ 34.149359] The buggy address is located 0 bytes to the right of [ 34.149359] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.149523] [ 34.150421] The buggy address belongs to the physical page: [ 34.150554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.150694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.151052] page_type: f5(slab) [ 34.151160] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.151308] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.151433] page dumped because: kasan: bad access detected [ 34.151570] [ 34.151659] Memory state around the buggy address: [ 34.151932] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.152079] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.152296] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.152497] ^ [ 34.152651] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.152929] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.153040] ================================================================== [ 34.234833] ================================================================== [ 34.234986] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 34.235555] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.236190] [ 34.236356] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.236677] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.236778] Hardware name: linux,dummy-virt (DT) [ 34.236913] Call trace: [ 34.237003] show_stack+0x20/0x38 (C) [ 34.237190] dump_stack_lvl+0x8c/0xd0 [ 34.237342] print_report+0x118/0x608 [ 34.237512] kasan_report+0xdc/0x128 [ 34.237628] kasan_check_range+0x100/0x1a8 [ 34.237939] __kasan_check_write+0x20/0x30 [ 34.238294] kasan_atomics_helper+0x147c/0x4858 [ 34.238458] kasan_atomics+0x198/0x2e0 [ 34.238588] kunit_try_run_case+0x170/0x3f0 [ 34.238713] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.239104] kthread+0x328/0x630 [ 34.239226] ret_from_fork+0x10/0x20 [ 34.239370] [ 34.239449] Allocated by task 276: [ 34.239757] kasan_save_stack+0x3c/0x68 [ 34.239900] kasan_save_track+0x20/0x40 [ 34.240315] kasan_save_alloc_info+0x40/0x58 [ 34.240552] __kasan_kmalloc+0xd4/0xd8 [ 34.240699] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.240848] kasan_atomics+0xb8/0x2e0 [ 34.240967] kunit_try_run_case+0x170/0x3f0 [ 34.241065] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.241200] kthread+0x328/0x630 [ 34.241295] ret_from_fork+0x10/0x20 [ 34.241461] [ 34.241515] The buggy address belongs to the object at fff00000c76a3180 [ 34.241515] which belongs to the cache kmalloc-64 of size 64 [ 34.241670] The buggy address is located 0 bytes to the right of [ 34.241670] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.242186] [ 34.242335] The buggy address belongs to the physical page: [ 34.242480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.242754] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.243329] page_type: f5(slab) [ 34.243461] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.243600] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.243715] page dumped because: kasan: bad access detected [ 34.243799] [ 34.243886] Memory state around the buggy address: [ 34.243967] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.244117] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.244231] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.244585] ^ [ 34.244727] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.244918] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.245029] ================================================================== [ 34.359109] ================================================================== [ 34.359243] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 34.359768] Read of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.359911] [ 34.360003] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.360213] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.360280] Hardware name: linux,dummy-virt (DT) [ 34.360359] Call trace: [ 34.360418] show_stack+0x20/0x38 (C) [ 34.360540] dump_stack_lvl+0x8c/0xd0 [ 34.361315] print_report+0x118/0x608 [ 34.361579] kasan_report+0xdc/0x128 [ 34.361789] __asan_report_load8_noabort+0x20/0x30 [ 34.362184] kasan_atomics_helper+0x3e20/0x4858 [ 34.362429] kasan_atomics+0x198/0x2e0 [ 34.362554] kunit_try_run_case+0x170/0x3f0 [ 34.363324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.363639] kthread+0x328/0x630 [ 34.363779] ret_from_fork+0x10/0x20 [ 34.364004] [ 34.364059] Allocated by task 276: [ 34.364227] kasan_save_stack+0x3c/0x68 [ 34.364576] kasan_save_track+0x20/0x40 [ 34.364928] kasan_save_alloc_info+0x40/0x58 [ 34.365043] __kasan_kmalloc+0xd4/0xd8 [ 34.365559] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.365694] kasan_atomics+0xb8/0x2e0 [ 34.365778] kunit_try_run_case+0x170/0x3f0 [ 34.365861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.365977] kthread+0x328/0x630 [ 34.366522] ret_from_fork+0x10/0x20 [ 34.366651] [ 34.367107] The buggy address belongs to the object at fff00000c76a3180 [ 34.367107] which belongs to the cache kmalloc-64 of size 64 [ 34.367296] The buggy address is located 0 bytes to the right of [ 34.367296] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.368033] [ 34.368103] The buggy address belongs to the physical page: [ 34.368204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.368348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.368808] page_type: f5(slab) [ 34.368952] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.369694] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.369825] page dumped because: kasan: bad access detected [ 34.369916] [ 34.369969] Memory state around the buggy address: [ 34.370149] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.370269] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.370384] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.370509] ^ [ 34.370606] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.370735] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.370845] ================================================================== [ 34.070170] ================================================================== [ 34.070597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 34.070794] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.070959] [ 34.071045] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.071253] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.071363] Hardware name: linux,dummy-virt (DT) [ 34.071498] Call trace: [ 34.071566] show_stack+0x20/0x38 (C) [ 34.071697] dump_stack_lvl+0x8c/0xd0 [ 34.071822] print_report+0x118/0x608 [ 34.071946] kasan_report+0xdc/0x128 [ 34.072063] kasan_check_range+0x100/0x1a8 [ 34.072188] __kasan_check_write+0x20/0x30 [ 34.072303] kasan_atomics_helper+0xeb8/0x4858 [ 34.072436] kasan_atomics+0x198/0x2e0 [ 34.072557] kunit_try_run_case+0x170/0x3f0 [ 34.072679] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.072817] kthread+0x328/0x630 [ 34.072948] ret_from_fork+0x10/0x20 [ 34.073077] [ 34.073134] Allocated by task 276: [ 34.073212] kasan_save_stack+0x3c/0x68 [ 34.073321] kasan_save_track+0x20/0x40 [ 34.073727] kasan_save_alloc_info+0x40/0x58 [ 34.074346] __kasan_kmalloc+0xd4/0xd8 [ 34.074732] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.074833] kasan_atomics+0xb8/0x2e0 [ 34.074952] kunit_try_run_case+0x170/0x3f0 [ 34.075077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.075245] kthread+0x328/0x630 [ 34.075371] ret_from_fork+0x10/0x20 [ 34.075509] [ 34.075809] The buggy address belongs to the object at fff00000c76a3180 [ 34.075809] which belongs to the cache kmalloc-64 of size 64 [ 34.075970] The buggy address is located 0 bytes to the right of [ 34.075970] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.076312] [ 34.076425] The buggy address belongs to the physical page: [ 34.076527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.076924] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.077070] page_type: f5(slab) [ 34.077310] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.077648] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.077764] page dumped because: kasan: bad access detected [ 34.077945] [ 34.078105] Memory state around the buggy address: [ 34.078323] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.078464] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.078560] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.078654] ^ [ 34.078745] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.079139] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.079354] ================================================================== [ 33.934809] ================================================================== [ 33.934967] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 33.935110] Read of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 33.936268] [ 33.936367] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 33.937307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.937520] Hardware name: linux,dummy-virt (DT) [ 33.937608] Call trace: [ 33.937674] show_stack+0x20/0x38 (C) [ 33.937809] dump_stack_lvl+0x8c/0xd0 [ 33.940009] kasan_atomics+0x198/0x2e0 [ 33.942336] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.942889] ret_from_fork+0x10/0x20 [ 33.943670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 33.943858] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.943986] page_type: f5(slab) [ 33.944208] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.944797] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.945011] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.948274] kunit_try_run_case+0x170/0x3f0 [ 33.950540] The buggy address belongs to the physical page: [ 33.950755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.950917] page_type: f5(slab) [ 33.951297] page dumped because: kasan: bad access detected [ 33.952049] ^ [ 33.952140] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.952318] ================================================================== [ 34.246294] ================================================================== [ 34.246420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 34.246547] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.246730] [ 34.246819] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.247121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.247210] Hardware name: linux,dummy-virt (DT) [ 34.247287] Call trace: [ 34.247349] show_stack+0x20/0x38 (C) [ 34.247770] dump_stack_lvl+0x8c/0xd0 [ 34.247957] print_report+0x118/0x608 [ 34.248090] kasan_report+0xdc/0x128 [ 34.248211] kasan_check_range+0x100/0x1a8 [ 34.248335] __kasan_check_write+0x20/0x30 [ 34.248449] kasan_atomics_helper+0x14e4/0x4858 [ 34.248589] kasan_atomics+0x198/0x2e0 [ 34.248710] kunit_try_run_case+0x170/0x3f0 [ 34.249088] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.249247] kthread+0x328/0x630 [ 34.249453] ret_from_fork+0x10/0x20 [ 34.249578] [ 34.249629] Allocated by task 276: [ 34.249998] kasan_save_stack+0x3c/0x68 [ 34.250165] kasan_save_track+0x20/0x40 [ 34.250307] kasan_save_alloc_info+0x40/0x58 [ 34.250413] __kasan_kmalloc+0xd4/0xd8 [ 34.250493] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.250600] kasan_atomics+0xb8/0x2e0 [ 34.250691] kunit_try_run_case+0x170/0x3f0 [ 34.250993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.251120] kthread+0x328/0x630 [ 34.251233] ret_from_fork+0x10/0x20 [ 34.251465] [ 34.251559] The buggy address belongs to the object at fff00000c76a3180 [ 34.251559] which belongs to the cache kmalloc-64 of size 64 [ 34.251788] The buggy address is located 0 bytes to the right of [ 34.251788] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.252021] [ 34.252086] The buggy address belongs to the physical page: [ 34.252172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.252307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.252443] page_type: f5(slab) [ 34.252551] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.252744] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.252902] page dumped because: kasan: bad access detected [ 34.252978] [ 34.253032] Memory state around the buggy address: [ 34.253112] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.253239] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.253723] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.253906] ^ [ 34.254136] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.254323] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.254665] ================================================================== [ 34.375374] ================================================================== [ 34.375511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 34.375892] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.376132] [ 34.376748] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.377005] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.377257] Hardware name: linux,dummy-virt (DT) [ 34.377352] Call trace: [ 34.377587] show_stack+0x20/0x38 (C) [ 34.377833] dump_stack_lvl+0x8c/0xd0 [ 34.378458] print_report+0x118/0x608 [ 34.378601] kasan_report+0xdc/0x128 [ 34.378994] kasan_check_range+0x100/0x1a8 [ 34.379297] __kasan_check_write+0x20/0x30 [ 34.379819] kasan_atomics_helper+0x17ec/0x4858 [ 34.380215] kasan_atomics+0x198/0x2e0 [ 34.380570] kunit_try_run_case+0x170/0x3f0 [ 34.381067] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.381341] kthread+0x328/0x630 [ 34.381523] ret_from_fork+0x10/0x20 [ 34.381718] [ 34.381788] Allocated by task 276: [ 34.381937] kasan_save_stack+0x3c/0x68 [ 34.382098] kasan_save_track+0x20/0x40 [ 34.382371] kasan_save_alloc_info+0x40/0x58 [ 34.382489] __kasan_kmalloc+0xd4/0xd8 [ 34.382633] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.382741] kasan_atomics+0xb8/0x2e0 [ 34.382839] kunit_try_run_case+0x170/0x3f0 [ 34.383518] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.383987] kthread+0x328/0x630 [ 34.384115] ret_from_fork+0x10/0x20 [ 34.384268] [ 34.384341] The buggy address belongs to the object at fff00000c76a3180 [ 34.384341] which belongs to the cache kmalloc-64 of size 64 [ 34.384898] The buggy address is located 0 bytes to the right of [ 34.384898] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.385063] [ 34.385145] The buggy address belongs to the physical page: [ 34.385449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.386002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.386134] page_type: f5(slab) [ 34.386763] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.386930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.387406] page dumped because: kasan: bad access detected [ 34.387500] [ 34.387557] Memory state around the buggy address: [ 34.387870] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.388354] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.388946] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.389068] ^ [ 34.389178] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.389359] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.389703] ================================================================== [ 34.111973] ================================================================== [ 34.112127] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 34.112364] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.112667] [ 34.112949] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.113390] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.113644] Hardware name: linux,dummy-virt (DT) [ 34.113747] Call trace: [ 34.113814] show_stack+0x20/0x38 (C) [ 34.114235] dump_stack_lvl+0x8c/0xd0 [ 34.114687] print_report+0x118/0x608 [ 34.114926] kasan_report+0xdc/0x128 [ 34.115048] kasan_check_range+0x100/0x1a8 [ 34.115147] __kasan_check_write+0x20/0x30 [ 34.115521] kasan_atomics_helper+0x1058/0x4858 [ 34.116038] kasan_atomics+0x198/0x2e0 [ 34.116545] kunit_try_run_case+0x170/0x3f0 [ 34.116761] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.117123] kthread+0x328/0x630 [ 34.117241] ret_from_fork+0x10/0x20 [ 34.117367] [ 34.117417] Allocated by task 276: [ 34.117491] kasan_save_stack+0x3c/0x68 [ 34.117906] kasan_save_track+0x20/0x40 [ 34.118163] kasan_save_alloc_info+0x40/0x58 [ 34.118492] __kasan_kmalloc+0xd4/0xd8 [ 34.118841] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.119093] kasan_atomics+0xb8/0x2e0 [ 34.119195] kunit_try_run_case+0x170/0x3f0 [ 34.119299] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.119778] kthread+0x328/0x630 [ 34.120084] ret_from_fork+0x10/0x20 [ 34.120325] [ 34.120494] The buggy address belongs to the object at fff00000c76a3180 [ 34.120494] which belongs to the cache kmalloc-64 of size 64 [ 34.120913] The buggy address is located 0 bytes to the right of [ 34.120913] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.121243] [ 34.121567] The buggy address belongs to the physical page: [ 34.121674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.121826] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.121967] page_type: f5(slab) [ 34.122255] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.122830] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.123002] page dumped because: kasan: bad access detected [ 34.123099] [ 34.123159] Memory state around the buggy address: [ 34.123251] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.123370] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.123486] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.123590] ^ [ 34.123678] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.123788] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.123901] ================================================================== [ 34.001243] ================================================================== [ 34.001372] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 34.001544] Write of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.001677] [ 34.002121] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.002438] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.002731] Hardware name: linux,dummy-virt (DT) [ 34.002953] Call trace: [ 34.003030] show_stack+0x20/0x38 (C) [ 34.003163] dump_stack_lvl+0x8c/0xd0 [ 34.003515] print_report+0x118/0x608 [ 34.003937] kasan_report+0xdc/0x128 [ 34.004462] kasan_check_range+0x100/0x1a8 [ 34.004624] __kasan_check_write+0x20/0x30 [ 34.004744] kasan_atomics_helper+0xd3c/0x4858 [ 34.004889] kasan_atomics+0x198/0x2e0 [ 34.005081] kunit_try_run_case+0x170/0x3f0 [ 34.005270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.005451] kthread+0x328/0x630 [ 34.005556] ret_from_fork+0x10/0x20 [ 34.005682] [ 34.005743] Allocated by task 276: [ 34.005927] kasan_save_stack+0x3c/0x68 [ 34.006305] kasan_save_track+0x20/0x40 [ 34.006507] kasan_save_alloc_info+0x40/0x58 [ 34.006608] __kasan_kmalloc+0xd4/0xd8 [ 34.006712] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.006802] kasan_atomics+0xb8/0x2e0 [ 34.006909] kunit_try_run_case+0x170/0x3f0 [ 34.007252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.007381] kthread+0x328/0x630 [ 34.007469] ret_from_fork+0x10/0x20 [ 34.007559] [ 34.007617] The buggy address belongs to the object at fff00000c76a3180 [ 34.007617] which belongs to the cache kmalloc-64 of size 64 [ 34.007773] The buggy address is located 0 bytes to the right of [ 34.007773] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.007955] [ 34.008024] The buggy address belongs to the physical page: [ 34.008111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.008573] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.008773] page_type: f5(slab) [ 34.008935] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.009132] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.009260] page dumped because: kasan: bad access detected [ 34.009347] [ 34.009395] Memory state around the buggy address: [ 34.009505] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.009615] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.009961] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.010067] ^ [ 34.010160] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.010278] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.010379] ================================================================== [ 34.197379] ================================================================== [ 34.197851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 34.198185] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.198329] [ 34.198411] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.198964] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.199050] Hardware name: linux,dummy-virt (DT) [ 34.199304] Call trace: [ 34.199635] show_stack+0x20/0x38 (C) [ 34.200031] dump_stack_lvl+0x8c/0xd0 [ 34.200275] print_report+0x118/0x608 [ 34.200472] kasan_report+0xdc/0x128 [ 34.200587] kasan_check_range+0x100/0x1a8 [ 34.201012] __kasan_check_write+0x20/0x30 [ 34.201791] kasan_atomics_helper+0x1384/0x4858 [ 34.201930] kasan_atomics+0x198/0x2e0 [ 34.202067] kunit_try_run_case+0x170/0x3f0 [ 34.202178] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.202316] kthread+0x328/0x630 [ 34.202440] ret_from_fork+0x10/0x20 [ 34.202578] [ 34.202633] Allocated by task 276: [ 34.202708] kasan_save_stack+0x3c/0x68 [ 34.203199] kasan_save_track+0x20/0x40 [ 34.203718] kasan_save_alloc_info+0x40/0x58 [ 34.203983] __kasan_kmalloc+0xd4/0xd8 [ 34.204087] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.204184] kasan_atomics+0xb8/0x2e0 [ 34.204556] kunit_try_run_case+0x170/0x3f0 [ 34.204684] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.204817] kthread+0x328/0x630 [ 34.204915] ret_from_fork+0x10/0x20 [ 34.205015] [ 34.205285] The buggy address belongs to the object at fff00000c76a3180 [ 34.205285] which belongs to the cache kmalloc-64 of size 64 [ 34.205672] The buggy address is located 0 bytes to the right of [ 34.205672] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.205837] [ 34.205905] The buggy address belongs to the physical page: [ 34.205991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.206182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.206382] page_type: f5(slab) [ 34.206507] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.207268] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.207524] page dumped because: kasan: bad access detected [ 34.207720] [ 34.207976] Memory state around the buggy address: [ 34.208165] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.208550] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.208838] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.208982] ^ [ 34.209159] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.209437] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.209531] ================================================================== [ 34.153900] ================================================================== [ 34.154021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 34.154199] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.154372] [ 34.154502] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.154808] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.155465] Hardware name: linux,dummy-virt (DT) [ 34.155671] Call trace: [ 34.155728] show_stack+0x20/0x38 (C) [ 34.155842] dump_stack_lvl+0x8c/0xd0 [ 34.156007] print_report+0x118/0x608 [ 34.156345] kasan_report+0xdc/0x128 [ 34.156465] kasan_check_range+0x100/0x1a8 [ 34.156631] __kasan_check_write+0x20/0x30 [ 34.156852] kasan_atomics_helper+0x1190/0x4858 [ 34.157375] kasan_atomics+0x198/0x2e0 [ 34.157536] kunit_try_run_case+0x170/0x3f0 [ 34.157671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.157894] kthread+0x328/0x630 [ 34.158111] ret_from_fork+0x10/0x20 [ 34.158494] [ 34.158598] Allocated by task 276: [ 34.158668] kasan_save_stack+0x3c/0x68 [ 34.158757] kasan_save_track+0x20/0x40 [ 34.159028] kasan_save_alloc_info+0x40/0x58 [ 34.159149] __kasan_kmalloc+0xd4/0xd8 [ 34.159403] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.159623] kasan_atomics+0xb8/0x2e0 [ 34.159735] kunit_try_run_case+0x170/0x3f0 [ 34.160087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.160373] kthread+0x328/0x630 [ 34.160462] ret_from_fork+0x10/0x20 [ 34.160552] [ 34.160610] The buggy address belongs to the object at fff00000c76a3180 [ 34.160610] which belongs to the cache kmalloc-64 of size 64 [ 34.161010] The buggy address is located 0 bytes to the right of [ 34.161010] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.161229] [ 34.161381] The buggy address belongs to the physical page: [ 34.161698] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.161943] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.162088] page_type: f5(slab) [ 34.162189] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.162293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.162609] page dumped because: kasan: bad access detected [ 34.162818] [ 34.162905] Memory state around the buggy address: [ 34.163117] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.163514] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.163715] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.163822] ^ [ 34.163917] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.164020] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.164125] ==================================================================